Documentation Index
Fetch the complete documentation index at: https://docs.iru.com/llms.txt
Use this file to discover all available pages before exploring further.
Create a Windows Update Library Item
To add this Library Item to your Iru Endpoint Library, follow the steps in the Library Overview article.Settings
The following settings are available for Windows Update.Manage updates offered from Windows Update
Allow optional content
Controls whether devices receive optional updates and gradual rollouts (controlled feature rollouts, or CFRs) in addition to required updates. Options:- Don’t receive optional updates
- Automatically receive optional updates (including CFRs)
- Automatically receive optional updates only
- Users can select optional updates
Manage end-user experience
Allow auto update
Controls how updates are installed: notify only, auto install, or auto install and restart. Options:- Notify the user before downloading the update
- Auto install and then notify the user to schedule a restart
- Auto install and restart (default)
- Auto install and restart at a scheduled time
- Allow the local administrator to choose the setting
- Turn off automatic updates
Active hours start
Start of the active hours window (hour 0–23). Windows avoids restarting the device for updates during this time.Active hours end
End of the active hours window (hour 0–23). Restarts can occur after this hour.Set disable pause UX access
Controls whether users can pause updates from the Windows Update UI. Options: Users can pause updates, or Remove the pause option from the device UI. Choose the latter to prevent users from stalling updates.Manage preview builds
Controls whether the device can receive Windows Insider Preview builds. Options:- Disable Preview builds
- Disable Preview builds once the next release is public
- Enable Preview builds
- Preview builds are left to user selection
Update notification level
Controls which update notifications users see: default, hide all except restart warnings, or hide all including restart warnings. Options:- Use the default Windows Update notifications
- Disable restart notifications for updates (excludes restart warnings)
- Disable all notifications for updates (includes restart warnings)
Advanced settings
These settings appear in an expandable section of the Library Item. They are not configured by default and are for admins who need more control over update behavior.Manage updates from Windows Update
Manage updates from Windows Update
- Allow non-Microsoft signed update Lets the device accept updates signed by someone other than Microsoft when using an intranet update service (for example, WSUS for third-party patches).
- Automatic maintenance wake up Allows Automatic Maintenance to wake the device for its daily scheduled maintenance if needed.
- Disable WUfB safeguards Windows Update for Business (WUfB). When enabled, devices skip Microsoft safeguard holds that block upgrades when known compatibility issues exist. Use only for validation; it can lead to poor upgrade experiences.
- Exclude WU drivers in quality update Excludes driver updates from Windows quality updates. Use if you manage drivers separately.
Manage end-user experience
Manage end-user experience
- Active hours max range Maximum number of hours (8–18) that users can set for their active hours window, starting from the active hours start time.
- Allow auto Windows Update download over metered network Allows Windows Update to download updates over metered (for example, cellular) connections. May incur data charges.
- Allow MU update service Controls whether the device scans for app and other Microsoft product updates via Microsoft Update.
- Allow temporary enterprise feature control When allowed, features delivered in monthly quality updates (servicing) are turned on before the next feature update. When disabled, those features stay off until the feature update that includes them.
- Configure feature update uninstall period Number of days (2–60) that users can uninstall a feature update after it is installed.
- No update notifications during active hours Reduces or turns off Windows Update notifications during active hours (optionally excluding restart warnings). Notifications can still appear after the deadline if configured.
- Scheduled install day Day of the week (or every day) when updates are installed. Only applies when Allow auto update is set to Auto install and restart at a scheduled time or Allow the local administrator to choose the setting. Options: Every day, Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday.
- Scheduled install every week When enabled, updates are scheduled every week. Only applies when Allow auto update is set to Auto install and restart at a scheduled time or Allow the local administrator to choose the setting.
- Scheduled install first week Schedule install during the first week of the month (days 1–7). Use with Scheduled install day for a specific weekday (for example, first Tuesday).
- Scheduled install second week Schedule install during the second week of the month (days 8–14). Use with Scheduled install day for a specific weekday.
- Scheduled install third week Schedule install during the third week of the month (days 15–21). Use with Scheduled install day for a specific weekday.
- Scheduled install fourth week Schedule install during the fourth week of the month (days 22–31). Use with Scheduled install day for a specific weekday.
- Scheduled install time Hour of the day (0–23) when scheduled updates install. There is about a 30-minute window. Only applies when Allow auto update is set to Auto install and restart at a scheduled time or Allow the local administrator to choose the setting.
- Set disable UX WU access When enabled, users cannot scan, download, or install updates from the Windows Update settings UI.
- Set EDU restart Allows the device to automatically restart outside active hours to finish updates. Intended for Education (EDU) scenarios.
Manage updates from WSUS
Manage updates from WSUS
- Allow update service When using an intranet update service, this controls whether the device can still use Microsoft Update, WSUS, or Microsoft Store. Disabling can break Store and other public services.
- Detection frequency How many hours Windows waits before checking for updates, plus a 0–4 hour random offset. Only applies when using a WSUS server. Range: 1–22 hours.
- Do not enforce enterprise TLS cert pinning for update detection When enabled, the Windows Update client does not enforce TLS certificate pinning for update detection. Microsoft recommends keeping TLS pinning enabled for WSUS environments.
- Fill empty content URLs Lets Windows Update Agent determine download URLs when metadata does not include them. Use when working with an alternate download server or ISV cache that does not populate all content URLs.
- Set policy driven update source for driver updates Chooses whether driver updates come from Windows Update or your WSUS server. Requires Update service URL to be set.
- Set policy driven update source for feature updates Chooses whether feature updates come from Windows Update or your WSUS server. Requires Update service URL to be set.
- Set policy driven update source for other updates Chooses whether other updates come from Windows Update or your WSUS server. Requires Update service URL to be set.
- Set policy driven update source for quality updates Chooses whether quality updates come from Windows Update or your WSUS server. Requires Update service URL to be set.
- Set proxy behavior for update detection Allows using the user proxy as a fallback when detecting updates with an HTTP WSUS server. Using the user proxy can reduce security; prefer system proxy when possible.
-
Update service URL
URL of your WSUS server so devices check for updates there instead of Microsoft Update (for example,
https://server:8531orhttp://server:8530). Per-type update source settings require this field to be configured before they take effect. - Update service URL alternate Alternate intranet server for update detection, download, or statistics reporting. Use this to specify a secondary download server or redirect reporting traffic separately from the main WSUS server.
Considerations
Unconfigured settings
Unconfigured settings
Disabling access to Windows Update UI
Disabling access to Windows Update UI
Active hours and restarts
Active hours and restarts
WSUS: Update service URL required
WSUS: Update service URL required
Allow update service
Allow update service
Detection frequency
Detection frequency
Proxy behavior for update detection
Proxy behavior for update detection
TLS cert pinning
TLS cert pinning
Best Practices
Start with the defaults
Define active hours for your fleet
Disable pause access for managed fleets
Test before deploying broadly
Troubleshooting
Updates are not installing on schedule
Updates are not installing on schedule
- Allow auto update is not set to the intended option
- Scheduled install time or day misconfigured
- Active hours configured too broadly (for example, close to the maximum allowed range)
- Verify that Allow auto update is set to your intended option
- Check that the scheduled install time and day are configured correctly
- Ensure active hours are configured to a realistic workday window and respect the Active hours max range setting
Users are pausing updates
Users are pausing updates
- Set disable pause UX access is not enabled or is set to allow pausing
- Set Set disable pause UX access to Remove the pause option from the device UI
Devices are restarting during business hours
Devices are restarting during business hours
- Active hours start and end do not cover the full workday
- Incorrect time zone or configuration
- Review your Active hours start and Active hours end settings
- Make sure the range covers the full workday for your users
Preview builds appearing on managed devices
Preview builds appearing on managed devices
- Manage preview builds is set to allow preview builds or left to user selection
- Set Manage preview builds to Disable Preview builds to prevent devices from receiving Windows Insider builds
Devices are not receiving updates from WSUS
Devices are not receiving updates from WSUS
- Update service URL not configured or not reachable from devices
- Verify that Update service URL is configured and reachable from your devices. Per-type source settings will not take effect without a valid Update service URL.
Microsoft Store or Microsoft services not working
Microsoft Store or Microsoft services not working
- Allow update service is disabled
- Check whether Allow update service is disabled. Disabling it can block access to Microsoft Store and other public Microsoft services.
Devices are not detecting updates
Devices are not detecting updates
- Detection frequency misconfigured or not accounting for random offset
- Review Detection frequency. Windows adds a 0–4 hour random offset to the configured interval. If detection frequency is not configured, the CSP default is 22 hours.
Update scanning is failing with TLS errors
Update scanning is failing with TLS errors
- WSUS server certificate conflicts with TLS pinning
- If your WSUS server uses a certificate that conflicts with TLS pinning, enable Do not enforce enterprise TLS cert pinning for update detection after confirming the certificate configuration on the WSUS server.
Download URLs missing or broken
Download URLs missing or broken
- Alternate download server or ISV cache not populating content URLs in metadata
- If you use an alternate download server or ISV cache, enable Fill empty content URLs so Windows Update Agent can resolve download paths when they are absent from update metadata.