SOLVED
Home

Windows 10 1809 - Feature on Demand but prevent users from using WindowsUpdate

%3CLINGO-SUB%20id%3D%22lingo-sub-386593%22%20slang%3D%22en-US%22%3EWindows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-386593%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20use%20a%20SCCM%201810%20environment.%20Beginning%20with%20Windows%2010%201709%2C%20you%20can%E2%80%99t%20use%20WSUS%20to%20host%20Features%20on%20Demand%20and%20language%20packs%20for%20Windows%2010%20clients.%3CBR%20%2F%3ESince%20we%20use%20Windows%2010%201809%20I%20noticed%20also%20RSAT%20and%20Language.Handwriting%20packages%20are%20not%20available%20anymore%20in%20WSUS%2FSCCM%20environment.%3CBR%20%2F%3EInstead%2C%20you%20need%20to%20download%20them%20directly%20from%20Windows%20Update.%20So%20just%20used%20%3CEM%3EGet-WindowsCapability%3C%2FEM%3E%20commandline%20and%20tried%20to%20install%20missing%20features%20and%20ran%20into%26nbsp%3B%3C%2FP%3E%3CP%3E0x800f0954%20error.%26nbsp%3BAfter%20changing%20the%20GPO%20%E2%80%9CDownload%20repair%20content%20and%20optional%E2%80%A6%E2%80%9D%20we%20now%20receive%20a%20different%20error%3A%200x8024002e.%26nbsp%3BChanging%26nbsp%3B%20%3CEM%3EComputer%5CHKEY_LOCAL_MACHINE%5CSOFTWARE%5CPolicies%5CMicrosoft%5CWindows%5CWindowsUpdate%5CDisableWindowsUpdateAccess%3C%2FEM%3E%20from%20%E2%80%9C1%E2%80%9D%20to%20%E2%80%9C0%E2%80%9D%20prevents%20error%200x8024002e%20and%3CBR%20%2F%3Ecommandline%3A%20%E2%80%9DGet-WindowsCapability%20-Online%20%7C%20where%20name%20-like%20*.....*%20%7C%20Add-WindowsCapability%20-Online%E2%80%9D%20works%20now.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EBut%20now%2C%20our%20users%20are%20able%20to%20use%20%E2%80%9CWindows%20Update%20%E2%80%93%20Check%20online%20for%20updates%20from%20Microsoft%20Windows%E2%80%9D%20directly.%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F99107i3946B7239A6D4F28%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Windows_Update.jpg%22%20title%3D%22Windows_Update.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EI%20have%20something%20to%20consider%20that%20our%20users%20are%20now%20able%20to%20download%20and%20install%20Windows%20Feature%20Updates%20(f.e.%201809)%20over%20here.%3C%2FP%3E%3CP%3EIs%20there%20any%20best%20practice%20how%20to%20prevent%20users%20from%20installing%20updates%20from%20WindowsUpdate%20directly%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-386593%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECM%20current%20branch%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESoftware%20Update%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-401411%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-401411%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F126269%22%20target%3D%22_blank%22%3E%40Jochen%20Schmitt%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIf%20you%20enabled%20the%20%22Do%20not%20allow%20update%20deferral%20policies%20to%20cause%20scan%20against%20windows%20update%22%20than%20you're%20all%20good.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-393775%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-393775%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255442%22%20target%3D%22_blank%22%3E%40RahamimL%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eseems%20the%20suggested%20config%20solves%20my%20problem%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3ETurn%20off%20access%20to%20all%20Windows%20Update%20features%20is%20set%3C%2FSTRONG%3E%20to%20%221%22%20at%20the%20moment.%20Changing%20it%20to%20%220%22%20and%20configure%20%22%3CSTRONG%3ERemove%20access%20to%20use%20all%20Windows%20Update%20features%3C%2FSTRONG%3E%22%20to%20%221%22%20shows%20now%26nbsp%3Bthe%20behavior%20I%20wanted.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20description%20of%20%3CSPAN%3EDisableWindowsUpdateAccess%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3Bsays%20%22..and%20enable%20automatic%20updating%20to%20receive%20notifications%20and%20critical%20updates%20from%20Windows%20Update%22%20Is%20there%20any%20risk%20that%20my%20clients%20will%20receive%20feature%20updates%20from%20windowsupdate%20and%20not%20from%20my%20SCCM%20environment%3F%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-393697%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-393697%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F126269%22%20target%3D%22_blank%22%3E%40Jochen%20Schmitt%3C%2FA%3Eyou%20are%20using%20this%3A%3C%2FP%3E%3CP%3E%3CA%20title%3D%22Turn%20off%20access%20to%20all%20Windows%20Update%20features%22%20href%3D%22https%3A%2F%2Fgetadmx.com%2F%3FCategory%3DWindows_10_2016%26amp%3BPolicy%3DMicrosoft.Policies.InternetCommunicationManagement%3A%3ARemoveWindowsUpdate_ICM%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgetadmx.com%2F%3FCategory%3DWindows_10_2016%26amp%3BPolicy%3DMicrosoft.Policies.InternetCommunicationManagement%3A%3ARemoveWindowsUpdate_ICM%3C%2FA%3E%3C%2FP%3E%3CP%3EYou%20need%20to%20use%3A%3C%2FP%3E%3CP%3E%3CA%20title%3D%22Remove%20access%20to%20use%20all%20Windows%20Update%20features%22%20href%3D%22https%3A%2F%2Fgetadmx.com%2F%3FCategory%3DWindows_10_2016%26amp%3BPolicy%3DMicrosoft.Policies.WindowsUpdate%3A%3ADisableUXWUAccess%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgetadmx.com%2F%3FCategory%3DWindows_10_2016%26amp%3BPolicy%3DMicrosoft.Policies.WindowsUpdate%3A%3ADisableUXWUAccess%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-393658%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-393658%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255442%22%20target%3D%22_blank%22%3E%40RahamimL%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPlease%20see%20the%20config%20attached.%26nbsp%3B%3C%2FP%3E%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-393061%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-393061%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F126269%22%20target%3D%22_blank%22%3E%40Jochen%20Schmitt%3C%2FA%3E%2C%20That%20is%20weird...%20I%20use%20this%20policy%20on%201803%20and%20don't%20have%20this%20issue...%20I%20can%20run%20%22Add-WindowsCapabilty%22%20elevated%20without%20errors.%3C%2FP%3E%3CP%3EAlso%2C%20I%20just%20tested%20this%20on%20a%201809%20that%20I%20have%20and%26nbsp%3B%20it%20is%20working%20perfectly...%20Can%20you%20share%20your%20policies%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ERahamim%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-393012%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-393012%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255442%22%20target%3D%22_blank%22%3E%40RahamimL%3C%2FA%3E%26nbsp%3B%20But%20it%20seems%26nbsp%3B%3CEM%3EComputer%5CHKEY_LOCAL_MACHINE%5CSOFTWARE%5CPolicies%5CMicrosoft%5CWindows%5CWindowsUpdate%5CDisableWindowsUpdateAccess%20%3C%2FEM%3Eis%20the%20same%20as%20R%22emove%20access%20to%20all%20Windows%20Update%20features%22%20So%20this%20will%20not%20help%20for%20my%20scenario.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390799%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390799%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F126269%22%20target%3D%22_blank%22%3E%40Jochen%20Schmitt%3C%2FA%3EI%20believe%20it%20is%202%20of%20them%3A%3C%2FP%3E%3COL%3E%3CLI%3ERemove%20access%20to%20all%20Windows%20Update%20features%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FLI%3E%3CLI%3E%3CSPAN%3E%3CSPAN%3EAllow%20non-administrators%20to%20receive%20update%20notification%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FLI%3E%3C%2FOL%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390760%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390760%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F255442%22%20target%3D%22_blank%22%3E%40RahamimL%3C%2FA%3E%26nbsp%3B%20Thank%20you%20for%20your%20answer.%20Which%20GPO%20setting%20do%20you%20mean%20will%20prevent%20users%20in%20checking%20the%20updates%3F%20It's%20not%20really%20clear%20for%20me.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-388469%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-388469%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F126269%22%20target%3D%22_blank%22%3E%40Jochen%20Schmitt%3C%2FA%3E%26nbsp%3Bcheck%20this%3A%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20683px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F100006i5A9B47E0482D0C6A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22WSUS-GPO.PNG%22%20title%3D%22WSUS-GPO.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-799992%22%20slang%3D%22en-US%22%3ERe%3A%20Windows%2010%201809%20-%20Feature%20on%20Demand%20but%20prevent%20users%20from%20using%20WindowsUpdate%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-799992%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F126269%22%20target%3D%22_blank%22%3E%40Jochen%20Schmitt%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWindows%20environment%3A%201803%20Enterprise%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAfter%20a%20lot%20of%20pain%2C%20I%20am%20happy%20I%20found%20this%20post.%3C%2FP%3E%3CP%3ESo%20in%20our%20occassion%20where%20we%20really%20need%20to%20have%20the%20clients%20blocked%20from%20WU%2C%20I%20had%20to%20allow%20them%20to%20download%20FODs%20from%20WU%20since%20hosting%20them%20is%20a%20-no%20go-%20from%20Microsoft%20for%20the%20future%20builds.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3E1.%20Specify%20settings%20for%20optional%20component%20installation%20and%20component%20repair%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3EComputer%20Configuration%5CPolicies%5CAdministrative%20Templates%5CSystem%5CSpecify%20settings%20for%20optional%20component%20installation%20and%20component%20repair.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOnce%20we%20set%20this%20up%2C%20with%20a%20Blank%20alternate%20source%20and%20only%20checked%20that%20clients%20should%20contact%20WU%20instead%20of%20WSUS%2C%20we%20got%20the%20following%20error%20on%20Add-WindowsCapability%20-Online%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E0x8024002e%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20meant%20that%20something%20else%20was%20blocking%20access%20to%20WU%20so%20we%20changed%20the%20following%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3E2.%20Do%20not%20connect%20to%20any%20Windows%20Update%20Internet%20locations%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3EComputer%20Configuration%5CAdministrative%20Templates%5CWindows%20Components%5CWindows%20update%5CDo%20not%20connect%20to%20any%20Windows%20Update%20Internet%20locations%3C%2FP%3E%3CP%3EWe%20set%20this%20to%20%3CSTRONG%3EDisabled%3C%2FSTRONG%3Esince%20we%20need%20clients%20to%20be%20able%20to%20contact%20WU%2C%20Store%20and%20DO.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMicrosoft%20documentation%3A%3C%2FP%3E%3CP%3E%3CEM%3E%22When%20enabled%2C%20this%20policy%20will%20disable%20the%20functionality%20described%20above%2C%20and%20may%20cause%20connection%20to%20public%20services%20such%20as%20the%20Microsoft%20Store%2C%20Windows%20Update%20for%20Business%20and%20Delivery%20Optimization%20to%20stop%20working.%22%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20reality%20this%20has%20been%20the%20case%20for%20a%20year%20now%20and%20our%20clients%20never%20misbehaved%20(I%20have%20set%20the%20proper%20policy%20setting%20for%20Dual%20Scan%20so%20clients%20will%20not%20get%20tricked%20into%20pulling%20Feature%20Updates%20from%20WU).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBut%20then%20it%20still%20failed%20for%20us%20with%20another%20error%20code!%20So%20what%20is%20blocking%20this%20functionality%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3E3.%20Turn%20off%20access%20to%20all%20Windows%20Update%20features%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3EComputer%20Configuration%5CAdministrative%20Templates%5CSystem%5CInternet%20Communication%20Management%5CInternet%20Communication%20Settings%5CTurn%20off%20access%20to%20all%20Windows%20Update%20feature.%20Registry%20Value%3A%20DisableWindowsUpdateAccess%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20had%20to%20set%20this%20to%20%3CSTRONG%3EDisabled.%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBut%20this%20time%20we%20were%20faced%20with%20the%20critical%20issue%20of%20the%20GUI%20allowing%20the%20users%20to%20%22Check%20for%20Updates%20from%20Microsoft%20Update%22.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMicrosoft%20documentation%3A%3C%2FP%3E%3CP%3E%3CEM%3EBy%20enabling%20the%20Group%20Policy%20setting%20administrators%20can%20disable%20the%20%22Check%20for%20updates%22%20option%20for%20users.%20Any%20background%20update%20scans%2C%20downloads%20and%20installations%20will%20continue%20to%20work%20as%20configured.%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CEM%3ESo%2C%20finally%20we%20had%20to%20block%20access%20to%20Check%20for%20Updates%20altogether!%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3E4.%20Remove%20access%20to%20use%20all%20Windows%20update%20features%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3EComputer%20Configuration%5CAdministrative%20Templates%5CWindows%20Components%5CWindows%20update%5CRemove%20access%20to%20use%20all%20Windows%20update%20features%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20had%20to%20set%20this%20to%20%3CSTRONG%3EEnabled%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESo%20as%20it%20is%20now%2C%20we%20are%20able%20to%20properly%20do%20FoDs%20over%20WU%20and%20our%20clients%20will%20not%20use%20WU%20for%20anything%20else%20other%20than%20that.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHope%20this%20helps%20someone%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E-%3C%2FP%3E%3CP%3EAlex%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Jochen Schmitt
Occasional Contributor

We use a SCCM 1810 environment. Beginning with Windows 10 1709, you can’t use WSUS to host Features on Demand and language packs for Windows 10 clients.
Since we use Windows 10 1809 I noticed also RSAT and Language.Handwriting packages are not available anymore in WSUS/SCCM environment.
Instead, you need to download them directly from Windows Update. So just used Get-WindowsCapability commandline and tried to install missing features and ran into 

0x800f0954 error. After changing the GPO “Download repair content and optional…” we now receive a different error: 0x8024002e. Changing  Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\DisableWindowsUpdateAccess from “1” to “0” prevents error 0x8024002e and
commandline: ”Get-WindowsCapability -Online | where name -like *.....* | Add-WindowsCapability -Online” works now.

 

But now, our users are able to use “Windows Update – Check online for updates from Microsoft Windows” directly.

 

Windows_Update.jpg

I have something to consider that our users are now able to download and install Windows Feature Updates (f.e. 1809) over here.

Is there any best practice how to prevent users from installing updates from WindowsUpdate directly?

 

10 Replies

@RahamimL  Thank you for your answer. Which GPO setting do you mean will prevent users in checking the updates? It's not really clear for me. 

@Jochen SchmittI believe it is 2 of them:

  1. Remove access to all Windows Update features.
  2. Allow non-administrators to receive update notification

@RahamimL  But it seems Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\DisableWindowsUpdateAccess is the same as R"emove access to all Windows Update features" So this will not help for my scenario.

 

@Jochen Schmitt, That is weird... I use this policy on 1803 and don't have this issue... I can run "Add-WindowsCapabilty" elevated without errors.

Also, I just tested this on a 1809 that I have and  it is working perfectly... Can you share your policies?

 

Rahamim

@RahamimL 

seems the suggested config solves my problem,

 

Turn off access to all Windows Update features is set to "1" at the moment. Changing it to "0" and configure "Remove access to use all Windows Update features" to "1" shows now the behavior I wanted.

 

The description of DisableWindowsUpdateAccess says "..and enable automatic updating to receive notifications and critical updates from Windows Update" Is there any risk that my clients will receive feature updates from windowsupdate and not from my SCCM environment?

 

@Jochen Schmitt

 

If you enabled the "Do not allow update deferral policies to cause scan against windows update" than you're all good.

@Jochen Schmitt

 

Windows environment: 1803 Enterprise

 

After a lot of pain, I am happy I found this post.

So in our occassion where we really need to have the clients blocked from WU, I had to allow them to download FODs from WU since hosting them is a -no go- from Microsoft for the future builds.

 

1. Specify settings for optional component installation and component repair

Computer Configuration\Policies\Administrative Templates\System\Specify settings for optional component installation and component repair.

 

Once we set this up, with a Blank alternate source and only checked that clients should contact WU instead of WSUS, we got the following error on Add-WindowsCapability -Online

 

0x8024002e

 

This meant that something else was blocking access to WU so we changed the following:

 

2. Do not connect to any Windows Update Internet locations

Computer Configuration\Administrative Templates\Windows Components\Windows update\Do not connect to any Windows Update Internet locations

We set this to Disabled since we need clients to be able to contact WU, Store and DO. 

 

Microsoft documentation:

"When enabled, this policy will disable the functionality described above, and may cause connection to public services such as the Microsoft Store, Windows Update for Business and Delivery Optimization to stop working."

 

In reality this has been the case for a year now and our clients never misbehaved (I have set the proper policy setting for Dual Scan so clients will not get tricked into pulling Feature Updates from WU).

 

But then it still failed for us with another error code! So what is blocking this functionality?

 

3. Turn off access to all Windows Update features 

Computer Configuration\Administrative Templates\System\Internet Communication Management\Internet Communication Settings\Turn off access to all Windows Update feature. Registry Value: DisableWindowsUpdateAccess

 

We had to set this to Disabled.

 

But this time we were faced with the critical issue of the GUI allowing the users to "Check for Updates from Microsoft Update".

 

Microsoft documentation:

By enabling the Group Policy setting administrators can disable the "Check for updates" option for users. Any background update scans, downloads and installations will continue to work as configured.

 

So, finally we had to block access to Check for Updates altogether!

 

4. Remove access to use all Windows update features

Computer Configuration\Administrative Templates\Windows Components\Windows update\Remove access to use all Windows update features

 

We had to set this to Enabled

 

So as it is now, we are able to properly do FoDs over WU and our clients will not use WU for anything else other than that.

 

Hope this helps someone :)

 

 

-

Alex