WSUS 4.0 and Windows 10 Enterprise 1607 and Windows Updates; GPO to fully control updates??

%3CLINGO-SUB%20id%3D%22lingo-sub-60470%22%20slang%3D%22en-US%22%3EWSUS%204.0%20and%20Windows%2010%20Enterprise%201607%20and%20Windows%20Updates%3B%20GPO%20to%20fully%20control%20updates%3F%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-60470%22%20slang%3D%22en-US%22%3E%3CP%3ESo%20does%20anyone%20know%20how%20we%20can%20fully%20control%20windows%20updates%20and%20office%202016%20updates%20via%20WSUS%20and%20still%20allow%20Windows%20Store%20updates%20from%20microsoft%3F%20These%20policies%20seem%20to%20be%20directly%20related%20and%20reliant%20upon%20each%20other%20vs%20having%20the%20ability%20to%20use%20WSUS%20for%20windows%20updates%2Foffice%20updates%20and%20then%20allow%20Store%20to%20update%20via%20microsoft.%20%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20consider%20Windows%20Store%20to%20be%20more%20BYOD%20in%20that%20apps%20are%20sandboxed%2C%20consumer%20orientated%20whereas%20windows%20updates%20should%20be%20managed%20by%20WSUS.%20%26nbsp%3BWe%20have%20a%20ticket%20open%20w%2FPremiere%20support%20but%20the%20more%20we%20dig%20the%20more%20it%20seems%20that%20NO%20ONE%20knows%20how%20Windows%2010%20Enterprise%2C%20Windows%20Updates%20and%20WSUS%20work.%20%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOur%20policies%20are%20not%20being%20abided%20by%3B%20today%20we%20have%20a%20ton%20of%20win10%20computers%20we%20just%20rolled%20out%20yesterday%20get%20windows%20updates%20even%20though%20we%20have%20set%20the%20appropriate%20GPO%20for%20fridays%20only.%20%26nbsp%3BWE.ARE.LOSING.OUR.MINDS%20and%20very%20concerned%20that%20our%20users%20w%2Fwin10%20will%20get%20the%20creators%20update%20before%20we%20even%20can%20vett%20it%3B%20we%20have%20lost%20all%20faith%20in%20Microsoft's%20testing%20of%20patches%20w%2Fthe%20Feb%20issues%20and%20now%20the%20office%202016%20updates%20in%20march%20(KB3178674)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20funny%20thing%20is%20that%20we%20hadn't%20noticed%20windows%2010%20machines%20not%20abiding%20by%20the%20rules%20until%20the%20infamous%20Office%202016%20Word%20patches%20in%20March%20that%20broke%20subscript%2Fsuperscript%20in%20footers%20hit%20all%20of%20our%20windows%2010%20machines%20even%20though%20we%20were%20blocking%20this%20update%20in%20WSUS.%20%26nbsp%3BMore%20IT%20admins%20are%20starting%20to%20realize%20this%20now%20that%20the%20bad%20patch%20slipped%20through%20in%20March%202017%20and%20are%20getting%20a%20bit%20freaked%20out%20that%20even%20though%20we%20have%20WSUS%20stood%20up%20and%20GPO%20configured%3B%20windows%20updates%20are%20getting%20past%20wsus%20w%2Fo%20approval%20and%20into%20the%20users%20machines.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20issue%20with%20WSUS%20and%20no%20one%20at%20microsoft%20knowing%20how%20it%20truelly%20works%20is%20going%20to%20keep%20inflating%20as%20more%20and%20more%20companies%20finally%20deploy%20win10%20this%20year%20and%20get%20a%20bad%20patch%20they%20never%20approved.%20%26nbsp%3BSo%2C%20my%20question%20is%3A%20what%20settings%2Fpolicies%20are%20you%20using%20to%20make%20sure%20Windows%2010%20enterprise%20edition%20only%20gets%20approved%20updates%20from%20WSUS%204.0%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20running%20these%20settings%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWSUS%204.0%20on%20a%20freshly%20build%20Windows%20Server%202016%20(built%20in%20mid%20march%202017)%3C%2FP%3E%0A%3CP%3EWindows%2010%20Enterprise%20Edition%20OS%20on%20workstations%20configured%20to%20be%20CBB%20w%2F180days%20deferral.%3C%2FP%3E%0A%3CP%3EGPO%20configured%20as%20follows%3A%3CBR%20%2F%3EComputer%20Policy%2C%20assigned%20to%20our%20Win10%20IT%20OU%20(for%20testing)%20with%20these%20options%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CTABLE%20border%3D%220%22%20cellspacing%3D%220%22%20cellpadding%3D%220%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3E%3CA%3ESystem%3C%2FA%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CDIV%3EPolicy%3C%2FDIV%3E%0A%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3ESpecify%20settings%20for%20optional%20component%20installation%20and%20component%20repair%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EAlternate%20source%20file%20path%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ENever%20attempt%20to%20download%20payload%20from%20Windows%20Update%3C%2FTD%3E%0A%3CTD%3EDisabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EDownload%20repair%20content%20and%20optional%20features%20directly%20from%20Windows%20Update%20instead%20of%20Windows%20Server%20Update%20Services%20(WSUS)%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CDIV%3E%3CSPAN%3E%3CA%3EWindows%20Components%2FDelivery%20Optimizationhide%3C%2FA%3E%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CDIV%3EPolicy%3C%2FDIV%3E%0A%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EDownload%20Mode%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EDownload%20Mode%3A%3C%2FTD%3E%0A%3CTD%3EGroup%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CDIV%3E%3CSPAN%3E%3CA%3EWindows%20Components%2FStorehide%3C%2FA%3E%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CDIV%3EPolicy%3C%2FDIV%3E%0A%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3ETurn%20off%20the%20offer%20to%20update%20to%20the%20latest%20version%20of%20Windows%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CDIV%3E%3CSPAN%3E%3CA%3EWindows%20Components%2FWindows%20Updatehide%3C%2FA%3E%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CDIV%3EPolicy%3C%2FDIV%3E%0A%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EAlways%20automatically%20restart%20at%20the%20scheduled%20time%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EDisabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EAutomatic%20Updates%20detection%20frequency%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ECheck%20for%20updates%20at%20the%20following%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3Einterval%20(hours)%3A%3C%2FTD%3E%0A%3CTD%3E1%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EPolicy%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EConfigure%20Automatic%20Updates%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EConfigure%20automatic%20updating%3A%3C%2FTD%3E%0A%3CTD%3E4%20-%20Auto%20download%20and%20schedule%20the%20install%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EThe%20following%20settings%20are%20only%20required%20and%20applicable%20if%204%20is%20selected.%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EInstall%20during%20automatic%20maintenance%3C%2FTD%3E%0A%3CTD%3EDisabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EScheduled%20install%20day%3A%3C%2FTD%3E%0A%3CTD%3E0%20-%20Every%20day%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EScheduled%20install%20time%3A%3C%2FTD%3E%0A%3CTD%3E12%3A00%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EInstall%20updates%20for%20other%20Microsoft%20products%3C%2FTD%3E%0A%3CTD%3EDisabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EPolicy%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EConfigure%20auto-restart%20reminder%20notifications%20for%20updates%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ESpecify%20the%20style%20used%20for%20auto-restart%20reminder%20notifications%3A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EStyle%3A%3C%2FTD%3E%0A%3CTD%3E2%20-%20Partial%20Screen%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ESpecify%20the%20period%20for%20auto-restart%20reminder%20notifications%3A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EPeriod%20(min)%3A%3C%2FTD%3E%0A%3CTD%3E60%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EPolicy%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EConfigure%20auto-restart%20required%20notification%20for%20updates%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ESpecify%20the%20method%20by%20which%20the%20auto-restart%20required%20notification%20is%20dismissed%3A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EMethod%3A%3C%2FTD%3E%0A%3CTD%3E2%20-%20User%20Action%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EPolicy%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EConfigure%20auto-restart%20warning%20notifications%20schedule%20for%20updates%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ESpecify%20the%20period%20for%20auto-restart%20warning%20reminder%20notifications%3A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EReminder%20(hours)%3A%3C%2FTD%3E%0A%3CTD%3E4%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ESpecify%20the%20period%20for%20auto-restart%20immiment%20warning%20notifications%3A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EWarning%20(mins)%3A%3C%2FTD%3E%0A%3CTD%3E15%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EPolicy%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EDo%20not%20connect%20to%20any%20Windows%20Update%20Internet%20locations%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EDo%20not%20include%20drivers%20with%20Windows%20Updates%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3EEnable%20client-side%20targeting%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ETarget%20group%20name%20for%20this%20computer%3C%2FTD%3E%0A%3CTD%3EIT%3BWorkstations%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EPolicy%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3ERemove%20access%20to%20use%20all%20Windows%20Update%20features%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EDisabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3ESpecify%20deadline%20before%20auto-restart%20for%20update%20installation%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EDisabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3ESpecify%20intranet%20Microsoft%20update%20service%20location%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ESet%20the%20intranet%20update%20service%20for%20detecting%20updates%3A%3C%2FTD%3E%0A%3CTD%3Ehttp%3A%2F%2FourinhouseWSUSserver%3A8530%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ESet%20the%20intranet%20statistics%20server%3A%3C%2FTD%3E%0A%3CTD%3Ehttp%3A%2F%2FourinhouseWSUSserver%3A8530%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ESet%20the%20alternate%20download%20server%3A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E(example%3A%20http%3A%2F%2FIntranetUpd01)%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EPolicy%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3ETurn%20off%20auto-restart%20for%20updates%20during%20active%20hours%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EActive%20Hours%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EStart%3A%3C%2FTD%3E%0A%3CTD%3E7%3A00%20AM%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EEnd%3A%3C%2FTD%3E%0A%3CTD%3E6%3A00%20PM%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CDIV%3E%3CSPAN%3E%3CA%3EWindows%20Components%2FWindows%20Update%2FDefer%20Windows%20Updateshide%3C%2FA%3E%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CDIV%3EPolicy%3C%2FDIV%3E%0A%3C%2FTD%3E%0A%3CTD%3ESetting%3C%2FTD%3E%0A%3CTD%3EComment%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E%3CSPAN%3ESelect%20when%20Feature%20Updates%20are%20received%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%3EEnabled%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3ESelect%20the%20branch%20readiness%20level%20for%20the%20feature%20updates%20you%20want%20to%20receive%3A%3C%2FTD%3E%0A%3CTD%3ECurrent%20Branch%20for%20Business%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EAfter%20a%20feature%20update%20is%20released%2C%20defer%20receiving%20it%20for%20this%20many%20days%3A%3C%2FTD%3E%0A%3CTD%3E180%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3EPause%20Feature%20Updates%20starting%3C%2FTD%3E%0A%3CTD%3E3%2F30%2F2017%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%3E(format%20yyyy-mm-dd%20example%3A%202016-09-16)%3C%2FTD%3E%0A%3CTD%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CDIV%20class%3D%22container%22%3E%26nbsp%3B%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-73496%22%20slang%3D%22en-US%22%3ERe%3A%20WSUS%204.0%20and%20Windows%2010%20Enterprise%201607%20and%20Windows%20Updates%3B%20GPO%20to%20fully%20control%20updates%3F%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-73496%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20James%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWell%20my%20worst%20fear%20happened%20and%20the%20creators%20update%20installed%20on%20my%20computer%20with%20out%20asking%20me%20to%20install%20it%2C%20and%20I%20haev%20not%20approved%20it%20in%20WSUS.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20read%20various%20stuff%20on%20the%20internet%20and%20posted%20on%20reddit%20forums.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThere%20are%20articles%20that%20seem%20to%20say%20that%20certain%20GPO%20settings%20don't%20apply%20when%20your%20using%20WSUS%20and%20windows%2010%20and%20are%20more%20designed%20for%20Windows%20machines%20that%20get%20updates%20online.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESee%20here%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fwindowsserver%2F2017%2F01%2F09%2Fwhy-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fblogs.technet.microsoft.com%2Fwindowsserver%2F2017%2F01%2F09%2Fwhy-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online%2F%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20particular%20%22%3CSTRONG%3EWe%20also%20recommend%20that%20you%20do%20not%20use%20these%20new%20settings%20with%20WSUS%2FSCCM.%22%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20additon%2C%20I%20have%20found%20another%20site%20talking%20about%20%22Dual%20scan%22%20where%20its%20checking%20online%20%26nbsp%3Bfor%20updates%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fwsus%2F2017%2F05%2F05%2Fdemystifying-dual-scan%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fblogs.technet.microsoft.com%2Fwsus%2F2017%2F05%2F05%2Fdemystifying-dual-scan%2F%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYour%20GPO%20is%20very%20similar%20to%20mine.%20I%20have%20the%20same%20options%20set.%20However%2C%20I%20am%20going%20to%20change%20the%20following%20(which%20is%20set%20how%20yours%20is)%3A%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EENABLE%3A%20Never%20attempt%20to%20download%20payload%20from%20Windows%20Update%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EDISABLE%3A%20Download%20repair%20content%20and%20optional%20features%20directly%20from%20Windows%20Update%20instead%20of%20Windows%20Server%20Update%20Services%20(WSUS)%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3E100%20(BITS%20DOWNLOADS)%3A%26nbsp%3BDownload%20Mode%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-60747%22%20slang%3D%22en-US%22%3ERe%3A%20WSUS%204.0%20and%20Windows%2010%20Enterprise%201607%20and%20Windows%20Updates%3B%20GPO%20to%20fully%20control%20updates%3F%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-60747%22%20slang%3D%22en-US%22%3E%3CP%3ERegarding%20the%20Store%20there%20are%202%20settings%2C%20one%20for%20the%20user%20and%20one%20for%20the%20computer.%20If%20I%20remember%20the%20discussion%20correctly%2C%20allow%20the%20computer%20and%20it%20will%20update%20the%20built-in%20Store%20apps.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20believe%20by%20enabling%20the%20defer%20updates%20part%20for%20CBB%20that%20it%20will%20check%20from%20Microsoft%20for%20updates.%20It's%20part%20of%20a%20dual%20scan%20%22feature%22%20of%201607.%201703%20will%20will%20make%20this%20more%20clear.%20I%20do%20not%20have%20those%20settings%20enabled%20and%20the%20computers%20just%20get%20updates%20from%20WSUS.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-60481%22%20slang%3D%22en-US%22%3ERe%3A%20WSUS%204.0%20and%20Windows%2010%20Enterprise%201607%20and%20Windows%20Updates%3B%20GPO%20to%20fully%20control%20updates%3F%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-60481%22%20slang%3D%22en-US%22%3ENOTE%3B%20the%20users%20GPO%20object%20for%20this%20is%20set%20to%20be%20Friday%20only%20(our%20GPO%20for%20IT%20is%20set%20to%20any%20day%20since%20we%20want%20to%20test%20asap)%3C%2FLINGO-BODY%3E
Highlighted
New Contributor

So does anyone know how we can fully control windows updates and office 2016 updates via WSUS and still allow Windows Store updates from microsoft? These policies seem to be directly related and reliant upon each other vs having the ability to use WSUS for windows updates/office updates and then allow Store to update via microsoft.  

 

We consider Windows Store to be more BYOD in that apps are sandboxed, consumer orientated whereas windows updates should be managed by WSUS.  We have a ticket open w/Premiere support but the more we dig the more it seems that NO ONE knows how Windows 10 Enterprise, Windows Updates and WSUS work.   

 

Our policies are not being abided by; today we have a ton of win10 computers we just rolled out yesterday get windows updates even though we have set the appropriate GPO for fridays only.  WE.ARE.LOSING.OUR.MINDS and very concerned that our users w/win10 will get the creators update before we even can vett it; we have lost all faith in Microsoft's testing of patches w/the Feb issues and now the office 2016 updates in march (KB3178674)

 

 

The funny thing is that we hadn't noticed windows 10 machines not abiding by the rules until the infamous Office 2016 Word patches in March that broke subscript/superscript in footers hit all of our windows 10 machines even though we were blocking this update in WSUS.  More IT admins are starting to realize this now that the bad patch slipped through in March 2017 and are getting a bit freaked out that even though we have WSUS stood up and GPO configured; windows updates are getting past wsus w/o approval and into the users machines.

 

This issue with WSUS and no one at microsoft knowing how it truelly works is going to keep inflating as more and more companies finally deploy win10 this year and get a bad patch they never approved.  So, my question is: what settings/policies are you using to make sure Windows 10 enterprise edition only gets approved updates from WSUS 4.0?

 

We are running these settings:

 

WSUS 4.0 on a freshly build Windows Server 2016 (built in mid march 2017)

Windows 10 Enterprise Edition OS on workstations configured to be CBB w/180days deferral.

GPO configured as follows:
Computer Policy, assigned to our Win10 IT OU (for testing) with these options:

System    
Policy
Setting Comment
Specify settings for optional component installation and component repair Enabled  
Alternate source file path    
Never attempt to download payload from Windows Update Disabled  
Download repair content and optional features directly from Windows Update instead of Windows Server Update Services (WSUS) Enabled  
 
 
Policy
Setting Comment
Download Mode Enabled  
Download Mode: Group  
 
 
Policy
Setting Comment
Turn off the offer to update to the latest version of Windows Enabled  
     
 
Policy
Setting Comment
Always automatically restart at the scheduled time Disabled  
Automatic Updates detection frequency Enabled  
Check for updates at the following  
interval (hours): 1  
Policy Setting Comment
Configure Automatic Updates Enabled  
Configure automatic updating: 4 - Auto download and schedule the install  
The following settings are only required and applicable if 4 is selected.  
Install during automatic maintenance Disabled  
Scheduled install day: 0 - Every day  
Scheduled install time: 12:00  
Install updates for other Microsoft products Disabled  
Policy Setting Comment
Configure auto-restart reminder notifications for updates Enabled  
Specify the style used for auto-restart reminder notifications:  
Style: 2 - Partial Screen  
Specify the period for auto-restart reminder notifications:  
Period (min): 60  
Policy Setting Comment
Configure auto-restart required notification for updates Enabled  
Specify the method by which the auto-restart required notification is dismissed:  
Method: 2 - User Action  
Policy Setting Comment
Configure auto-restart warning notifications schedule for updates Enabled  
Specify the period for auto-restart warning reminder notifications:  
Reminder (hours): 4  
Specify the period for auto-restart immiment warning notifications:  
Warning (mins): 15  
Policy Setting Comment
Do not connect to any Windows Update Internet locations Enabled  
Do not include drivers with Windows Updates Enabled  
Enable client-side targeting Enabled  
Target group name for this computer IT;Workstations  
Policy Setting Comment
Remove access to use all Windows Update features Disabled  
Specify deadline before auto-restart for update installation Disabled  
Specify intranet Microsoft update service location Enabled  
Set the intranet update service for detecting updates: http://ourinhouseWSUSserver:8530  
Set the intranet statistics server: http://ourinhouseWSUSserver:8530  
Set the alternate download server:    
(example: http://IntranetUpd01)  
Policy Setting Comment
Turn off auto-restart for updates during active hours Enabled  
Active Hours  
Start: 7:00 AM  
End: 6:00 PM  
 
 
Policy
Setting Comment
Select when Feature Updates are received Enabled  
Select the branch readiness level for the feature updates you want to receive: Current Branch for Business  
After a feature update is released, defer receiving it for this many days: 180  
Pause Feature Updates starting 3/30/2017  
(format yyyy-mm-dd example: 2016-09-16)  
 
3 Replies
Highlighted
NOTE; the users GPO object for this is set to be Friday only (our GPO for IT is set to any day since we want to test asap)
Highlighted

Regarding the Store there are 2 settings, one for the user and one for the computer. If I remember the discussion correctly, allow the computer and it will update the built-in Store apps.

 

I believe by enabling the defer updates part for CBB that it will check from Microsoft for updates. It's part of a dual scan "feature" of 1607. 1703 will will make this more clear. I do not have those settings enabled and the computers just get updates from WSUS.

Highlighted

Hi James,

 

Well my worst fear happened and the creators update installed on my computer with out asking me to install it, and I haev not approved it in WSUS.

 

I have read various stuff on the internet and posted on reddit forums.

 

There are articles that seem to say that certain GPO settings don't apply when your using WSUS and windows 10 and are more designed for Windows machines that get updates online.

 

See here: https://blogs.technet.microsoft.com/windowsserver/2017/01/09/why-wsus-and-sccm-managed-clients-are-r...

 

In particular "We also recommend that you do not use these new settings with WSUS/SCCM."

 

In additon, I have found another site talking about "Dual scan" where its checking online  for updates

 

https://blogs.technet.microsoft.com/wsus/2017/05/05/demystifying-dual-scan/

 

Your GPO is very similar to mine. I have the same options set. However, I am going to change the following (which is set how yours is): 

 

ENABLE: Never attempt to download payload from Windows Update

DISABLE: Download repair content and optional features directly from Windows Update instead of Windows Server Update Services (WSUS)

100 (BITS DOWNLOADS): Download Mode