Why you shouldn’t set these 25 Windows policies

Published Jan 19 2022 01:58 PM 88K Views
Microsoft

The Windows update experience, as well as the policies that control it, have changed dramatically over the last few years. Notifications, the ability to dictate the behavior of update downloads, installation, and restarts, and the Settings experience have all shifted dramatically from what was released in Windows 10, version 1511. We have invested in building the best experience possible for end users – adding capabilities like active hours to enable a device to automatically restart when the end user is away and changing our notifications to include information like restart time estimates so that end users can decide to restart immediately or at a later, more convenient time.

We have listened to your feedback and learned a lot about which experiences work and which don't. We have also worked to evolve and simplify the controls needed to support these improved experiences, and identify which older policies have become irrelevant or replaced with a better option. As a result, the Windows update policy set contains policies that no longer have any impact; that don’t work as described on devices running Windows 10, version 20H2 or later; or that work but not as well as the policies that were added to accomplish a similar experience in a much better way.

To reduce that complexity, with Windows 11 we created a sub-folder under “Windows Update” to specify “Legacy Policies.” While these sub-folders are only available in the Windows 11 ADMX templates, the same recommendations can be made for Windows 10, version 20H2 and above. Therefore, we recommend that you review your policy settings and leverage only the recommended policy set.

The Legacy Policies folder as it appears under Windows Update settings in the Local Group Policy EditorThe Legacy Policies folder as it appears under Windows Update settings in the Local Group Policy Editor

To help you figure out which policies to stop setting and which to use instead, please leverage the below list. In it, you will find which policies are not recommended, why they are not recommended, and how to get the same or similar behavior with either default settings or recommended policies.

Policies not to set

Group Policy path: […]/Administrative Templates/Windows Components/ Windows Updates/Legacy Policies

 

Policy

Description

Why not to set it and what to use instead

GP name:
Do not display ‘Install Updates and Shut Down” option in Shut Down Windows dialog box

GP setting name: n/a

CSP name: No equivalent

Enable this policy to not show the “install updates and shut down”

This policy was never implemented on Windows 10 and will have no effect if set on Windows 10 or Windows 11.

GP name:
Do not adjust default option to ‘Install Updates and Shut Down’ in Shut Down Windows dialog box

GP setting name: n/a

CSP name: No equivalent

Enable this policy so that the users last shut down choice is the default rather than the “install updates and shut down” option being default

This policy was never implemented on Windows 10 and will have no effect if set on Windows 10 or Windows 11.

GP name:
Specify deadline before auto-restart for update installation

GP setting names:
Quality Updates, Feature Updates

CSP names:
Update/AutoRestartDeadlinePeriodInDays
Update/AutoRestartDeadlinePeriodInDaysForFeatureUpdates

Specify the deadline in days before a pending restart will automatically be executed outside of active hours

GP recommendation:
Leverage the compliance deadline policies instead. To do so, go to “Specify deadlines for automatic updates and restarts” policy, configure deadlines, and then select "Don‘t auto-restart until end of grace period" to ensure your devices will not automatically restart outside of active hours until after the deadline is reached.

Policy to use instead:

Specify deadlines for automatic updates and restarts > Don’t auto-restart until end of grace period

CSP recommendation:
Leverage the compliance deadline policies instead. By configuring "NoAutoReboot" your devices will not automatically restart outside of active hours until after the deadline is reached.

Policies to use instead:

Update/ConfigureDeadlineForQualityUpdates

Update/ConfigureDeadlineGracePeriod

Update/ConfigureDeadlineNoAutoReboot


Note: If the end user selects "restart tonight", we will automatically restart the device outside of active hours from that point on.

GP name:
Delay Restart for scheduled installations

GP setting name: n/a

CSP name: No equivalent

If the status is set to Enabled, a scheduled restart will occur the specified number of minutes after the installation is finished.

If the status is set to Disabled or Not Configured, the default wait time is 15 minutes.

Note: This policy applies only when Automatic Updates is configured to perform scheduled installations of updates. If the "Configure Automatic Updates" policy is disabled, this policy has no effect.

This policy was never implemented on Windows 10 and will have no effect if set on Windows 10 or Windows 11.

GP name:
Configure auto-restart reminder notifications for updates

GP setting name: n/a

CSP name:
Update/AutoRestartNotificationSchedule

Enable this policy to specify when auto-restart reminders are displayed. You can specify the amount of time prior to a scheduled restart to notify the user.

This policy only works with the automatic updates schedule install time, day, week or if auto-restart deadline is configured and compliance deadline is not configured. These notifications are shown before the deadline is reached.

GP and CSP recommendation:
Utilize compliance deadline instead and the default notification flow to ensure that end users are properly notified prior to a restart occurring.

GP name:
Configure auto-restart required notification for updates

GP setting name: n/a

CSP name:
Update/AutoRestartRequiredNotificationDismissal

Enable this policy to specify how a notification is dismissed (auto – after 25 sec, default OR user action)

This policy is not supported in code for Windows 10 or Windows 11. Configuring it will have no effect.

GP and CSP recommendation:
Our notification flow will involve both automatically dismissed notifications as well as notifications that will require the end user to interact, assuming you are leveraging the compliance deadline policy.

GP name:
Turn off auto-restart notifications for update installations

GP setting name: n/a

CSP name:
Update/SetAutoRestartNotificationDisable

Can disable auto-restart notifications for update installations.

- 0: Enabled [default]

- 1: Disable notifications

The default notification experience is designed to balance the impact of updates while giving users a good experience. Disabling notifications may lead to end user dissatisfaction. We only recommend turning off notifications for kiosk or user-less scenarios. In such scenarios, you can disable notifications by:

CSP recommendation:
If you wish to disable restart notifications, including restart reminder and warning notifications, please utilize the Update/UpdateNotificationLevel policy instead.

GP recommendation:
If you wish to disable restart notifications, including restart reminder and warning notifications, please utilize the "Display options for update notifications" policy instead.

GP name:
Allow non-administrators to receive update notifications

GP setting name: n/a

CSP name: No equivalent

Enables admin to control whether non-admins receive notifications based on configure automatic updates setting.

This policy has never been supported via CSP and was not implemented on Windows 10 or Windows 11 for Group Policy. Setting it on such will have no effect.

GP recommendation:
By default, end users will receive update notifications. 

GP name: Specify Engaged restart transition and notification schedule for updates

 

GP setting names:
For quality updates: Transition (days), Snooze (days), Deadline (days)

For feature updates: Transition (days), Snooze (days), Deadline (days)

CSP names:
For quality updates:
Update/EngagedRestartDeadline 
Update/EngagedRestartSnoozeSchedule
Update/EngagedRestartTransitionSchedule

For feature updates: Update/EngagedRestartDeadlineForFeatureUpdates 
Update/EngagedRestartSnoozeScheduleForFeatureUpdates 
Update/EngagedRestartTransitionScheduleForFeatureUpdates

Enable this policy to configure Transition (the amount of time before going from auto-restart to engaged restart), Snooze (the amount of engaged notifications the end user can snooze), Deadline (the time before a pending reboot will be automatically executed outside of active hours)

CSP recommendation:
Leverage the compliance deadline policies instead. These policies better allow you to ensure updates are completed within your compliance window while providing a much better experience for your end users.

Policies to use instead:

Update/ConfigureDeadlineForQualityUpdates

Update/ConfigureDeadlineGracePeriod


If you wish to prevent automatic restarts outside of active hours when the device is plugged in and the user is away until after the deadline has been reached, you can configure:

Update/ConfigureDeadlineNoAutoReboot

GP recommendation:
Leverage the compliance deadline policies instead. These policies better allow you to ensure updates are completed within your compliance window while providing a much better experience for your end users.

Policy to use instead:
Specify deadlines for automatic updates and restarts

If you wish to prevent automatic restarts outside of active hours when the device is plugged in and the user is away until after the deadline has been reached, you can configure: "Turn off auto-restart for updates during active hours" within the above policy.

GP name:
Turn on Software Notifications

GP setting name: n/a

CSP name: No equivalent

Control whether users see detailed enhanced notification messages

This policy has never been supported via CSP and was not implemented on Windows 10 or Windows 11 for Group Policy. Setting it on such will have no effect. 

GP name:
Allow Automatic Updates immediate installation

GP setting name: n/a

CSP name: No equivalent

Specify if updates that don’t cause a restart are automatically installed.

This policy has never been supported via CSP and was not implemented on Windows 10 or Windows 11 for Group Policy. Setting it on such will have no effect.

GP and CSP recommendation:
By default updates will be automatically installed.

 

GP name:
Re-prompt for restart with scheduled installations

GP setting name: n/a

CSP name: No equivalent

If Enabled, a scheduled restart will occur the specified number of minutes after the previous prompt for restart was postponed.

This policy has never been supported via CSP and was not implemented on Windows 10 or Windows 11 for Group Policy. Setting it on such will have no effect.

GP name:
Reschedule Automatic Updates scheduled installations

GP setting name:
Wait after system startup (minutes): [1, 60]

CSP name: No equivalent

Amount of time after a system startup that a scheduled install occurs when missed previously

This policy has never been supported via CSP and was not implemented on Windows 10 or Windows 11 for Group Policy. Setting it on such will have no effect.

GP name: Configure auto-restart warning notifications schedule for updates

GP setting name: n/a

CSP names:
Update/ScheduleImminentRestartWarning
Update/ScheduleRestartWarning

 

Specify the number of hours before a restart to notify the end user.

This policy only works on Windows 10 if the GP: "Specify deadline before auto-restart for update installation" or the CSP: Update/AutoRestartDeadlinePeriodInDays / Update/AutoRestartDeadlinePeriodInDaysForFeatureUpdates is configured.

GP and CSP recommendation:
Leverage the default notification flow that comes with compliance deadline.

GP name:
No auto-restart with logged on users for scheduled automatic updates installation

GP setting name: n/a

CSP name: No equivalent

Do not automatically restart with the user logged on

This policy was never created as a CSP. In Group Policy this policy does not work exactly as per description. Further, this policy can result in no quality update reboots period, given many users today never log off.

GP recommendation:
The recommendation to replace this would be to leverage compliance deadline and then to configure no-auto reboot to prevent non-user aware reboots prior to the deadline being reached. Or for server devices, leverage Configure Automatic Updates options 7 - notify to install and notify to reboot.

GP name:
Select when Feature Updates are received

GP setting name: n/a

CSP name:
Update/PauseFeatureUpdates

Pause updates for 60 days or until set back to 0.

GP and CSP recommendation:
This policy was replaced back in 1703. To pause updates, utilize the Update/PauseFeatureUpdatesStartTime and/or Update/PauseQualityUpdatesStartTime policy.

GP name:
Defer Upgrades and Updates

GP setting name: n/a

CSP name:
Update/DeferUpdatePeriod

Defer quality updates for up to 4 weeks (0-4 weeks).

GP and CSP recommendation:
This policy was replaced back in 1607. To defer quality updates, utilize

Update/DeferQualityUpdatesPeriodInDays or GPS: Select when Quality Updates are received.

GP name:
Defer Upgrades and Updates

GP setting name: n/a

CSP name:
Update/DeferUpgradePeriod

Defer feature updates for up to 8 months (0-8 months).

GP and CSP recommendation:
This policy was replaced back in 1607. To defer feature updates, utilize

Update/DeferFeatureUpdatesPeriodInDays or GPS: Select when Preview Builds and Feature Updates are received.

GP name:
Select when Feature Updates are received

GP setting name: n/a

CSP name: Update/RequireDeferUpgrade

Allows admins to stay on the Semi-Annual Channel 

CSP recommendation:
This policy was replaced back in 1607. To defer feature updates, utilize Update/DeferFeatureUpdatesPeriodInDays

GP name:
Turn on recommended updates via Automatic Updates

GP setting name: n/a

CSP name: No equivalent

Specify whether Automatic updates will deliver both important and recommended updates from Windows Update

This policy has never been supported via CSP and was not implemented on Windows 10 or Windows 11 for Group Policy. Setting it on such will have no effect.

GP name: No equivalent

GP setting name: n/a

CSP name:
Update/RequireUpdateApproval

Admins can restrict what updates are installed to only those on the approval list.

- 0: Device installs all applicable updates [default]

- 1: Device only installs updates that are on the approved update list

CSP recommendation:
This policy is only recommended for mobile devices. Using this policy for other device types can result in a poor experience and is not supported on Windows 10 or Windows 11.

GP name: No equivalent

GP setting name: n/a

CSP name:
Update/PhoneUpdateRestrictions

 

Deprecated already, replaced with Require Update Approval - which is now also being deprecated.

GP name:
Do not allow update deferral policies to cause scans against Windows Update

GP setting name: n/a

CSP name:
Update/DisableDualScan

Enable this policy to not allow update deferral policies to cause scans against Windows Update.

This policy works on Windows 10, but is not supported and will have no effect on Windows 11 devices. We recommend using the new scan source policy instead.

CSP recommendation:
For Windows 10, version 2004 and above and Windows 11 leverage the policies:

Update/SetPolicyDrivenUpdateSourceForDriverUpdates;

Update/SetPolicyDrivenUpdateSourceForFeatureUpdates;

Update/SetPolicyDrivenUpdateSourceForOtherUpdates;

Update/SetPolicyDrivenUpdateSourceForQualityUpdates

To configure whether updates come from Windows Update or Windows Server Update Services (WSUS).

GP recommendation:
For Windows 10, version 2004 and above and Windows 11 leverage the policy “Specify source service for specific classes of Windows Updates” policy. This will enable you to specify whether specific update classes (Feature updates, quality updates, driver and firmware updates, and other updates) individually come from WSUS or Windows Update.

GP name:
Update Power Policy for Cart Restarts

GP setting name: n/a

CSP name:
Update/SetEDURestart

Added in Windows 10, version 1703. For devices in a cart, this policy skips all restart checks to ensure that the reboot will happen at ScheduledInstallTime.

When you set this policy along with Update/ActiveHoursStart, Update/ActiveHoursEnd, and ShareCartPC, it will defer all the update processes (scan, download, install, and reboot) to a time after Active Hours. After a buffer period after ActiveHoursEnd, the device will wake up several times to complete the processes. All processes are blocked before ActiveHoursStart.

This policy will work on Windows 10; However, it will dramatically reduce compliance and the velocity at which the device takes updates.

GP and CSP recommendation:
We recommend leveraging the default settings with Active Hours instead.

After reading all of this you may be wondering – what is recommended? At the end of the day, it is best to leverage the default experience. Not only do defaults provide the best experience, they are also the most effective at keeping devices up to date. For organizations with security mandates that require being on a specific version within a certain timeframe, the only policies needed for a client device that is being used as a 1:1 personal computer are offering policies (e.g. the new Windows Update for Business Deployment Service controls or deferrals) and deadlines. That’s it! The rest of the policies are simply there to enable you to tailor that experience to the needs of your organization, to help you manage other device types, or to support other device usage scenarios.

Questions? Comments! Reach out to me here on the Tech Community or at @AriaUpdated on Twitter. Thank you for helping provide your end users with a better update experience.

 

33 Comments
%3CLINGO-SUB%20id%3D%22lingo-sub-3066431%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3066431%22%20slang%3D%22en-US%22%3E%3CP%3EAs%20your%20friendly%2015-Year%20Group%20Policy%20and%203-Year%20Enterprise%20Mobility%20MVP...%20while%20I%20agree%20with%20the%20idea%20that%20you%20shouldn't%20set%20them%20if%20they%20aren't%20implemented%20in%20CODE...%20for%20those%20which%20ALSO%20have%20zero%20backward%20compatibility%20(say%20to%20Windows%207)%20then%20they%20should%20merely%20be%20removed%20from%20the%20ADMX%20templates%20before%20shipping%20so%20customers%20needn't%20even%20see%20or%20know%20about%20their%20existence.%26nbsp%3B%20It%20takes%20nearly%20no%20effort%20and%20would%20have%20a%20nice%20positive%20customer%20affect.%26nbsp%3B%20Thanks%20of%20course%20for%20the%20nice%20article%2C%20and%20I%20think%20something%20like%20this%20was%20needed%3B%20so%20nice%20job%20in%20filling%20in%20the%20gap.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3066483%22%20slang%3D%22pt-BR%22%3ERe%3A%20Why%20you%20shouldn't%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3066483%22%20slang%3D%22pt-BR%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3EAria%20Carley%3C%2FA%3E%26nbsp%3B%26nbsp%3BCould%20you%20give%20a%20brief%20explanation%20of%20what%20is%20GP%20recommendation%20and%20CSP%20recommendation%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3066489%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3066489%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E%26nbsp%3Bfor%20the%20needed%20clarification%20it's%20so%20helpful%20and%20I%20like%20this%20change%20from%20day%20one.%26nbsp%3B%3C%2FP%3E%3CP%3EThere's%20a%20different%20blogpost%20on%20the%20differences%20about%20Windows%2010%20and%2011%20which%20I%20really%20don't%20like%20for%20certain%20reasons.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20change%20and%20your%20excellent%20job%20on%20documentation%20and%20recommendations%20is%20very%20practical.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20agree%20with%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F143050%22%20target%3D%22_blank%22%3E%40Jeremy%20Moskowitz%3C%2FA%3E%26nbsp%3Bsince%20it%20seems%20the%20split%20logic%20of%20different%20W10%20and%20W11%20ADMX%20have%20run%20its%20course.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20would%20like%20to%20recommend%20adding%20a%20Windows%2011%20OS%20category%20to%20the%20filtering%20option.%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20cannot%20be%20wrong%20to%20add%20the%20release%20too%20as%20we%20will%20have%20only%20one%20per%20year.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYou%20know%20that%20a%20lot%20of%20settings%20worked%20only%20specific%20builds%20having%20these%20filtered%20or%20included%20in%20the%20compatible%20with%20OS%20metadata%20would%20be%20of%20additional%20help%20for%20CSP%20and%20GPO.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhat%20do%20you%20think%20about%20it%3F%20Can%20the%20release%20and%20build%20(21H2)%20be%20added%20to%20either%20the%20OS%20filtering%20or%20description%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3066470%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3066470%22%20slang%3D%22en-US%22%3E%3CP%3EVery%20useful%20and%20great%20content%2C%20thanks%20for%20the%20info!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3066771%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3066771%22%20slang%3D%22en-US%22%3E%3CP%3EHave%20the%20legacy%20policies%20in%20the%20separate%20folder%20make%20sense%20in%20real-time%20situations.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3067127%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3067127%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20for%20your%20valuable%20inputs.%3C%2FP%3E%3CP%3EI%20believe%20they%20are%20taken%20into%20consideration%20in%20the%20Update%20Compliance%2C%20correct%3F%3C%2FP%3E%3CP%3EI%20hope%20replacement%20will%20be%20added%20and%20they%20will%20be%20removed%20from%20the%20Group%20Policy%20in%20the%20future.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3068203%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3068203%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20a%20lot%20for%20the%20note%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3068420%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3068420%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20the%20valuable%20info.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3068590%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3068590%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20all%20well%20and%20good.%20If%20Microsoft%20actually%20releases%20updates%20that%20they%20have%20actually%20tested.%20The%20most%20recent%20update%20for%20instance%2C%20broke%20VPNs%20for%20remote%20users%20across%20multiple%20VPN%20products.%20This%20isolated%20users%20at%20home%20so%20they%20couldn't%20access%20their%20work%20resources%20during%20a%20pandemic.%20Not%20exactly%20good%20things%20to%20happen%20to%20users.%20Being%20able%20to%20delay%20updates%20until%20Microsoft%20fixed%20things%20was%20essential%20to%20working%20around%20this%20problem.%20The%20GPOs%20in%20question%20actually%20allow%20you%20to%20do%20this%20and%20are%20required%20in%20many%20instances.%20Microsoft%20needs%20to%20either%20test%20better%20or%20give%20better%20options%20for%20controlling%20updates.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3068855%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3068855%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E%26nbsp%3Bthis%20is%20a%20great%20start%20to%20some%20very%20much%20needed%20help%20the%20world%20needs.%26nbsp%3B%20Thanks%20for%20making%20this%20available!%26nbsp%3B%20Will%20there%20be%20additional%20details%20about%20recommended%20policies%20(more%20of%20a%20%22why%20you%20SHOULD%20set...%22)%20in%20the%20future%20perhaps%3F%20%3Abeaming_face_with_smiling_eyes%3A%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3069003%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3069003%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E!%26nbsp%3B%3C%2FP%3E%3CP%3E1.%20Why%20do%20you%20mention%2025%20policies%2C%20but%20list%20only%2024%3F%20(ctrl%2Bf%20-%20gp%20name)%3C%2FP%3E%3CP%3E2.%20Why%20do%20I%20have%20only%2018%20policies%20in%20this%20folder%20in%20Windows%2011%20Pro%20build%20.376%3F%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22VadimSterkin_0-1642838851548.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F341622iD91EA392C806C666%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22VadimSterkin_0-1642838851548.png%22%20alt%3D%22VadimSterkin_0-1642838851548.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EI%20wish%20your%20screenshot%20was%20showing%20the%20folder%20content%20for%20comparison.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E3.%20Are%20the%20%22legacy%22%20group%20policies%20still%26nbsp%3B%3CSTRONG%3Esupported%3C%2FSTRONG%3E%20in%20Windows%2010%2020H2%3F%20What%20about%20Windows%2011%3F%20(Ofc%20the%20question%20is%20not%20about%20those%20you%20described%20as%20'%3CSPAN%3Ewas%20not%20implemented%20on%20Windows%26nbsp%3B%3B)%3C%2Fimg%3E%3C%2FSPAN%3E%20I%20understand%20that%20Microsoft%20does%20not%20recommend%20using%20the%20now%20legacy%20policies.%20My%20question%20is%20about%20them%20being%20supported%2C%20not%20your%20recommendations.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EP.S.%20Please%20fix%20the%20broken%20links%20to%20CSP%20policies%20throughout%20the%20table.%20For%20example%2C%20this%20is%20broken%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22VadimSterkin_0-1642939023341.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F341704i3997DBC6681203FF%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22VadimSterkin_0-1642939023341.png%22%20alt%3D%22VadimSterkin_0-1642939023341.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EThis%20results%20in%20access%20denied%20(copypasted%20from%20e-mail%20obviously)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22VadimSterkin_1-1642939087173.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F341705i049D497C642295B1%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22VadimSterkin_1-1642939087173.png%22%20alt%3D%22VadimSterkin_1-1642939087173.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3069072%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3069072%22%20slang%3D%22en-US%22%3E%3CP%3EHi%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F67010%22%20target%3D%22_blank%22%3E%40Gabriel%20Luiz%3C%2FA%3E%20.%20CSP%20Stands%20for%20Configuration%20Service%20Provider%20and%20is%20used%20by%20MDM%20vendors%20to%20manage%20Windows%2010%2F11.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3069988%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3069988%22%20slang%3D%22en-US%22%3EWhat%20are%20recommendations%20for%20Windows%20Server%3F%20Does%20WS2019%20support%20the%20same%20set%20of%20GP%20as%20Windows%2010%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070263%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070263%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3ECSP%20recommendation%3A%3C%2FSTRONG%3E%3CBR%20%2F%3EFor%20Windows%2010%2C%20version%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CSTRONG%3E%3CSTRIKE%3E2004%20%3C%2FSTRIKE%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%26nbsp%3Band%20above%20and%20Windows%2011%20leverage%20the%20policies%3A%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Freview.docs.microsoft.com%252Fen-us%252Fwindows%252Fclient-management%252Fmdm%252Fpolicy-csp-update%253Fbranch%253Dpr-en-us-6017%2523update-setpolicydrivenupdatesourcefordriverupdates%26amp%3Bdata%3D04%257C01%257CArianna.Carley%2540microsoft.com%257C2023f93d77e24cd0870f08d9ba9e70a5%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637746011947300408%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3DoPw9YdBldsmOF0cByaJg6ARD9ey0%252BWpRCWk08cgF8bg%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUpdate%2FSetPolicyDrivenUpdateSourceForDriverUpdates%3C%2FA%3E%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Freview.docs.microsoft.com%252Fen-us%252Fwindows%252Fclient-management%252Fmdm%252Fpolicy-csp-update%253Fbranch%253Dpr-en-us-6017%2523update-setpolicydrivenupdatesourceforfeatureupdates%26amp%3Bdata%3D04%257C01%257CArianna.Carley%2540microsoft.com%257C2023f93d77e24cd0870f08d9ba9e70a5%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637746011947300408%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3D3GjMwAL3ozv91sFQp%252FmuIe4%252BMaGWvjLKJft4RA%252FnLfw%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUpdate%2FSetPolicyDrivenUpdateSourceForFeatureUpdates%3C%2FA%3E%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Freview.docs.microsoft.com%252Fen-us%252Fwindows%252Fclient-management%252Fmdm%252Fpolicy-csp-update%253Fbranch%253Dpr-en-us-6017%2523update-setpolicydrivenupdatesourceforotherupdates%26amp%3Bdata%3D04%257C01%257CArianna.Carley%2540microsoft.com%257C2023f93d77e24cd0870f08d9ba9e70a5%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637746011947300408%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3DxHi1xsjG8goMP5ugwXkXcl6v0rjyqvFha%252F5rNBvhRqA%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUpdate%2FSetPolicyDrivenUpdateSourceForOtherUpdates%3C%2FA%3E%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Freview.docs.microsoft.com%252Fen-us%252Fwindows%252Fclient-management%252Fmdm%252Fpolicy-csp-update%253Fbranch%253Dpr-en-us-6017%2523update-setpolicydrivenupdatesourceforqualityupdates%26amp%3Bdata%3D04%257C01%257CArianna.Carley%2540microsoft.com%257C2023f93d77e24cd0870f08d9ba9e70a5%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637746011947300408%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3D6%252BU0%252FlQDK6c7apLKdnsw1ztg43%252Fu7E21lcFL4GIIcdc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUpdate%2FSetPolicyDrivenUpdateSourceForQualityUpdates%3C%2FA%3E%3C%2FP%3E%3CP%3ETo%20configure%20whether%20updates%20come%20from%20Windows%20Update%20or%20Windows%20Server%20Update%20Services%20(WSUS).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3ESupported%20on%3A%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3BAt%20least%20Windows%20Server%202016%2C%20Windows%2010%20Version%20%3CFONT%20color%3D%22%23FF0000%22%3E2106%20(21H2)%3C%2FFONT%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CFONT%20color%3D%22%23000000%22%3E%3CSPAN%3E(Sources%20ADMX.Help%20%2C%20need%20a%20cross-check%20maybe)%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070365%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070365%22%20slang%3D%22en-US%22%3E%3CDIV%20class%3D%22lia-message-author-with-avatar%22%3E%0A%3CDIV%20class%3D%22lia-message-author-with-avatar%22%3E%3CSPAN%20class%3D%22UserName%20lia-user-name%20lia-user-rank-Senior-Member%20lia-component-message-view-widget-author-username%22%3E%3CA%20id%3D%22link_21e3b272b0e5d4_1f8d2%22%20class%3D%22lia-link-navigation%20lia-page-link%20lia-user-name-link%22%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F143050%22%20target%3D%22_self%22%20aria-label%3D%22View%20Profile%20of%20Jeremy%20Moskowitz%22%3E%3CSPAN%20class%3D%22%22%3EJeremy%20Moskowitz%3C%2FSPAN%3E%3C%2FA%3E%3C%2FSPAN%3E%3C%2FDIV%3E%3CSPAN%20class%3D%22UserName%20lia-user-name%20lia-user-rank-Senior-Member%20lia-component-message-view-widget-author-username%22%3E%3CSPAN%3E%26nbsp%3B%20I%20would%20love%20to%20completely%20remove%20them%20and%20hope%20to%20in%20a%20future%20release%2C%20but%20unfortunately%20the%20templates%20have%20to%20be%20backward%20compatible%20and%20many%20folks%20use%20the%20latest%20template%20for%20managing%20older%20versions%20of%20Windows.%26nbsp%3B%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3CDIV%20class%3D%22lia-message-author-with-avatar%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20class%3D%22lia-message-author-with-avatar%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%20class%3D%22lia-message-author-with-avatar%22%3E%26nbsp%3B%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070367%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070367%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F67010%22%20target%3D%22_blank%22%3E%40Gabriel%20Luiz%3C%2FA%3E%26nbsp%3BFor%20sure!%20The%20recommendation%20is%20really%20just%3CSPAN%3E%26nbsp%3Bthe%20default%20experience.%20Not%20only%20do%20defaults%20provide%20the%20best%20experience%2C%20they%20are%20also%20the%20most%20effective%20at%20keeping%20devices%20up%20to%20date.%20For%20organizations%20with%20security%20mandates%20that%20require%20being%20on%20a%20specific%20version%20within%20a%20certain%20timeframe%2C%20the%20only%20policies%20needed%20for%20a%20client%20device%20that%20is%20being%20used%20as%20a%201%3A1%20personal%20computer%20are%20offering%20policies%20(e.g.%20the%20new%20Windows%20Update%20for%20Business%20Deployment%20Service%20controls%20or%20deferrals)%20and%20%3CSTRONG%3Edeadlines%3C%2FSTRONG%3E.%20That%E2%80%99s%20it!%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EIf%20useful%20I%20can%20also%20write%20a%20blog%20on%20the%20recommendation%20and%20when%20to%20use%20the%20other%20policies%20that%20are%20neither%20recommended%20nor%20legacy.%20Just%20let%20me%20know%20if%20that%20would%20help.%20%3A)%3C%2Fimg%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070370%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070370%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F289393%22%20target%3D%22_blank%22%3E%40K_Wester-Ebbinghaus%3C%2FA%3E%26nbsp%3Bthat%20is%20an%20interesting%20idea.%20Unfortunately%2C%20I%20am%20not%20sure%20if%20the%20ADMX%2FL%20templates%20would%20allow%20such%20filtering.%20I%20can%20look%20into%20it.%20%3A)%3C%2Fimg%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERegardless%2C%20I%20am%20working%20on%20making%20the%20box%20describing%20supported%20versions%20clearer%20for%20the%20different%20policies.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070373%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070373%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F54514%22%20target%3D%22_blank%22%3E%40VINOD%20KUMAR%3C%2FA%3E%26nbsp%3BGlad%20you%20enjoyed%20the%20article!%20Per%20your%20described%20situation-%20is%20that%209-12%20days%20after%20the%20device%20has%20already%20downloaded%20the%20update%20or%20is%20that%20just%209-12%20days%20from%20when%20the%20feature%20update%20was%20released%3F%20If%20you%20could%20submit%20logs%20via%20FeedbackHub%20for%20this%20that%20would%20be%20very%20helpful%20(unless%20you%20are%20already%20working%20with%20support%20on%20this%3F).%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20deadline%2C%20you%20may%20also%20find%20these%20docs%20useful%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fdeployment%2Fupdate%2Fwufb-compliancedeadlines%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEnforce%20compliance%20deadlines%20with%20policies%20in%20Windows%20Update%20for%20Business%20(Windows%2010)%20-%20Windows%20Deployment%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070374%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070374%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F972439%22%20target%3D%22_blank%22%3E%40Reza_Ameri%3C%2FA%3E%26nbsp%3Byep!%20We%20are%20working%20on%20having%20alerts%20in%20Update%20Compliance%20for%20legacy%20policies.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070376%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070376%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F198103%22%20target%3D%22_blank%22%3E%40Lee%20Drake%3C%2FA%3E%26nbsp%3Byou%20should%20still%20be%20able%20to%20control%20when%20updates%20are%20offered%20to%20end%20users%20without%20using%20any%20of%20the%20above%20legacy%20policies..%20You%20can%20use%20quality%20update%20deferrals%20to%20delay%20the%20deployment%20of%20the%20security%20quality%20update%20for%20up%20to%2030%20days%20or%20you%20can%20use%20pause%20to%20delay%20it%20for%20even%20longer.%20Additionally%2C%20you%20can%20leverage%20Release%20Preview%20to%20test%20the%20non-security%20fixes%20and%20features%20that%20are%20coming%20out%20in%20the%20security%20update%20to%20see%20if%20they%20will%20break%20anything%20in%20your%20ecosystem.%20All%20of%20these%20things%20can%20be%20done%20using%20the%20recommended%20policy%20set.%20%3A)%3C%2Fimg%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070380%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070380%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F10143%22%20target%3D%22_blank%22%3E%40Chris%20Rivers%3C%2FA%3E%26nbsp%3Bthanks%20Chris!%20I%20am%20toying%20around%20with%20the%20idea%20of%20doing%20a%20blog%20on%20the%20recommended%20policy%20settings%20and%20then%20why%20and%20when%20you%20should%20use%20the%20other%20policies%20that%20are%20not%20legacy%2C%20but%20also%20not%20recommended%20in%20most%20situations.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENote%20-%20as%20stated%20for%20most%201%3A1%20client%20devices%20the%20default%20is%20great!%20If%20you%20want%20more%20control%20than%20that%20use%20offering%20policies%20and%20deadlines%20-%20that's%20it!%20%3A)%3C%2Fimg%3E%20However%2C%20I%20respect%20not%20everything%20is%20a%201%3A1%20client%20device%20so%20I%20will%20still%20likely%20put%20together%20a%20blog.%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070392%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070392%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F226354%22%20target%3D%22_blank%22%3E%40Vadim%20Sterkin%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E1.%20It%20was%2025%20before%20I%20realized%20there%20was%20a%20duplicate.%20%3A)%3C%2Fimg%3E%20(Note%20if%20you%20count%20CSPs%20it%20is%20%26gt%3B%2025)%3C%2FP%3E%0A%3CP%3E2.%20Because%20there%20are%20not%20GPs%20for%20all%20of%20the%20policies%20listed%20and%20one%20is%20moving%20into%20the%20legacy%20folder%20shortly%20once%20we%20have%20a%20replacement.%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20class%3D%22lia-quilt-row%20lia-quilt-row-main%22%3E%0A%3CDIV%20class%3D%22lia-quilt-column%20lia-quilt-column-24%20lia-quilt-column-single%20lia-quilt-column-main%22%3E%0A%3CDIV%20class%3D%22lia-quilt-column-alley%20lia-quilt-column-alley-single%22%3E%0A%3CDIV%20class%3D%22lia-message-body-wrapper%20lia-component-message-view-widget-body%22%3E%0A%3CDIV%20id%3D%22bodyDisplay_21e47f371d4d77_10_1f4d8%22%20class%3D%22lia-message-body%22%3E%0A%3CDIV%20class%3D%22lia-message-body-content%22%3E%0A%3CP%3E3.%20The%20ones%20that%20say%20they%20were%20never%20moved%20to%20Windows%2010%20are%20NOT%20supported.%20The%20others%20are%20highly%20not%20recommended%20per%20the%20flaws%20that%20are%20called%20out.%20They%20are%20not%20supported%20on%20Windows%2011%20and%20they%20will%20be%20removed%20from%20the%20code%20in%20future.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThank%20you%20for%20letting%20me%20know%20about%20the%20CSP%20links!%20I%20will%20work%20to%20get%20those%20fixed.%20%3A)%3C%2Fimg%3E%3C%2FP%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%0A%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070396%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070396%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F385679%22%20target%3D%22_blank%22%3E%40exchange12rocks%3C%2FA%3E%26nbsp%3BI%20will%20work%20to%20put%20together%20a%20blog%20on%20the%20recommendations%20for%20Windows%20Server%3F%26nbsp%3B%20WS2019%20supports%20the%20same%20set%20of%20GP%20that%20are%20supported%20on%20Windows%2010%2C%20version%201809.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3070399%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3070399%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F967102%22%20target%3D%22_blank%22%3E%40Pierre_Furlooze%3C%2FA%3E%26nbsp%3Bhaha%20yep%2C%20I've%20noticed.%20Opening%20a%20bug%20to%20get%20it%20fixed.%20%3A)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3071515%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3071515%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E%26nbsp%3Bthank%20you%20for%20your%20information%20and%20hope%20to%20see%20these%20feature%20soon.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3072493%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3072493%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E%26nbsp%3Bthanks%20for%20taking%20time%20to%20answer%20so%20many%20questions.%20%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Fhtml%2F%408DDBD50279ACC780C7A2E03EDB4710BD%2Femoticons%2F1f44d_1f3fb.png%22%20alt%3D%22%3Athumbs_up%3A%22%20title%3D%22%3Athumbs_up%3A%22%20%2F%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20the%20filtering%3A%3C%2FP%3E%3CP%3EIf%20you%20right%20click%20on%20Administrative%20Templates%20node%20in%20GPMC%20or%20GP%20there%20a%20search%20and%20filtering%20that's%20really%20helpful.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHaving%20it%20in%20the%20description%20would%20help%20a%20lot.%20Adding%20a%20new%20OS%20category%20would%20be%20perfect.%20Might%20have%20more%20dependencies%20though.%20The%20filtering%20can%20also%20specificially%20filter%20for%20strings%20in%20the%20description%20only.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EReading%20the%20helpful%20feedback%20from%20others%20I%20would%20like%20to%20reinstate%20a%20former%20idea.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20could%20not%20do%20it%20myself%20but%20maybe%20either%20a%20community%20project%20from%20MVPs%20like%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F63901%22%20target%3D%22_blank%22%3E%40Jeremy%20Moskowitz%3C%2FA%3E%2C%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F11042%22%20target%3D%22_blank%22%3E%40Susan%20Bradley%3C%2FA%3E%26nbsp%3Band%20others%3CSPAN%3Ei%20n%20cooperation%20with%20Microsoft%20or%20a%20native%20solution%20from%20Microsoft%20supported%20by%20feedback%20from%20the%20community%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMany%20still%20have%20to%20deal%20with%20GPO%20and%20want%20to%20modernize%20their%20policies.%20But%20that's%20not%20the%20only%20target.%20Would%20also%20work%20with%20CSP.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThere%20is%20the%20valid%20question%20how%20to%20setup%20modern%20policies%20for%20Windows%20Server%202019%20and%20later.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EIdea%3C%2FSTRONG%3E%3A%3C%2FP%3E%3CP%3ECreate%20a%20webpage%20(comparable%20to%20config.%20Office.com)%20that's%20able%20to%20do%20the%20following%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E1.%20A)%20Import%20gpresult.html%20and%20parse%20for%20Windows%20Update%2C%20Defender%20and%20Telemetry%20Settings%20%26gt%3B%20showing%20the%20effective%20results%20per%20Windows%20%2FWindows%20Server%20OS%20and%20SKU%20for%20all%20supported%20and%20ESU%20Versions.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EB)%20Alternative%20method%3A%20read%20settings%20via%20registry%20from%20hklm%20%2F%20hcu%20policies%20hives%20and%20direct%20settings.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUsecase%3A%20see%20how%20modern%20policies%20would%20work%20as%20result%20on%20all%20OSes.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E2.%20The%20webpage%20has%20a%20wizard%20that%20assist%20to%20select%20OS%20and%20SKU%20and%20the%20outcome%20based%20on%20requirements.%20Step%20by%20step%20especially%20restart%20and%20enforcement%20policies.%26nbsp%3B%3C%2FP%3E%3CP%3EThey%20differ%20most%20depending%20OS.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E3.%20Export%20the%20settings%20as%20GPO%20or%20PowerShell%20which%20can%20be%20then%20imported%20in%20GPMC%20or%20CSP%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhat%20do%20you%20think%20about%20this%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20sounds%20like%20some%20work%20to%20do%2C%20but%20honestly%20it%20would%20be%20the%20easiest%20approach%20for%20patchmanagement%20people.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20you%20mentioned%20to%20write%20more%20blogs%20about%20other%20aspects%20I%20welcome%20this%2C%20but%20would%20also%20be%20a%20good%20base%20for%20this%20idea.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20would%20not%20only%20get%20reliable%20settings%20for%20all%20OS%20per%20version%20but%20also%20have%20an%20easy%20deployment%20and%20pretty%20easy%20troubleshooting.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHow%20do%20you%20feel%20about%20this%20idea%3F%20Is%20it%20something%20you%20would%20consider%20to%20invest%20ressources%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3066178%22%20slang%3D%22en-US%22%3EWhy%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3066178%22%20slang%3D%22en-US%22%3E%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EThe%20Windows%20update%20experience%2C%20as%20well%20as%20the%20policies%20that%20control%20it%2C%20have%20changed%20dramatically%20over%20the%20last%20few%20years.%20Notifications%2C%20the%20ability%20to%20dictate%20the%20behavior%20of%20update%20downloads%2C%20installation%2C%20and%20restarts%2C%20and%20the%20Settings%20experience%20have%20all%20shifted%20dramatically%20from%20what%20was%20released%20in%20Windows%2010%2C%20version%201511.%20We%20have%20invested%20in%20building%20the%20best%20experience%20possible%20for%20end%20users%20%E2%80%93%20adding%20capabilities%20like%20active%20hours%20to%20enable%20a%20device%20to%20automatically%20restart%20when%20the%20end%20user%20is%20away%20and%20changing%20our%20notifications%20to%20include%20information%20like%20restart%20time%20estimates%20so%20that%20end%20users%20can%20decide%20to%20restart%20immediately%20or%20at%20a%20later%2C%20more%20convenient%20time.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EWe%20have%20listened%20to%20your%20feedback%20and%20learned%20a%20lot%20about%20which%20experiences%20work%20and%20which%20don't.%20We%20have%20also%20worked%20to%20evolve%20and%20simplify%20the%20controls%20needed%20to%20support%20these%20improved%20experiences%2C%20and%20identify%20which%20older%20policies%20have%20become%20irrelevant%20or%20replaced%20with%20a%20better%20option.%20As%20a%20result%2C%20the%20Windows%20update%20policy%20set%20contains%20policies%20that%20no%20longer%20have%20any%20impact%3B%20that%20don%E2%80%99t%20work%20as%20described%20on%20devices%20running%20Windows%2010%2C%20version%2020H2%20or%20later%3B%20or%20that%20work%20but%20not%20as%20well%20as%20the%20policies%20that%20were%20added%20to%20accomplish%20a%20similar%20experience%20in%20a%20much%20better%20way.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ETo%20reduce%20that%20complexity%2C%20with%20Windows%2011%20we%20created%20a%20sub-folder%20under%20%E2%80%9CWindows%20Update%E2%80%9D%20to%20specify%20%E2%80%9CLegacy%20Policies.%E2%80%9D%20While%20these%20sub-folders%20are%20only%20available%20in%20the%20Windows%2011%20ADMX%20templates%2C%20the%20same%20recommendations%20can%20be%20made%20for%20Windows%2010%2C%20version%2020H2%20and%20above.%20Therefore%2C%20we%20recommend%20that%20you%20review%20your%20policy%20settings%20and%20leverage%20only%20the%20recommended%20policy%20set.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22The%20Legacy%20Policies%20folder%20as%20it%20appears%20under%20Windows%20Update%20settings%20in%20the%20Local%20Group%20Policy%20Editor%22%20style%3D%22width%3A%20683px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F340762i14907EEDF92649FF%2Fimage-dimensions%2F683x453%3Fv%3Dv2%22%20width%3D%22683%22%20height%3D%22453%22%20role%3D%22button%22%20title%3D%22AriaCarley_0-1642616897160.png%22%20alt%3D%22The%20Legacy%20Policies%20folder%20as%20it%20appears%20under%20Windows%20Update%20settings%20in%20the%20Local%20Group%20Policy%20Editor%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EThe%20Legacy%20Policies%20folder%20as%20it%20appears%20under%20Windows%20Update%20settings%20in%20the%20Local%20Group%20Policy%20Editor%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3ETo%20help%20you%20figure%20out%20which%20policies%20to%20stop%20setting%20and%20which%20to%20use%20instead%2C%20please%20leverage%20the%20below%20list.%20In%20it%2C%20you%20will%20find%20which%20policies%20are%20not%20recommended%2C%20why%20they%20are%20not%20recommended%2C%20and%20how%20to%20get%20the%20same%20or%20similar%20behavior%20with%20either%20default%20settings%20or%20recommended%20policies.%3C%2FP%3E%0A%3CH2%20style%3D%22margin-top%3A%2036px%3B%20margin-bottom%3A%2020px%3B%20font-family%3A%20'Segoe%20UI'%2C%20Segoe%2C%20Tahoma%2C%20Geneva%2C%20sans-serif%3B%20font-weight%3A%20600%3B%20font-size%3A%2020px%3B%20color%3A%20%23333333%3B%22%20id%3D%22toc-hId-335632885%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%20id%3D%22toc-hId-336529277%22%3EPolicies%20not%20to%20set%3C%2FH2%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%3CSTRONG%3EGroup%20Policy%20path%3A%3C%2FSTRONG%3E%20%5B%E2%80%A6%5D%3CEM%3E%2FAdministrative%20Templates%2FWindows%20Components%2F%20Windows%20Updates%2FLegacy%20Policies%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20width%3D%22100%25%22%3E%0A%3CTHEAD%3E%0A%3CTR%20style%3D%22background-color%3A%20%230066cc%3B%22%3E%0A%3CTD%20width%3D%22266%22%3E%3CP%3E%3CFONT%20color%3D%22%23FFFFFF%22%3EPolicy%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%3E%3CP%3E%3CFONT%20color%3D%22%23FFFFFF%22%3EDescription%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%3E%3CP%3E%3CFONT%20color%3D%22%23FFFFFF%22%3EWhy%20not%20to%20set%20it%20and%20what%20to%20use%20instead%3C%2FFONT%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTHEAD%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EDo%20not%20display%20%E2%80%98Install%20Updates%20and%20Shut%20Down%E2%80%9D%20option%20in%20Shut%20Down%20Windows%20dialog%20box%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EEnable%20this%20policy%20to%20not%20show%20the%20%E2%80%9Cinstall%20updates%20and%20shut%20down%E2%80%9D%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20was%20never%20implemented%20on%20Windows%2010%20and%20will%20have%20no%20effect%20if%20set%20on%20Windows%2010%20or%20Windows%2011.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EDo%20not%20adjust%20default%20option%20to%20%E2%80%98Install%20Updates%20and%20Shut%20Down%E2%80%99%20in%20Shut%20Down%20Windows%20dialog%20box%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EEnable%20this%20policy%20so%20that%20the%20users%20last%20shut%20down%20choice%20is%20the%20default%20rather%20than%20the%20%E2%80%9Cinstall%20updates%20and%20shut%20down%E2%80%9D%20option%20being%20default%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20was%20never%20implemented%20on%20Windows%2010%20and%20will%20have%20no%20effect%20if%20set%20on%20Windows%2010%20or%20Windows%2011.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ESpecify%20deadline%20before%20auto-restart%20for%20update%20installation%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20names%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3EQuality%20Updates%2C%20Feature%20Updates%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20names%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%2522%2520%2Fl%2520%2522update-autorestartdeadlineperiodindays%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FAutoRestartDeadlinePeriodInDays%3C%2FA%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-autorestartdeadlineperiodindaysforfeatureupdates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FAutoRestartDeadlinePeriodInDaysForFeatureUpdates%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3ESpecify%20the%20deadline%20in%20days%20before%20a%20pending%20restart%20will%20automatically%20be%20executed%20outside%20of%20active%20hours%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ELeverage%20the%20compliance%20deadline%20policies%20instead.%20To%20do%20so%2C%20go%20to%20%E2%80%9CSpecify%20deadlines%20for%20automatic%20updates%20and%20restarts%E2%80%9D%20policy%2C%20configure%20deadlines%2C%20and%20then%20select%20%22Don%E2%80%98t%20auto-restart%20until%20end%20of%20grace%20period%22%20to%20ensure%20your%20devices%20will%20not%20automatically%20restart%20outside%20of%20active%20hours%20until%20after%20the%20deadline%20is%20reached.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EPolicy%20to%20use%20instead%3A%3C%2FP%3E%0A%3CP%3ESpecify%20deadlines%20for%20automatic%20updates%20and%20restarts%20%26gt%3B%20Don%E2%80%99t%20auto-restart%20until%20end%20of%20grace%20period%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ELeverage%20the%20compliance%20deadline%20policies%20instead.%20By%20configuring%20%22NoAutoReboot%22%20your%20devices%20will%20not%20automatically%20restart%20outside%20of%20active%20hours%20until%20after%20the%20deadline%20is%20reached.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EPolicies%20to%20use%20instead%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%2522%2520%2Fl%2520%2522update-configuredeadlineforqualityupdates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FConfigureDeadlineForQualityUpdates%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%2522%2520%2Fl%2520%2522update-configuredeadlinegraceperiod%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FConfigureDeadlineGracePeriod%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%2522%2520%2Fl%2520%2522update-configuredeadlinenoautoreboot%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FConfigureDeadlineNoAutoReboot%20%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%3CBR%20%2F%3ENote%3A%20If%20the%20end%20user%20selects%20%22restart%20tonight%22%2C%20we%20will%20automatically%20restart%20the%20device%20outside%20of%20active%20hours%20from%20that%20point%20on.%3C%2FEM%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EDelay%20Restart%20for%20scheduled%20installations%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EIf%20the%20status%20is%20set%20to%20Enabled%2C%20a%20scheduled%20restart%20will%20occur%20the%20specified%20number%20of%20minutes%20after%20the%20installation%20is%20finished.%3C%2FP%3E%0A%3CP%3EIf%20the%20status%20is%20set%20to%20Disabled%20or%20Not%20Configured%2C%20the%20default%20wait%20time%20is%2015%20minutes.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3ENote%3A%20This%20policy%20applies%20only%20when%20Automatic%20Updates%20is%20configured%20to%20perform%20scheduled%20installations%20of%20updates.%20If%20the%20%22Configure%20Automatic%20Updates%22%20policy%20is%20disabled%2C%20this%20policy%20has%20no%20effect.%3C%2FEM%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20was%20never%20implemented%20on%20Windows%2010%20and%20will%20have%20no%20effect%20if%20set%20on%20Windows%2010%20or%20Windows%2011.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EConfigure%20auto-restart%20reminder%20notifications%20for%20updates%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-autorestartnotificationschedule%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FAutoRestartNotificationSchedule%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EEnable%20this%20policy%20to%20specify%20when%20auto-restart%20reminders%20are%20displayed.%20You%20can%20specify%20the%20amount%20of%20time%20prior%20to%20a%20scheduled%20restart%20to%20notify%20the%20user.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20only%20works%20with%20the%20automatic%20updates%20schedule%20install%20time%2C%20day%2C%20week%20or%20if%20auto-restart%20deadline%20is%20configured%20and%20compliance%20deadline%20is%20not%20configured.%20These%20notifications%20are%20shown%20before%20the%20deadline%20is%20reached.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20and%20CSP%20recommendation%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3EUtilize%20compliance%20deadline%20instead%20and%20the%20default%20notification%20flow%20to%20ensure%20that%20end%20users%20are%20properly%20notified%20prior%20to%20a%20restart%20occurring.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EConfigure%20auto-restart%20required%20notification%20for%20updates%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-autorestartrequirednotificationdismissal%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FAutoRestartRequiredNotificationDismissal%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EEnable%20this%20policy%20to%20specify%20how%20a%20notification%20is%20dismissed%20(auto%20%E2%80%93%20after%2025%20sec%2C%20default%20OR%20user%20action)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20is%20not%20supported%20in%20code%20for%20Windows%2010%20or%20Windows%2011.%20Configuring%20it%20will%20have%20no%20effect.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20and%20CSP%20recommendation%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3EOur%20notification%20flow%20will%20involve%20both%20automatically%20dismissed%20notifications%20as%20well%20as%20notifications%20that%20will%20require%20the%20end%20user%20to%20interact%2C%20assuming%20you%20are%20leveraging%20the%20compliance%20deadline%20policy.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ETurn%20off%20auto-restart%20notifications%20for%20update%20installations%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-setautorestartnotificationdisable%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FSetAutoRestartNotificationDisable%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3ECan%20disable%20auto-restart%20notifications%20for%20update%20installations.%3C%2FP%3E%0A%3CP%3E-%200%3A%20Enabled%20%5Bdefault%5D%3C%2FP%3E%0A%3CP%3E-%201%3A%20Disable%20notifications%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThe%20default%20notification%20experience%20is%20designed%20to%20balance%20the%20impact%20of%20updates%20while%20giving%20users%20a%20good%20experience.%20Disabling%20notifications%20may%20lead%20to%20end%20user%20dissatisfaction.%20We%20only%20recommend%20turning%20off%20notifications%20for%20kiosk%20or%20user-less%20scenarios.%20In%20such%20scenarios%2C%20you%20can%20disable%20notifications%20by%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EIf%20you%20wish%20to%20disable%20restart%20notifications%2C%20including%20restart%20reminder%20and%20warning%20notifications%2C%20please%20utilize%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-updatenotificationlevel%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FUpdateNotificationLevel%3C%2FA%3E%20policy%20instead.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EIf%20you%20wish%20to%20disable%20restart%20notifications%2C%20including%20restart%20reminder%20and%20warning%20notifications%2C%20please%20utilize%20the%20%22Display%20options%20for%20update%20notifications%22%20policy%20instead.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EAllow%20non-administrators%20to%20receive%20update%20notifications%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EEnables%20admin%20to%20control%20whether%20non-admins%20receive%20notifications%20based%20on%20configure%20automatic%20updates%20setting.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20has%20never%20been%20supported%20via%20CSP%20and%20was%20not%20implemented%20on%20Windows%2010%20or%20Windows%2011%20for%20Group%20Policy.%20Setting%20it%20on%20such%20will%20have%20no%20effect.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EBy%20default%2C%20end%20users%20will%20receive%20update%20notifications.%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20Specify%20Engaged%20restart%20transition%20and%20notification%20schedule%20for%20updates%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20names%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CEM%3EFor%20quality%20updates%3A%3C%2FEM%3E%20Transition%20(days)%2C%20Snooze%20(days)%2C%20Deadline%20(days)%3C%2FP%3E%0A%3CP%3E%3CEM%3EFor%20feature%20updates%3A%3C%2FEM%3E%20Transition%20(days)%2C%20Snooze%20(days)%2C%20Deadline%20(days)%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20names%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CEM%3EFor%20quality%20updates%3A%3C%2FEM%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-engagedrestartdeadline%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FEngagedRestartDeadline%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-engagedrestartsnoozeschedule%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FEngagedRestartSnoozeSchedule%3C%2FA%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-engagedrestarttransitionschedule%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FEngagedRestartTransitionSchedule%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EFor%20feature%20updates%3A%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-engagedrestartdeadlineforfeatureupdates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FEngagedRestartDeadlineForFeatureUpdates%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-engagedrestartsnoozescheduleforfeatureupdates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FEngagedRestartSnoozeScheduleForFeatureUpdates%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-engagedrestarttransitionscheduleforfeatureupdates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FEngagedRestartTransitionScheduleForFeatureUpdates%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EEnable%20this%20policy%20to%20configure%20Transition%20(the%20amount%20of%20time%20before%20going%20from%20auto-restart%20to%20engaged%20restart)%2C%20Snooze%20(the%20amount%20of%20engaged%20notifications%20the%20end%20user%20can%20snooze)%2C%20Deadline%20(the%20time%20before%20a%20pending%20reboot%20will%20be%20automatically%20executed%20outside%20of%20active%20hours)%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3ECSP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ELeverage%20the%20compliance%20deadline%20policies%20instead.%20These%20policies%20better%20allow%20you%20to%20ensure%20updates%20are%20completed%20within%20your%20compliance%20window%20while%20providing%20a%20much%20better%20experience%20for%20your%20end%20users.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EPolicies%20to%20use%20instead%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-configuredeadlineforqualityupdates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FConfigureDeadlineForQualityUpdates%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-configuredeadlinegraceperiod%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FConfigureDeadlineGracePeriod%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EIf%20you%20wish%20to%20prevent%20automatic%20restarts%20outside%20of%20active%20hours%20when%20the%20device%20is%20plugged%20in%20and%20the%20user%20is%20away%20until%20after%20the%20deadline%20has%20been%20reached%2C%20you%20can%20configure%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-configuredeadlinenoautoreboot%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FConfigureDeadlineNoAutoReboot%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ELeverage%20the%20compliance%20deadline%20policies%20instead.%20These%20policies%20better%20allow%20you%20to%20ensure%20updates%20are%20completed%20within%20your%20compliance%20window%20while%20providing%20a%20much%20better%20experience%20for%20your%20end%20users.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EPolicy%20to%20use%20instead%3A%20%3CBR%20%2F%3ESpecify%20deadlines%20for%20automatic%20updates%20and%20restarts%3C%2FP%3E%0A%3CP%3EIf%20you%20wish%20to%20prevent%20automatic%20restarts%20outside%20of%20active%20hours%20when%20the%20device%20is%20plugged%20in%20and%20the%20user%20is%20away%20until%20after%20the%20deadline%20has%20been%20reached%2C%20you%20can%20configure%3A%20%22Turn%20off%20auto-restart%20for%20updates%20during%20active%20hours%22%20within%20the%20above%20policy.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ETurn%20on%20Software%20Notifications%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EControl%20whether%20users%20see%20detailed%20enhanced%20notification%20messages%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20has%20never%20been%20supported%20via%20CSP%20and%20was%20not%20implemented%20on%20Windows%2010%20or%20Windows%2011%20for%20Group%20Policy.%20Setting%20it%20on%20such%20will%20have%20no%20effect.%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EAllow%20Automatic%20Updates%20immediate%20installation%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3ESpecify%20if%20updates%20that%20don%E2%80%99t%20cause%20a%20restart%20are%20automatically%20installed.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20has%20never%20been%20supported%20via%20CSP%20and%20was%20not%20implemented%20on%20Windows%2010%20or%20Windows%2011%20for%20Group%20Policy.%20Setting%20it%20on%20such%20will%20have%20no%20effect.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20and%20CSP%20recommendation%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3EBy%20default%20updates%20will%20be%20automatically%20installed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ERe-prompt%20for%20restart%20with%20scheduled%20installations%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EIf%20Enabled%2C%20a%20scheduled%20restart%20will%20occur%20the%20specified%20number%20of%20minutes%20after%20the%20previous%20prompt%20for%20restart%20was%20postponed.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20has%20never%20been%20supported%20via%20CSP%20and%20was%20not%20implemented%20on%20Windows%2010%20or%20Windows%2011%20for%20Group%20Policy.%20Setting%20it%20on%20such%20will%20have%20no%20effect.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EReschedule%20Automatic%20Updates%20scheduled%20installations%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EWait%20after%20system%20startup%20(minutes)%3A%20%5B1%2C%2060%5D%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EAmount%20of%20time%20after%20a%20system%20startup%20that%20a%20scheduled%20install%20occurs%20when%20missed%20previously%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20has%20never%20been%20supported%20via%20CSP%20and%20was%20not%20implemented%20on%20Windows%2010%20or%20Windows%2011%20for%20Group%20Policy.%20Setting%20it%20on%20such%20will%20have%20no%20effect.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20Configure%20auto-restart%20warning%20notifications%20schedule%20for%20updates%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20names%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-scheduleimminentrestartwarning%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FScheduleImminentRestartWarning%3C%2FA%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-schedulerestartwarning%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FScheduleRestartWarning%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3ESpecify%20the%20number%20of%20hours%20before%20a%20restart%20to%20notify%20the%20end%20user.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20only%20works%20on%20Windows%2010%20if%20the%20GP%3A%20%22Specify%20deadline%20before%20auto-restart%20for%20update%20installation%22%20or%20the%20CSP%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-autorestartdeadlineperiodindays%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FAutoRestartDeadlinePeriodInDays%3C%2FA%3E%20%2F%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-autorestartdeadlineperiodindaysforfeatureupdates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FAutoRestartDeadlinePeriodInDaysForFeatureUpdates%3C%2FA%3E%20is%20configured.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20and%20CSP%20recommendation%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3ELeverage%20the%20default%20notification%20flow%20that%20comes%20with%20compliance%20deadline.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ENo%20auto-restart%20with%20logged%20on%20users%20for%20scheduled%20automatic%20updates%20installation%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EDo%20not%20automatically%20restart%20with%20the%20user%20logged%20on%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20was%20never%20created%20as%20a%20CSP.%20In%20Group%20Policy%20this%20policy%20does%20not%20work%20exactly%20as%20per%20description.%20Further%2C%20this%20policy%20can%20result%20in%20no%20quality%20update%20reboots%20period%2C%20given%20many%20users%20today%20never%20log%20off.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EThe%20recommendation%20to%20replace%20this%20would%20be%20to%20leverage%20compliance%20deadline%20and%20then%20to%20configure%20no-auto%20reboot%20to%20prevent%20non-user%20aware%20reboots%20prior%20to%20the%20deadline%20being%20reached.%20Or%20for%20server%20devices%2C%20leverage%20Configure%20Automatic%20Updates%20options%207%20-%20notify%20to%20install%20and%20notify%20to%20reboot.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ESelect%20when%20Feature%20Updates%20are%20received%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-pausefeatureupdates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FPauseFeatureUpdates%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EPause%20updates%20for%2060%20days%20or%20until%20set%20back%20to%200.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20and%20CSP%20recommendation%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3EThis%20policy%20was%20replaced%20back%20in%201703.%20To%20pause%20updates%2C%20utilize%20the%20Update%2FPauseFeatureUpdatesStartTime%20and%2For%20Update%2FPauseQualityUpdatesStartTime%20policy.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EDefer%20Upgrades%20and%20Updates%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-deferupdateperiod%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FDeferUpdatePeriod%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EDefer%20quality%20updates%20for%20up%20to%204%20weeks%20(0-4%20weeks).%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20and%20CSP%20recommendation%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3EThis%20policy%20was%20replaced%20back%20in%201607.%20To%20defer%20quality%20updates%2C%20utilize%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-deferqualityupdatesperiodindays%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FDeferQualityUpdatesPeriodInDays%3C%2FA%3E%20or%20%3CA%20href%3D%22https%3A%2F%2Fgpsearch.azurewebsites.net%2F%2313436%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGPS%3A%20Select%20when%20Quality%20Updates%20are%20received%3C%2FA%3E%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EDefer%20Upgrades%20and%20Updates%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-deferupgradeperiod%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FDeferUpgradePeriod%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EDefer%20feature%20updates%20for%20up%20to%208%20months%20(0-8%20months).%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20and%20CSP%20recommendation%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3EThis%20policy%20was%20replaced%20back%20in%201607.%20To%20defer%20feature%20updates%2C%20utilize%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%2522%2520%2Fl%2520%2522update-deferfeatureupdatesperiodindays%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FDeferFeatureUpdatesPeriodInDays%3C%2FA%3E%20or%20%3CA%20href%3D%22https%3A%2F%2Fgpsearch.azurewebsites.net%2F%2313435%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGPS%3A%20Select%20when%20Preview%20Builds%20and%20Feature%20Updates%20are%20received%3C%2FA%3E%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ESelect%20when%20Feature%20Updates%20are%20received%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-requiredeferupgrade%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FRequireDeferUpgrade%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EAllows%20admins%20to%20stay%20on%20the%20Semi-Annual%20Channel%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3ECSP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EThis%20policy%20was%20replaced%20back%20in%201607.%20To%20defer%20feature%20updates%2C%20utilize%20Update%2FDeferFeatureUpdatesPeriodInDays%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3ETurn%20on%20recommended%20updates%20via%20Automatic%20Updates%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3ESpecify%20whether%20Automatic%20updates%20will%20deliver%20both%20important%20and%20recommended%20updates%20from%20Windows%20Update%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20has%20never%20been%20supported%20via%20CSP%20and%20was%20not%20implemented%20on%20Windows%2010%20or%20Windows%2011%20for%20Group%20Policy.%20Setting%20it%20on%20such%20will%20have%20no%20effect.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-requireupdateapproval%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FRequireUpdateApproval%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EAdmins%20can%20restrict%20what%20updates%20are%20installed%20to%20only%20those%20on%20the%20approval%20list.%3C%2FP%3E%0A%3CP%3E-%200%3A%20Device%20installs%20all%20applicable%20updates%20%5Bdefault%5D%3C%2FP%3E%0A%3CP%3E-%201%3A%20Device%20only%20installs%20updates%20that%20are%20on%20the%20approved%20update%20list%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3ECSP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EThis%20policy%20is%20only%20recommended%20for%20mobile%20devices.%20Using%20this%20policy%20for%20other%20device%20types%20can%20result%20in%20a%20poor%20experience%20and%20is%20not%20supported%20on%20Windows%2010%20or%20Windows%2011.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20No%20equivalent%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-phoneupdaterestrictions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FPhoneUpdateRestrictions%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EDeprecated%20already%2C%20replaced%20with%20Require%20Update%20Approval%20-%20which%20is%20now%20also%20being%20deprecated.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EDo%20not%20allow%20update%20deferral%20policies%20to%20cause%20scans%20against%20Windows%20Update%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-disabledualscan%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FDisableDualScan%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EEnable%20this%20policy%20to%20not%20allow%20update%20deferral%20policies%20to%20cause%20scans%20against%20Windows%20Update.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20works%20on%20Windows%2010%2C%20but%20is%20not%20supported%20and%20will%20have%20no%20effect%20on%20Windows%2011%20devices.%20We%20recommend%20using%20the%20new%20scan%20source%20policy%20instead.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EFor%20Windows%2010%2C%20version%202004%20and%20above%20and%20Windows%2011%20leverage%20the%20policies%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Freview.docs.microsoft.com%252Fen-us%252Fwindows%252Fclient-management%252Fmdm%252Fpolicy-csp-update%253Fbranch%253Dpr-en-us-6017%2523update-setpolicydrivenupdatesourcefordriverupdates%26amp%3Bdata%3D04%257C01%257CArianna.Carley%2540microsoft.com%257C2023f93d77e24cd0870f08d9ba9e70a5%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637746011947300408%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3DoPw9YdBldsmOF0cByaJg6ARD9ey0%252BWpRCWk08cgF8bg%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUpdate%2FSetPolicyDrivenUpdateSourceForDriverUpdates%3C%2FA%3E%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Freview.docs.microsoft.com%252Fen-us%252Fwindows%252Fclient-management%252Fmdm%252Fpolicy-csp-update%253Fbranch%253Dpr-en-us-6017%2523update-setpolicydrivenupdatesourceforfeatureupdates%26amp%3Bdata%3D04%257C01%257CArianna.Carley%2540microsoft.com%257C2023f93d77e24cd0870f08d9ba9e70a5%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637746011947300408%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3D3GjMwAL3ozv91sFQp%252FmuIe4%252BMaGWvjLKJft4RA%252FnLfw%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUpdate%2FSetPolicyDrivenUpdateSourceForFeatureUpdates%3C%2FA%3E%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Freview.docs.microsoft.com%252Fen-us%252Fwindows%252Fclient-management%252Fmdm%252Fpolicy-csp-update%253Fbranch%253Dpr-en-us-6017%2523update-setpolicydrivenupdatesourceforotherupdates%26amp%3Bdata%3D04%257C01%257CArianna.Carley%2540microsoft.com%257C2023f93d77e24cd0870f08d9ba9e70a5%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637746011947300408%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3DxHi1xsjG8goMP5ugwXkXcl6v0rjyqvFha%252F5rNBvhRqA%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUpdate%2FSetPolicyDrivenUpdateSourceForOtherUpdates%3C%2FA%3E%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Freview.docs.microsoft.com%252Fen-us%252Fwindows%252Fclient-management%252Fmdm%252Fpolicy-csp-update%253Fbranch%253Dpr-en-us-6017%2523update-setpolicydrivenupdatesourceforqualityupdates%26amp%3Bdata%3D04%257C01%257CArianna.Carley%2540microsoft.com%257C2023f93d77e24cd0870f08d9ba9e70a5%257C72f988bf86f141af91ab2d7cd011db47%257C0%257C0%257C637746011947300408%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%26amp%3Bsdata%3D6%252BU0%252FlQDK6c7apLKdnsw1ztg43%252Fu7E21lcFL4GIIcdc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EUpdate%2FSetPolicyDrivenUpdateSourceForQualityUpdates%3C%2FA%3E%3C%2FP%3E%0A%3CP%3ETo%20configure%20whether%20updates%20come%20from%20Windows%20Update%20or%20Windows%20Server%20Update%20Services%20(WSUS).%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20recommendation%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EFor%20Windows%2010%2C%20version%202004%20and%20above%20and%20Windows%2011%20leverage%20the%20policy%20%E2%80%9CSpecify%20source%20service%20for%20specific%20classes%20of%20Windows%20Updates%E2%80%9D%20policy.%20This%20will%20enable%20you%20to%20specify%20whether%20specific%20update%20classes%20(Feature%20updates%2C%20quality%20updates%2C%20driver%20and%20firmware%20updates%2C%20and%20other%20updates)%20individually%20come%20from%20WSUS%20or%20Windows%20Update.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22266%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3EUpdate%20Power%20Policy%20for%20Cart%20Restarts%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-setedurestart%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FSetEDURestart%3C%2FA%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22149%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EAdded%20in%20Windows%2010%2C%20version%201703.%20For%20devices%20in%20a%20cart%2C%20this%20policy%20skips%20all%20restart%20checks%20to%20ensure%20that%20the%20reboot%20will%20happen%20at%20ScheduledInstallTime.%3C%2FP%3E%0A%3CP%3EWhen%20you%20set%20this%20policy%20along%20with%20Update%2FActiveHoursStart%2C%20Update%2FActiveHoursEnd%2C%20and%20ShareCartPC%2C%20it%20will%20defer%20all%20the%20update%20processes%20(scan%2C%20download%2C%20install%2C%20and%20reboot)%20to%20a%20time%20after%20Active%20Hours.%20After%20a%20buffer%20period%20after%20ActiveHoursEnd%2C%20the%20device%20will%20wake%20up%20several%20times%20to%20complete%20the%20processes.%20All%20processes%20are%20blocked%20before%20ActiveHoursStart.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3CTD%20width%3D%22208%22%20style%3D%22vertical-align%3A%20top%3B%22%3E%3CP%3EThis%20policy%20will%20work%20on%20Windows%2010%3B%20However%2C%20it%20will%20dramatically%20reduce%20compliance%20and%20the%20velocity%20at%20which%20the%20device%20takes%20updates.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EGP%20and%20CSP%20recommendation%3A%20%3CBR%20%2F%3E%3C%2FSTRONG%3EWe%20recommend%20leveraging%20the%20default%20settings%20with%20Active%20Hours%20instead.%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EAfter%20reading%20all%20of%20this%20you%20may%20be%20wondering%20%E2%80%93%20what%20is%20recommended%3F%20At%20the%20end%20of%20the%20day%2C%20it%20is%20best%20to%20leverage%20the%20default%20experience.%20Not%20only%20do%20defaults%20provide%20the%20best%20experience%2C%20they%20are%20also%20the%20most%20effective%20at%20keeping%20devices%20up%20to%20date.%20For%20organizations%20with%20security%20mandates%20that%20require%20being%20on%20a%20specific%20version%20within%20a%20certain%20timeframe%2C%20the%20only%20policies%20needed%20for%20a%20client%20device%20that%20is%20being%20used%20as%20a%201%3A1%20personal%20computer%20are%20offering%20policies%20(e.g.%20the%20new%20Windows%20Update%20for%20Business%20Deployment%20Service%20controls%20or%20deferrals)%20and%20deadlines.%20That%E2%80%99s%20it!%20The%20rest%20of%20the%20policies%20are%20simply%20there%20to%20enable%20you%20to%20tailor%20that%20experience%20to%20the%20needs%20of%20your%20organization%2C%20to%20help%20you%20manage%20other%20device%20types%2C%20or%20to%20support%20other%20device%20usage%20scenarios.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3EQuestions%3F%20Comments!%20Reach%20out%20to%20me%20here%20on%20the%20Tech%20Community%20or%20at%20%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2FAriaUpdated%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%40AriaUpdated%3C%2FA%3E%20on%20Twitter.%20Thank%20you%20for%20helping%20provide%20your%20end%20users%20with%20a%20better%20update%20experience.%3C%2FP%3E%0A%3CP%20style%3D%22margin-top%3A%2020px%3B%22%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-3066178%22%20slang%3D%22en-US%22%3E%3CP%3EUnderstand%20which%20Windows%20update%20policies%20to%20set%2C%20and%20not%20to%20set%2C%20and%20why.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Screenshot%20of%20the%20Legacy%20Policies%20folder%20as%20it%20appears%20under%20Windows%20Update%20settings%20in%20the%20Local%20Group%20Policy%20Editor%22%20style%3D%22width%3A%20645px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F340761iBEEB118BDC18F3A1%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22policy-editor.png%22%20alt%3D%22policy-editor.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3066178%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EServicing%20and%20updates%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWindows%2010%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWindows%2011%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3216124%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3216124%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20topic%20is%20completly%20misleading%20and%20feels%20like%20some%20kind%20of%20click%20bait%20...%20wthe%20whole%20article%20is%20about%20WINDOWS%20UPDATE.%3CBR%20%2F%3E%3CBR%20%2F%3EThe%20topic%20should%20be%20%22Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20Update%20policies%22.%20It%C2%B4s%20just%20a%20component%2C%20that%20changed%20it%C2%B4s%20behavior.%20Sorry%2C%20not%20really%20that%20interesting%20...%2025%20GPOs%20no%20longer%20used%20in%20WINDOWS%20would%20be%20the%20more%20helpful%20article.%3CBR%20%2F%3E%3CBR%20%2F%3EBy%20the%20way%2C%20like%20the%20others%20say%3A%20Why%20don%C2%B4t%20you%20cleanup%3F%3CBR%20%2F%3E%3CBR%20%2F%3EThere%20is%20still%20my%20most%20loved%20one%20available%3A%20%22Do%20not%20display%20the%20Getting%20Started%20welcome%20screen%20at%20logon%22%20...%20only%20W2K%20...%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3245477%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3245477%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E%26nbsp%3Byesterday%20I%20have%20had%20a%20customer%20which%20spare%20the%20time%20to%20work%20through%20your%20epic%20guidance%20and%20we%20had%20to%20do%20a%20lot%20of%20changes%20on%20their%20baseline.%20They%20are%20still%20using%20WSUS%2C%20well%20a%20modernized%20form%20with%20WAM%20and%20not%20saving%20updates%20locally%20anymore%20and%20leveraged%20DO.%20However%20at%20the%20end%20of%20the%20day%20we%20noticed%20two%20things%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSPAN%3E1.%20Turn%20off%20auto-restart%20notifications%20for%20update%20installations%20-%20there%20seems%20to%20be%20a%20missing%20text%20after%20the%20highlighted%20sentence%2C%20can%20you%20confirm%20this%3F%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CBLOCKQUOTE%3E%3CHR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E%26nbsp%3Bwrote%3A%3CBR%20%2F%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CTABLE%20width%3D%22100%25%22%3E%3CTBODY%3E%3CTR%3E%3CTD%20width%3D%22266%22%20height%3D%22895px%22%3E%3CP%3E%3CSTRONG%3EGP%20name%3A%3C%2FSTRONG%3E%3CBR%20%2F%3ETurn%20off%20auto-restart%20notifications%20for%20update%20installations%3C%2FP%3E%3CP%3E%3CSTRONG%3EGP%20setting%20name%3A%3C%2FSTRONG%3E%20n%2Fa%3C%2FP%3E%3CP%3E%3CSTRONG%3ECSP%20name%3A%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-setautorestartnotificationdisable%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FSetAutoRestartNotificationDisable%3C%2FA%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%22149%22%20height%3D%22895px%22%3E%3CP%3ECan%20disable%20auto-restart%20notifications%20for%20update%20installations.%3C%2FP%3E%3CP%3E-%200%3A%20Enabled%20%5Bdefault%5D%3C%2FP%3E%3CP%3E-%201%3A%20Disable%20notifications%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%22208%22%20height%3D%22895px%22%3E%3CP%3EThe%20default%20notification%20experience%20is%20designed%20to%20balance%20the%20impact%20of%20updates%20while%20giving%20users%20a%20good%20experience.%20Disabling%20notifications%20may%20lead%20to%20end%20user%20dissatisfaction.%20We%20only%20recommend%20turning%20off%20notifications%20for%20kiosk%20or%20user-less%20scenarios.%20In%20such%20scenarios%2C%20%3CSTRONG%3Eyou%20can%20disable%20notifications%20by%3A%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3E%3CSTRONG%3ECSP%20recommendation%3A%3C%2FSTRONG%3E%3CBR%20%2F%3EIf%20you%20wish%20to%20disable%20restart%20notifications%2C%20including%20restart%20reminder%20and%20warning%20notifications%2C%20please%20utilize%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-updatenotificationlevel%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUpdate%2FUpdateNotificationLevel%3C%2FA%3E%20policy%20instead.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3E%3CSTRONG%3EGP%20recommendation%3A%3C%2FSTRONG%3E%3CBR%20%2F%3EIf%20you%20wish%20to%20disable%20restart%20notifications%2C%20including%20restart%20reminder%20and%20warning%20notifications%2C%20please%20utilize%20the%20%22Display%20options%20for%20update%20notifications%22%20policy%20instead.%3C%2FP%3E%3C%2FTD%3E%3C%2FTR%3E%3C%2FTBODY%3E%3C%2FTABLE%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FBLOCKQUOTE%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3E2.%20Ultimately%20we%20followed%20all%20advice%20but%20at%20the%20end%20of%20the%20day%20we%20could%20not%20leverage%20the%20whole%20set%20as%20we%20had%20one%20logic%20conflict%20maybe%20you%20can%20help%20here.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EScenario%3A%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3Ecustomer%20only%20has%20Windows%20Server%202019%20(1809)%20or%20later%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3Ecustomer%20uses%20WSUS%20with%20DO%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EWe%20have%20applied%20quite%20everything%20from%20this%20guide.%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EWe%20hesitate%20to%20leverage%20the%20recommended.%20C%3CSPAN%3Eompliance%20deadline%20policies.%20Reason%3A%20currently%20we%20use%20a%20day%20and%20time%20based%20schedule%20to%20orchestrate%20server%20updates.%20From%20the%20description%20using%20automatic%20download%20and%20installed%20based%20on%20a%20specific%20week%2C%20day%20and%20time%20does%20conflict%20with%20the%20compliance%20deadline%20policies.%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3EHow%20can%20we%20assure%20that%20the%20server%20will%20only%20install%20and%20reboot%20outside%20set%20work%20hours%20which%20include%20work%20hours%20and%20backup%2C%20so%20we%20have%20a%20backup%20before%20installing%20updates.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EThanks%20for%20your%20help!%20I%20believe%20this%20is%20a%20common%20scenario.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3272625%22%20slang%3D%22pt-BR%22%3ERe%3A%20Why%20you%20shouldn't%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3272625%22%20slang%3D%22pt-BR%22%3E%3CP%3EGood%20Morning.%20It%20would%20be%20very%20useful%20to%20put%20the%20recommended%20options%20for%20servers.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3273987%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3273987%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F67010%22%20target%3D%22_blank%22%3E%40Gabriel%20Luiz%3C%2FA%3E%26nbsp%3Bthanks%20for%20chiming%20in.%20Brought%20that%20up%20on%20twitter%2C%20If%20I%20am%20not%20mistaken%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E%26nbsp%3Bwant%20to%20consider%20this%20aspect%2C%20so%20I%20believe%20there%20will%20be%20a%20new%20post%20for%20Windows%20Server%202019%20and%20later.%20It%20is%20particularly%20important%20to%20understand%20as%20except%20of%20one%20or%20two%20settings%20named%20here%2C%20they%20are%20applicable%2C%20except%20the%20deadline%20policies%20which%20would%20incur%20restarts%20during%20business%20hours.%20Also%20Aria%20confirmed%20there%20is%20no%20availability%20to%20set%20a%20scheduled%20restart%20time%20for%20Azure%20Patchmanagement%20which%20would%20be%20the%20evaluation%20of%20on-prem%20WSUS%20and%20legacy%20policies%2C%20for%20Windows%20Server.%3C%2FP%3E%3CP%3EIs%20this%20a%20correct%20summary%20of%20things%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E%26nbsp%3B%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3391912%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3391912%22%20slang%3D%22en-US%22%3E%3CP%3EOn%20the%20recommendation%20to%20use%20'%3CSPAN%3ESpecify%20source%20service%20for%20specific%20classes%20of%20Windows%20Updates'%20instead%20of%20'Do%20not%20allow%20update%20deferral%20policies%20to%20cause%20scans%20against%20Windows%20Update'%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Eon%20Windows%2010%20version%202004%20and%20above%20and%20Windows%2011%3A%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%3EIf%20'SetPolicyDrivenUpdateSourceForQualityUpdates'%20is%20set%20to%20WSUS%20on%20these%20operating%20systems%2C%20the%20installation%20of%20optional%20features%20(Optional%20languages%20.NET%20Framework%203.5%2C%20RSAT%20tools)%20fail%20with%20'0x800f0950'%20or%20'0x800f0954'%20errors%26nbsp%3B(see%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fanswers%2Fquestions%2F703064%2Fspecify-source-service-for-specific-classes-of-win.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fanswers%2Fquestions%2F703064%2Fspecify-source-service-for-specific-classes-of-win.html%3C%2FA%3E).%20This%20is%20even%20with%20'Specify%20settings%20for%20optional%20component%20installation%20and%20component%20repair'%20enabled%20with%20'Download%20repair%20content%20and%20optional%20features%20directly%20from%20Windows%20Server%20Update%20Services%20(WSUS)'%20turned%20on.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20this%20a%20known%20bug%3F%20Will%20it%20be%20fixed%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3397005%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3397005%22%20slang%3D%22en-US%22%3E%3CP%3EHey%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F158630%22%20target%3D%22_blank%22%3E%40Aria%20Carley%3C%2FA%3E%26nbsp%3BI%20am%20currently%20engaging%20Azure%20Patch%20Management%20for%20on-premises%20Windows%20Server.%20I%20am%20not%20sure%20if%20we%20need%20any%20policies%20at%20all%2C%20however%20I%20will%20check%20if%20it%20makes%20it%20any%20easier%20to%20say%20%22do%20not%20restart%22%20in%20AzPMgmt%20and%20use%20GPOs%20for%20the%20restart%20behaviour%20%2F%20deadlines%20for%20WS%202019%20or%20newer.%20Overall%20AzPMgmt%20seems%20to%20be%20an%20exciting%20experience%20and%20frankly%20-%20it%20would%20be%20nice%20to%20have%20Windows%20Clients%20there%2C%20too.%20There%20is%20no%20upgrade%20category%20though.%20And%20I%20no%20seperate%20drivers%20%2F%20firmware%20category%20either.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHave%20you%20tried%20it%20yourself%20instead%20of%20WufB%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3066517%22%20slang%3D%22en-US%22%3ERe%3A%20Why%20you%20shouldn%E2%80%99t%20set%20these%2025%20Windows%20policies%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3066517%22%20slang%3D%22en-US%22%3E%3CP%3ENice%20article.%20We%20have%20been%20struggling%20to%20get%20the%20desired%20result%20for%20last%201%20month.%20Deployed%20Feature%20update%20by%20setting%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-configuredeadlineforfeatureupdates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConfigureDeadlineForFeatureUpdates%3C%2FA%3E%26nbsp%3Bas%204%20days%20and%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fclient-management%2Fmdm%2Fpolicy-csp-update%23update-configuredeadlinegraceperiod%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EConfigureDeadlineGracePeriod%3C%2FA%3E%26nbsp%3Bas%202%20days.%20Even%20then%20the%20device%20restart%20happens%20only%20after%209%20or%2012%20days%20or%20randomly%20after%2010%20days.%20It%20is%20really%20inconsistent%20and%20difficult%20to%20understand%20when%20exactly%20the%20Feature%20update%20will%20happen.%20Very%20less%20documentation%20on%20the%20logs%20in%20the%20client%20side%20to%20understand%20when%20the%20reboot%20is%20scheduled.%20There%20should%20be%20a%20simple%20template%20that%20shows%20what%20policy%20are%20to%20be%20configured%20only%20in%20Intune%20go%20get%20the%20desired%20results.%20these%20way%20org.%20like%20us%20moving%20away%20from%20GPO%2FSCCM%20to%20Intune%20will%20be%20easier%20instead%20of%20chasing%20support%20for%20each%20and%20every%20small%20issue.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Jan 27 2022 10:00 AM
Updated by: