May 07 2018 08:20 AM
1803 build 17134 is now available
Did it release as Semi-annual (Targeted) or Semi-annual?
windows-10 release-information
will it be the approximately 4 months before my rings begin to defer it as semi-annual or are they going to start installing it now if on the semi-annual branch???
May 29 2018 12:00 PM
May 29 2018 12:02 PM
May 29 2018 12:11 PM
@Darrell Gorter wrote:
The one set of logs showed RS4 was available prior to the machine joining WUFB with the deferral policy.
Darrell -
Are you referring to my logs? I built this virtual machine from scratch and joined the domain in early February, then set up deferral policy in Group Policy in late February. RS4 was released April 30, right?
Is there an article somewhere about what logs to review and what to look for to confirm that deferral is working?
May 29 2018 12:17 PM
@SusanBradleyGeek wrote:You don't want to set telemetry to 0 as that ignores the Windows update for business settings. If you use the don't use dual scan setting - and are behind WSUS you should be fine.
Agreed that AllowTelemetry should be at least 1, but according to the docs (see screen shots in my post above), all editions except Enterprise/EDU/IoT/server treat 0 as 1. In other words, with Pro, it's not possible to block telemetry. You would think that also means it is not possible to ignore Windows Update for Business settings.
May 29 2018 12:25 PM
You want the policy called "Do not allow update deferral policies to cause scans against Windows update". Set that to enabled.
The telemetry setting of 0 only works on Enterprise as I recall. Are you running that sku?
May 29 2018 12:59 PM
May 29 2018 01:20 PM
May 29 2018 01:34 PM
@Thomas Czekalla wrote:
hi Susan,
We run the Enterprise Version. Comparing with the explanations above we have telemetry 0 which is the same as 1 in the Enterprise Environment (so i have Unterstand it.)
I don't have Enterprise so I'm not speaking from experience, but I understand that differently. The way I read it, it is only possible to set a value of 0 if you DO have Enterprise; in that case, it is NOT treated as a 1. Then, under "Select when Preview Builds and Feature Updates are received," it says, "To configure Feature Updates, you must have a telemetry level setting of 1 or higher." Does deferral work as expected on your Enterprise machines if you set AllowTelemetry to 1?
May 29 2018 01:39 PM
@SusanBradleyGeek wrote:
If you don't use WSUS, if you are choosing "semi annual channel" what number of days did you select for deferral? As I recall even if you set the deferral for X number of days, if you click on "check for updates" this will trigger the install of 1803. Check for updates isn't like the old Windows 7 scan where you would see what would be offered, check for updates actually triggers detection and install.
Not for me. No WSUS, Win10 Pro 1709, deferral set to 180 days. On most machines, I can Check for updates all day long and not get offered 1803.
Once it IS offered, you're right, it won't ask if it's okay to install it.
May 30 2018 11:29 AM
I tend not to "check for updates" unless I'm positive I want the thing that might be up there.
BTW I pointed another Consultant who had a client who got 1803 with deferrals in place to this thread. Is there anyway to have a checking tool to check if what you think will be deferred is going to be deferred? The state of affairs right now is you never know if
a. you've set something wrong
or
b. it's a detection bug. And given that we have had them in the past we are constantly in a state of questioning.
Jun 02 2018 03:23 PM - edited Jun 02 2018 03:24 PM
I've now confirmed that my machine did NOT have the deferral group policy applied before 1803 was released. Although the machine is domain-joined, group policy updates started failing after the machine's NIC lost its Domain profile on February 14. It's unclear if this was due to a Windows update or due to a general failure of Network Location Awareness.
Details: https://www.mcbsys.com/blog/2018/06/windows-10-unexpectedly-updated-to-1803/
Thanks to the MS team for reviewing the logs, which led me to restore a pre-update image.
Jun 04 2018 07:20 AM
Hi Mark,
I have now set the Telemetry from 0 to 1.
After this my policies worked like expected.
Still strange why i worked with 0 for at least one year and all was also fine.
Thanks to all for support and help
Jun 05 2018 03:15 PM
SolutionMicrosoft updated the docs to make it clear, that when Telemetry is set to Zero, the deferral policies do not take affect and you make get the feature updates.
Here are the links to the updated Docs
https://docs.microsoft.com/en-us/windows/deployment/update/waas-overview
Important Devices on the Semi-Annual Channel (formerly called Current Branch for Business) must have their diagnostic data set to 1 (Basic) or higher, in order to ensure that the service is performing at the expected quality. If diagnostic data is set to 0, the device will be treated as if it were in the Semi-Annual Channel (Targeted)(formerly called Current Branch or CB) branch. For instructions to set the diagnostic data level, see Configure the operating system diagnostic data level.
https://docs.microsoft.com/en-us/windows/deployment/update/waas-configure-wufb
Note Users will not be able to change this setting if it was configured by policy. Important Devices on the Semi-Annual Channel (formerly called Current Branch for Business) must have their diagnostic data set to 1 (Basic) or higher, in order to ensure that the service is performing at the expected quality. If diagnostic data is set to 0, the device will be treated as if it were in the Semi-Annual Channel (Targeted)(formerly called Current Branch or CB) branch. For instructions to set the diagnostic data level, see Configure the operating system diagnostic data level.
Thanks
Darrell Gorter