We all know that the Windows Server needs to be patched, or the loophole that is called more ah. The Windows family of servers patching is just two ways:
1. Patching over the Internet:
- Go to control panel->windows update->hit ' Check for Updates '
- Go to control panel->windows Update->hit ' Check online for updates from Windows Update '
- After completing the above tasks you receive the availabe ' Install updates for computer '
- Go to control panel->windows update->hit ' numbers important Update is available '
- Unselect the package for you, don ' t want to update and hit ' OK '
- Then hits ' Install Updates ', then it starts downloading the patches and install it automatically.
- Once installation is completed, instead for install updates you'll get the option to restart.
2. Patching via WSUS: (can be used with SCCM)
- Set up a domain environment, of course you have to install and configure AD
- Install a WSUS server, the specific steps do not write, many online
- Join the client to the domain environment
- Go to control Panel->windows update->change Settings, (check if you setings block by Domain Admin, gpupdate/force )
- Go to control panel->windows update->hit ' Check for Update managed by your system administrator ' (from WSUS)
- Then hits ' Install Updates ', then it starts downloading the patches and install it automatically. (which patches are already configured in the WSUS server to be installed)
- Once installation is completed, instead for install updates you'll get the option to restart.
3. Directories and logs used by clients when patching
C:\Windows\WindowsUpdate.txt (Logging Windows client whether patched from where to hit the patch)
- Log patterns that are patched over the internet
--Ten- at .: -: +:670 34025cc PT + ServiceId = {9482f4b4-e343-43b6-b170-9a65bc822c77}, Server URL = https://Www.update.microsoft.com/v6/ClientWebService/client.asmx --Ten- at .: -: -:217 34025cc Misc Validating Signature forC:\Windows\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9a65bc822c77\muv4wuredir.cab: --Ten- at .: -: -:217 34025cc Misc Microsoft signed:yes --Ten- at .: +:Geneva:577 34025cc Agent * Found -Updates and -CategoriesinchSearch Evaluated Appl. Rules of862 outOf1522deployed Entities --Ten- at .: +:Geneva:624 34025cc Agent ********* --Ten- at .: +:Geneva:655 340216c AU # -Updates detected
- Patch Log patterns via WSUS
--Ten- at .: +:xx:716 34025cc PT +++++++++++ pt:synchronizing Server Updates +++++++++++ --Ten- at .: +:xx:716 34025cc PT + ServiceId = {3da21691-e39d-4da6-8a4b-b43877bcb1b7}, Server URL = http://10.15.1.14/clientwebservice/client.asmx --Ten- at .: +: -:670 34025cc Agent * Found -Updates and AboutCategoriesinchSearch Evaluated Appl. Rules of956 outOf1708deployed Entities --Ten- at .: +: -:685 34025cc Agent ********* --Ten- at .: +: -:732 340216c AU # -Updates detected
C:\Windows\SoftwareDistribution\Download (this directory is used to store downloaded patches)
Windows2008 Patching (patching)