This project focuses on learning the fundamentals of patch management and vulnerability remediation using Windows Server Update Services (WSUS). WSUS enables administrators to centrally manage the distribution of Microsoft updates across a corporate network. By the end of this project, we will have the skills to deploy WSUS, configure client systems, approve and distribute updates, and monitor update status.
- Basic knowledge of Windows Server and client management
- A Windows Server 2016 or later system. In this project, I use the 2022 server
- Windows client devices (Windows 10) for testing purposes
- Windows Server 2022 or later with WSUS role installed
- Windows client machines
- Active Directory for domain-joined machines (optional but recommended)
Steps:
- Open Server Manager on the Windows Server.
- Click "Manage" > "Add Roles and Features".
- Follow the installation wizard to add the WSUS role:
- Select "Windows Server Update Services".
- Choose the required services and proceed with the installation.
- Once installed, launch the WSUS Configuration Wizard:
- Configure the update source.
- Choose the classifications and products you want to update.
- Set up synchronization schedule.
- Complete the wizard to finalize the setup..
Result:
- WSUS is installed and configured with initial settings applied
Steps:
- Open the Group Policy Management Console (GPMC) on the Windows Server.
- Create a new Group Policy Object (GPO) or modify an existing one.
- Navigate to "Computer Configuration" > "Policies" > "Administrative Templates" > "Windows Components" > "Windows Update".
- Configure the following policies:
- "Specify Intranet Microsoft update service location": Set it to the WSUS server URL (e.g.,
http://wsusserver). - "Configure Automatic Updates": Set it to auto-download and schedule the install.
- "Specify Intranet Microsoft update service location": Set it to the WSUS server URL (e.g.,
- Link the GPO to the organizational unit (OU) containing the target client machines.
Result:
- Group policies are configured to direct client devices to use the WSUS server for updates.
Steps:
- Open the WSUS management console on the server.
- Navigate to "Updates" > "All Updates".
- Select the updates to be approved for installation.
- Right-click the selected updates and choose "Approve".
- Assign the updates to the appropriate computer groups.
Result:
- The selected updates are approved for deployment to designated device groups.
Steps:
- On a client machine, open Command Prompt with administrative privileges
- Execute the following command to trigger an update check:
wuauclt /detectnow
- Open Windows Update from the Control Panel or Settings and check for available updates.
- Confirm that the updates approved in WSUS are listed and begin installation.
Result:
- The client machine detects and installs updates as configured by WSUS
Steps:
- Access the WSUS console on the server.
- Navigate to the "Reports" section and select the desired report type (e.g., Update Status Summary).
- Define the necessary parameters and generate the report.
- Analyze the report to assess update compliance and identify any issues.
Result:
- A detailed report providing insights into update status and compliance across client devices, helping to detect pending or failed updates.
Summary:
By completing these exercises, participants will gain hands-on experience in using WSUS for patch management and vulnerability remediation, including server configuration, client setup, update deployment, and compliance monitoring.