Professional Documents
Culture Documents
Wsus Configurar Clientes Sin Active Directory
Wsus Configurar Clientes Sin Active Directory
http://banman.isoftmarketing.com/a.aspx?ZoneID=54&Task=Click&Mode=HTML&SiteID=7&PageID=63187
http://banman.isoftmarketing.com/a.aspx?ZoneID=54&Task=Click&Mode=HTML&SiteID=7&PageID=63187
In this article, I will show you some registry keys that are associated with Windows Update. As I
do, I will show you the various settings that you can assign to those registry keys.
• Published: May 03, 2006
• Updated: May 17, 2006
• Section: Articles & Tutorials :: Windows XP
• Author: Brien M. Posey
Although Windows Update and WSUS are both generally pretty simple to configure, you can
sometimes gain a higher level of control over them by making a few minor modifications to the
Windows registry. In this article, I will show you some registry keys that are associated with
Windows Update. As I do, I will show you the various settings that you can assign to those
registry keys.
Before I Begin
Before I get started, I need to keep the lawyers happy by telling you that modifying the Windows
registry can be dangerous. Incorrectly modifying the registry can destroy Windows and / or your
applications. I therefore strongly recommend that you perform a full system backup prior to
attempting any of the techniques that I am about to show you.
Now that I’ve gotten the standard disclaimer out of the way, there is one more thing that I need
to tell you before I get started. The registry tweaks that I am about to show you are intended for
machines that are running Windows XP. You can apply the tweaks to individual machines
directly, or you can apply modifications as a part of a login script. Also, some of the keys that I
am going to be talking about may not exist by default. If you want to use a key that does not
exist, you will have to create it. You should also keep in mind that Windows Update’s behavior
can be controlled by a group policy, and that if a group policy is in effect, it can cause portions of
the registry to be overwritten after you have made changes.
Elevation of Privileges
One of the problems with receiving updates from a WSUS server is that users are not allowed to
approve or disapprove of updates unless they are a member of the local administrators group.
However, you can use the registry to give users an elevation of privileges that will allow them to
approve or disapprove of updates regardless of whether or not they are a local administrator. On
the flip side, you could also deny end users the ability to approve updates, reserving that right for
Admins.
The registry key that controls this behavior is:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\Eleva
teNonAdmins
The ElevateNonAdmins key has two possible values. The default value of 1 allows non
administrators to approve or deny updates. If you change this value to 0, then only administrators
will be allowed to approve or deny updates.
Target Groups
One of the nice things about WSUS is that it allows you to use client side targeting. The idea
behind client side targeting is that you can set up different computer groups, and you can roll out
updates on a group basis. Client side targeting isn’t used by default, but if you decide to use it,
then there are two different registry keys that you will have to create. One of these keys enables
client side targeting, while the other specifies the name of the target group that the computer
belongs to. Both of these registry keys must be created at:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\
The first key is a DWORD key named TargetGroupEnabled. You can assign this key a value of
either 0, which disables client side targeting, or of 1, which enables client side targeting.
The other key that you will have to create is string value named TargetGroup. The value that you
would assign to this key is the name of the target group that the computer should be assigned to.
Before I Begin
Before I get started, I have to keep the lawyers happy by telling you that making modifications to
the registry can be dangerous. Making an incorrect registry modification can destroy Windows
and / or any applications that are running on the machine. You should therefore make a full
system backup before attempting any of the registry tweaks that I am about to show you.
One other thing that I want to mention before I get started is that if you try some of these
modifications and you don’t get the results that you are expecting, try checking to see if there is a
group policy that mandates Windows update settings for the machine. Group policies can
sometimes modify a registry key so that it follows the mandated behavior rather than using any
modifications that might have been previously made.
Finally, I want to mention that I ended Part 1 of this article by discussing some of the registry
keys found in the HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\windows\Windows
Update section of the registry. All of the registry keys that I will be discussing in this article are
found in this section of the registry as well. None of the registry keys that I am about to show
you exist by default, but you can create them to achieve the desired behavior. If you choose to
create a registry key, then please keep in mind that the key names that I will be showing you are
case sensitive and any of these keys that you create should be created as DWORD values.
Reboot Reminders
Have you ever applied an update to a server and then had Windows prompt you to reboot the
server at a time that just wasn’t convenient? Personally, I’ve always found it annoying that
Windows Update keeps prompting you to reboot your server every few minutes while you are
trying to work. You can however change the reminder frequency. To do so, simply create a
registry key named RebootRelaunchTimeout. The value that you assign to this registry key
should reflect the number of minutes that you want Windows to wait between reminders. For
example, if you wanted a reminder every half hour, then you would set the value to 30. You can
set the RebootRelaunchTimeout registry key to use any positive integer from 1 to 1440.
Of course you also have the option of getting rid of reboot reminders completely. To do so,
create a registry key named RebootRelaunchTimeoutEnabled, and set the value to 0. If you
decide later that you want to re-enable reboot reminders then just change this key’s value to 1.
If you have ever worked with scheduled updates, you might have noticed that Windows can be
configured so that the computer automatically reboots after an update requiring a reboot is
applied. When automatic update is configured in this way, the user will receive a warning
message before their computer reboots. The warning says something like “your computer will
reboot in 5 minutes”. As you might have already guessed though, this reboot count down is
controlled by the Windows registry. You can therefore tweak the registry to give users more or
less warning prior to a reboot.
To create a custom reboot count down, simply create a registry key named
RebootWarningTimeout. A continuación, puede asignar esta clave un valor que
corresponde a la cantidad de minutos que desea que el usuario desde el momento en que
la advertencia es la primera muestra hasta que el ordenador se reinicia. For example,
setting this registry key to a value of 10 would give the users a ten minute warning. Valid
values include positive integers ranging from 1 to 30.
If you plan on using the RebootWarningTimeout key to specify a custom reboot warning
countdown, you will have to use the RebootWarningTimeoutEnabled registry key to enable it.
To do so, create a registry key named RebootTimeoutWarningEnabled, and set its value to 1.
Setting this value to 0 will cause Windows to use a five minute reboot countdown regardless of
what has been set through the RebootWarningTimeout key.
Scheduling Installations
I have talked a lot about scheduled installations, but I want to show you one last trick. You can
use the registry to set the installation schedule. There are two registry keys that are used when
scheduling an update. The first of these keys is ScheduledInstallDay. El valor para la asignación
de esta clave será de 0, indica que las actualizaciones de Windows que debe ser instalado,
independientemente de qué día es. You can however specify a day by specifying a positive
integer ranging from 1 to 7. The number that you specify designates a day of the week. A value
of 1 sets the installation day to Sunday. Setting the value to 2 sets installation day to Monday. If
you are going to limit installations to one day a week, Se recomienda usar Miércoles (valor=4)
ya que la mayoría de parches de Microsoft serán liberados el martes.
Una cosa que usted necesita saber sobre el ScheduledInstallDay clave es que se ignora a no ser
que el
HKEY_LOCAL_MACHINES\Software\Policies\Microsoft\Windows\WindowsUpdate\AU\AU
Options key is set to a value of 4. I discussed this key in Part 1.
The last key that I want to talk about is the ScheduledInstallTime key. This key tells Windows
what time of day updates should be installed. Valid values for this key are positive integers
ranging from 1 to 24, which reflect the hour of the day in military time. As such, a value of 3
would reflect a 3:00 AM installation time. A value of 13 would be a 1:00 PM installation time.
Conclusion
As you can see, there are a tremendous number of registry keys that can be used to configure
Windows Update. If you are thinking about trying these keys out, I recommend testing your
settings on a single PC before rolling out your changes on a large scale.