Difference between revisions of "Active Directory/Service Groups"
Line 10: | Line 10: | ||
==WSUS Service Group== | ==WSUS Service Group== | ||
*Leads: Dan Green (djgreen), Joshua Gira (jjgira) | *Leads: Dan Green (djgreen), Joshua Gira (jjgira) | ||
− | |||
WolfTech's WSUS Service provides a convenient way to automatically keep your computer up-to-date with the latest software updates from Microsoft. The prompt installation of security updates is critical to the security of the NC State University Network. | WolfTech's WSUS Service provides a convenient way to automatically keep your computer up-to-date with the latest software updates from Microsoft. The prompt installation of security updates is critical to the security of the NC State University Network. | ||
Revision as of 21:18, 20 March 2009
There are a number of people critical to the success of the WolfTech Active Directory domain. While many provide encouragement, support, and assistance when asked by the community, the following service groups have agreed to provide support for specific key sections of the domain.
Domain Controllers
- Domain Administrators: Dan Green (djgreen), Billy Beaudion (wrbeaudo), Derek Ballard (ddballar).
WDS Service Group
- Leads: Alan Gerber (agerber), Michael Underwood (mpunderw)
WSUS Service Group
- Leads: Dan Green (djgreen), Joshua Gira (jjgira)
WolfTech's WSUS Service provides a convenient way to automatically keep your computer up-to-date with the latest software updates from Microsoft. The prompt installation of security updates is critical to the security of the NC State University Network.
Usage Policy
- University-Owned Computers - All University-owned computers are automatically configured to use WSUS to install updates.
- Personal Machines - All personal machines used on the NC State University Network should be kept patched. These may be manually configured to use the WolfTech WSUS Service. See Active_Directory/Documentation#How_to_Manually_Configure_Your_Personal_Computer.
- Home Machines - NCSU faculty and staff are encouraged to manually configure their home computers to use WolfTech WSUS. See Active_Directory/Documentation#How_to_Manually_Configure_Your_Personal_Computer.
Client Support
WSUS supports the following client operating systems:
- Windows 2000 SP3 or later
- Windows XP, Vista
- Windows Server 2003, 2008
Earlier operating systems, such as Windows 95, Windows 98, and Windows ME are not supported. These operating systems are no longer supported by Microsoft and should be upgraded immediately. Non-Windows operating systems are not supported.
Patches / Approval
Classifications of patches and their configuration / deployment on the WolfTech WSUS server.
Automatically Approved Update Classifications
The WolfTech WSUS server has been configured to automatically download and approve for installation the following update classifications:
- Definition Updates
Manually Approved Update Classifications
The following classification of updates are downloaded to the WolfTech WSUS server but are not approved for installation without minimal testing by IT support staff. Unless critical circumstances arise, these patches will not be approved until after each month's "Patch Tuesday" and will be accompanied by an email to the OU Admins:
- Service Packs
- Updates
- Feature Packs
- Tools
- Critical Updates
- Security Updates
- Update Rollups
Unapproved Update Classifications
Updates that are classified as 'Drivers' are not downloaded to the WolfTech WSUS server.
How to Manually Configure Your Personal Computer
NOTE: You must have local administrative rights on the computer.
- Download wsus.reg to your hard disk.
- Double click on wsus.reg.
- When prompted if you are sure you want to add the information to the registry, click Yes. You should see a confirmation that the information was successfully entered into the registry.
- Click OK.
- Reboot.
WSUS Settings for Personal Computers
WSUS Clients on Personal Computers are configured with the following settings:
- Turn on Automatic Updates.
- Point to WolfTech's WSUS server.
- Set the appropriate client-side target group - ECE-Personal.
- Auto-download and install patches approved on the WSUS server at the scheduled install time.
- Set the scheduled install time to be 2:00 PM every day.
- Reschedule patch installation to the next boot time if the regular scheduled time is missed.
- Specify a 15 minute delay that Automatic Updates will wait, following system start-up, before proceeding with a scheduled installation that was missed previously. This is to ensure that the machine is fully operational before patch installation will occur.
- Allow non-admins to install patches and to delay rebooting after patch installation.
- Set the option to not restart the computer automatically during a scheduled installation if a user is logged in to the computer. Instead, Automatic Updates will notify the user to restart the computer to complete the installation.
- Enable the immediate installation of minor patches that do not require a reboot.
- Set new update detection frequency to every 8 hours.
References
For more info about WSUS, see:
- http://www.microsoft.com/windowsserversystem/updateservices/default.mspx
- [[../Update_Policy| WSUS Update Policy]]
Documentation and Technical Support for WSUS: WSUS section of AD Documentation