We have had a WSUS patch policy for our company since 2012. We deploy Microsoft's security updates first to our IT staff computers the Thursday evening after Patch Tuesday using our WSUS Server, and then deploy the patches out to everyone the following week. This policy helps us to ensure that the security patches are deployed, after making sure that the patches work in our environment.
In 2022, we found some savvy users were navigating to "Check for Updates from Microsoft" and were updating their computers to Windows 11 on their own. I was asked to block Windows 11, as we weren't ready to deploy it yet. We used Group Policy's Windows Updates for Business to block Windows 11 at first, but this introduced a dual scan scenario where computers were updated immediately, violating our patch process. We disabled that policy, and tested and confirmed a new Group Policy with the following policies Enabled: "Turn off access to all Windows Update features," "Do not allow update deferral policies to cause scans against Windows Update," and "Do not connect to any Windows Update Internet locations." This policy worked well for the past 9 months. Computers were still updated from our WSUS Server, but they were no longer allowed to "Check for Updates from Microsoft," as this option no longer appeared in Windows Updates on Windows 10, which meant that they couldn't update their computers to Windows 11 on their own, which was exactly what I was tasked to implement.
After the patch Tuesday on June 13, however, several employees noticed that their computers were being updated automatically, the day after Patch Tuesday, and before I had deployed the updates to IT Staff on Thursday evening. These employees had not navigated to Windows Update at all, they were simply being updated automatically, and this issue was not limited to IT Staff. Once again, our patch policy was being violated, by a change at Microsoft, it appeared. We then blocked access to update.microsoft.com at our firewalls. This restored sanity for a few days, until we realized that new installs of Microsoft Office on new or reimaged computers were failing to complete because they needed to go to the same URL to update Office and complete the install.
To resolve this issue, we allowed IT Staff computers to navigate to update.microsoft.com at our firewalls. IT Staff could now complete new installs of Microsoft Office successfully. However, this means that IT Staff now must assist users in installing Office, rather than allowing ordinary users to install Office from Software Center (SCCM), as we had done in the past, greatly impacting the available time of our IT staff. It also means that our IT Staff are in danger of having their computers updated in the middle of the day on the Wednesday after Patch Tuesday, rather than on Friday, which has been our patching process.
Here is what we are asking for: whatever change was made on June 13, reverse it, so that our Group Policy which allows us to maintain our patch process, which has worked for us for the past 11 years, can be allowed to continue. Perhaps some inadvertent change was made that has already been reversed? Or perhaps there is some other solution for us? Please let us know how we can proceed and maintain our patching policy. Thank you! Sincerely, Richard Roati