Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The Windows Update Agent (WUA) API can be used by a user on a remote computer or by an application that is running on a remote computer. However, the remote user or application must have administrator privileges.
The following list contains interfaces that are available to remote users and applications:
- IUpdateSession
- IUpdateSession2
- IUpdateSearcher
- IAutomaticUpdates
- ISearchResult
- IUpdateCollection
- IUpdate
- IUpdate2
- IWindowsDriverUpdate
- IWindowsDriverUpdate2
- IUpdateIdentity
- IImageInformation
- IInstallationBehavior
- IStringCollection
- IUpdateHistoryEntryCollection
- IUpdateHistoryEntry
- ICategoryCollection
- ICategory
- IUpdateExceptionCollection
- IUpdateException
- IUpdateDownloadContentCollection
- IUpdateDownloadContent
- IUpdateServiceManager
- IUpdateServiceCollection
- IUpdateService
- IWindowsUpdateAgentInfo
The following list contains interfaces and properties that are not available to remote users and applications:
- IUpdateSession::CreateUpdateDownloader
- IUpdateSession::CreateUpdateInstaller
- WebProxy Property of IUpdateSession
- IUpdateSearcher::BeginSearch
- IUpdateSearcher::EndSearch
- IsHidden Property of IUpdate (IsHidden is read-only when it is called remotely.)
- IUpdate::AcceptEula
- IUpdate::CopyFromCache
- IUpdate2::CopyToCache
- IWindowsDriverUpdate2::CopyToCache
- IUpdateServiceManager::AddService
- IUpdateServiceManager::RegisterServiceWithAU
- IUpdateServiceManager::UnregisterServiceWithAU
- IAutomaticUpdate::Pause
- IAutomaticUpdates::Resume
- IAutomaticUpdates::ShowSettingsDialog
- Settings Property of IAutomaticUpdates
- ServiceEnabled Property of IAutomaticUpdates
- IAutomaticUpdates::EnableService
- ISystemInformation
The following ports and exceptions must be added to the Windows firewall settings for Windows Vista and Windows Server 2008 for the WUA API to be called remotely.
-
Exception 1
-
- Local port: 135
- Remote port: ALL
- Protocol number: 6
- Executable: %windir%\\system32\\svchost.exe
- Service: rpcss
- Remote privilege: Administrator
-
Exception 2
-
- Local port: Dynamic RPC
- Remote port: ALL
- Protocol number: 6
- Executable: %windir%\\system32\\dllhost.exe
- Remote privilege: Administrator
The following list contains tools that can be used to configure Windows Firewall settings:
- Windows Firewall with Advanced Security snap-in
- Group Policy
- Netsh advfirewall command-line tool
For more information about how to use tools to configure Windows Firewall settings, see Getting Started with Windows Firewall with Advanced Security.