Redigera

Dela via


OS Updates

Connected devices have the challenge of new security threats, updates are an essential tool to address this.

The Microsoft Security Response Center (MSRC) is part of the defender community and on the front line of security response evolution. MSRC's mission is to protect customers from being harmed by security vulnerabilities in Microsoft's products and services. By building your solution with Windows IoT Enterprise, you have Microsoft Security Response Center's commitment towards security. Please review their Security Update Guide to ensure your devices are up-to-date and secured.

Windows Update Advantage:

  • Keeps device up to date with critical security software updates​
  • Utilize the Microsoft proven and scalable infrastructure
  • Updates can be easily managed and controlled by device owners

Windows IoT Enterprise gives you the power to manage and control updates as per device and organization requirements.

Control Windows Updates

One of the most common requests from device partners is centered around controlling automatic updates on Windows IoT Enterprise devices. The nature of IoT devices is such that unexpected disruptions, through something like an unplanned update, can create a bad device experience.

Questions that you should ask when considering how to control Windows updates:

  • Is the device scenario such that any disruption of the workflow is unacceptable?
  • How are updates validated prior to deployment?
  • What is the update user experience on the device itself?

If you have a device where disruption of the user experience isn't acceptable, you should consider limiting updates to only certain hours, disabling automatic updates, or deploying updates either manually or through a controlled third-party device-management solution.

Limit reboots from updates

You can use the Active Hours Group Policy, MDM, or registry setting to limit updates to only certain hours.

  1. Open the Group Policy Editor (gpedit.msc) and navigate to
    Windows 10: Computer Configuration\Administrative Templates\Windows Components\Windows Update
    Windows 11: Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience
    and open the Turn off auto-restart for updates during active hours policy setting. Enable the policy so you can set the start and end times for active hours.
  2. Set the Start and End time to the Active Hours window. For example, set Active Hours to start at 4:00AM and end 2:00AM. This allows the system to reboot from updates between the hours of 2:00 AM and 4:00 AM.

Disable Automatic Windows Updates

Security and stability are at the core of a successful IoT project, and Windows Update provides updates to ensure Windows IoT Enterprise has the latest applicable security and stability updates. You might, however, have a device scenario where updating Windows has to be handled completely manually. For this type of scenario, we recommend disabling automatic updating through Windows Update. In previous versions of Windows device partners could stop and disable the Windows Update service, but this is no longer the supported method for disabling automatic updates. Windows has a number of policies that allow you to configure Windows Updates in several ways.

To completely disable automatic updating of Windows with Windows Update:

  1. Open the Group Policy Editor (gpedit.msc) and navigate to
    Windows 10: Computer Configuration\Administrative Templates\Windows Components\Windows update\Configure Automatic Updates.
    Windows 11: Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience\Configure Automatic Updates.

  2. Explicitly set the policy to Disabled. When this setting is set to Disabled, any available updates from Windows Update must be downloaded and installed manually, which you can do in the Settings app under Update & security > Windows Update.

Disable access to the Windows Update user experience

In some scenarios, configuring Automatic Updates isn't enough to preserve a desired device experience. For example, an end-user may still have access to the Windows Update settings, which would allow manual updates via Windows Update. You can configure Group policy to prohibit access to Windows Update through settings.

To prohibit access to Windows update:

  1. Open the Group Policy Editor (gpedit.msc) and navigate to

Windows 10: Computer Configuration\Administrative Templates\Windows Components\Windows update\Remove access to use all Windows update features.
Windows 11: Computer Configuration\Administrative Templates\Windows Components\Windows Update\Manage end user experience\Remove access to use all Windows update features. 2. Set this policy to Enabled to prevent the "Check for updates" option for users. Note: Any background update scans, downloads, and installations will continue to work as configured. This policy simply prevents the user from accessing the manual check through settings. Use the steps in the previous section to also disable scans, downloads, and installations.

Important

Be sure to have a well-designed servicing strategy for your device. Disabling Windows Update capabilities leaves the device in a vulnerable state if your device isn't getting updates in another way.

Completely Turn Off Windows Updates

You can configure Windows Update in several ways. As a general rule, IoT devices require special attention to the servicing and management strategy to be used on the devices. If your servicing strategy is to disable all Windows Update features, you have two possible approaches. You can turn off updates via Group Policy or through Registry.

Note

By setting this policy, it will also stop performing updates from other machines on the local network. To confirm this behavior, you can also turn off Delivery Optimization which is the subsystem for getting updates from others on your local network.

Additional Resources