使用 Windows 更新 for Business 部署服务管理安全措施

使用部署服务部署更新时,该服务通过阻止Windows 更新向具有已知或可能问题的设备提供更新,从而自动保护部署。

安全措施与Windows 11和Windows 10功能更新的部署兼容。 针对已知问题的防护保留可用于部署Windows 11和Windows 10功能更新,并且针对可能问题的保护保留可用于部署Windows 11。

应用所有安全措施

默认情况下,部署服务会将所有适用的安全措施应用于部署中的设备。 若要从安全措施中受益,在创建部署时无需指定任何其他内容。

以下示例演示如何创建应用了所有安全措施的部署。

请求

POST https://graph.microsoft.com/beta/admin/windows/updates/deployments
Content-type: application/json

{
    "@odata.type": "#microsoft.graph.windowsUpdates.deployment",
    "content": {
        "@odata.type": "#microsoft.graph.windowsUpdates.catalogContent",
        "catalogEntry": {
            "@odata.type": "#microsoft.graph.windowsUpdates.featureUpdateCatalogEntry",
            "id": "catalog/entries/1"
        }
    }
}

响应

HTTP/1.1 201 Created
Content-Type: application/json

{
    "@odata.type": "#microsoft.graph.windowsUpdates.deployment",
    "id": "b5171742-1742-b517-4217-17b5421717b5",
    "state": {
        "@odata.type": "microsoft.graph.windowsUpdates.deploymentState",
        "value": "offering",
        "reasons": [
            {
                "@odata.type": "microsoft.graph.windowsUpdates.deploymentStateReason",
                "value": "offeringByRequest"
            }
        ],
        "requestedValue": "none",
        "effectiveSinceDate": "String (timestamp)"
    },
    "content": {
        "@odata.type": "#microsoft.graph.windowsUpdates.catalogContent",
        }
    },
    "settings": null,
    "createdDateTime": "String (timestamp)",
    "lastModifiedDateTime": "String (timestamp)"
}

选择退出针对可能出现的问题的安全措施

可以通过配置安全措施设置来选择退出针对部署中可能的问题 的安全措施。 如有必要,还可以 使用禁用安全措施策略,为已知问题选择退出安全措施保留

以下示例演示了如何创建部署,而无需防范可能的问题。 通过在要禁用的防护配置文件列表下为 类别likelyIssues指定一个 safeguardProfile,可以配置部署来为设备提供更新,即使设备可能有更新问题。

请求

POST https://graph.microsoft.com/beta/admin/windows/updates/deployments
Content-type: application/json

{
    "@odata.type": "#microsoft.graph.windowsUpdates.deployment",
    "content": {
        "@odata.type": "#microsoft.graph.windowsUpdates.catalogContent",
        "catalogEntry": {
            "@odata.type": "#microsoft.graph.windowsUpdates.featureUpdateCatalogEntry",
            "id": "catalog/entries/1"
        }
    },
    "settings": {
        "@odata.type": "microsoft.graph.windowsUpdates.deploymentSettings",
        "contentApplicability": {
            "safeguard": {
                "disabledSafeguardProfiles": [
                    {
                        "category": "likelyIssues"
                    }
                ]
            }
        }
    }
}

响应

HTTP/1.1 201 Created
Content-Type: application/json

{
    "@odata.type": "#microsoft.graph.windowsUpdates.deployment",
    "id": "b5171742-1742-b517-4217-17b5421717b5",
    "state": {
        "@odata.type": "microsoft.graph.windowsUpdates.deploymentState",
        "value": "offering",
        "reasons": [
            {
                "@odata.type": "microsoft.graph.windowsUpdates.deploymentStateReason",
                "value": "offeringByRequest"
            }
        ],
        "requestedValue": "none",
        "effectiveSinceDate": "String (timestamp)"
    },
    "content": {
        "@odata.type": "#microsoft.graph.windowsUpdates.catalogContent",
        }
    },
    "settings": {
        "@odata.type": "microsoft.graph.windowsUpdates.deploymentSettings",
        "monitoring": null,
        "schedule": null,
        "userExperience": null,
        "contentApplicability": {
            "safeguard": {
                "disabledSafeguardProfiles": [
                    {
                        "@odata.type": "#microsoft.graph.windowsUpdates.safeguardProfile",
                        "category": "likelyIssues"
                    }
                ]
            }
        }
    },
    "createdDateTime": "String (timestamp)",
    "lastModifiedDateTime": "String (timestamp)"
}