Right-click Administrative Templates, and then click Add/Remove Templates.
Click Add, click Wuau.adm in the Windows\Inf folder, and then click Open.
Under Computer Configuration, expand Administrative Templates, expand Windows Components, and then expand Windows Update.
The Configure Automatic Updates policy appears. This policy specifies whether the computer receives security updates and other important downloads through the Windows Automatic Updates feature. By using the settings for this policy, you can specify whether automatic updates are enabled on the computer. If the service is enabled, you must select one of the three configuration options.
To view the policy settings, double-click the Configure Automatic Updates policy.
To turn on Automatic Updates, click Enabled in the list of options that appear at the top of the Setting tab.
If you click Enabled, you must select one of the configuration options that is described in step 10.
Select one of the following options:
2 - Notify for download and notify for install
When updates are available, an icon appears in the notification area and you receive a message that states that the updates are ready to be downloaded. Click the icon or the message to view and select the updates that you want to download. Windows downloads the updates in the background. When the download is complete, an icon appears in the notification area and you receive a message that states that the updates are ready to be installed. You can click the icon or the message to select the updates that you want to install.
3 - Auto download and notify for install
Note This is the default setting.
When updates are available, Windows downloads the updates in the background. The user is not notified or interrupted during this process. When the download is complete, an icon appears in the notification area and you receive a message that states that the updates are ready to be installed. You can click the icon or the message to view and select the updates that you want to install.
4 - Auto download and schedule the install
To specify the schedule, select the appropriate options in the Group Policy Settings dialog box. If you do not specify a schedule, updates are installed daily at 3:00 A.M by default. Windows restarts the computer automatically if it is necessary. If someone is using the computer when Windows is ready to restart it, a notification appears that states that Windows needs to restart the computer. The user can choose to restart the computer later.
If you select 4 - Auto download and schedule the install, you can set a recurring schedule. If you do not set a schedule, all updates are downloaded and installed every day at 3:00 A.M.
Additionally, you can select the Disabled option or the Not Configured option. If you select Disabled, an administrator must download and install any available updates manually from the Microsoft Windows Update website.
If you select Not Configured, the status of Automatic Updates is not specified at the Group Policy level. The status is either "enabled" or "not enabled." However, an administrator can still configure Automatic Updates by using Control Panel. Control Panel includes the same settings that are available in Group Policy.
Note An updated Administrative Template (.adm file) is now available for use with the Automatic Updates feature in Windows Server 2003 and the Software Update Services (SUS) Service Pack 1 (SP1) client. This updated policy file adds two new policies:
This policy specifies the time period that Automatic Updates must wait after the computer starts, before it continues with a scheduled installation that was missed previously.
No auto-restart for scheduled Automatic Updates installations
This policy specifies that Automatic Updates will complete a scheduled installation when any user who is logged on restarts the computer. If this policy is not used, the computer restarts automatically.
To load policy settings by using Group Policy, you must use the Wuau.adm file that describes the new policy settings for the Automatic Updates client. Wuau.adm is automatically installed in the Windows\Inf folder when you install the new Automatic Updates feature.
You can load Windows\Inf\Wuau.adm as an administrative template in Group Policy Object Editor.
To load policy settings by using Group Policy in Active Directory:
On an Active Directory domain controller, click Start, and then click Run.
Right-click the organizational unit or domain where you want to create the policy, and then click Properties.
Click the Group Policy tab, and then click New.
Type a name for the policy, and then click Edit.
Under Computer Settings, right-click Administrative Templates.
Click Add/Remove Templates, and then click Add.
Type the name of the Automatic Updates .adm file, for example, type windows_folder\inf\wuau.adm.
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows
In a non-Active Directory environment, you can edit registry settings to configure Automatic Updates.
Note You must create these registry keys manually.
Use one of the following methods to set these registry keys:
Manually edit the registry by using Registry Editor.
Centrally deploy these registry keys by using the Windows NT 4.0-style System Policy functionality.
To use Registry Editor, follow these steps:
Click Start, click Run, and then type regedit in the Open box.
Locate and then click the following key in the registry:
1: Keep my computer up to date has been disabled in Automatic Updates.
2: Notify of download and installation.
3: Automatically download and notify of installation.
4: Automatically download and scheduled installation.
Registry Value Type: Reg_DWORD
Value name: ScheduledInstallDay Value data: 0 to 7
0: Every day.
1 through 7: The days of the week from Sunday (1) to Saturday (7).
Registry Value Type: Reg_DWORD
Value name: ScheduledInstallTime Value data: n, where n equals the time of day in a 24-hour format (0-23). Registry Value Type: Reg_DWORD
Value name: UseWUServer Value data: Set this value to 1 to configure Automatic Updates to use a server that is running Software Update Services instead of Windows Update. Registry Value Type: Reg_DWORD
Value name: RescheduleWaitTime Value data: m, where m equals the time period to wait between the time Automatic Updates starts and the time it begins installations where the scheduled times have passed. The time is set in minutes from 1 to 60, representing 1 minute to 60 minutes) Registry Value Type: Reg_DWORD
Note This setting only affects client behavior after the clients have updated to the SUS SP1 client version or later versions.
Value name: NoAutoRebootWithLoggedOnUsers Value data: Reg_DWORD: 0 (false) or 1 (true). If set to 1, Automatic Updates does not automatically restart a computer while users are logged on. Registry Value Type: Reg_DWORD
Note This setting affects client behavior after the clients have updated to the SUS SP1 client version or later versions.
When you configure Automatic Updates directly by using the policy registry keys, the policy overrides the preferences that are set by the local administrative user to configure the client. If an administrator removes the registry keys at a later date, the preferences that were set by the local administrative user are used again.
To determine the server that is running SUS that your client computers and servers go to for their updates, add the following f registry values to the registry:
Value name: WUServer Registry Value Type: Reg_SZ This value sets the SUS server by HTTP name (for example, http://IntranetSUS).
Value name: WUStatusServer Registry Value Type: Reg_SZ This value sets the SUS statistics server by HTTP name (for example, http://IntranetSUS).
Article ID: 328010 - Last Review: Oct 26, 2017 - Revision: 2
Windows Server 2008 Datacenter, Windows Server 2008 for Itanium-Based Systems, Windows Server 2008 Enterprise, Windows Server 2008 Enterprise without Hyper-V, Windows Server 2008 Standard, Windows Server 2008 Standard without Hyper-V, Windows Vista Enterprise, Windows Vista Business, Windows Vista Home Premium, Windows Server 2008 Datacenter without Hyper-V, Windows Vista Home Basic N 64-bit Edition, Windows Vista Home Basic N, Windows Vista Home Basic, Windows Vista Starter, Microsoft Windows Server 2003, Enterprise x64 Edition, Microsoft Windows Server 2003, Datacenter Edition (32-bit x86), Microsoft Windows Server 2003, Enterprise Edition (32-bit x86), Microsoft Windows Server 2003, Standard Edition (32-bit x86), Microsoft Windows XP Professional, Microsoft Windows XP Professional x64 Edition, Microsoft Windows XP Tablet PC Edition, Windows Vista Ultimate, Windows Vista Business 64-bit Edition, Windows Vista Business N 64-bit Edition, Windows Vista Business N, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2000 Professional Edition, Windows Server 2008 R2 Datacenter, Windows Server 2008 R2 Datacenter without Hyper-V, Windows Server 2008 R2 Enterprise, Windows Server 2008 R2 Enterprise without Hyper-V, Windows Server 2008 R2 Standard, Windows Server 2008 R2 Standard without Hyper-V