- Get Updates For Other Microsoft Products Missing People
- Get Updates For Other Microsoft Products Missing One
I have Office 2013 and I have the same issue as the OP. Prior to Anniversary update, the option to 'Give me updates for other Microsoft products when I update Windows' was selectable and it was checked and I got Office updates. After installing Anniversary update, this option is now UNselected and it is greyed out, not allowing me to select it. Under Recommended updates, select Give me recommended updates the same way I receive important updates. Under Microsoft Update, select Give me updates for other Microsoft products when I update Windows, and then select Apply. Click the questions below to see answers about how Windows Update keeps your device up to date. May 11, 2017 A week ago on Windows 7 Windows Update was trying to force me into installing Wjndows 10 and the update 3035583 was getting annoying. I kept hiding the Install Windows 10 update but it kept showing back up, so I read if I opt out of the 'get updates for other Microsoft products' I wouldn't get the Windows 10 update.
And now when I go into Windows Update and click on the 'find out more' link where it says 'get Updates for other Microsoft Products' - instead of going to Microsoft Update - I get this link: Microsoft Windows Update Which simply displays two lame graphics on how to get to Windows update via the Start Menu. Even the main Windows update site has.
-->Applies to Tenis meja indonesia.
- Windows 10
Looking for consumer information? See Windows Update: FAQ
You can use Group Policy settings or mobile device management (MDM) to configure the behavior of Windows Update (WU) on your Windows 10 devices. You can configure the update detection frequency, select when updates are received, specify the update service location and more.
Summary of Windows Update settings
Group Policy setting | MDM setting | Supported from version |
---|---|---|
Specify Intranet Microsoft update service location | UpdateServiceUrl and UpdateServiceUrlAlternate | All |
Automatic Updates Detection Frequency | DetectionFrequency | 1703 |
Remove access to use all Windows Update features | Update/SetDisableUXWUAccess | All |
Do not connect to any Windows Update Internet locations | All | |
Enable client-side targeting | All | |
Allow signed updates from an intranet Microsoft update service location | AllowNonMicrosoftSignedUpdate | All |
Do not include drivers with Windows Updates | ExcludeWUDriversInQualityUpdate | 1607 |
Configure Automatic Updates | AllowAutoUpdate | All |
Important
Additional information about settings to manage device restarts and restart notifications for updates is available on Manage device restarts after updates.
Additional settings that configure when Feature and Quality updates are received are detailed on Configure Windows Update for Business.
Scanning for updates
With Windows 10, admins have a lot of flexibility in configuring how their devices scan and receive updates.
Specify Intranet Microsoft update service location allows admins to point devices to an internal Microsoft update service location, while Do not connect to any Windows Update Internet locations gives them to option to restrict devices to just that internal update service. Automatic Updates Detection Frequency controls how frequently devices scan for updates.
You can make custom device groups that'll work with your internal Microsoft update service by using Enable client-side targeting. You can also make sure your devices receive updates that were not signed by Microsoft from your internal Microsoft update service, through Allow signed updates from an intranet Microsoft update service location.
Finally, to make sure the updating experience is fully controlled by the admins, you can Remove access to use all Windows Update features for users.
For additional settings that configure when Feature and Quality updates are received, see Configure Windows Update for Business.
Specify Intranet Microsoft update service location
Specifies an intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network.This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network.
To use this setting in Group Policy, go to Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows UpdateSpecify Intranet Microsoft update service location. You must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update Agent to download updates from an alternate download server instead of the intranet update service.
If the setting is set to Enabled, the Automatic Updates client connects to the specified intranet Microsoft update service (or alternate download server), instead of Windows Update, to search for and download updates. Enabling this setting means that end users in your organization don’t have to go through a firewall to get updates, and it gives you the opportunity to test updates after deploying them.If the setting is set to Disabled or Not Configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet.
The alternate download server configures the Windows Update Agent to download files from an alternative download server instead of the intranet update service.The option to download files with missing Urls allows content to be downloaded from the Alternate Download Server when there are no download Urls for files in the update metadata. This option should only be used when the intranet update service does not provide download Urls in the update metadata for files which are present on the alternate download server.
Note
If the 'Configure Automatic Updates' policy is disabled, then this policy has no effect.
If the 'Alternate Download Server' is not set, it will use the intranet update service by default to download updates.
The option to 'Download files with no Url..' is only used if the 'Alternate Download Server' is set.
To configure this policy with MDM, use UpdateServiceUrl and UpdateServiceUrlAlternate.
Automatic Updates detection frequency
Specifies the hours that Windows will use to determine how long to wait before checking for available updates. The exact wait time is determined by using the hours specified here minus zero to twenty percent of the hours specified. For example, if this policy is used to specify a 20-hour detection frequency, then all clients to which this policy is applied will check for updates anywhere between 16 to 20 hours.
To set this setting with Group Policy, navigate to Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows UpdateAutomatic Updates detection frequency.
If the setting is set to Enabled, Windows will check for available updates at the specified interval.If the setting is set to Disabled or Not Configured, Windows will check for available updates at the default interval of 22 hours.
Note
The “Specify intranet Microsoft update service location” setting must be enabled for this policy to have effect.
If the “Configure Automatic Updates” policy is disabled, this policy has no effect.
To configure this policy with MDM, use DetectionFrequency.
Remove access to use all Windows Update features
By enabling the Group Policy setting under Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows updateRemove access to use all Windows update features, administrators can disable the 'Check for updates' option for users. Any background update scans, downloads and installations will continue to work as configured.
Do not connect to any Windows Update Internet locations
Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Microsoft Store.
Use Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows updateDo not connect to any Windows Update Internet locations to enable this policy. When enabled, this policy will disable the functionality described above, and may cause connection to public services such as the Microsoft Store, Windows Update for Business and Delivery Optimization to stop working.
Note
This policy applies only when the device is configured to connect to an intranet update service using the 'Specify intranet Microsoft update service location' policy.
Enable client-side targeting
Specifies the target group name or names that should be used to receive updates from an intranet Microsoft update service. This allows admins to configure device groups that will receive different updates from sources like WSUS or Configuration Manager.
This Group Policy setting can be found under Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows updateEnable client-side targeting.If the setting is set to Enabled, the specified target group information is sent to the intranet Microsoft update service which uses it to determine which updates should be deployed to this computer.If the setting is set to Disabled or Not Configured, no target group information will be sent to the intranet Microsoft update service.
If the intranet Microsoft update service supports multiple target groups, this policy can specify multiple group names separated by semicolons. Otherwise, a single group must be specified.
Note
This policy applies only when the intranet Microsoft update service the device is directed to is configured to support client-side targeting. If the “Specify intranet Microsoft update service location” policy is disabled or not configured, this policy has no effect.
Allow signed updates from an intranet Microsoft update service location
This policy setting allows you to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location.
Volume license key hack. To configure this setting in Group Policy, go to Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows updateAllow signed updates from an intranet Microsoft update service location.
If you enable this policy setting, Automatic Updates accepts updates received through an intranet Microsoft update service location, as specified by Specify Intranet Microsoft update service location, if they are signed by a certificate found in the “Trusted Publishers” certificate store of the local computer.If you disable or do not configure this policy setting, updates from an intranet Microsoft update service location must be signed by Microsoft.
Note
Updates from a service other than an intranet Microsoft update service must always be signed by Microsoft and are not affected by this policy setting.
To configure this policy with MDM, use AllowNonMicrosoftSignedUpdate.
Installing updates
To add more flexibility to the update process, settings are available to control update installation.
Configure Automatic Updates offers 4 different options for automatic update installation, while Do not include drivers with Windows Updates makes sure drivers are not installed with the rest of the received updates.
Do not include drivers with Windows Updates
Allows admins to exclude Windows Update (WU) drivers during updates.
To configure this setting in Group Policy, use Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows updateDo not include drivers with Windows Updates.Enable this policy to not include drivers with Windows quality updates.If you disable or do not configure this policy, Windows Update will include updates that have a Driver classification.
Configure Automatic Updates
Enables the IT admin to manage automatic update behavior to scan, download, and install updates.
Configuring Automatic Updates by using Group Policy
Under Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows updateConfigure Automatic Updates, you must select one of the four options:
2 - Notify for download and auto install - When Windows finds updates that apply to this device, users will be notified that updates are ready to be downloaded. After going to Settings > Update & security > Windows Update, users can download and install any available updates.
3 - Auto download and notify for Install - Windows finds updates that apply to the device and downloads them in the background (the user is not notified or interrupted during this process). When the downloads are complete, users will be notified that they are ready to install. After going to Settings > Update & security > Windows Update, users can install them.
4 - Auto download and schedule the install - Specify the schedule using the options in the Group Policy Setting. For more information about this setting, see Schedule update installation.
5 - Allow local admin to choose setting - With this option, local administrators will be allowed to use the settings app to select a configuration option of their choice. Local administrators will not be allowed to disable the configuration for Automatic Updates.
If this setting is set to Disabled, any updates that are available on Windows Update must be downloaded and installed manually. To do this, users must go to Settings > Update & security > Windows Update.
If this setting is set to Not Configured, an administrator can still configure Automatic Updates through the settings app, under Settings > Update & security > Windows Update > Advanced options.
Configuring Automatic Updates by editing the registry
Note
Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require you to reinstall the operating system. Microsoft cannot guarantee that these problems can be resolved. Modify the registry at your own risk.
In an environment that does not have Active Directory deployed, you can edit registry settings to configure group policies for Automatic Update.
To do this, follow these steps:
- Select Start, search for 'regedit', and then open Registry Editor.
- Open the following registry key:
- Add one of the following registry values to configure Automatic Update.
- NoAutoUpdate (REG_DWORD):
- 0: Automatic Updates is enabled (default).
- 1: Automatic Updates is disabled.
- AUOptions (REG_DWORD):
- 1: Keep my computer up to date is disabled in Automatic Updates.
- 2: Notify of download and installation.
- 3: Automatically download and notify of installation.
- 4: Automatically download and scheduled installation.
- ScheduledInstallDay (REG_DWORD):
- 0: Every day.
- 1 through 7: The days of the week from Sunday (1) to Saturday (7).
- ScheduledInstallTime (REG_DWORD):n, where n equals the time of day in a 24-hour format (0-23).
- UseWUServer (REG_DWORD)Set this value to 1 to configure Automatic Updates to use a server that is running Software Update Services instead of Windows Update.
- RescheduleWaitTime (REG_DWORD)m, where m equals the time period to wait between the time Automatic Updates starts and the time that it begins installations where the scheduled times have passed. The time is set in minutes from 1 to 60, representing 1 minute to 60 minutes)NoteThis setting only affects client behavior after the clients have updated to the SUS SP1 client version or later versions.
- NoAutoRebootWithLoggedOnUsers (REG_DWORD):0 (false) or 1 (true). If set to 1, Automatic Updates does not automatically restart a computer while users are logged on.NoteThis setting affects client behavior after the clients have updated to the SUS SP1 client version or later versions.
To use Automatic Updates with a server that is running Software Update Services, see the Deploying Microsoft Windows Server Update Services 2.0 guidance.
When you configure Automatic Updates directly by using the policy registry keys, the policy overrides the preferences that are set by the local administrative user to configure the client. If an administrator removes the registry keys at a later date, the preferences that were set by the local administrative user are used again.
To determine the WSUS server that the client computers and servers connect to for updates, add the following registry values to the registry:
- WUServer (REG_SZ)This value sets the WSUS server by HTTP name (for example, http://IntranetSUS).
- WUStatusServer (REG_SZ)This value sets the SUS statistics server by HTTP name (for example, http://IntranetSUS).
Related topics
-->Applies to
- Windows 10
Looking for consumer information? See Windows Update: FAQ
Overview
You can use Group Policy through the Group Policy Management Console (GPMC) to control how Windows Update for Business works. You should consider and devise a deployment strategy for updates before you make changes to the Windows Update for Business settings. See Prepare servicing strategy for Windows 10 updates for more information.
An IT administrator can set policies for Windows Update for Business by using Group Policy, or they can be set locally (per device). All of the relevant policies are under the path Computer configuration > Administrative Templates > Windows Components > Windows Update.
To manage updates with Windows Update for Business as described in this article, you should prepare with these steps, if you haven't already:
- Create Active Directory security groups that align with the deployment rings you use to phase deployment of updates. See Build deployment rings for Windows 10 updates to learn more about deployment rings in Windows 10.
- Allow access to the Windows Update service.
- Download and install ADMX templates appropriate to your Windows 10 version. For more information, see How to create and manage the Central Store for Group Policy Administrative Templates in Windows and Step-By-Step: Managing Windows 10 with Administrative templates.
Set up Windows Update for Business
In this example, one security group is used to manage updates. Typically we would recommend having at least three rings (early testers for pre-release builds, broad deployment for releases, critical devices for mature releases) to deploy. See Build deployment rings for Windows 10 updates for more information.
Follow these steps on a device running the Remote Server Administration Tools or on a domain controller:
Set up a ring
- Start Group Policy Management Console (gpmc.msc).
- Expand Forest > Domains > *<your domain>.
- Right-click <your domain> and select Create a GPO in this domain and link it here.
- In the New GPO dialog box, enter Windows Update for Business - Group 1 as the name of the new Group Policy Object.
- Right-click the 'Windows Update for Business - Group 1' object, and then select Edit.
- In the Group Policy Management Editor, go to Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Update. You are now ready to start assigning policies to this ring (group) of devices.
Manage Windows Update offerings
You can control when updates are applied, for example by deferring when an update is installed on a device or by pausing updates for a certain period of time.
Determine which updates you want offered to your devices
Both Windows 10 feature and quality updates are automatically offered to devices that are connected to Windows Update using Windows Update for Business policies. However, you can choose whether you want the devices to additionally receive other Microsoft Updates or drivers that are applicable to that device.
To enable Microsoft Updates use the Group Policy Management Console go to Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Automatic Updates and select Install updates for other Microsoft products.
Drivers are automatically enabled because they are beneficial to device systems. We recommend that you allow the driver policy to allow drivers to updated on devices (the default), but you can turn this setting off if you prefer to manage drivers manually. If you want to disable driver updates for some reason, use the Group Policy Management Console to go to Computer Configuration > Administrative Templates > Windows Components > Windows Update > Do not include drivers with Windows Updates and enable the policy.
We also recommend that you allow Microsoft product updates as discussed previously.
Set when devices receive feature and quality updates
I want to receive pre-release versions of the next feature update
- Ensure that you are enrolled in the Windows Insider Program for Business. This is a completely free program available to commercial customers to aid them in their validation of feature updates before they are released. Joining the program enables you to receive updates prior to their release as well as receive emails and content related to what is coming in the next updates.
- Use Group Policy Management Console to go to: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Windows Update for Business > Manage preview builds and set the policy to Enable preview builds for any of test devices you want to install pre-release builds.
- Use Group Policy Management Console to go to Computer Configuration > Administrative Templates > Windows Components > Windows Update > Windows Update for Business > Select when Preview Builds and Feature Updates are received. In the Options pane, use the pulldown menu to select one of the preview builds. We recomment Windows Insider Program Slow for commercial customers using pre-release builds for validation.
- Select OK.
I want to manage which released feature update my devices receive
A Windows Update for Business administrator can defer or pause updates. You can defer feature updates for up to 365 days and defer quality updates for up to 30 days. Deferring simply means that you will not receive the update until it has been released for at least the number of deferral days you specified (offer date = release date + deferral date). You can pause feature or quality updates for up to 35 days from a given start date that you specify.
- To defer or pause a feature update: Computer configuration > Administrative Templates > Windows Components > Windows Update > Windows Update for Business > Select when Preview Builds and Feature Updates are Received
- Defer or pause a quality update: Computer configuration > Administrative Templates > Windows Components > Windows Update > Windows Update for Business > Select when Quality Updates are Received
Example
In this example, there are three rings for quality updates. The first ring ('pilot') has a deferral period of 0 days. The second ring ('fast') has a deferral of five days. The third ring ('slow') has a deferral of ten days.
When the quality update is released, it is offered to devices in the pilot ring the next time they scan for updates.
Five days later
The devices in the fast ring are offered the quality update the next time they scan for updates.
Ten days later
Ten days after the quality update is released, it is offered to the devices in the slow ring the next time they scan for updates.
If no problems occur, all of the devices that scan for updates will be offered the quality update within ten days of its release, in three waves.
What if a problem occurs with the update?
![Get Updates For Other Microsoft Products Missing Get Updates For Other Microsoft Products Missing](https://i.stack.imgur.com/lZlGy.jpg)
In this example, some problem is discovered during the deployment of the update to the 'pilot' ring.
At this point, the IT administrator can set a policy to pause the update. In this example, the admin selects the Pause quality updates check box.
Now all devices are paused from updating for 35 days. When the pause is removed, they will be offered the next quality update, which ideally will not have the same issue. If there is still an issue, the IT admin can pause updates again.
I want to stay on a specific version
If you need a device to stay on a version beyond the point when deferrals on the next version would elapse or if you need to skip a version (for example, update fall release to fall release) use the Select the target Feature Update version setting instead of using the Specify when Preview Builds and Feature Updates are received setting for feature update deferrals. When you use this policy, specify the version that you want your device(s) to use. If you don't update this before the device reaches end of service, the device will automatically be updated once it is 60 days past end of service for its edition.
When you set the target version policy, if you specify a feature update version that is older than your current version or set a value that isn't valid, the device will not receive any feature updates until the policy is updated. When you specify target version policy, feature update deferrals will not be in effect.
Manage how users experience updates
I want to manage when devices download, install, and restart after updates
We recommend that you allow to update automatically--this is the default behavior. If you don't set an automatic update policy, the device will attempt to download, install, and restart at the best times for the user by using built-in intelligence such as intelligent active hours and smart busy check.
For more granular control, you can set the maximum period of active hours the user can set with Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify active hours range for auto restart.
It's best to refrain from setting the active hours policy because it's enabled by default when automatic updates are not disabled and provides a better experience when users can set their own active hours. If you do want to set active hours, use Computer Configuration > Administrative Templates > Windows Components > Windows Update > Turn off auto-restart for updates during active hours.
To update outside of the active hours, you don't need to set any additional settings: simply don't disable automatic restarts. For even more granular control, consider using automatic updates to schedule the install time, day, or week. To do this, use Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure Automatic Updates and select Auto download and schedule the install. You can customize this setting to accommodate the time that you want the update to be installed for your devices.
When you set these policies, installation happens automatically at the specified time and the device will restart 15 minutes after installation is complete (unless it's interrupted by the user).
I want to keep devices secure and compliant with update deadlines
We recommend that you use Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify deadline for automatic updates and restarts for feature and quality updates to ensure that devices stay secure on Windows 10, version 1709 and later. This works by enabling you to specify the number of days that can elapse after an update is offered to a device before it must be installed. Also you can set the number of days that can elapse after a pending restart before the user is forced to restart.
This policies also offers an option to opt out of automatic restarts until a deadline is reached by presenting an 'engaged restart experience' until the deadline has actually expired. At that point the device will automatically schedule a restart regardles of active hours.
These notifications are what the user sees depending on the settings you choose:
When Specify deadlines for automatic updates and restarts is set (For Windows 10, version 1709 and later):
- While restart is pending, before the deadline occurs:
- For the first few days, the user receives a toast notification
- After this period, the user receives this dialog:
- If the user scheduled a restart, or if an auto restart is scheduled, 15 minutes before the scheduled time the user is receives this notification that the restart is about to occur:
- If the restart is still pending after the deadline passes:
- Within 12 hours before the deadline passes, the user receives this notification that the deadline is approaching:
- Once the deadline has passed, the user is forced to restart to keep their devices in compliance and receives this notification:
I want to manage the notifications a user sees
There are additional settings that affect the notifications.
Get Updates For Other Microsoft Products Missing People
We recommend that you use the default notifications as they aim to provide the best user experience while adjusting for the compliance policies that you have set. If you do have further needs that are not met by the default notification settings, you can use Computer Configuration > Administrative Templates > Windows Components > Windows Update > Display options for update notifications with these values:
0 (default) – Use the default Windows Update notifications1 – Turn off all notifications, excluding restart warnings2 – Turn off all notifications, including restart warnings
Note
Option 2 creates a poor experience for personal devices; it's only recommended for kiosk devices where automatic restarts have been disabled.
Still more options are available in Computer Configuration > Administrative Templates > Windows Components > Windows Update > Configure auto-restart restart warning notifications schedule for updates. This setting allows you to specify the period for auto-restart warning reminder notifications (from 2-24 hours; 4 hours is the default) before the update and to specify the period for auto-restart imminent warning notifications (15-60 minutes is the default). We recommend using the default notifications.
I want to manage the update settings a user can access
Get Updates For Other Microsoft Products Missing One
Every Windows device provides users with a variety of controls they can use to manage Windows Updates. They can access these controls by Search to find Windows Updates or by going selecting Updates and Security in Settings. We provide the ability to disable a variety of these controls that are accessible to users.
Users with access to update pause settings can prevent both feature and quality updates for 7 days. You can prevent users from pausing updates through the Windows Update settings page by using Computer Configuration > Administrative Templates > Windows Components > Windows Update > Remove access to “Pause updates.When you disable this setting, users will see Some settings are managed by your organization and the update pause settings are greyed out.
If you use Windows Server Update Server (WSUS), you can prevent users from scanning Windows Update. To do this, use Computer Configuration > Administrative Templates > Windows Components > Windows Update > Remove access to use all Windows Update features.