Share via


Configure Automatic Updates using Registry Editor

 

Applies To: Windows Server Update Services, Windows Small Business Server 2011 Standard, Windows Server 2008 R2, Windows Server 2003 with SP2, Windows Server 2008 R2 with SP1

If you do not want to use Group Policy to manage Automatic Updates (for example, the WSUS deployment is in a non-Active Directory environment), you can configure Automatic Updates by using Registry Editor.

Warning

Incorrectly editing the registry might severely damage your system. Before making changes to the registry, you should back up any valued data on the computer.

Registry keys for configuring Automatic Updates

Registry entries that you can use to configure Automatic Updates by using Registry Editor are located in the following subkeys:

  • HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

  • HKEY_LOCAL_MACHINE\SYSTEM\Internet Communication Management\Internet Communication

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate

  • HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\AU

Registry keys for Windows Update

WSUS registry entries for Windows Update are located in the following subkey:

HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate

The keys and their values are listed in the following table.

Entry name Data type Values
AcceptTrustedPublisherCerts Reg_DWORD Range = 1|0

- 1 = Enabled. The WSUS server distributes available signed non-Microsoft updates.
- 0 = Disabled. The WSUS server does not distribute available signed non-Microsoft updates.
DisableWindowsUpdateAccess Reg_DWORD Range = 1|0

- 1 = Disables access to Windows Update.
- 0 = Enables access to Windows Update.
ElevateNonAdmins Reg_DWORD Range = 1|0

- 1 = All members of the Users security group can approve or disapprove updates.
- 0 = Only members of the Administrators security group can approve or disapprove updates.
TargetGroup Reg_SZ Name of the computer group to which the computer belongs. This policy is paired with TargetGroupEnabled.
TargetGroupEnabled Reg_DWORD Range = 1|0

- 1 = Use client-side targeting.
- 0 = Do not use client-side targeting. This policy is paired with TargetGroup.
WUServer Reg_SZ HTTP(S) URL of the WSUS server that is used by Automatic Updates and API callers (by default). This policy is paired with WUStatusServer, and both keys must be set to the same value to be valid.
WUStatusServer Reg_SZ The HTTP(S) URL of the server to which reporting information is sent for client computers that use the WSUS server that is configured by the WUServer key. This policy is paired with WUServer, and both keys must be set to the same value to be valid.

WSUS registry keys for Internet Explorer

WSUS registry entries for Internet Explorer are located in the following subkey:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

The keys and their values are listed in the following table.

Entry name Data type Corresponding Group Policy setting Values
NoWindowsUpdate Reg_DWORD Remove links and access to Windows Update Prevents users from connecting to the Windows Update website.

Range = 1|0

- 1 = Enabled. Users cannot connect to the Windows Update website.
- 0 = Disabled or not configured. Users can connect to the Windows Update website.

WSUS registry keys for Internet communication

WSUS registry entries for Internet communication are located in the following subkey:

HKEY_LOCAL_MACHINE\SYSTEM\Internet Communication Management\Internet Communication

The keys and their values are listed in the following table.

Entry name Data type Corresponding Group Policy setting Values
DisableWindowsUpdateAccess Reg_DWORD Turn off access to all Windows Update features Remove all access to Windows Update.

Range = 1|0

- 1 = Enabled. All Windows Update features are removed. This includes blocking access to the Windows Update website at https://windowsupdate.microsoft.com, from the Windows Update hyperlink on the Start menu, and also on the Tools menu in Internet Explorer. Windows automatic updating is also disabled; you will neither be notified about nor will you receive critical updates from Windows Update. This setting also prevents Device Manager from automatically installing driver updates from the Windows Update website.
- 0 = Disabled or not configured. Users will be able to access the Windows Update website and enable automatic updating to receive notifications and critical updates from Windows Update.

WSUS registry key for Windows Update

WSUS registry entry for Windows Update is located in the following subkey:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate

The key and its value is listed in the following table.

Entry name Data type Corresponding Group Policy setting Values
DisableWindowsUpdateAccess Reg_DWORD Remove access to use all Windows Update features Prevents users from connecting to the Windows Update website.

Range = 1|0

- 1 = Enabled. All Windows Update features are removed.
- 0 = Disabled or not configured. All Windows Update features are available.

Registry keys for Automatic Update configuration options

The registry entries for Automatic Update configuration options are located in the following subkey:

HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\AU

The keys and their values are listed in the following table.

Entry name Data type Values
AUOptions Reg_DWORD Range = 2|3|4|5

- 2 = Notify before download.
- 3 = Automatically download and notify of installation.
- 4 = Automatically download and schedule installation. Only valid if values exist for ScheduledInstallDay and ScheduledInstallTime.
- 5 = Automatic Updates is required and users can configure it.
AutoInstallMinorUpdates Reg_DWORD Range = 0|1

- 0 = Treat minor updates like other updates.
- 1 = Silently install minor updates.
DetectionFrequency Reg_DWORD Range = n, where n = time in hours (1–22).

- Time between detection cycles.
DetectionFrequencyEnabled Reg_DWORD Range = 0|1

- 1 = Enable detection frequency.
- 0 = Disable custom detection frequency (use default value of 22 hours).
NoAutoRebootWithLoggedOnUsers Reg_DWORD Range = 0|1

- 1 = Logged-on user can decide whether to restart the client computer.
- 0 = Automatic Updates notifies the user that the computer will restart in 15 minutes.
NoAutoUpdate Reg_DWORD Range = 0|1

- 0 = Enable Automatic Updates.
- 1 = Disable Automatic Updates.
RebootRelaunchTimeout Reg_DWORD Range = n, where n = time in minutes (1–1,440).

- Time between prompts for a scheduled restart.
RebootRelaunchTimeoutEnabled Reg_DWORD Range = 0|1

- 1 = Enable RebootRelaunchTimeout.
- 0 = Disable custom RebootRelaunchTimeout(use default value of 10 minutes).
RebootWarningTimeout Reg_DWORD Range = n, where n = time in minutes (1–30).

- Length, in minutes, of the restart warning countdown after updates have been installed that have a deadline or scheduled updates.
RebootWarningTimeoutEnabled Reg_DWORD Range = 0|1

- 1 = Enable RebootWarningTimeout.
- 0 = Disable custom RebootWarningTimeout (use default value of 5 minutes).
RescheduleWaitTime Reg_DWORD Range = n, where n = time in minutes (1–60).

- Time in minutes that Automatic Updates waits at startup before it applies updates from a missed scheduled installation time.
- This policy applies only to scheduled installations, not to deadlines. Updates with deadlines that have expired should always be installed as soon as possible.
RescheduleWaitTimeEnabled Reg_DWORD Range = 0|1

- 1 = Enable RescheduleWaitTime .
- 0 = Disable RescheduleWaitTime (attempt the missed installation during the next scheduled installation time).
ScheduledInstallDay Reg_DWORD Range = 0|1|2|3|4|5|6|7

- 0 = Every day.
- 1 through 7 = the days of the week from Sunday (1) to Saturday (7).
(Only valid if AUOptions = 4.)
ScheduledInstallTime Reg_DWORD Range = n, where n = the time of day in 24-hour format (0–23).
UseWUServer Reg_DWORD Range = 0|1

- 1 = The computer gets its updates from a WSUS server.
- 0 = The computer gets its updates from Microsoft Update.
- The WUServer value is not respected unless this key is set.

See Also

Plan Automatic Updates Settings
Configure Automatic Updates using Group Policy