This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\PT-L-SEC-GPO-Windows Updates Server Settings
Delegation
These groups and users have the specified permission for this GPO
Name
Allowed Permissions
Inherited
EMEA\Domain Admins
Edit settings, delete, modify security
No
EMEA\PT-L-SEC-Delegation Modify Group Policy Settings Access
Edit settings, delete, modify security
No
EMEA\PT-L-SEC-GPO-Windows Updates Server Settings
Read (from Security Filtering)
No
NT AUTHORITY\Authenticated Users
Read
No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS
Read
No
NT AUTHORITY\SYSTEM
Edit settings, delete, modify security
No
ROOT\Enterprise Admins
Edit settings, delete, modify security
No
Computer Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Windows Update/Legacy Policies
Policy
Setting
Comment
Allow Automatic Updates immediate installation
Enabled
No auto-restart with logged on users for scheduled automatic updates installations
Enabled
Windows Components/Windows Update/Manage end user experience
Policy
Setting
Comment
Configure Automatic Updates
Enabled
Configure automatic updating:
3 - Auto download and notify for install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenance
Disabled
Scheduled install day:
0 - Every day
Scheduled install time:
05:00
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every week
Enabled
First week of the month
Disabled
Second week of the month
Disabled
Third week of the month
Disabled
Fourth week of the month
Disabled
Install updates for other Microsoft products
Disabled
Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
Policy
Setting
Comment
Automatic Updates detection frequency
Enabled
Check for updates at the following
interval (hours):
4
Policy
Setting
Comment
Enable client-side targeting
Enabled
Target group name for this computer
Servers
Policy
Setting
Comment
Specify intranet Microsoft update service location
Enabled
Set the intranet update service for detecting updates:
http://ptcitwsus01.emea.tpg.ads:8530
Set the intranet statistics server:
http://ptcitwsus01.emea.tpg.ads:8530
Set the alternate download server:
(example: https://IntranetUpd01)
Download files with no Url in the metadata if alternate download server is set.
Disabled
Do not enforce TLS certificate pinning for Windows Update client for detecting updates.
Disabled
Select the proxy behavior for Windows Update client for detecting updates:
Only use system proxy for detecting updates (default)