Patch Tuesday from Microsoft and other vendors is all dependent upon several underlying processes contained within the Windows operating system. In this edition of Tachyon Tuesday, we will outline each layer of this technological Matryoshka Doll, with the aim of providing tangible improvements at each layer to achieve the very visible outcome of fast, easy, repeatable patch compliance.
How do I know the current status of my defined windows patches?- 1E Patch Success – Automated patch management and reporting.
If you are using Microsoft Configuration Manager (MEMCM or SCCM) you probably already have Automatic Deployment Rules (ADR) rules in place. Those only work as well as the CM client. 1E has extensive and deep experience making CM absolutely sing. The guaranteed State MEMCM Client Health – Tachyon Exchange (1e.com) ensures the health of another 7% (on average) of persistently broken devices.
Once the data is transferred to your device from Windows Cloud, MEMCM, or a local WSUS server, the local Windows Update Agent (WUA) can still be broken. The detailed steps in this Microsoft Docs article Windows Update – Additional resources – Windows Deployment | Microsoft Docs will fix the issue for a while on a single device. 1E has provided an easy-to-use Guaranteed State that will both check the health of WUA and – if required – repair it, following the steps in this document.
Windows core files are frequently patched and updated by, well, patching. However, as we have all experienced, a device can become out of compliance. The number one response in the forums for an unhealthy windows client is to run SFC /SCANNOW. System File Checker (SFC) is a legacy command line that looks at the registered files of the Windows operating system. This implies the correct files, are correctly registered, and correct versions exist. Every step of this process is fraught with potential mismatches and issues – Exactly the symptoms we are all seeing.
Ironically, for Windows 10 a replacement for SFC exists. Deployment Image Servicing and Management (DISM). This tool is for windows administrators to prepare, modify, restore, and repair system images including Setup, Recovery Environment, and WinPE. Neat! What commands do I need to run to make this all go away?
CheckHealth
ScanHealth
RestoreHealth
WARNING: If this step is so great why doesn't everyone run it every day? Simple; this will cause the local device to reach out to the internet – specifically Microsoft Update Catalog. Depending on the version and patching the client will download the full OS (3 to 6 gb). This is (might have changed) straight SMB.
How do you prevent going to the internet? Well that is going to require a WIM file that is locally available.
DISM /Online /Cleanup-Image /RestoreHealth /source:C:\Sources\Install.wim:1 /LimitAccess
/Source = local or network file location of a WIM and the : Colon is the index in the image that refers to the matching OS on the device.
/LimitAccess = don't go out to the internet
How do we know which WIM to use? Again, MEMCM to the rescue for Enterprises. You can easily precache out at a low priority the WIM file with 1E Nomad. Nomad Content Distribution from 1E – Windows Software Deployment
If you found this Tachyon Tuesday blog helpful, why not check out the Masterclass session Jason delivered at the Work From Anywhere conference earlier this year? Or subscribe to our YouTube channel to stay up to date with the latest Tachyon Tuesday vlog content!