best business builder

Automating WSUS with PowerShell

The scripts explained in this post allow you to automate several Windows Server Update Services (WSUS) tasks such as synchronization, approvals, cleanups, and scheduled update installations.

Syncing WSUS with PowerShell and Task Scheduler ^

In this article, I assume you are familiar with WSUS administration. Right after installing WSUS, you have to configure periodic synchronization. Unfortunately, as you can see in the screenshot below, the synchronization options are somewhat limited.

WSUS synchronization options

WSUS synchronization options

Since I don’t need to sync every day, I select Synchronize manually and use the script below along with Task Scheduler to synchronize WSUS at the times I prefer.

I load the .NET Update Services object into the $wsusserver variable and use the StartSynchronization() method to start manual synchronization. The screenshot below shows the Task Scheduler task I’m using to launch the PowerShell script.

WSUS synchronization task

WSUS synchronization task

You will see the synchronization results in the WSUS console as if you synced manually:

Synchronization results

Synchronization results

 

Automating WSUS update approval ^

The next task I’m going to automate is the approval of updates. WSUS offers automatic approval. However, it is quite inflexible, so I wrote the PowerShell script below:

I added comments, so I’ll just explain briefly how the script works. First I load the Windows Update Assembly, so I can use the WSUS .NET object. Then I’m preparing the variables that I need to work with the WSUS object:

  • $wsus: is the WSUS object.
  • $UpdateScope: Defines the time interval for the $wsus.GetUpdates() method.
  • $groups: Defines all WSUS groups I’d like to approve updates for.
  • $Classification: Defines updates classifications for the $wsus.GetUpdates() method. I’m filtering out service packs, drivers, and upgrades.
  • $Categories: Defines updates categories or products for the $wsus.GetUpdates() method. I’m filtering out SQL and Skype updates. SQL gets updated manually, and I don’t have Skype installations in my environment.

Then I’m setting up the Update Scope interval to get only updates created within the last month. I know I’m approving my updates every month, so I only need to get recently released updates.

After that, I’m assigning the $Classification and $Categories variables to the corresponding objects. And with the help of the $wsus.GetUpdates($UpdateScope) method, I am saving all updates that match my scope to the $updates variable. Then I’m adding some filtering to remove updates such as LanguagePack, FeatureOnDemand, and Itanium from the results because I don’t have these kinds of updates in my environment.

Now I have all updates I want to approve. Next, I’m looping through the WSUS groups to which I want to assign the updates. Then I loop through the updates, approving every update for every group. In this particular case, there is only one group. However, I use a loop here, just to be able to add more groups later.

After approving all updates, I only need to update the log file and send this file by email to myself. This way, I am sure I’ve approved the updates, and I receive brief information about them.

Like before, I’m using Task Scheduler to run the script:

WSUS updates approval task

WSUS updates approval task

 

Declining superseded updates ^

As you know, Microsoft frequently replaces single updates with packages of multiple updates. They call the replaced update a “superseded update,” which is no longer needed. Thus, it makes sense to decline those updates. For this purpose, I modified the PowerShell script below, which I found here.

My changes are in the lines 57–59, 99–100, and 242. I added the transcript file, so when the script ran via the Task Scheduler, I could see the number of declined updates. And after I ran the script the first time, I changed the update scope. So it’ll check and decline only updates within the last six months.

The screenshot below shows a sample log file:

Declining superseded updates log file

Declining superseded updates log file

 

Deleting declined updates from the WSUS database ^

After you decline the updates, they are still residing inside the WSUS database and taking up disk space. To remove them completely, you have to run the WSUS cleanup wizard. This is another task you can automate:

All I’m doing in the script above is defining a cleanup scope using the CleanUpScope object and then running CleanUpManager using the corresponding object against that scope. I’m not compressing updates because this operation takes a long time and doesn’t save much space.

The script also runs as scheduled task and produces the log file you can see below:

Cleanup wizard log file

Cleanup wizard log file

Because all of these procedures are making many changes in the WSUS database, it is good idea to re-index the database occasionally. To do that, I’m using this SQL query from the Microsoft Script Center. You can use the sqlcmd utility you find there to run the SQL query. Just create a scheduled task and run it once a month.

 

Arranging the maintenance scripts ^

Here is how I scheduled the maintenance scripts:

  1. Synchronize WSUS every Tuesday.
  2. Decline superseded updates after every WSUS synchronization.
  3. Run the WSUS cleanup wizard script after declining superseded updates finishes.
  4. Re-index the WSUS database after WSUS cleanup.
  5. Approve updates every Wednesday. This way I know I’m approving updates after removal of all superseded, outdated, and expired updates.

 

Scheduling updates ^

At this point I’m done with maintenance. However, I still need to install the updates. Unfortunately, WSUS also only offers poor choices when it comes to scheduling update installations. Basically, I can only pick the day of the week and the time. Of course, this is not always what you want. Because I have several environments, I created a Group Policy Object (GPO) for each of them and assigned them to the appropriate Active Directory organizational units (OUs).

GPO for updates installation

GPO for updates installation

As you can see, I configured this GPO to install updates every Friday at 7 p.m. The thing is, I just need to do this on a particular Friday every month. Thus, I wrote a tiny script for enabling this GPO and a second one for disabling it. Then I configured a scheduled task to run the first script a couple days before the update day and the second one after installing the updates.

 

Conclusion ^

And after I’ve completed my configuration, I’m just checking my WSUS server every once in a while to make sure everything works as intended.

customer relationships

Leave a Reply

Your email address will not be published. Required fields are marked *