implementing partching using wsus(Installing and configuring wsus)
Exercise 1 - Install and Configure WSUS
Exercise 1 - Install and Configure WSUS
Windows Server Update Services (WSUS) provides a cost effective patch management solution to deploy updates to domain-joined Windows servers and workstation in a corporate network. WSUS is fully integrated in Windows Server 2012 and can be enabled on Windows clients by configuring settings in Group Policy Objects - GPO.
To get a better understanding of this technology, please refer to your course material or use your preferred search engine to research this topic in more detail.
Task 1 - Initialize Disk Storage for WSUS
In this task, you will use PLABDM01as the designated server to run Windows Server Update Services. To prepare this server to assume the role of WSUS server, you must prepare the disk volume that will be used for storage of operating system updates. To configure the disk on PLABDM01server, follow these steps:
Step 1
Ensure you have powered on the required devices and connect to PLABDM01.
From Server Manager Dashboard, click on Tools > Computer Management.
Step 2
On the Computer Management console, on the left pane, click Storage node and click Disk Management.
On the right-details pane, scroll down a bit to see the list of available disk volumes.
Then right-click Disk 1 and select Online.
Step 3
Right-click on Disk 1's unallocated partition and choose New Simple Volume.
The New Simple Volume Wizard will launch.
Click Next twice on the wizard, keeping the default settings.
Step 4
When you reach the Assign Drive Letter or Path options, make sure drive letter E is selected.
Click Next.
Step 5
Keep the default Format Partition options and click Next.
Click Finish to close the Completing the New Simple Volume Wizard page.
Wait for the formatting process to be completed before installing WSUS.
Close Computer Management.
Keep all devices powered on in their current state and proceed to the next task.
Task 2 - Install and Configure WSUS
To install the Windows Server Update Services server, follow these steps:
Step 1
Connect to PLABDM01.
Click on the Start button and select Windows PowerShell from the menu.
Step 2
On the Windows PowerShell prompt, type the following:
Note: Please wait while the services are being installed. This will take a few moments.
Step 3
Windows indicates that the services and their dependencies were successfully installed.
Close Windows PowerShell window.
Step 4
Reopen Server Manager Dashboard, click the Tools menu and select Windows Server Update Services.
Step 5
On Complete WSUS Installation dialogue box, select Store updates locally box.
In Content directory path type:
e:\Updates
Select Run.
Note: Wait for the configuration of WSUS to be completed. This process will take a few minutes to finish.
On Complete WSUS Installation, click Close when the progress bar has reached the end.
Note: On the Server Manager Dashboard, you will notice a yellow exclamation point icon, appended to the flag. This indicates that additional required configuration is needed. WSUS will automatically launch a wizard to address this requirement.
Step 6
The WSUS configuration wizard page automatically opens.
On the Before you begin page, click Next.
Step 7
On Microsoft Update Improvement Program page, clear Yes, I would like to join the Microsoft Update Improvement Program check box.
Click Next.
Step 8
Since this is the first WSUS server to be rolled out for this lab, accept the default setting to Synchronise from Microsoft Update option.
Click Next.
Step 9
On Specify Proxy Server page, select Use a proxy when synchronizing. Enter the following information:
Proxy server name: proxy
Port number: 8080
Click Next.
Step 10
On Connect to Upstream Server, click on Start Connecting.
On Connect to Upstream Server screen, please wait while it downloads update information from Microsoft.
Alert: Depending on the amount of updates, this can take up to 20 minutes to complete.
Step 11
On Choose Languages page, verify that only English check box is selected.
Click Next.
Step 12
Scroll down the list of products and select Windows 10 and Windows 8.1.
Click Next.
Step 13
On the Choose Classifications page, select only Critical Updates check box.
Choose Next.
Step 14
On the Set Sync Schedule page, accept the default to Synchronise manually.
Click Next.
Step 15
On the Finished screen, select Begin initial synchronisation check box and choose Next.
On the What's Next page, click Finish.
Step 16
The Update Services console will automatically open.
If you don’t see it, click on the taskbar as it appears as a minimized icon.
Step 17
Expand PLABDM01node.
Click on Synchronizations node, and you can see the progress of downloading the updates from Microsoft on the bottom center pane.
Wait for the synchronization to complete. This will take a few minutes to finish.
Step 18
When Synchronization is complete, you can see the details of the download.
Minimize Update Services console.
Keep all devices powered on in their current state and proceed to the next task.
Task 3 - Enable SSL for WSUS Server
For security reasons, it is important that you enable secure sockets layer for WSUS server to encrypt web network traffic between the server and the requesting clients. In addition, SSL verifies the identity of the WSUS server when Windows update clients make a connection to it.
To enable SSL on the WSUS server, perform the following steps:
Step 1
On PLABDM01device, go to Server Manager Dashboard, click on Tools and select Internet Information Services Manager.
Step 2
Alert: If you get a prompt about updating to latest web platform components, click No.
On IIS Manager, click on PLABDM01and on centre pane select Server Certificates.
On Actions pane, click Open Feature.
Step 3
On Actions pane, click Create Self-Signed Certificate.
Step 4
On the Specify Friendly Name dialog box, use the following information:
Specify a friendly name for the certificate: PLABDM01-WSUS
Select a certificate store for the new certificate: Personal
Click OK.
Step 5
Expand Sites and then click on WSUS Administration.
On the centre pane, right-click on SSL Settings and choose Bindings...
Step 6
On the Site Bindings dialog box, select https and click Edit.
Step 7
On the Edit Site Binding dialog box, use the following information:
Hostname: plabdm01.practicelabs.com
Choose SSL certificate PLABDM01-WSUS from the drop down list.
Click OK.
Click Close to save changes in Edit Bindings.
Step 8
Back in the IIS Manager, click on WSUS Administration and on centre pane right-click on SSL Settings, and select Open Feature.
Step 9
On the SSL Settings dialog box, select Require SSL check box.
Then on Actions pane, click Apply.
Step 10
In this step, you will export the self-signed certificate to a file.
Click on PLABDM01.PRACTICELABS.COM and on the centre pane, right-click on Server Certificates and choose Open Feature.
Step 11
On the Server Certificates pane, right-click on PLABDM01-WSUS on the middle pane and choose View…
Step 12
From Certificate dialogue box, go to Details tab.
Click Copy to File…
On the Welcome to the Certificate Export Wizard page, click Next.
Step 13
From the Export Private Key page, click Yes, export the private key option button. Click Next.
Keep the default Export File Format options and click Next.
Step 14
In the Security page, click Password check box and then type the following in each text box:
Passw0rd
Click Next.
Step 15
From the File to Export page, type:
C:\plabdm01
Click Next.
Step 16
In the Completing the Certificate Export Wizard page, click Finish.
Click OK when notified that the export was successful. Click OK to close Certificate dialogue box. Close the IIS Manager console.
Keep all devices powered on in their current state and proceed to the next task.
Task 4 - Configure domain to trust self-signed certificate
To setup the self-signed certificate to be trusted by the Windows domain, follow these steps:
Step 1
Connect to PLABDC01.
From Server Manager Dashboard, Click on Tools menu and select Group Policy Management.
Step 2
Expand Forest: PRACTICELABS.COM, then expand Domains and finally expand PRACTICELABS.COM.
Note: Ignore the screen prompt about GPO links by choosing OK.
Right-click on Default Domain Policy, then select Edit…
Step 3
In Group Policy Management Editor window, navigate to Computer Configuration > Policies > Windows Settings > Security Settings > Public Key Policies > Trusted Root Certification Authorities.
Right-click on details pane and then select Import…
Click Next in the Welcome to the Certificate Import Wizard page.
Step 4
From the File to Import page, click in File name box and type:
\\plabdm01\c$\plabdm01.pfx
Click Next.
Step 5
From the Private key protection page, type:
Passw0rd
Keep the other default settings. Click Next.
In Certificate Store page, click Next.
Step 6
Click Finish to close Completing the Certification Import Wizard page.
Click OK when prompted that the import was successful.
Step 7
The self-signed certificate is now added.
Close Group Policy Management Editor and Group Policy Management Console windows.
Leave the devices you have powered on in their curren
Comments
Post a Comment