Product Version: 6.5.0.0
Overview
In some cases, Microsoft KBs automatically download and install on client machines. End-users can also manually download missing KBs using the Check for Updates option. This behavior can impact Saner CVEM remediation, as it lists such KBs under the Installed Patch section, showing them as installed by the system. To avoid these automatic downloads, administrators can disable the Check for Updates and Automatic Updates features using GPO policies deployed from Active Directory.
Resolution Steps
The following steps show how to configure GPO policies to disable update checks and apply them only to specific target devices (e.g., desktop-1j0rh8j, desktop-5p1ag86, and same hostname).
1. Create a Group in Active Directory Users and Computers
Open the Active Directory Users and Computers console.
Right-click on an empty area, then select New > Group.
Enter a group name (e.g., Disable WinUpdates).
In Group Scope, select Global.
In Group Type, select Security.
Click OK to save.
The group will now appear under the OU.
2. Add Target Computers as Group Members
Open the created group and click Add.
In the object selection window, click Object Types and ensure Computers is checked.
Enter the names of target computers separated by a semicolon (
;
).Click Check Names to validate.
Correct names will be underlined.
Ensure all target computers are listed as members, then click OK.
3. Create and configure the GPO Policy
Open the Group Policy Management Console (GPMC).
Select the OU where the policy should be applied.
Right-click the desired GPO and choose Edit.
In the Group Policy Object Editor, expand:
Computer Configuration > Administrative Templates > Windows Components > Windows Update.
From the list of settings, right-click Remove access to use all Windows Update features and select Edit.
Configure as Enabled.
4. Apply Security Filtering
In the Security Filtering section, select Authenticated Users and click Remove.
Click Add, enter the group name created in Step 1, and click Check Names.
Once validated, click OK.
Ensure the group is listed under Security Filtering.
5. Enforce the Policy on Client Devices
Log in to each target client device.
Open Command Prompt with Administrator rights.
Run the command:
Run
rsop.msc
to verify that the policy has been applied.On the client machine, open Windows Update.
The Check for Updates option should now be grayed out.
To confirm, navigate to View configured update policies on the client to see applied settings.
Conclusion
With this setup, Windows Updates will not automatically download or allow manual checks on the specified devices, ensuring that Saner CVEM remediation results remain consistent.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article