Submit a ticketCall us

Training Class Getting Started with SolarWinds Backup - February 28

This course offers customers an introduction to SolarWinds Backup, focusing on configuring the backup technology, taking backups, data restoration and data security. It is a great primer and will get you up to speed quickly on SolarWinds Backup.
Register for class.

Home > Success Center > Patch Manager > Patch Manager 2.1.5 Administrator Guide > Configuring Patch Manager > Configuring clients using the Patch Manager Administrator Console

Configuring clients using the Patch Manager Administrator Console

Created by Caroline Juszczak, last modified by Steve.Hawkins on Jan 15, 2018

Views: 645 Votes: 0 Revisions: 6

SolarWinds WMI Providers provide additional management and inventory tools that interface with Windows Server Update Services (WSUS) and your managed clients. If you provisioned your managed clients with the SolarWinds WMI Providers, run Client Certificate Management in the Patch Manager Administrator Console to enable your clients to receive third-party updates from Patch Manager. 

When you are finished, Patch Manager prompts you to configure the Windows Update Group Policy on your managed clients to enable each client to allow third-party updates from Patch Manager. Based on your corporate IT policy, enable the requisite policy in Group Policy.

Run Client Certificate Management

Use the Client Certificate Management task to distribute and install the WSUS self-signed publishing certificate to your managed clients.

  1. Log in to the Patch Manager Administration Console.
  2. In the navigation pane, select Administration and Reporting.
    SPM-Admin-Guide-Administration-And-Reporting.png
  3. In the Administrative Tasks pane, click Client Certificate Management.
    SPM-Admin-Guide-Client-Certificate-Management.png
  4. In the Client Certificate Management window, select the WSUS publishing certificate you want to distribute to the managed clients
    1. Select the Distribute and install Update Services Signing Certificate check box.
      SPM-Admin-Guide-Distribute-And-Install-US-Signing-Certificate.png
    2. Choose whether to distribute the certificate directly from the WSUS server to a CER file. 
      To distribute the certificate directly from the WSUS server, choose Select certificate from WSUS server, and then select the WSUS server from the drop-down menu.
      SPM-Admin-Guide-Select-Certificate-From-WSUS-Server.png
      To distribute the certificate from a CER file, choose Select certificate from file and then click [...] to browse to the file location.
      SPM-Admin-Guide-Select-Certificate-From-File.png
      If the managed clients require SSL for remote connections:
      1. Select Distribute and install Update Services Server SSL Certificate check box.
        SPM-Admin-Guide-Distribute-And-Install-USS-SSL-Certificate.png
      2. Next to the File Name field, browse to the file location.
        SPM-Admin-Guide-File-Name.png
  5. Click Distribute.
  6. Complete the Task Options Wizard to specify the target systems and schedule or execute the task. See Task Options Wizard for details.

Configure the Windows Update Local Policy

Run the Client Certificate Management task to distribute and install the WSUS self-signed publishing certificate to your managed clients.

  1. In the navigation pane, select Administration and Reporting.
    SPM-Admin-Guide-Administration-And-Reporting.png
  2. In the Administrative Tasks pane, click Windows Update Local Policy Management.
  3. On the Windows Update Local Policy Settings window, create a new local policy template for the managed clients.
    1. Enable Allow signed content from intranet Microsoft update service location.
      SPM-Admin-Guide-Allow-Signed-Content-From-Intranet.png
      This option specifies whether Automatic Updates should accept updates from non-Micorosft entities when the update is from an intranet Microsoft update services location.
    2. Modify any other policies you want to configure for the managed clients.

      Changes made to Local Policy do not override any policies already enforced by Group Policy.

    3. Click Save.
  4. Click OK.
  5. Complete the Task Options Wizard to specify the target systems and schedule and/or execute the task. See Task Options Wizard for details.
Last modified

Tags

Classifications

Public