Error 1627 Error Configuring Machine Software Microsoft Driver Signing Policy

  среда 12 февраля
      57
-->

Applies to: Configuration Manager (current branch)

I can't state this authoratively (Jason working for Microsoft may be able to) but I have observed limitations like he has stated. What is to stop you from rearranging your package to call DriverPackageInstall twice once for each driver, splitting the INF file, etc? Winlogon.log entry: 'Configure machine software microsoft driver signing policy. Undo value for the undefined group policy setting machine software microsoft driver signing policy wasn't reset successfully (1627).

Beginning with version 1806, the Third-Party Software Update Catalogs node in the Configuration Manager console allows you to subscribe to third-party catalogs, publish their updates to your software update point (SUP), and then deploy them to clients.

Note

Configuration Manager doesn't enable this feature by default. Before using it, enable the optional feature Enable third party update support on clients. For more information, see Enable optional features from updates.

Prerequisites

  • Sufficient disk space on the top-level software update point's WSUSContent folder to store the source binary content for third-party software updates.
    • The amount of required storage varies based on the vendor, types of updates, and specific updates that you publish for deployment.
    • If you need to move the WSUSContent folder to another drive with more free space, see the How to change the location where WSUS stores updates locally blog post.
  • The third-party software update synchronization service requires internet access.
    • For the partner catalogs list, download.microsoft.com over HTTPS port 443 is needed.
    • Internet access to any third-party catalogs and update content files. Additional ports other than 443 may be needed.
    • Third-party updates use the same proxy settings as the SUP.

Additional requirements when the SUP is remote from the top-level site server

  1. SSL must be enabled on the SUP when it's remote. This requires a server authentication certificate generated from an internal certificate authority or via a public provider.

    • Configure SSL on WSUS
      • When you configure SSL on WSUS, note some of the web services and the virtual directories are always HTTP and not HTTPS.
      • Configuration Manager downloads third-party content for software update packages from your WSUS content directory over HTTP.
  2. When setting the third-party updates WSUS signing certificate configuration to Configuration Manager manages the updates in the Software Update Point Component Properties, the following configurations are required to allow the creation of the self-signed WSUS signing certificate:

    • Remote registry should be enabled on the SUP server.
    • The WSUS server connection account should have remote registry permissions on the SUP/WSUS server.
  3. Create the following registry key on the Configuration Manager site server:

    • HKLMSoftwareMicrosoftUpdate ServicesServerSetup, create a new DWORD named EnableSelfSignedCertificates with a value of 1.
  4. To enable installing the self-signed WSUS signing certificate to the Trusted Publishers and Trusted Root stores on the remote SUP server:

    • The WSUS server connection account should have remote administration permissions on the SUP server.

      If this item isn't possible, export the certificate from the local computer's WSUS store into the Trusted Publisher and Trusted Root stores.

Note

The WSUS server connection account can be identified by viewing the Proxy and Account Settings tab on the Site System role properties of the SUP. If an account is not specified, the site server's computer account is used.

Enable third-party updates on the SUP

If you enable this option, you can subscribe to third-party update catalogs in the Configuration Manager console. You can then publish those updates to WSUS and deploy them to clients. The following steps should be run once per hierarchy to enable and set up the feature for use. The steps may need to be rerun if you ever replace the top-level SUP's WSUS server.

  1. In the Configuration Manager console, go to the Administration workspace. Expand Site Configuration, and select the Sites node.

  2. Select the top-level site in the hierarchy. In the ribbon, click Configure Site Components, and select Software Update Point.

  3. Switch to the Third-Party Updates tab. Select the option Enable third-party software updates.

Configure the WSUS signing certificate

You'll need to decide if you want Configuration Manager to automatically manage the third-party WSUS signing certificate using a self-signed certificate, or if you need to manually configure the certificate.

Automatically manage the WSUS signing certificate

If you don't have a requirement to use PKI certificates, you can choose to automatically manage the signing certificates for third-party updates. The WSUS certificate management is done as part of the sync cycle and gets logged in the wsyncmgr.log.

  1. In the Configuration Manager console, go to the Administration workspace. Expand Site Configuration, and select the Sites node.
  2. Select the top-level site in the hierarchy. In the ribbon, click Configure Site Components, and select Software Update Point.
  3. Switch to the Third-Party Updates tab. Select the option Configuration Manager manages the certificate.
  4. A new certificate of type Third-party WSUS Signing is created in the Certificates node under Security in the Administration workspace.

Manually manage the WSUS signing certificate

If you need to manually configure the certificate, such as needing to use a PKI certificate, you'll need to use either System Center Updates Publisher or another tool to do so.

  1. Configure the signing certificate using System Center Updates Publisher.
  2. In the Configuration Manager console, go to the Administration workspace. Expand Site Configuration, and select the Sites node.
  3. Select the top-level site in the hierarchy. In the ribbon, click Configure Site Components, and select Software Update Point.
  4. Switch to the Third-Party Updates tab. Select the option for Manually manage the certificate.

Enable third-party updates on the clients

Enable third-party updates on the clients in the client settings. The setting sets the Windows Update agent policy for Allow signed updates for an intranet Microsoft update service location. This client setting also installs the WSUS signing certificate to the Trusted Publisher store on the client. The certificate management logging is seen in updatesdeployment.log on the clients. Run these steps for each custom client setting you want to use for third-party updates. For more information, see the About client settings article.

  1. In the Configuration Manager console, go to the Administration workspace and select the Client Settings node.
  2. Select an existing custom client setting or create a new one.
  3. Select the Software Updates tab on the left-hand side. If you don't have this tab, make sure that the Software Updates box is enabled.
  4. Set Enable third-party software updates to Yes.

Add a custom catalog

Partner catalogs are software vendor catalogs that have their information already registered with Microsoft. With partner catalogs, you can subscribe to them without having to specify any additional information. Catalogs that you add are called custom catalogs. You can add a custom catalog from a third-party update vendor to Configuration Manager. Custom catalogs must use https and the updates must be digitally signed.

Adobe flash cs3 professional portable download gratis. It is full offline installer setup of Adobe Flash CS3 Professional for 64 Bit. Adobe Flash CS3 Professional Overview. Adobe Flash CS3 Professional is an exceptionally well known and convenient application which can be utilized for making Web activity, rich web applications, work area applications, portable diversions and versatile applications.

  1. Go to the Software Updates Library workspace, expand Software updates, and select the Third-Party Software Update Catalogs node.

  2. Click Add Custom Catalog in the ribbon.

  3. On the General page, specify the following items:

    • Download URL: A valid HTTPS address of the custom catalog.
    • Publisher: The name of the organization that publishes the catalog.
    • Name: The name of the catalog to display in the Configuration Manager Console.
    • Description: A description of the catalog.
    • Support URL (optional): A valid HTTPS address of a website to get help with the catalog.
    • Support Contact (optional): Contact information to get help with the catalog.
  4. Click Next to review the catalog summary and to continue with completing the Third-party Software Updates Custom Catalog Wizard.

Subscribe to a third-party catalog and sync updates

When you subscribe to a third-party catalog in the Configuration Manager console, the metadata for every update in the catalog are synced into the WSUS servers for your SUPs. The sync of the metadata allows the clients to determine if any of the updates are applicable. Perform the following steps for each third-party catalog to which you want to subscribe:

  1. In the Configuration Manager console, go to the Software Library workspace. Expand Software Updates and select the Third-Party Software Update Catalogs node.
  2. Select the catalog to subscribe and click Subscribe to Catalog in the ribbon.
  3. Review and approve the catalog certificate.

    Note

    When you subscribe to a third-party software update catalog, the certificate that you review and approve in the wizard is added to the site. This certificate is of type Third-party Software Updates Catalog. You can manage it from the Certificates node under Security in the Administration workspace.

  4. Complete the wizard. After initial subscription, the catalog should start to download in a few minutes.
    • The catalog synchronizes automatically every 7 days.
    • Click Sync now in the ribbon to force a sync.
  5. After the catalog is downloaded, the product metadata needs to be synchronized from the WSUS database into the Configuration Manager database. Manually start the software updates synchronization to synchronize the product information.
  6. Once the product information is synchronized, Configure the SUP to synchronize the desired product into Configuration Manager.
  7. Manually start the software updates synchronization to synchronize the new product's updates into Configuration Manager.
  8. When the synchronization completes, you can see the third-party updates in the All Updates node. These updates are published as metadata-only updates until you choose to publish them.
    • The icon with the blue arrow represents a metadata-only software update.
Windows installer

Publish and deploy third-party software updates

Once the third-party updates are in the All Updates node, you can choose which updates should be published for deployment. When you publish an update, the binary files are downloaded from the vendor and placed into the WSUSContent directory on the top-level SUP.

  1. In the Configuration Manager console, go to the Software Library workspace. Expand Software Updates and select the All Software Updates node.

  2. Click Add Criteria to filter the list of updates. For example, add Vendor for HP. to view all updates from HP.

  3. Select the updates that are required by your organization. Click Publish Third-Party Software Update Content.

    • This action downloads the update binaries from the vendor then stores them in the WSUSContent folder on the top-level software update point.
  4. Manually start the software updates synchronization to change the state of the published updates from metadata-only to deployable updates with content.

    Note

    When you publish third-party software update content, any certificates used to sign the content are added to the site. These certificates are of type Third-party Software Updates Content. You can manage them from the Certificates node under Security in the Administration workspace.

  5. Review the progress in the SMS_ISVUPDATES_SYNCAGENT.log. The log is located on the top-level software update point in the site system Logs folder.

  6. Deploy the updates using the Deploy software updates process.

  7. On the Download Locations page of the Deploy Software Updates Wizard, select the default option to Download software updates from the internet. In this scenario, the content is already published to the software update point, which is used to download the content for the deployment package.

  8. Clients will need to run a scan and evaluate updates before you can see compliance results. You can manually trigger this cycle from the Configuration Manager control panel on a client by running the Software Updates Scan Cycle action.

Improvements for third-party updates starting in 1910

You now have more granular controls over synchronization of third party updates catalogs. Starting in Configuration Manager version 1910, you can configure the synchronization schedule for each catalog independently. When using catalogs that include categorized updates, you can configure synchronization to include only specific categories of updates to avoid synchronizing the entire catalog. With categorized catalogs, when you're confident you'll deploy a category, you can configure it to automatically download and publish to WSUS.

Set the schedule for a catalog in a new catalog subscription

  1. Go to the Software Library workspace, expand Software Updates, then select the Third-Party Software Update Catalogs node.
  2. Select the catalog to subscribe and click Subscribe to Catalog in the ribbon.
  3. Choose your options on the Schedule page if you want to override the default synchronization schedule:
    • Simple schedule: Chose the hour, day or month interval.
    • Custom schedule: Set a complex schedule.

Update the schedule per catalog

  1. Go to the Software Library workspace, expand Software Updates, then select the Third-Party Software Update Catalogs node.
  2. Right-click on the catalog and select Properties.
  3. Choose your options on the Schedule tab:
    • Simple schedule: Chose the hour, day or month interval.
    • Custom schedule: Set a complex schedule.

New subscription to a third-party v3 catalog

Important

This option is only available for v3 third-party update catalogs, which support categories for updates. These options are disabled for catalogs that aren't published in the new v3 format.

  1. In the Configuration Manager console, go to the Software Library workspace. Expand Software Updates and select the Third-Party Software Update Catalogs node.

  2. Select the catalog to subscribe and click Subscribe to Catalog in the ribbon.

  3. Choose your options on the Select Categories page:

    • Synchronize all update categories (default)

      • Synchronizes all updates in the third-party update catalog into Configuration Manager.
    • Select categories for synchronization

      • Choose which categories and child categories to synchronize into Configuration Manager.
  4. Choose if you want to Stage update content for the catalog. When you stage the content, all updates in the selected categories are automatically downloaded to your top-level software update point meaning you don't need to ensure they're already downloaded before deploying. You should only automatically stage content for updates you are likely to deploy them to avoid excessive bandwidth and storage requirements.

    • Do not stage content, synchronize for scanning only (recommended)
      • Don't download any content for updates in the third-party catalog
    • Stage the content for selected categories automatically
      • Choose the update categories that will automatically download content.
      • The content for updates in selected categories will be downloaded to the top-level software update point's WSUS content directory.
  5. Set your Schedule for catalog synchronization, then complete the wizard.

Edit an existing subscription

Important

This option is only available for v3 third-party update catalogs, which support categories for updates. These options are disabled for catalogs that aren't published in the new v3 format.

  1. In the Configuration Manager console, go to the Software Library workspace. Expand Software Updates and select the Third-Party Software Update Catalogs node.
  2. Right-click on the catalog and select Properties.
  3. Choose your options on the Select Categories tab.
    • Synchronize all update categories (default)
      • Synchronizes all updates in the third-party update catalog into Configuration Manager.
    • Select categories for synchronization
      • Choose which categories and child categories to synchronize into Configuration Manager.
  4. Choose your options for the Stage update content tab.
    • Do not stage content, synchronize for scanning only (recommended)
      • Don't download any content for updates in the third-party catalog
    • Stage the content for selected categories automatically
      • Choose the update categories that will automatically download content.
      • The content for updates in selected categories will be downloaded to the top-level software update point's WSUS content directory.

Monitoring progress of third-party software updates

Synchronization of third-party software updates is handled by the SMS_ISVUPDATES_SYNCAGENT component on the top-level default software update point. You can view status messages from this component, or see more detailed status in the SMS_ISVUPDATES_SYNCAGENT.log. This log is on the top-level software update point in the site system Logs folder. By default this path is C:Program FilesMicrosoft Configuration ManagerLogs. For more information on monitoring the general software update management process, see Monitor software updates

Known issues

  • The machine where the console is running is used to download the updates from WSUS and add it to the updates package. The WSUS signing certificate must be trusted on the console machine. If it isn't, you may see issues with the signature check during the download of third-party updates.
  • The third-party software update synchronization service can't publish content to metadata-only updates that were added to WSUS by another application, tool, or script, such as SCUP. The Publish third-party software update content action fails on these updates. If you need to deploy third-party updates that this feature doesn't yet support, use your existing process in full for deploying those updates.
  • Configuration Manager has a new version for the catalog cab file format. The new version includes the certificates for the vendor's binary files. These certificates are added to the Certificates node under Security in the Administration workspace once you approve and trust the catalog.
    • You can still use the older catalog cab file version as long as the download URL is https and the updates are signed. The content will fail to publish because the certificates for the binaries aren't in the cab file and already approved. You can work around this issue by finding the certificate in the Certificates node, unblocking it, then publish the update again. If you're publishing multiple updates signed with different certificates, you'll need to unblock each certificate that is used.
    • For more information, see status messages 11523 and 11524 in the below status message table.
  • When the third-party software update synchronization service on the top-level software update point requires a proxy server for internet access, digital signature checks may fail. To mitigate this issue, configure the WinHTTP proxy settings on the site system. For more information, see Netsh commands for WinHTTP.

Status messages

MessageIDSeverityDescriptionPossible causePossible solution
11516ErrorFailed to publish content for update 'Update ID' because the content is unsigned. Only content with valid signatures can be published.Configuration Manager doesn't allow unsigned updates to be published.Publish the update in an alternate way.
See if a signed update is available from the vendor.
11523WarningCatalog 'X' does not include content signing certificates, attempts to publish update content for updates from this catalog may be unsuccessful until content signing certificates are added and approved.This message can occur when you import a catalog that is using an older version of the cab file format.Contact the catalog provider to obtain an updated catalog that includes the content signing certificates.
The certificates for the binaries aren't included in the cab file so the content will fail to publish. You can work around this issue by finding the certificate in the Certificates node, unblocking it, then publish the update again. If you're publishing multiple updates signed with different certificates, you'll need to unblock each certificate that is used.
11524ErrorFailed to publish update 'ID' due to missing update metadata.The update may have been synchronized to WSUS outside of Configuration Manager.Synchronize the update with Configuration Manager before attempting to publish it's content.
If an external tool was used to publish the update as Metadata only, then use the same tool to publish the update content.

Working with third-party updates video

Next step