Logo
PREGNANCY
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
 
 
Windows Server

Windows Server 2008 R2 : Work with Windows Updates (part 2)

7/25/2011 11:26:29 AM

4. View Installed Updates

With automatic updates enabled, it is easy to forget that the process of updates is occurring in the background. You may want to check periodically which updates have been installed:

  1. Select Start => All Programs => Control Panel.

  2. Select System And Security.

  3. Double-click Windows Update.

  4. Select View Update History.

As shown in Figure 5, when you view the update history, you will see the names of the updates that have been installed, their unique identifiers in parentheses, the status of the install, the importance of the update, and the date each update was installed. Each update can be right-clicked to view its details. One of the cool features of Windows Update in Windows Server 2008 R2 allows you to right-click any update in your update history and copy the details of the update to the Windows clipboard so you can save them to your network log file or print them for your network logbook.

Figure 5. Viewing the update history

5. Remove an Update

All updates are not created equally. There are updates for drivers, security, Internet Explorer, Windows Defender, and a whole host of others. Operating system updates for Windows Server 2008 R2 are shown in the Windows Update history; however, they are also shown in another interface utility called simply Installed Updates. This tool not only allows you to see which updates have been installed but also allows you to select any of the installed updates and remove them, as shown in Figure 6.

Figure 6. Removing updates

Once you remove an update from your Windows Server, it is highly probable that you will see it on the list of recommended updates again. To avoid this problem, you will need to go to the list of available updates and right-click the update. At this point, you can choose Hide Update so that it will no longer be presented to you as a recommended update.

But what if you were to remove an update and then hide it, only to find out that you actually really do want it installed on your server? The process couldn't be easier, as shown in Figure 7:

  1. Open Windows Update.

  2. Select Restore Hidden Updates.

Figure 7. Restoring hidden updates

Please keep in mind here that when Microsoft addresses an issue with an update, it may address the same or similar issues again with future updates. Sometimes when you restore updates, you may not see all the updates you had previously hidden, especially if Microsoft since released another more recent update that addresses the same problem. You will only see the new update in the list.

6. Install Automatic Updates Between Scheduled Times

Automatic updates are great if your computer is up and running all the time. In today's world of green computing and as businesses attempt to save money by minimizing power consumption, it is possible that a scheduled update may occur at a time when your computer is powered off. If this should occur, you have a few options.

When you boot the computer, it will check for available updates and, if configured to do so, will download them. At this point, you will be prompted to install the updates or to postpone the installation to a future time. The updates will automatically be installed with other available updates when the next configured installation time is reached.

If you choose to shut down the computer and updates are waiting to be installed, you will notice a yellow shield on the shutdown button as an indicator. At this point, you can choose to install the updates and then shut down the server.

Other -----------------
- SQL Server 2005 : Privilege Escalation Without Ownership Chains
- SQL Server 2005 : Privilege and Authorization - Ownership Chaining
- SQL Server 2005 : Privilege and Authorization - Basic Impersonation Using EXECUTE AS
- Configuring Standard Permissions for Exchange Server 2010 (part 2) - Understanding & Assigning Advanced Exchange Server Permissions
- Configuring Standard Permissions for Exchange Server 2010 (part 1)
- Feature Overview of Microsoft Lync Server 2010 : Dial-In Conferencing & Enterprise Voice
- Feature Overview of Microsoft Lync Server 2010 : Instant Messaging & Web Conferencing
- Feature Overview of Microsoft Lync Server 2010 : Presence
- Installing Windows Small Business Server 2011
- Business Server 2011 : Planning Fault Tolerance and Avoidance - Disk Arrays
- Microsoft Dynamics GP 2010 : Improving financial reporting clarity by splitting purchasing accounts & Speeding up lookups with Advanced Lookups
- Microsoft Dynamics GP 2010 : Remembering processes with an Ad hoc workflow
- Microsoft Dynamics GP 2010 : Gaining additional reporting control with Account Rollups
- SharePoint 2010 Search : Replacing the SharePoint Search Engine (part 2) - FAST Search Server 2010 for SharePoint
- SharePoint 2010 Search : Replacing the SharePoint Search Engine (part 1) - Google Search Appliance
- Microsoft Dynamics NAV : Backing up and restoring with SQL Server
- Microsoft Dynamics NAV : Using HotCopy backup & Testing the database
- Microsoft Dynamics NAV : Creating and restoring backups using a Dynamics NAV client
- Microsoft SQL Server 2008 Analysis Services : Building Basic Dimensions and Cubes - Setting up a new Analysis Services project
- Windows Server 2008 Server Core : Managing IIS - Working with the ApplicationHost.CONFIG File
 
 
Most view of day
- Windows Server 2012 : Managing networking using Windows PowerShell (part 1) - Identifying networking cmdlets
- Microsoft Visio 2010 : Creating and Validating Process Diagrams - Creating Subprocesses
- Windows Server 2008 R2 high-availability and recovery features : Installing and Administering Failover Clustering (part 1) - Failover Clustering prerequisites
- Securing the Workstation : Applying the Castle Defense System (part 2) - Hardening the system - Local Security Policy and security configurations
- Sharepoint 2013 : The Office JavaScript Object Model (part 3) - App Security
- Windows Phone 7 : The Silverlight Controls (part 3) - Line, Polyline, and Polygon Controls
- Microsoft PowerPoint 2010 : Animating Slide Content (part 2) - Special Options for Text Animation
- Windows Phone 8 : Configuring Basic Device Settings - Backing Up Your Phone (part 1) = Backing Up App Lists and Settings
- Configuring Startup and Troubleshooting Startup Issues : Understanding the Startup Process (part 3) - Kernel Loading Phase
- Microsoft Exchange Server 2007 : Hub Transport Server Policy Compliance Features (part 1) - Transport Rules
Top 10
- Windows Server 2012 : Configuring IPsec (part 7) - Configuring connection security rules - Monitoring IPsec
- Windows Server 2012 : Configuring IPsec (part 6) - Configuring connection security rules - Creating a custom rule, Configuring authenticated bypass
- Windows Server 2012 : Configuring IPsec (part 5) - Configuring connection security rules - Creating an authentication exemption rule, Creating a server-to-server rule, Creating a tunnel rule
- Windows Server 2012 : Configuring IPsec (part 4) - Configuring connection security rules - Types of connection security rules, Creating an isolation rule
- Windows Server 2012 : Configuring IPsec (part 3) - Configuring IPsec settings - Customizing IPsec tunnel authorizations, Configuring IPsec settings using Windows PowerShell
- Windows Server 2012 : Configuring IPsec (part 2) - Configuring IPsec settings - Customizing IPsec defaults
- Windows Server 2012 : Configuring IPsec (part 1) - Understanding connection security
- Microsoft Project 2010 : Linking Tasks (part 8) - Auditing Task Links,Using the Task Inspector
- Microsoft Project 2010 : Linking Tasks (part 7) - Creating Links by Using the Mouse,Working with Automatic Linking Options
- Microsoft Project 2010 : Linking Tasks (part 6) - Creating Links by Using the Entry Table
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro