Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Windows updates

Posted on 2014-10-20
2
Medium Priority
?
101 Views
Last Modified: 2014-11-15
I have a customer that needs the administrator to be able to log on to a windows machine managed by Windows Update Group policy and change how windows updates a computer.  

I figured out how to exclude windows machines, but I can not get the Administrator account excluded.  

Policy number 5 will enable the local administrator the ability to change how windows updates interacts with the desktop, but the stake holders do not necessarily want the local user to change.  Log in in as the administrator is preferred.   the local user is an admin on the station.

Thanks,

Rick
0
Comment
Question by:RickArnold
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 25

Accepted Solution

by:
Lionel MM earned 2000 total points
ID: 40394316
I may not understand what you are saying but you do not want local users who logon to be able to run Windows updates, right? Yet you say local users are admin users--if that is the case you will then have to create a group to add the users to and then add that group to the Group policy and exclude them from that right
0
 

Author Closing Comment

by:RickArnold
ID: 40444636
Thanks very much I know it was not a sane question.
0

Featured Post

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

OfficeMate Freezes on login or does not load after login credentials are input.
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question