{"id":8375,"date":"2017-01-09T09:00:42","date_gmt":"2017-01-09T17:00:42","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/windowsserver\/?p=8375"},"modified":"2024-03-07T16:45:32","modified_gmt":"2024-03-08T00:45:32","slug":"why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/","title":{"rendered":"Why WSUS and SCCM managed clients are reaching out to Microsoft Online"},"content":{"rendered":"<p><em>This post was authored by Shadab Rasheed, Technical Advisor, Windows Devices &amp; Deployment\u00a0<\/em><\/p>\n<p>Of late, several customers have reached out to my team asking why their Windows 10 1511 and 1607 clients, which are managed by WSUS or SCCM are going online to Microsoft update to download updates. Not only the clients are\u00a0reaching out to external Microsoft URL, outside of the internal update endpoint, but they are downloading a significant amount of data from the Microsoft content delivery gateway.<\/p>\n<h2>So, what\u2019s exactly going on here?<\/h2>\n<p>There are essentially two different behaviors that is being experienced here. It is important that we understand and identify them instead of brushing them under the same stroke. I will try to add some important details to help you identify them.<\/p>\n<h2>OS impact: 1511 &amp; 1607<\/h2>\n<h3>Scenario 1<\/h3>\n<p>You have WSUS or SCCM to manage Windows update in the environment, but you observe that Windows 10 machines are going online to url &#8211; tlu.dl.delivery.mp.microsoft.com and are downloading updates.<\/p>\n<p>Here the concern could be two situations:<\/p>\n<p>A. Why is it reaching out to Microsoft url= tlu.dl.delivery.mp.microsoft.com despite WSUS endpoints provided through GPO?<\/p>\n<p>B. It is consuming a significant bandwidth towards this url.<\/p>\n<p>While both these scenarios are interconnected, if you are observing Scenario A then you may also report Scenario B.<\/p>\n<h2>What is happening here?<\/h2>\n<h3>Scenario A + B<\/h3>\n<p>Delivery optimization (DO) was introduced in TH2, but it was only used for downloads of large content. DO in 1511 build is used in about 50% of the downloads, and when DO isn\u2019t used the download switches to BITS. From 1607 build onwards, it is the default downloader for Windows Update and Windows Store content.<\/p>\n<p>While system specific updates will still reach out to WSUS or SCCM, or against Microsoft Update if the machine is configured to use Microsoft Update instead of Windows Update, the Store App updates are not yet cached or supported on WSUS or SCCM yet.<\/p>\n<p>So actually, the machine is going out to url- tlu.dl.delivery.mp.microsoft.com only to update the Windows Store Apps. There is no set timeline for the release of the store App updates, unlike patch Tuesdays. Each app update is released almost weekly and could be on different days.<\/p>\n<p>So, what you are is experiencing is by-design behavior.<\/p>\n<h3>Scenario B<\/h3>\n<p>One of the main reasons why you may be experiencing a significant bandwidth consumption is because of the Proxy configuration. We recommend that you refer to <a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/3175743\">https:\/\/support.microsoft.com\/en-us\/kb\/3175743<\/a>. The requirement is that your proxy server should support byte-range requests.<\/p>\n<p>If it does, then you need to apply a rule to permit HTTP RANGE requests for the following URLs:<\/p>\n<p>*.download.windowsupdate.com<\/p>\n<p>*.au.windowsupdate.com<\/p>\n<p>*.tlu.dl.delivery.mp.microsoft.com<\/p>\n<h2>How will it help?<\/h2>\n<p>Most of the customers may already have included the first two URLs but may not be aware of the 3rd URL, which is the CDN for Store App updates. In the absence byte-range inclusion, the store app update is not downloaded as delta and instead the entire payload is downloaded which, needless to say, it will be bigger in size. Thus, consuming more bandwidth when downloading the store app updates.<\/p>\n<p>We also recommend you to apply GPO for DO to use over LAN-in which case the clients will establish peer to peer connection and download already cached content.<\/p>\n<p>Learn more about <a href=\"https:\/\/blogs.technet.microsoft.com\/mniehaus\/2016\/08\/16\/windows-10-delivery-optimization-and-wsus-take-2\/\" target=\"_blank\" rel=\"noopener\">Windows 10, Delivery Optimization, and WSUS<\/a>.<\/p>\n<p>Learn more about policy updated for DO in <a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/3088114\" target=\"_blank\" rel=\"noopener\">TH2<\/a> and <a href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/manage\/waas-delivery-optimization\" target=\"_blank\" rel=\"noopener\">RS1<\/a>.<\/p>\n<p>As you figured out we didn\u2019t recommend disabling the Store itself to prevent the store app updates download since it breaks the entire store and makes it inaccessible for the clients. Also, if a machine has already queued for an app update, it doesn\u2019t cancel the existing download. However, it may help in mitigating new clients not reaching out for Store app updates. Thus, we don\u2019t recommend it.<\/p>\n<p>The app update has to be cancelled from the Store itself or using wsreset.exe from Run.<\/p>\n<p>Refer to the Windows Update logs after you have decoded the etl. Look for following entries:<\/p>\n<pre>11\/17\/2016 08:48:39.74543 AM 6440  6536  downloadjob_cpp183             [ComApi] * START *   Download ClientId = WSAutoUpdate\r\n\r\n11\/17\/2016 08:48:39.74543 AM 6440  6536  downloadjob_cpp186             [ComApi] Flags: 0X302; Download priority: 3; Network Cost Policy: 0\r\n\r\n11\/17\/2016 08:48:41.46862 AM 816   7568  downloadmanager_cpp19049       [DownloadManager] BITS job {EAEFD6D9-9143-42CD-8CE7-D126152AD743} hit a transient error, updateId = {FF39AB78-CBBF-4F6F-84F5-FCE88A67260B}.1, error = 0x80200056\r\n\r\n11\/17\/2016 08:48:41.46882 AM 816   7568  downloadmanager_cpp19059       [DownloadManager] File: https:\/\/2.tlu.dl.delivery.mp.microsoft.com\/filestreamingservice\/files\/3f93f3a8-59bb-497c-96d6-fceab9e53b99?P1=1479373825&amp;P2=301&amp;P3=2&amp;P4=c0yzfIEEswvsym8OSjwcei83366u7NOp7GMfPOt2ccc%3d\r\n\r\n11\/17\/2016 08:48:41.60514 AM 816   6432  downloadmanager_cpp14250       [DownloadManager] Updates to download = 1\r\n\r\n11\/17\/2016 08:48:41.60514 AM 816   6432  susupdateinfo_cpp121           [Agent]   Title = Windows Calculator\r\n\r\n11\/17\/2016 08:48:41.60514 AM 816   6432  susupdateinfo_cpp11            [Agent]   UpdateId = 7DD40C91-F143-4628-A87A-3B29D4199C64.1\r\n\r\n11\/17\/2016 08:48:41.60515 AM 816   6432  susupdateinfo_cpp15            [Agent]     Bundles 2 updates:<\/pre>\n<h3>Scenario 2<\/h3>\n<p>You have WSUS or SCCM configured to manage Windows Update in the environment, but you observe that Windows 10 machines are reaching online to get updates including<strong> system updates<\/strong>.<\/p>\n<p>For example, look at this log snippet:<\/p>\n<pre>11\/18\/2016 09:13:09.18706 AM 936   16068 service_cpp393                 [Shared] * START * Service startup\r\n\r\n11\/18\/2016 09:13:09.19555 AM 936   16068 susclientglobal_cpp67          [Agent] WU client version 10.0.14393.351\r\n\r\n11\/18\/2016 09:13:09.19571 AM 936   16068 sleepstudytracker_cpp162       [Agent] SleepStudyTracker: Machine is non-AOAC. Sleep study tracker disabled.\r\n\r\n11\/18\/2016 09:13:09.19576 AM 936   16068 susclientglobal_cpp115         [Agent] Base directory: C:\\WINDOWS\\SoftwareDistribution\r\n\r\n11\/18\/2016 09:13:09.19604 AM 936   16068 dscore_cpp1033                 [Agent] Datastore directory: C:\\WINDOWS\\SoftwareDistribution\\DataStore\\DataStore.edb\r\n\r\n11\/18\/2016 09:13:09.21624 AM 936   1840  settingcache_cpp191            [Agent] Initializing global settings cache\r\n\r\n11\/18\/2016 09:13:09.21624 AM 936   1840  settingcache_cpp192            [Agent] WSUS server: https:\/\/wsus.contoso.com\r\n\r\n11\/18\/2016 09:13:09.21624 AM 936   1840  settingcache_cpp194            [Agent] WSUS status server: https:\/\/wsus.contoso.com\r\n\r\n11\/18\/2016 09:13:09.21624 AM 936   1840  settingcache_cpp196            [Agent] Target group: (Unassigned Computers)\r\n\r\n11\/18\/2016 09:13:09.21624 AM 936   1840  settingcache_cpp200            [Agent] Windows Update access disabled: No\r\n\r\n11\/18\/2016 09:13:09.22079 AM 936   16068 agent_cpp142                   [Agent] Initializing Windows Update Agent\r\n\r\n11\/18\/2016 09:13:09.22085 AM 936   16068 downloadmanager_cpp13864       [DownloadManager] Download manager restoring 0 downloads\r\n\r\n11\/18\/2016 09:13:09.22220 AM 13660 520   discoveryjob_cpp36             [ComApi] *QUEUED* SLS Discovery\r\n\r\n11\/18\/2016 09:13:09.25741 AM 936   4988  downloadmanager_cpp9702        [DownloadManager] PurgeExpiredUpdates::Found 650 non expired updates.\r\n\r\n11\/18\/2016 09:13:09.33071 AM 936   12612 slsclient_cpp413               [SLS] Retrieving SLS response from server using ETAG \"ltWsyjl36fnzgR4MZLDNwWkS+BpTJFrLWZwzas2Z+9Y=_1440\"...\r\n\r\n11\/18\/2016 09:13:09.33097 AM 936   12612 slsdownloader_cpp156           [SLS] Making request with URL HTTPS:\/\/sls.update.microsoft.com\/SLS\/{9482F4B4-E343-43B6-B170-9A65BC822C77}\/x64\/10.0.14393.0\/0?CH=448&amp;L=en-US&amp;P=&amp;PT=0x4&amp;WUA=10.0.14393.351\r\n\r\n11\/18\/2016 09:13:09.33179 AM 13660 9700  discoveryjob_cpp150            [ComApi] *RESUMED* Discovery\r\n\r\n11\/18\/2016 09:13:09.33184 AM 13660 9700  discoveryjob_cpp208            [Api] * END *   Discovery ClientId<\/pre>\n<p>Point to note: If you didn\u2019t try to scan it against Microsoft Online manually, then why did it try to establish connection with *.update.microsoft.com although WSUS endpoint is in place.<\/p>\n<h2>What you need to check?<\/h2>\n<p>Check the Windows Update Group policies and ensure that none of these policies are configured (Enabled or Disabled).<\/p>\n<p><a href=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2017\/01\/Image1_thumb.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px\" title=\"Image1\" src=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2017\/01\/Image1_thumb.jpg\" alt=\"Image1\" width=\"1774\" height=\"414\" border=\"0\" \/><\/a><\/p>\n<p>Ensure that the registry <strong>HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate<\/strong> doesn\u2019t reflect any of these values.<\/p>\n<ul>\n<li>DeferFeatureUpdate<\/li>\n<li>DeferFeatureUpdatePeriodInDays<\/li>\n<li>DeferQualityUpdate<\/li>\n<li>DeferQualityUpdatePeriodInDays<\/li>\n<li>PauseFeatureUpdate<\/li>\n<li>PauseQualityUpdate<\/li>\n<li>DeferUpgrade<\/li>\n<li>ExcludeWUDriversInQualityUpdate<\/li>\n<\/ul>\n<h2>What just happened here? Aren\u2019t these update or upgrade deferral policies?<\/h2>\n<p>Not in a managed environment. These policies are meant for <a href=\"https:\/\/blogs.msdn.microsoft.com\/beanexpert\/2015\/11\/15\/windows-update-for-business-explained\/\" target=\"_blank\" rel=\"noopener\">Windows Update for Business<\/a> (WUfB). Learn more about <a href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/manage\/waas-manage-updates-wufb\" target=\"_blank\" rel=\"noopener\">Windows Update for Business<\/a>.<\/p>\n<p>Windows Update for Business aka WUfB enables information technology administrators to keep the Windows 10 devices in their organization always up to date with the latest security defenses and Windows features <strong>by directly connecting these systems to Windows Update service<\/strong>.<\/p>\n<p><strong>We also recommend that you do not use these new settings with WSUS\/SCCM.<\/strong><\/p>\n<p>If you are already using an on-prem solution to manage Windows updates\/upgrades, using the new WUfB settings will enable your clients to also reach out to Microsoft Update online to fetch update bypassing your WSUS\/SCCM end-point.<\/p>\n<p><u>To manage updates, you have two solutions:<\/u><\/p>\n<ul>\n<li>Use WSUS (or SCCM) and manage how and when you want to deploy updates and upgrades to Windows 10 computers in your environment (in your intranet).<\/li>\n<li>Use the new WUfB settings to manage how and when you want to deploy updates and upgrades to Windows 10 computers in your environment directly connecting to Windows Update.<\/li>\n<\/ul>\n<p>So, the moment any one of these policies are configured, even if these are set to be \u201cdisabled\u201d, a new behavior known as Dual Scan is invoked in the Windows Update agent.<\/p>\n<p>When Dual Scan is engaged, the following change in client behavior occur:<\/p>\n<ul>\n<li>Whenever Automatic Updates scans for updates against the WSUS or SCCM server, it also scans against Windows Update, or against Microsoft Update if the machine is configured to use Microsoft Update instead of Windows Update. It processes any updates it finds, subject to the deferral\/pausing policies mentioned above.<\/li>\n<\/ul>\n<p>Some Windows Update GPOs that can be configured to better manage the Windows Update agent. I recommend you test them in your environment.<\/p>\n<p><a href=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2017\/01\/Image2_thumb.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"padding-top: 0px;padding-left: 0px;padding-right: 0px;border-width: 0px\" title=\"Image2\" src=\"https:\/\/cloudblogs.microsoft.com\/wp-content\/uploads\/2017\/01\/Image2_thumb.jpg\" alt=\"Image2\" width=\"1637\" height=\"839\" border=\"0\" \/><\/a><\/p>\n<p>[HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate]<\/p>\n<p>&#8220;DoNotConnectToWindowsUpdateInternetLocations&#8221;=dword:00000001<\/p>\n<p>[HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU]<\/p>\n<p>&#8220;NoAutoUpdate&#8221;=dword:00000001<\/p>\n<p>&#8220;UseWUServer&#8221;=dword:00000001<\/p>\n<h2>In GPO<\/h2>\n<p><strong>Windows Components\/Windows Update<\/strong><\/p>\n<p>Configure Automatic Updates: Disabled<\/p>\n<p>Do not connect to any Windows Update Internet locations: Enabled<\/p>\n<p>Specify intranet Microsoft update service location: Enabled<\/p>\n<p>WSUS Endpoints<\/p>\n<h2>More information<\/h2>\n<p>Delivery Optimization is integrated with and builds on the existing security measures in Windows Update and Windows Store to ensure a highly secure download system.<\/p>\n<p>Delivery Optimization ensures that your PC only downloads trusted OS updates and apps from Windows Update and Windows Store.<\/p>\n<p>Delivery Optimization does not use broadcast messages like BranchCache. Instead it uses a cloud service for peer discovery and peer management.<\/p>\n<p>This means that client \u2013 service calls (HTTPS) to *.do.dsp.mp.microsoft.com need to be allowed for DO to work (even if you\u2019re restricting DO to use the local network \/ LAN option).<\/p>\n<p>DO uses TCP port 7680 to listen for incoming connections from peers.<\/p>\n<p>3544 is a Teredo port that DO uses for NAT traversal which is used for Internet peers or if Group DownloadMode is enabled (for peering across NATs).<\/p>\n<p>Get more information on <a href=\"https:\/\/aka.ms\/waas-do\" target=\"_blank\" rel=\"noopener\">Group mode and Bypass mode<\/a>.<\/p>\n<p>I hope this information helps you to understand and appropriately plan your patching configurations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of late, several customers have reached out to my team asking why their Windows 10 1511 and 1607 clients, which are managed by WSUS or SCCM are going online to Microsoft update to download updates.<\/p>\n","protected":false},"author":685,"featured_media":20679,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msxcm_post_with_no_image":false,"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"post_tag":[],"product":[],"content-type":[964],"solution":[952],"coauthors":[926],"class_list":["post-8375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-updates","solution-server-management","review-flag-1593580361-475","review-flag-1593580427-982","review-flag-1593580414-127","review-flag-1593580409-206","review-flag-1593580418-473","review-flag-1-1593580431-223","review-flag-2-1593580436-936","review-flag-3-1593580441-66","review-flag-bundl-1593580259-422","review-flag-new-1593580246-692"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why WSUS and SCCM managed clients are reaching out to Microsoft Online | Microsoft Windows Server Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why WSUS and SCCM managed clients are reaching out to Microsoft Online | Microsoft Windows Server Blog\" \/>\n<meta property=\"og:description\" content=\"Of late, several customers have reached out to my team asking why their Windows 10 1511 and 1607 clients, which are managed by WSUS or SCCM are going online to Microsoft update to download updates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Windows Server Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WindowsServer\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-09T17:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T00:45:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Windows Server Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@WindowsServer\" \/>\n<meta name=\"twitter:site\" content=\"@WindowsServer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Windows Server Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/author\/microsoft-windows-server-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Windows Server Team\"}],\"headline\":\"Why WSUS and SCCM managed clients are reaching out to Microsoft Online\",\"datePublished\":\"2017-01-09T17:00:42+00:00\",\"dateModified\":\"2024-03-08T00:45:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/\"},\"wordCount\":1330,\"commentCount\":16,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.webp\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/\",\"name\":\"Why WSUS and SCCM managed clients are reaching out to Microsoft Online | Microsoft Windows Server Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.webp\",\"datePublished\":\"2017-01-09T17:00:42+00:00\",\"dateModified\":\"2024-03-08T00:45:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.webp\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.webp\",\"width\":1170,\"height\":640,\"caption\":\"background pattern\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why WSUS and SCCM managed clients are reaching out to Microsoft Online\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/\",\"name\":\"Microsoft Windows Server Blog\",\"description\":\"Your Guide to the Latest Windows Server Product Information\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#organization\",\"name\":\"Microsoft Windows Server Blog\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":1,\"height\":1,\"caption\":\"Microsoft Windows Server Blog\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WindowsServer\",\"https:\/\/x.com\/WindowsServer\",\"https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/\",\"https:\/\/www.youtube.com\/user\/MSCloudOS\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why WSUS and SCCM managed clients are reaching out to Microsoft Online | Microsoft Windows Server Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/","og_locale":"en_US","og_type":"article","og_title":"Why WSUS and SCCM managed clients are reaching out to Microsoft Online | Microsoft Windows Server Blog","og_description":"Of late, several customers have reached out to my team asking why their Windows 10 1511 and 1607 clients, which are managed by WSUS or SCCM are going online to Microsoft update to download updates.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/","og_site_name":"Microsoft Windows Server Blog","article_publisher":"https:\/\/www.facebook.com\/WindowsServer","article_published_time":"2017-01-09T17:00:42+00:00","article_modified_time":"2024-03-08T00:45:32+00:00","og_image":[{"width":1170,"height":640,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.png","type":"image\/png"}],"author":"Microsoft Windows Server Team","twitter_card":"summary_large_image","twitter_creator":"@WindowsServer","twitter_site":"@WindowsServer","twitter_misc":{"Written by":"Microsoft Windows Server Team","Est. reading time":"7 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/author\/microsoft-windows-server-team\/","@type":"Person","@name":"Microsoft Windows Server Team"}],"headline":"Why WSUS and SCCM managed clients are reaching out to Microsoft Online","datePublished":"2017-01-09T17:00:42+00:00","dateModified":"2024-03-08T00:45:32+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/"},"wordCount":1330,"commentCount":16,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.webp","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/","name":"Why WSUS and SCCM managed clients are reaching out to Microsoft Online | Microsoft Windows Server Blog","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.webp","datePublished":"2017-01-09T17:00:42+00:00","dateModified":"2024-03-08T00:45:32+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.webp","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2024\/03\/Windows-Server-brand-gradient-3.webp","width":1170,"height":640,"caption":"background pattern"},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/2017\/01\/09\/why-wsus-and-sccm-managed-clients-are-reaching-out-to-microsoft-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/"},{"@type":"ListItem","position":2,"name":"Why WSUS and SCCM managed clients are reaching out to Microsoft Online"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/","name":"Microsoft Windows Server Blog","description":"Your Guide to the Latest Windows Server Product Information","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#organization","name":"Microsoft Windows Server Blog","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":1,"height":1,"caption":"Microsoft Windows Server Blog"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WindowsServer","https:\/\/x.com\/WindowsServer","https:\/\/www.linkedin.com\/showcase\/microsoft-cloud-platform\/","https:\/\/www.youtube.com\/user\/MSCloudOS"]}]}},"word_count":1622,"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Windows Server Blog","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/posts\/8375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/users\/685"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/comments?post=8375"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/posts\/8375\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/media\/20679"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/media?parent=8375"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/post_tag?post=8375"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/product?post=8375"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/content-type?post=8375"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/solution?post=8375"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/windows-server\/blog\/wp-json\/wp\/v2\/coauthors?post=8375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}