Skip to content

Commit 8db5125

Browse files
authored
Merge pull request #6549 from mestew/2111-certpinningcmg-12590425
2111-certpinningcmg-12590425
2 parents 88e42db + 84a32cc commit 8db5125

1 file changed

Lines changed: 4 additions & 2 deletions

File tree

memdocs/configmgr/sum/get-started/software-update-point-ssl.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Tutorial - Configure Windows Server Update Services (WSUS) servers
55
author: mestew
66
ms.author: mstewart
77
manager: dougeby
8-
ms.date: 04/05/2021
8+
ms.date: 01/14/2022
99
ms.topic: tutorial
1010
ms.prod: configuration-manager
1111
ms.technology: configmgr-sum
@@ -289,11 +289,13 @@ Starting in Configuration Manager 2103, you can further increase the security of
289289
- Configuration Manager version 2103
290290
- Ensure your WSUS servers and software update points are configured to use TLS/SSL
291291
- Add the certificates for your WSUS servers to the new `WindowsServerUpdateServices` certificate store on your clients
292+
- When using certificate pinning with a cloud management gateway (CMG), the `WindowsServerUpdateServices` store needs the CMG certificate. If clients switch from internet to VPN both the CMG and WSUS server certificates are needed in the `WindowsServerUpdateServices` store. <!--12590425-->
292293

293294
> [!Note]
294295
> Software update scans for devices will continue to run successfully using the default value of **Yes** for the **Enforce TLS certificate pinning for Windows Update client for detecting updates** client setting. This includes scans over both HTTP and HTTPS. The certificate pinning doesn't take effect until a certificate is in the client's `WindowsServerUpdateServices` store and the WSUS server is configured to use TLS/SSL.
295296
296297

298+
297299
### Enable or disable TLS certificate pinning for devices scanning HTTPS-configured WSUS servers
298300

299301
1. From the Configuration Manager console, go to **Administration** > **Client Settings**.
@@ -306,4 +308,4 @@ Starting in Configuration Manager 2103, you can further increase the security of
306308

307309
## Next steps
308310

309-
[Deploy software updates](../deploy-use/deploy-software-updates.md)
311+
[Deploy software updates](../deploy-use/deploy-software-updates.md)

0 commit comments

Comments
 (0)