Secure Sockets Layer (SSL) is a standard security technology for establishing an encrypted link between a server and a client.
Before we proceed with these steps, please take a look at these articles below
– Configuring WSUS Email Notification to Work With Office365
– How to setup and configure Windows server update services (WSUS)
– Important Areas to Master on WSUS (Installed and not applicable, Install 1/4, and Installed / Not applicable 100)
– Targeting WSUS Client with the Registry keys: How to configure WSUS Clients to get Updates from the WSUS server using Registry settings
– How to apply Windows Updates from WSUS to the server using AWS RunCommand
– Handy WSUS Commands – Windows Server Update Services Commands, WAUACLT, PowerShell and USOClient
– How to Start, Stop and Restart Windows Server Update Services (WSUS) via PowerShell and CMD
– Windows Server Update Services: Windows 2016 Servers does not show up on WSUS console,
– WSUS clients appear and disappear from the WSUS Update Services console
From the Server Manager,
– Open IIS
- Click on the IIS Server Node:
- double click on the Server Certificate
Click on Import (and import the SSL certificate in .pfx format and enter the passwd)
Note: This should be replaced when expired to ensure connectivity between the upstream and downstream servers.
Note: The certificate of the certification authority (CA) must be imported into the local computer Trusted Root CA store, or the Windows Server Update Service Trusted Root CA store on downstream WSUS servers. if the certificate is only imported to the Local User Trusted Root CA store, the downstream WSUS server will not be authenticated on the upstream server.
Note: You must import the certificate to all computers that will communicate with the WSUS server. This includes all client computers, downstream servers, and computers that run the WSUS Administration Console. The certificate should be imported into the local computer Trusted Root CA store or into the Windows Server Update Service Trusted Root CA store.
We have to bind the SSL certificate to your network adapter.
- Expand your server, expand Sites, and select WSUS Administration
The binding windows opens,
Click on Edit and enter the host names (Select the cert for https)
Now enforce the SSL encryption on the following virtual roots listed below
Note: Ensure to repeat all steps for each directory listed below
Select the directory (virtual root) e.g ClientWebService and double click on SSL Settings
Check the require SSL and under Actions click on Apply
Let’s instruct WSUS to make use of SSL, and this can be done via the command line.
Navigate to the WSUS installation path C:Program FilesUpdate ServicesTools as shown below on your Server
Run the WsusUtil.exe as shown above followed by configuressl and the FQDN as shown below
The result would be this
Finally, restart the WSUS server to make sure all changes take effect. This should enable access to the WSUS management console if everything is okay.
Note: You can witness some weird issues after configuring SSL, simply use these link
wsusutil usecustomwebsite false
wsusutil usecustomwebsite true
C:Program FilesUpdate ServicesToolsWSUSutil usecustomwebsite false
- And rerun
C:Program FilesUpdate ServicesToolsWSUSutil usecustomwebsite True
Note: All your downstream servers will still be connected to the upstream using port 8531. Note you will have to have all the rules in place to allow this.
– And you can additionally reconfigure using the configuressl from this path C:Program FilesUpdate ServicesToolsWSUSutil
Note: You can set up your own CA: (Enterprise root CA). I hope you found this blog post helpful. If you have any questions, please let me know in the comment session.