SSL Stands for the secure sockets layer and it is a standard security technology for establishing an encrypted link between a server and a client. SSL and its successor, Transport Layer Security (TLS), are protocols for establishing authenticated and encrypted links between networked computers. Although the SSL protocol was deprecated with the release of TLS 1.0, it is still common to refer to these related technologies as “SSL” or “SSL/TLS.” See the following guides for some related articles I have written. Configuring WSUS Email Notification to Work With Office365, How to setup and configure Windows server update services (WSUS), important Areas to Master on WSUS (Installed and not applicable, Install 1/4, and Installed / Not applicable 100).
Before we proceed with these steps, please take a look at the articles below. - Targeting WSUS Client with the Registry keys: How to configure WSUS Clients to get Updates from the WSUS server using Registry settings and how to apply Windows Updates from WSUS to the server using AWS RunCommand and some very handy WSUS Commands "Windows Server Update Services Commands, WAUACLT, PowerShell and USOClient ".
From the Server Manager,
– Open IIS
– Click on the IIS Server Node:
– Double click on the Server Certificate
Click on Import (and import the SSL certificate in .pfx format and enter the passwd)
Note: This should be replaced when expired to ensure connectivity between the upstream and downstream servers.
Note: The certificate of the certification authority (CA) must be imported into the local computer Trusted Root CA store, or the Windows Server Update Service Trusted Root CA store on downstream WSUS servers. if the certificate is only imported to the Local User Trusted Root CA store, the downstream WSUS server will not be authenticated on the upstream server.
Note: You must import the certificate to all computers that will communicate with the WSUS server. This includes all client computers, downstream servers, and computers that run the WSUS Administration Console. The certificate should be imported into the local computer Trusted Root CA store or into the Windows Server Update Service Trusted Root CA store. See the following link for how to configure WSUS.
We have to bind the SSL certificate to your network adapter.
– Expand your server, expand Sites, and select WSUS Administration
The binding windows opens,
– Click on Edit and enter the host names (Select the cert for https)
Now enforce the SSL encryption on the following virtual roots listed below
Note: Ensure to repeat all steps for each directory listed below
Select the directory (virtual root) e.g ClientWebService and double click on SSL Settings
Check the require SSL and under Actions click on Apply
Let’s instruct WSUS to make use of SSL, and this can be done via the command line.
Navigate to the WSUS installation path C:Program FilesUpdate ServicesTools as shown below on your Server
Run the WsusUtil.exe as shown above followed by configuressl and the FQDN as shown below
The result would be this
Finally, restart the WSUS server to make sure all changes take effect. This should enable access to the WSUS management console if everything is okay. See the following guide for some related WSUS contents “how to Start, Stop and Restart Windows Server Update Services (WSUS) via PowerShell and CMD, Windows Server Update Services: Windows 2016 Servers does not show up on the WSUS console, and
– WSUS clients appear and disappear from the WSUS Update Services console“.
Note: You can witness some weird issues after configuring SSL, simply use these link
wsusutil usecustomwebsite false
wsusutil usecustomwebsite true
C:Program FilesUpdate ServicesToolsWSUSutil usecustomwebsite false
– And rerun
C:Program FilesUpdate ServicesToolsWSUSutil usecustomwebsite True
Note: All your downstream servers will still be connected to the upstream using port 8531. Note you will have to have all the rules in place to allow this. And you can additionally reconfigure using the configure SSL from this path. See the following link1 and link2 for more information.
C:Program FilesUpdate ServicesToolsWSUSutil
Note: You can set up your own CA: (Enterprise root CA). For the steps, to set up an enterprise root CA, follow these steps in this link.
I hope you found this blog post helpful. If you have any questions, please let me know in the comment session.