First, I honestly don’t know which updates are all CBS and which are not. I 
know that Office updates are not CBS (as mentioned by the others). I don’t 
think .Net Framework in Win 7 are either although they are in Win 8 – not sure 
on this though as I haven’t explicitly looked. I don’t think there’s a 
comprehensive list anywhere either ☹

As for what servicing buys you over installation during a build and capture: 
Technically, not much except side-stepping the double-reboot issues (although 
I’ve heard this isn’t even the case). Servicing has the advantage that you can 
add updates not in WSUS though (like 2775511 among a few others) – you need to 
this servicing manually though with DISM. The other advantage to servicing is 
that you don’t have to re-run your build and capture TS to inject the new 
monthly updates assuming they are all CBS based.

If you are comparing servicing to deploy updates in a normal deployment ts, 
then I’d say a lot because you are deploying a completely unpatched image which 
to me is a huge security risk.

My normal thing to do is use manual servicing to inject non-WSUS updates (like 
2775511) and double-reboot updates into the base image and then use a build and 
capture TS to inject the rest and put any other polish on the image. Then, on a 
monthly basis, use servicing to inject new monthly updates. Then once every 6 
months (or so), re-run the build and capture TS to add all (even non-CBS) 
updates.

I guess you/I could simply add the manual servicing steps to the build and 
capture TS also but just haven’t done that.

There’s lots of middle ground and minor difference possible here also.

J

From: [email protected] [mailto:[email protected]] On 
Behalf Of Dwayne Allen
Sent: Wednesday, October 29, 2014 9:42 AM
To: [email protected]
Subject: Re: [mssms] RE: Patch/WIM Injection

But what does that buy you over having an apply software updates step in your 
task sequence?

-----
Dwayne Allen
[email protected]<mailto:[email protected]>
(479) 310-0027

On Wed, Oct 29, 2014 at 8:40 AM, Jason Wallace 
<[email protected]<mailto:[email protected]>> wrote:
They are deployed as the OS boots for the first time so from a security 
perspective it is better than having a vulnerable system on the LAN while 
updates are deployed.


On 29 Oct 2014, at 14:08, Bradley, Matt 
<[email protected]<mailto:[email protected]>> wrote:
When you say not all updates can be injected, do you mean things like Office 
updates, or are there others that a person would miss?

I also didn’t realize injecting the updates to the image didn’t actually 
install them.  If they are only the installed after an OSD, then I’m even more 
inclined not to inject.  I might image two PC’s as a test, one with the patches 
already installed, one with them injected, and see which one builds faster.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Jason Sandys
Sent: Tuesday, October 28, 2014 10:06 AM
To: [email protected]<mailto:[email protected]>
Subject: [mssms] RE: Patch/WIM Injection

First, not all updates can be injected into a WIM so even if you do employ 
image servicing, it is not sufficient to deploy a fully patched image. Thus, 
you really should be capturing a new image periodically no matter what – if you 
are using a build and capture task sequence (whether in MDT or ConfigMgr) then 
this is a trivial task (beware of the double reboots in ConfigMgr though ☹).

Offline servicing in ConfigMgr has had issues (not really ConfigMgr’s fault to 
my knowledge but that’s beside the point) and is why some/many people shy away 
from using image servicing. Also note that image servicing doesn’t actually 
install the updates. It merely injects them into the WIM for installation 
during Windows Setup so it really doesn’t save you as much as you think it does 
in terms of time or space.

J

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Bradley, Matt
Sent: Tuesday, October 28, 2014 9:55 AM
To: [email protected]<mailto:[email protected]>
Subject: [mssms] Patch/WIM Injection

I’ve read that some people do not like injecting monthly patches directly into 
the OS WIM.  Some prefer to just capture reference images.  Being that a bad 
patch could be removed from a WIM if it was determined to be bad, I’d like to 
hear some feedback on why some choose to still stay away from this method, and 
stay with reference image capture.

Thanks.







Reply via email to