Performing these updates will deliver a multitude of revisions to your computer, such as adding new features, removing outdated features, updating drivers, delivering bug fixes, and most importantly, fixing security holes that have been discovered.
A software vulnerability is usually a security hole or weakness found in an operating system or software program.
We all get them from time to time- those little windows that pop up, notifying us that there are software updates available for our computer.
Chances are, these always seem to present themselves right when we are in the middle of doing something seemingly important, so it’s all too convenient to click on that “Remind Me Later” button.
When synchronization is complete at each primary site or secondary site, a site-wide policy is created that provides to client computers the location of the software update points.
Updated: January 22, 2016Applies To: System Center 2012 Configuration Manager, System Center 2012 Configuration Manager SP1, System Center 2012 Configuration Manager SP2, System Center 2012 R2 Configuration Manager, System Center 2012 R2 Configuration Manager SP1The overall process for software updates in System Center 2012 Configuration Manager includes four main operational phases: synchronization, compliance assessment, deployment, and monitoring.
The synchronization phase is the process of synchronizing the software update metadata from Microsoft Update and inserting it into the site server database.
For more information about planning for software updates, see Planning for Software Updates in Configuration Manager.
For more information about configuring software updates, see Configuring Software Updates in Configuration Manager.