Permissions

Applies to: Patch My PC Publisher

Overview

When publishing third-party updates through WSUS, correct permissions are critical. In standalone WSUS environments, Microsoft updates and third-party update binaries are both written to the WSUSContent directory, so administrators are typically already familiar with WSUS content storage.

In ConfigMgr environments, however, Microsoft update binaries are downloaded and stored directly in ConfigMgr deployment packages, and the WSUS content folder is primarily used for metadata. As a result, customers using a SUP may not have previously planned for WSUS content storage or permissions.

Third-party update content is written directly into the WSUS content folders, requiring WSUS to be able to create, modify, and serve update content without restriction. In environments where WSUS servers share a database, the WSUS content location must also be shared, and permissions must be carefully configured to ensure all WSUS instances can access the content reliably.

For third-party patching to function correctly, permissions must be aligned across:

  • WSUS content directories

  • IIS Content virtual directory authentication settings

Any misalignment between these components can result in publishing failures or clients being unable to download third-party updates.

WSUS Content Directory Permissions

The permissions required for third-party patching through WSUS depend heavily on where the WSUS content directory is located. WSUS supports storing content either locally on the WSUS server or on a remote file share, and the permission model differs significantly between these two scenarios.

Understanding the WSUS content location is essential, as this is where third-party update binaries are downloaded, staged, signed, and ultimately served to clients.

Determining the WSUS Content Location

Before validating permissions, you should first confirm where WSUS content is stored. There are two reliable ways to do this.

circle-check

Option 1: Registry

On the WSUS server, open Registry Editor and navigate to HKLM\SOFTWARE\Microsoft\Update Services\Server\Setup

The ContentDir value defines the root WSUS content path. This directory contains both:

  • WSUSContent

  • UpdateServicesPackages

WSUS ContentDir Value

Option 2: IIS (Content Virtual Directory)

You can also verify the content location in IIS Manager:

  1. Open IIS Manager

  2. Browse to Sites > WSUS Administration

  3. Select the Content virtual directory

  4. Open Basic Settings

The Physical path shown here maps directly to the WSUSContent directory on disk.

WSUS Content reference via IIS

Scenario 1: WSUS Content Stored Locally

When WSUS content is stored locally, the WSUS application pool identity (typically the Network Service) must have Full Control permissions on the WSUSContent and UpdateServicesPackages directories. These permissions may be granted directly on the folders or inherited from the WSUS content root, depending on how the server was configured.

circle-info

Note

If the ContentDir value is set to %ProgramFiles%\Update Services, this indicates that a custom WSUS content location was not specified during the WSUS configuration wizard. In this case, WSUS stores content on the system drive by default.

While this configuration can work in small or single-WSUS environments with sufficient free space on the system drive, it is generally sub-optimal for larger environments or for third-party patching scenarios where additional content is introduced. Storing WSUS content on the system drive can quickly consume disk space and complicate future scaling or maintenance.

The wsusutil movecontent command can be used to relocate the WSUS content directory to a dedicated drive or directory. Moving WSUS content off the system drive helps support better scalability, simplifies disk management, and makes it easier to share content if additional WSUS servers are introduced later.

For step-by-step guidance and important considerations when moving the WSUS content folder, see https://patchmypc.com/kb/how-move-wsus-content-folder/arrow-up-right

For guidance on recommended storage locations and disk space planning for third-party patching, see the Disk Space section later in this document.

In this scenario:

  • The WSUSContent and UpdateServicesPackages folders reside on a local volume.

  • The WSUS application pool identity (typically Network Service) has Full control to these folders.

  • Default NTFS permissions when the WSUS role is installed are usually sufficient.

Security permissions for local wsus content directory
circle-exclamation

Scenario 2: WSUS Content Stored Remotely (SMB Share)

When WSUS content is stored on a remote file share, or when WSUS content is shared between multiple WSUS servers in a shared database configuration, additional permission and configuration considerations apply.

In these scenarios, WSUS no longer accesses content as a local file system operation. Instead, all read and write activity typically occurs over SMB, which changes how identity and permissions are evaluated. Because the WSUS application pool runs under Network Service, access to remote content occurs using the computer account of the WSUS server.

  • If the WSUS server is remote from where the content is hosted, the computer account of that WSUS server must be granted appropriate permissions on both the SMB share and NTFS folder hosting the WSUS content.

  • If the WSUS server is also the server hosting the content and the content is accessed using a UNC path, the Network Service identity or the computer account must have appropriate permissions on both the SMB share and the underlying NTFS folders. Either is fine because when WSUS accesses content over a UNC path, the Network Service identity automatically authenticates as the WSUS server’s computer account. As a result, granting permissions to either Network Service or the computer account is functionally equivalent for SMB access.

Example

In the following example, a shared WSUS database is used, with WSUS content physically hosted on BB-CM1, while BB-APP1 acts as an additional WSUS server accessing that content remotely. Because the content is accessed via a UNC path, SMB permissions are always required. On the content-hosting server (BB-CM1), the WSUS application pool runs under Network Service, which performs local WSUS operations and accesses the content over SMB. When accessing a UNC path, Network Service authenticates as the WSUS server’s computer account, which is why granting permissions to either identity is functionally equivalent.

circle-info

Note

The image shows the Network Service (for BB-CM1) being granted the required SMB and NTFS permissions. It would be equally valid to grant these permissions to the computer account of BB-CM1 instead, as Network Service authenticates as the server’s computer account when accessing the content over a UNC path.

In addition, the computer account of the remote WSUS server (BB-APP1$) must be granted permissions, as it accesses the same content over SMB when serving clients. Granting permissions to the appropriate identities ensures that WSUS operations and content delivery function correctly across all WSUS servers participating in the shared database scenario.

SMB and NTFS Permission Considerations
circle-info

Note

Even in a single WSUS server environment, if WSUS content is stored on a remote UNC path, the computer account of the WSUS server must have permissions on both the SMB share and NTFS folders.

circle-check

Common Remote Content Misconfigurations

During the WSUS post installation process, when the WSUS content location is configured to use a UNC path, a known issue can cause the Physical Path for the Content virtual directory in IIS to be set incorrectly.

In this scenario, WSUS correctly stores the content location in the registry, for example \\FileServer\WSUS. However, the Content virtual directory in IIS may be configured without the required UNC prefix. As a result, the IIS path may appear as FileServer\WSUS\WSUSContent instead of the correct \\FileServer\WSUS\WSUSContent.

This mismatch can prevent clients and downstream systems from accessing WSUS content correctly, even though the registry configuration appears valid.

UNC Path Incomplete

When the WSUS Content virtual directory in IIS is misconfigured like this, third-party updates can still be published successfully, but clients will be unable to download the update content. In the example below a 404 is shown while attempting to download a third-party update (CAB file).

Last updated

Was this helpful?