Hello! To clarify your questions regarding patching 3rd party apps on Arc-enabled servers with Azure Update Management (AUM) using a local instance of WSUS: 1. WSUS can be standalone or managed by Configuration Manager (SUP role). As long as the WSUS server is properly configured and accessible by the Arc-enabled servers, you can use it for patching. 2. If the Arc-enabled servers are in a different forest than the WSUS server, it can still work as long as there is proper network connectivity and communication between the servers. The image you provided shows that you have set up the necessary communication ports (tcp/8530, 8531) and deployed the WSUS CA chain to the TRCA store on all Arc-enabled servers with GPO. However, if you are not seeing updates for WireShark after completing the assessment, there may be other factors to consider. If you are not seeing updates for WireShark after completing the assessment, it could be due to various reasons such as the updates not being approved in WSUS, the updates not being applicable to the specific server, or other configuration issues. I recommend checking the WSUS server logs, the update approval status, and ensuring that the updates are applicable to the Arc-enabled servers. If you need further assistance or clarification, please provide more details. As far as using WSUS with third party patches, check out this open source tool. WSUS Package Publisher from GitHub. Thank you.