Using WUA From a Remote Computer
The Windows Update Agent (WUA) API can be used by a user on a remote computer or by an application that is running on a remote computer. However, the remote user or application must have administrator privileges.
The following list contains interfaces that are available to remote users and applications:
- IUpdateSession
- IUpdateSession2
- IUpdateSearcher
- IAutomaticUpdates
- ISearchResult
- IUpdateCollection
- IUpdate
- IUpdate2
- IWindowsDriverUpdate
- IWindowsDriverUpdate2
- IUpdateIdentity
- IImageInformation
- IInstallationBehavior
- IStringCollection
- IUpdateHistoryEntryCollection
- IUpdateHistoryEntry
- ICategoryCollection
- ICategory
- IUpdateExceptionCollection
- IUpdateException
- IUpdateDownloadContentCollection
- IUpdateDownloadContent
- IUpdateServiceManager
- IUpdateServiceCollection
- IUpdateService
- IWindowsUpdateAgentInfo
The following list contains interfaces and properties that are not available to remote users and applications:
- IUpdateSession::CreateUpdateDownloader
- IUpdateSession::CreateUpdateInstaller
- WebProxy Property of IUpdateSession
- IUpdateSearcher::BeginSearch
- IUpdateSearcher::EndSearch
- IsHidden Property of IUpdate (IsHidden is read-only when it is called remotely.)
- IUpdate::AcceptEula
- IUpdate::CopyFromCache
- IUpdate2::CopyToCache
- IWindowsDriverUpdate2::CopyToCache
- IUpdateServiceManager::AddService
- IUpdateServiceManager::RegisterServiceWithAU
- IUpdateServiceManager::UnregisterServiceWithAU
- IAutomaticUpdate::Pause
- IAutomaticUpdates::Resume
- IAutomaticUpdates::ShowSettingsDialog
- Settings Property of IAutomaticUpdates
- ServiceEnabled Property of IAutomaticUpdates
- IAutomaticUpdates::EnableService
- ISystemInformation
The following ports and exceptions must be added to the Windows firewall settings for Windows Vista and Windows Server 2008 for the WUA API to be called remotely.
-
Exception 1
-
- Local port: 135
- Remote port: ALL
- Protocol number: 6
- Executable: %windir%\\system32\\svchost.exe
- Service: rpcss
- Remote privilege: Administrator
-
Exception 2
-
- Local port: Dynamic RPC
- Remote port: ALL
- Protocol number: 6
- Executable: %windir%\\system32\\dllhost.exe
- Remote privilege: Administrator
The following list contains tools that can be used to configure Windows Firewall settings:
- Windows Firewall with Advanced Security snap-in
- Group Policy
- Netsh advfirewall command-line tool
For more information about how to use tools to configure Windows Firewall settings, see Getting Started with Windows Firewall with Advanced Security.