Configure Software Update Point to use SSL in SCCM

Configure Software Update Point to use SSL in SCCM

Last Updated

September 5, 2025

Posted In

In this guide, I will show you how to configure Software Update Point to use SSL in SCCM. When you setup WSUS servers and their associated SUP servers to use SSL, it enhances security by minimizing the risk of remote attacks that could compromise client systems or lead to privilege escalation.

In Configuration Manager, the SUP site system role is always installed on a server that has the WSUS role installed. The Software Update Point (SUP) role integrates with WSUS to manage synchronization settings, including product categories, update classifications, and supported languages. The end goal is to deploy software updates to clients with SCCM.

When you have a WSUS running on a remote server, you can secure the traffic between the SCCM and remote WSUS server by enabling SSL and thereby encrypting the traffic. In short, we’ll configure our software update point to require SSL communication to the WSUS server.

Install and Update Third Party Applications with Patch My PC
Install and Update Third Party Applications with Patch My PC

In one of my guides, I covered the implementation of PKI certificates for SCCM infrastructure. If you haven’t configured PKI certificates yet, these guides will assist you and they also include the installation process for setting up an Enterprise Root Certificate Authority for your organization.

Prerequisites

Make sure the following requirements are in-place for setting up your SUP in SSL:

  1. A WSUS server with the software update point role installed.
  2. A security group in AD containing all of your WSUS servers.
  3. Access required to Certificate Authority to generate certificates.
  4. A working PKI certificate is already in the WSUS server’s Personal certificate store. If not, you can create one with the steps covered in this guide.
  5. The ability to request and obtain an appropriate PKI certificate for the WSUS server from your Enterprise root certificate authority (CA).
  6. Full administrator role permissions for SCCM.

Steps to Configure Software Update Point to use SSL

After going through the prerequisites, let’s proceed with the steps to configure Software Update Point to use SSL in SCCM. This process includes creating a web server certificate template for WSUS, enrolling the certificate on the SUP (WSUS) server, and finally setting up SUP to operate in SSL mode. I have broken down the entire process into individual steps which makes it easy to follow.

Step 1: Create SSL Certificate Template for SUP/WSUS

To enable SSL communication for WSUS/SUP servers, a certificate template needs to be generated and issued from within the Certificate Authority. Launch the Certificate Authority and right-click Certificate Templates and select Manage.

Create SSL Certificate for SUP WSUS
Create SSL Certificate Template for SUP/WSUS

In the Certificate Templates console, right-click Web Server and select Duplicate Template.

Create SSL Certificate for SUP WSUS
Web Server – Duplicate Template

In the General tab of the certificate template, specify the template display name and set the certificate validity period.

Create SSL Certificate for SUP WSUS
Configure the Template Name and validity

In the Compatibility tab, make sure the following compatibility selections are enabled:

  • Certification Authority: Windows Server 2003
  • Certificate recipient: Windows XP/Server 2003

Click Apply.

SSL Certificate compatibility
SSL Certificate compatibility

Select the Request Handling tab and checkbox “Allow private key to be exported“.

Certificate Request Handling
Certificate Request Handling

Head to the Security tab and here you can remove the Enroll permissions for the Enterprise Admins group. Click Apply when you make the changes.

Setup SUP SSL Certificate Security permissions
Setup SUP SSL Certificate Security permissions

Navigate to the Security tab, click Add, select the group associated with WSUS/SUP servers, and assign Enroll and Read permissions to this group. Click Apply and OK.

Close the certificate templates console.

Setup SUP SSL Certificate access permissions
Setup SUP SSL Certificate access permissions

Step 2: Issue the Certificate Template

The certificate template configured for SUP/WSUS in the previous step is now ready to be issued. It must be issued before it can be enrolled on your WSUS servers. In the Certificate Authority console, right-click Certificate Templates and select Certificate Template to Issue.

Issue the WSUS SUP Certificate Template
Issue the WSUS SUP Certificate Template

Now select your WSUS SSL certificate template that you created in Step 1. Click OK.

Issue the WSUS SUP Certificate Template
Issue the WSUS SUP Certificate Template

Step 3: Request and enroll the SSL Certificate on SUP/WSUS Server

In this step, I will show you how to request the SSL certificate on servers running WSUS/SUP roles. Sign in to the WSUS/SUP server and launch the Certificates console by running certlm.msc command. In the certificates console, go to Personal > Certificates. Right-click and select Request New Certificate.

Request the SSL Certificate on SUP/WSUS Server
Request the SSL Certificate on SUP/WSUS Server

We’ll now go through the certificate enrollment process. In the Request Certificates window, select the SSL certificate you created for WSUS/SUP and click on More information is required to enroll for this certificate.

Select WSUS Web Server Certificate
Select WSUS Web Server Certificate

In the Certificate Properties window, navigate to the Subject tab. Within the Alternative Name section, select the Type as DNS and enter the FQDN of your WSUS/SUP server. Click the Add button to see the entries below DNS. Click Apply.

Configure WSUS Web Server Certificate
Configure WSUS Web Server Certificate

Switch to the General tab and set the value to a descriptive name to help you identify the certificate later. Click OK and Apply.

Specify Friendly Name for Certificate
Specify Friendly Name for Certificate

Select Enroll then Finish to complete the enrollment. The certificate is now found in the WSUS server’s personal certificate store.

Enroll SSL Certificate for WSUS SUP Server
Enroll SSL Certificate for WSUS SUP Server

Step 4: Bind the SSL certificate to the WSUS Administration site

Once you have the SSL certificate in the WSUS server’s personal certificate store, the next step is to bind it to the WSUS Administration site in IIS. To configure the IIS bindings for WSUS, follow the below steps.

On the WSUS server, open Internet Information Services (IIS) Manager. Go to Sites > WSUS Administration. Select Edit Bindings from either the action menu or by right-clicking on the site.

Bind the SSL certificate to the WSUS Administration site
Bind the SSL certificate to the WSUS Administration site

In the Site Bindings window, select HTTPS and click Edit. Under the SSL certificate option, choose the SSL certificate to bind to the WSUS Administration site. The certificate’s friendly name is shown in the drop-down menu.

Select OK when you’re done, then Close to exit the site bindings.

Note: At this point, don’t remove the HTTP site binding. WSUS uses HTTP for the update content files.

Configure the IIS bindings for WSUS
Configure the IIS bindings for WSUS

Step 5: Configure the WSUS web services to require SSL

In this step, we will enable SSL enforcement for web services hosted on the WSUS server, ensuring all WSUS web service communications are securely transmitted using SSL.

In IIS Manager on the WSUS server, go to Sites > WSUS Administration. Expand the WSUS Administration site to see the list of web services and virtual directories for WSUS.

For each of the below WSUS web services, go to the SSL settings and enable the “Require SSL” option.

  • ApiRemoting30
  • ClientWebService
  • DSSAuthWebService
  • ServerSyncWebService
  • SimpleAuthWebService

For example, select the ApiRemoting30 web service and select SSL Settings as shown in the below screenshot.

Configure the WSUS web services to require SSL
Configure the WSUS web services to require SSL

On the SSL settings page, enable the Require SSL option. Verify the Client certificates option is set to Ignore. Select Apply.

Configure the WSUS web services to require SSL
Configure the WSUS web services to require SSL

Once you have completed the above procedure for all the web services, close the WSUS admin console.

Step 6: Configure the WSUS to use SSL

After configuring the web services to require SSL, we will now configure the WSUS to use SSL.

  1. On the WSUS server, launch the command prompt as administrator.
  2. Change the directory to the tools folder for WSUS: cd "c:\Program Files\Update Services\Tools"
  3. Configure WSUS to use SSL with the following command (Enter the FQDN of the WSUS server)
WsusUtil.exe configuressl WSUS_SERVER_FQDN

After running the above command, notice that the WsusUtil returns the URL of the WSUS server with the port number specified at the end. In the below example its 8531.

Configure the WSUS to use SSL
Configure the WSUS to use SSL

Step 7: Verify the WSUS console can connect using SSL

The WSUS console connects through the ApiRemoting30 web service. In this step, I will demonstrate how to confirm the functionality of the WSUS admin console by establishing an SSL connection to the WSUS server’s ApiRemoting30 web service via port 8531.

Open the WSUS console and select Action > Connect to Server. Enter the FQDN of the WSUS server for the Server name option. Choose the port number as 8531. The Use Secure Sockets Layer (SSL) to connect to this server option is automatically enabled when either 8531 (default) or 443 are chosen.

Click the connect button and you should now have access to the WSUS and its settings. If you see errors here, go back to step 4,5,6 and check if you have followed the procedure correctly.

Verify the WSUS console can connect using SSL
Verify the WSUS console can connect using SSL

Step 8: Verify the site server can sync updates

In this step, we will check if the site server can synchronize the updates after SUP is set to use SSL. In the SCCM console, go to Software Library > Overview > Software Updates > All Software Updates. From the ribbon, select Synchronize Software Updates. Select Yes when asked if you want to initiate a site-wide synchronization for software updates.

SUP SSL - Verify the site server can sync updates
Software Update Point SSL – Verify the site server can sync updates

Open the wsyncmgr.log for the site and you should find the similar entries as listed below. This confirms that site server can sync updates correctly after the SUP is configured to use SSL.

https://corpcm.prajwal.local:8531	SMS_WSUS_SYNC_MANAGER
Synchronizing WSUS server corpcm.prajwal.local
Done synchronizing WSUS Server corpcm.prajwal.local	SMS_WSUS_SYNC_MANAGER
Synchronizing SMS database with WSUS, default server is corpcm.prajwal.local
STATMSG: ID=6705 SEV=I LEV=M SOURCE="SMS Server" COMP="SMS_WSUS_SYNC_MANAGER"
software update point ssl check
software update point ssl check

Once WSUS is set up to use TLS/SSL, you’ll need to update the corresponding software update point to require SSL too. To do that, open the Configuration Manager console and navigate to Administration > Overview > Site Configuration > Servers and Site System Roles. Select the site system server installed with software update point site system role. From the ribbon, choose Properties and enable the ‘Require SSL communication to the WSUS server‘ option.

Configure Software Update Point to use SSL
Configure Software Update Point to use SSL

Note: If you’re installing the software Update Point role on a new server, you get to enable the SSL communication option during the role setup.

The WCM.log records the following after SUP is set to operate in SSL mode:

Configuration successful. Will wait for 1 minute for any subscription or proxy changes	SMS_WSUS_CONFIGURATION_MANAGER
Setting new configuration state to 2 (WSUS_CONFIG_SUCCESS)
Review WCM.log to confirm SSL for Software Update Point
Review WCM.log to confirm SSL for Software Update Point

Step 9: Verify a client can scan for updates

When you change the software update point to require SSL, Configuration Manager clients receive the updated WSUS URL when it makes a location request for a software update point.

The below tests will verify if the clients trust the WSUS server’s certificate and SimpleAuthWebService and the ClientWebService for WSUS are working correctly.

Open the PowerShell on the client computer and run a software update scan cycle using the below script:

Invoke-WMIMethod -Namespace root\ccm -Class SMS_CLIENT -Name TriggerSchedule "{00000000-0000-0000-0000-000000000113}"

Review the WUAHandler.log on the client computer to see the below entries.

Enabling WUA Managed server policy to use server: https://corpcm.prajwal.local:8531

In addition, review the LocationServices.log to verify that the client sees the correct WSUS URL:

LS Request CorrelationID {60D2E32F-807E-4D28-92E1-3180A73441DD} - WSUS Path='https://corpcm.prajwal.local:8531', Server='CORPCM.PRAJWAL.LOCAL', Version='4', LocalityEx='BOUNDARYGROUP', SUPFallbackIn='0'

Leave a Reply

Your email address will not be published. Required fields are marked *

Prajwal Desai

Prajwal Desai is a highly accomplished technology expert and an 11-time Dual Microsoft MVP (Most Valuable Professional), specializing in Microsoft Intune, SCCM, Windows 365, Enterprise Mobility, and Windows. As a renowned author, speaker, and community leader, he is widely recognized for sharing his in-depth expertise and insights through his blog, YouTube channel, conferences, webinars, and other platforms.