Skip to content

Managing System Update with Intune

System Update Icon

This post will describe how you can manage Lenovo System Update on Windows 10/11 devices with Intune.

Before you begin, you will need:

  • System Update Administrator Tools - This contains the System Update ADMX/ADML files. By default, the contents are extracted to C:\SWTOOLS\TOOLS\Admin
  • A Windows 10 or 11 device connected to Azure Active Directory and managed by Intune
  • System Update installed on the device

Ingest the TVSU ADMX file

Sign in to the Microsoft Endpoint Manager admin center

  • Navigate to Devices > Windows > Configuration Profiles > Create Profile
  • Select Windows 10 and later for Platform
  • Select Templates for Profile type and choose the Custom template. Click Create
  • Enter a name for the profile, for example, Lenovo System Update configuration
  • Enter a description (Optional)

In the Custom OMA-URI Settings menu, click Add and enter the following

  • Name: TVSU ADMX Ingest
  • Description: (Optional)
  • OMA-URI:
./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/Lenovo/Policy/TVSU
  • Data Type: String
  • Value: Copy the contents of the tvsu.admx into this field

Click save to complete adding the new OMA-URI row.

Assign the profile to a group. This group should only include devices that have System Update installed.

Verify the settings have pushed to a device by launching Regedit and navigating to HKLM\SOFTWARE\Microsoft\PolicyManager\AdmxDefault

Regedit

Creating a TVSU Policy

Example 1

Repeat the steps above by adding an additional configuration setting. This example will be for setting the AdminCommandLine

  • Name: Admin Command Line
  • Description: Installs Critical and Recommended packages with a reboot type 3 (requires reboot)
  • OMA-URI:
./Device/Vendor/MSFT/Policy/Config/Lenovo~Policy~Cat_ThinkVantage_61~Cat_System_Update_63~Cat_UserSettings_74~Cat_General_78/Policy_Admin_CommandLine_154
  • Data Type: String
  • Value
<enabled/>
<data id="Policy_TextBox_Element_Admin_CommandLine_155" value="/CM -search R -action INSTALL -includerebootpackages 3 -noicon -noreboot -nolicense"/>

OMA-URI

Example 2

This example will set custom repository paths

  • Name: Repository Path
  • Description: Optional
  • OMA-URI:
./Device/Vendor/MSFT/Policy/Config/Lenovo~Policy~Cat_ThinkVantage_61~Cat_System_Update_63~Cat_UserSettings_74~Cat_General_78/Policy_Repository_Location_116
  • Data Type: String

  • Value

<enabled/>
<data id="Policy_TextBox_Element_Repository_Location_119" value="\\CustomRepoPath"/>
<data id="Policy_TextBox_Element_Repository_Location_120" value="\\CustomRepoPath2"/>
<data id="Policy_TextBox_Element_Repository_Location_121" value="\\CustomRepoPath3"/>

OMA-URI

Verify the policies have pushed down to the device by launching Regedit and navigating to HKLM\SOFTWARE\Policies\Lenovo\System Update\UserSettings\General

OMA-URI

Further Reading

Enable ADMX-backed policies in MDM

Win32 and Desktop Bridge app policy