Tricks & Tips on How to Permanently Disable Windows Updates (Safely and Reliably)
![]() |
| Image Source: microsoft.com |
Disclaimer: Read This First
- Disabling Windows Update can leave your PC vulnerable and may violate organizational policies.
- I recommend pausing or controlling updates rather than blocking them entirely. Proceed at your own risk and always keep reliable backups.
Why You Might Want to Disable Windows Update
- Mission‑critical apps break after feature updates
- Metered or limited bandwidth environments
- Kiosk/production machines that require strict change control
- Testing or lab setups where stability trumps new features
I get it—sometimes “not now” really means “never.” Still, I aim for reversible, documented changes.
Before You Start: Prepare and Protect
- Create a System Restore point
- Take a full disk image or at least back up key data
- Note your current Windows edition and build:
winver - Ensure you have a local admin account
Quick Win: Pause and Defer (Safer Alternatives)
- Settings → Windows Update → Pause updates (up to 5 weeks)
- Settings → Advanced options → Defer feature updates (Pro/Enterprise)
- Set Active hours to reduce surprise restarts
If you need something more permanent, keep reading.
Method 1: Disable Windows Update Service (wuauserv)
- Press Win+R →
services.msc - Find “Windows Update” → Properties
- Startup type: Disabled → Stop the service → Apply
- Also set “Background Intelligent Transfer Service (BITS)” to Manual or Disabled if necessary
PowerShell one‑liners
- Run PowerShell as Administrator:
Stop-Service wuauserv -ForceSet-Service wuauserv -StartupType DisabledStop-Service bits -ForceSet-Service bits -StartupType Disabled
Pros: Fast and visible. Cons: Windows may re‑enable this after major updates.
Method 2: Group Policy (Pro/Enterprise/Education)
- Win+R →
gpedit.msc - Computer Configuration → Administrative Templates → Windows Components → Windows Update → Manage end user experience
- Set “Configure Automatic Updates” → Disabled
- Optional: “No auto‑restart with logged on users” → Enabled
- Run
gpupdate /force
This is harder for Windows to override and is my go‑to for Pro/Enterprise.
Method 3: Registry Tweak (All Editions, including Home)
- Win+R →
regedit(backup the registry first) - Navigate to:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU - Create keys if missing
- Create/modify DWORD (32‑bit)
NoAutoUpdate=1 - Optionally set
AUOptions=2(Notify for download and install)
Restart the PC. This emulates the Group Policy setting on systems without gpedit.
Method 4: Metered Connection + Delivery Optimization
- Settings → Network & Internet → Wi‑Fi/Ethernet → Set as Metered connection
- Settings → Windows Update → Advanced options → Delivery Optimization → Turn off “Allow downloads from other PCs”
This throttles updates; not bulletproof alone, but reduces background pulls.
Method 5: Block Update Endpoints via Hosts/Firewall
- Add known Windows Update domains to
hostsor block via firewall - Use Windows Defender Firewall with Advanced Security → Outbound Rules → New Rule → Program →
C:\Windows\System32\svchost.exe(wuauserv) → Block
Note: Domains and IPs change; this requires maintenance and can break Microsoft Store and Defender updates.
Method 6: Use Local Policies to Stop Update Orchestrator
- Task Scheduler → Task Scheduler Library → Microsoft → Windows → UpdateOrchestrator
- Disable tasks like
Schedule Scan,USO_UxBroker,Reboot_AC,Reboot_Battery - Also check Microsoft → Windows → WindowsUpdate
Windows may recreate these tasks after big upgrades—recheck periodically.
Method 7: Windows Update MiniTool/WuMgr (Third‑Party)
- Portable tools that let you hide, approve, or block updates
- Prefer open‑source, signed releases from reputable sources
- Keep offline installers for essential security patches you do want
Method 8: Service Wrapper with Scheduled Re‑enforcement
- Script that disables wuauserv and BITS at boot and every few hours
- Example approach (Task Scheduler, highest privileges):
- Trigger: At startup and every 3 hours
- Action: PowerShell
Set-Service wuauserv -StartupType Disabled; Stop-Service wuauserv -Force; Set-Service bits -StartupType Disabled; Stop-Service bits -Force
This guards against Windows re‑enabling services after cumulative updates.
Verify That Updates Are Disabled
- Settings → Windows Update → Check for updates should fail or show paused
Get-Service wuauserv,bitsshould show Status = Stopped, StartType = Disabled- Event Viewer → Applications and Services Logs → Microsoft → Windows → WindowsUpdateClient for errors/blocks
Rollback: Re‑enable Updates Cleanly
- Reverse any changes:
- Services: Set Startup type to Manual and start them
- Group Policy/Registry: Restore defaults (
NoAutoUpdate= 0 or remove) - Undo firewall/hosts/task changes
- Reboot and run
wuauclt /detectnoworusoclient startscan
FAQs
- Will Defender stop updating? Possibly, if you block Windows Update service. Consider keeping Defender’s engine current with manual definition updates or allow Microsoft Defender updates through policy.
- Is this truly permanent? Windows may revert settings during major feature upgrades. That’s why scheduled re‑enforcement and documentation help.
- Is it legal? On personal devices: generally yes. On corporate/managed devices: follow policy.
Best‑Practice Playbook (My Recommendation)
1) Use Group Policy or the registry to disable automatic updates.
2) Disable the Windows Update service and set a scheduled task to re‑enforce.
3) Keep a monthly maintenance window to manually apply security fixes you select.
4) Maintain backups and a rollback plan.
