Get-windowsfeature -name Updateservices -

Alex opened PowerShell as an administrator—no GUI, no clicking through Server Manager. Just a blinking cursor. The goal was simple: verify whether the core WSUS role, including its management console and database components, was installed on WSUS-01.

“First thing’s first,” Alex muttered. “Is the feature even there?” get-windowsfeature -name updateservices

Get-WindowsFeature -Name UpdateServices InstallState : Available Two hours later, after running Install-WindowsFeature and a reboot: Alex opened PowerShell as an administrator—no GUI, no

Invoke-Command -ComputerName Server02, Server03 -ScriptBlock Get-WindowsFeature -Name UpdateServices “First thing’s first,” Alex muttered

In the dimly lit server room of a mid-sized enterprise, Alex, a systems administrator, faced a familiar Monday morning dread. Three critical security patches had been released over the weekend, and the company’s 200 Windows servers were still unprotected. The problem wasn’t the patches themselves—it was control.

Alex’s predecessor had set up a Windows Server Update Services (WSUS) server years ago, naming it “WSUS-01.” But documentation was sparse, and the server had become a digital attic—crammed with old updates, syncing erratically, and suspected of not even being fully installed.