This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Windows 10 Updates killing the network

I came across a post today and it mirrors my own experience with Windows 10 updates.

A single new Surface Pro killed our internet connection.

Whirlpool post
https://forums.whirlpool.net.au/forum-replies.cfm?t=2530363

My original question
https://community.sophos.com/products/xg-firewall/f/131/t/75586

Would love to know how to mitigate this.



This thread was automatically locked due to age.
  • Hi David,

    If the windows or microsoft updates are still bothering you, try to configure Application based QoS policy and apply it in the Firewall Rule. Please refer: https://community.sophos.com/kb/en-US/123062.

    Thanks

    Sachin Gurung
    Team Lead | Sophos Technical Support
    Knowledge Base  |  @SophosSupport  |  Video tutorials
    Remember to like a post.  If a post (on a question thread) solves your question use the 'This helped me' link.

  • Hi,

    Windows 10 does not use BITS any more for downloading updates.

    In the Sophos XG this traffic is categorized as Http download, zip download, Multi Thread File Transfer.

    Limiting the traffic with these categories is not unique enough.

    The best temporary solution is limiting the traffic by IP address until Microsoft has an GPO for limiting the bandwidth.

  • I've been experiencing the same issue on our network of about a dozen PCs running Windows 10. We have a Cyberoam 25ING running Sophos 15.01.0 MR-3. It was totally crippling our network so I set a limit on the total bandwidth that was a few megabits below our 12Mb limit. It works a little better. 

  • I'm having the same issue, we switched back at the client site to the old netgear utm until we find a solution.


    At the site we don't have a WSUS running yet, this wil come later this year when we replace the old server.

    Has anyone else have found a workaround for now?

  • Hey arjan, I'm in the same boat, coming from a Netgear UTM. Setting a cap on the traffic that was below our total bandwidth made things usable, but not great. Overall this wasn't the return on investment I was hoping for. 

  • Last weekend we had some problems with different client Win 10 Pro and a new XG firewall. Some details from client sides: the services responsable was netsvc.exe that involves windows update.

    As we terminate that service the bandwidth will be free.

    Currently the firewall has only one policy configured to allow the Internet navigation.

    The workround that solved the congestion is: Inside Network rule, Section Malware Scanning we try to unflag Scan FTP and Scan HTTP.

    As we unflagged that 2 option the traffic became normal.

    I know that is not a secure solution but it works.

    We have not other security policies as it is a new network.

    So very interesting if this workaround could help to find the right solution to the issue.

    If microsoft uses now htpp and zip file as seems from comments, and if I unflagged scan Http maybe the investigations could go what happens into firewall when is analyzed this kind of traffic or these recent updates. I can add that the log shows like 12 GB of download all coming from Microsoft but I think that impossible an update of 12 GB. So it is only a theory that updates is some way goes in loop and try to download more and more and the band is satured.

  •   - This looks more like a Windows 10 issue than an XG firewall issue. Any reasons why you're not using the option to get updates from local PCs on your network in Windows 10? Start  --> Settings --> Update and Security --> Windows Updates --> Advanced Options --> Choose how updates are delivered --> PCs on my local network

    Also, if indeed Microsoft has removed the option to throttle Windows update traffic using BITS, and you're not using WSUS for bandwidth management, then you can follow the documentation that Sachin provided to create a traffic shaping policy - https://community.sophos.com/kb/en-US/123062

    i. Verify that an application list exists for Microsoft Updates already

    Object --> Content --> Application List --> Microsoft Updates

    ii. Create a new traffic shaping policy to apply the limits that you want
    Object --> Policies --> Traffic Shaping
    Policy Association --> Application
    Rule Type --> Limit
    Priority --> Lowest or whatever you want to set
    Bandwidth --> Set the percentage of the bandwidth that you want
    Bandwidth Usage Type --> Most likely Shared

    iii. Apply the traffic shaping policy to an application
    Object --> Policies --> Global App Traffic Shaping
    Expand Software Updates --> Look for Microsoft Updates --> Edit it and apply the newly created policy

    iv. Apply the traffic shaping policy to the Internet Access security policy
    Edit the security policy
    In the "Policy for User Applications" section, Change Application Control to "Allow All" and Select the option to "Apply Application-based Traffic Shaping Policy"

  • Hi all,

    this configuration doesn't work. We have a case open since four month

    For me this problem seem to be relative to AKAMAI. TS doesn't work with AKAMAI. So this problem isn't relative only windows update but all service that use AKAMAI. 

    The only solution is to block IP.

  • Microsoft released new GPO in the Aniversary update of windows 10.

    With these new GPO you can limit the bandwidth of the updates (upload and download).

    You can download the new GPO reference below.

     https://www.microsoft.com/en-us/download/details.aspx?id=25250

  • Hi Bruno,

    DM me the case#.

    Thanks

    Sachin Gurung
    Team Lead | Sophos Technical Support
    Knowledge Base  |  @SophosSupport  |  Video tutorials
    Remember to like a post.  If a post (on a question thread) solves your question use the 'This helped me' link.