Use > Server patching > Patch management for Windows > Patch management administration > Enable/disable Windows Server 2008 Itanium (IA64) patches

Enable/disable Windows Server 2008 Itanium (IA64) patches

Starting in 9.14, SA Windows Patching does not import Itanium (IA64) patches by default. However, a script is available to enable importing Windows Server IA64 patches.

Previously, Itanium patches were imported by default when the Windows Server 2008 R2 patch product was selected. In SA 9.14 and later, Itanium patches are not imported by default. The default setting was changed to reduce the patch import footprint, saving storage space and download time, for the customers who do not need Itanium patches.

About the enable-itanium-patches script:

  • Location: /opt/opsware/mm_wordbot/util/enable-itanium-patches
  • Usage: enable-itanium-patches enable|disable

To enable importing of Windows Server IA64 patches:

  1. Log in it the SA Core as root.
  2. Run the enable-itanium-patches script:

    /opt/opsware/mm_wordbot/util/enable_itanium_patches enable

To disable importing of Windows Server IA64 patches:

  1. Log in it the SA Core as root.
  2. Run the enable-itanium-patches script:

    /opt/opsware/mm_wordbot/util/enable_itanium_patches disable

To view the current setting:

  1. Log in to the SA Client as an administrator with Opsware System Administrators privileges.

Note SA configuration parameters are accessible only through the SA Client. Only system administrators with the Opsware System Administrators user group permission can change these settings.

  1. Navigate to the SA Software Repository system settings: Administration > System configuration > Software Repository.

The patchman.ms_mbsa20_import_architecturessetting will indicate enabled or disabled.

  • ['x86', 'x64'] is the default
  • ['x86', 'x64', 'ia64' ] indicates that Itanium patches are enabled

Note Do not change this setting from this view; use the script instead. Only use this view to verify the current setting. Changes to certain SA Core configuration parameter values, as listed in this document, are verified by HPE and you can safely apply them as directed. However, exercise caution when modifying any default SA Core configuration parameter values as modifications can have a negative effect on core functionality and performance.