Endpoint Protection Definition Update Source

I need to determine where an Endpoint Protection Client is getting updates from, whether it's the SCCM server, WSUS, or Microsoft's Windows Update. Is there a log file somewhere that I could use to determine that information?
Vincent Sprague

Have a look in C:Windows\Windowsupdate.log.

Similar Messages

  • Log file for manual download Endpoint Protection Definition Updates

    Hi,
    I am downloading manually endpoint protection definition updates from SCCM 2012 R2, which log file I have to check for download progress.
    Regards,
    Manzoor Ahmed

    If you are downloading updates manually you will need to have an alternate source other than ConfigMgr for definition updates.
    https://support.microsoft.com/en-us/kb/2831244?wa=wsignin1.0
    Here is a list of the logs for SCEP.
    http://chadstech.net/scep-2012-client-log-files/
    The logs depend on which sources you have set for updates, if you have updates coming from windows update or WSUS then you could look at WindowsUpdate.log

  • System Center Endpoint Protection Definition Updates

    Hi can anyone advise deploying definitions via SCCM 2012 and selecting the source as being "Updates distributed from Configuration Manager" does that mean each client will go to the Primary Site to get updates? Or by using ADR will it ensure that
    definitions come via distribution points?
    Also another question, as sccm 2012 is not rolled out to all sites yet, and will be deploying unmanaged clients, when I deploy the SCEP client offline un-managed with a policy file, is there a way then later to change policy on the client by command line?

    You could configure updating SCEP in many ways, including:
    Updates distributed from Configuration Manager – This method uses Configuration Manager software updates to deliver definition and engine updates to computers in your hierarchy.
    Updates distributed from Windows Server Update Services (WSUS) – This method uses your WSUS infrastructure to deliver definition and engine updates to computers.
    Updates distributed from Microsoft Update – This method allows computers to connect directly to Microsoft Update in order to download definition and engine updates. This method can be useful for computers that are not often connected to the business network.
    Updates distributed from Microsoft Malware Protection Center – This method will download definition updates from the Microsoft Malware Protection Center.
    Updates from UNC file shares – With this method, you can save the latest definition and engine updates to a share on the network. Clients can then access the network to install the updates.
    For more details, please refer to:
    http://technet.microsoft.com/en-us/library/jj822983.aspx

  • SCCM 2012 Endpoint Protection Definition Update

    Hi Guys, can you please help me out with this, some of the clients are not pulling or seeing the latest definition updates from the server.
    What do I check?

    Again - Start with the EndpointProtectionAgent.log file on the clients
    http://technet.microsoft.com/en-us/library/c6675aac-4bb8-4b4b-9075-06b4ecec2a18#BKMK_ClientOpLogs
    Nick Moseley | http://t3chn1ck.wordpress.com
    What do I look for in the CIDownloader.log?

  • Endpoint Protection error: The source folder for content does not exist.

    I have a single SCCM 2012 SP1 CU4 server running on Windows Server 2012.
    I have been using this for a little more than a month for Endpoint Protection and Windows Updates.
    I just recently started seeing that my Endpoint Deployment Package has Failed.  I click on "Content Status" and select the Endpoint package (which again shows Failed).  I click on "View Status" and I get this
    message in the "Error" tab:
    The source folder for content does not exist.
    The Asset Details point to the exact location  that does not exist:
    The source directory "\\<server>\updates\endpoint\6bd81fde-3a3f-4aa9-bf70-ba007891ca68" for package "<package>" does not exist. 
    I didn't change anything related to this, and that directory path (\\server\updates\endpoint) is
    shared and is populated with a lot of other folders. 
    Is this possibly just a bad update file?  Should I manually create that sub-folder that it says is missing?
    Any help would be great!  Thanks!

    Thanks for the quick reply, Torsten.  (I often forget which logs to check for certain things).
    There are six lines (3 errors -- in italics below) in the log around the same time frame.  They read:
    The source directory \\sccm-corp\updates\endpoint\6bd81fde-3a3f-4aa9-bf70-ba007891ca68 doesn't exist or the SMS service cannot access it, Win32 last error = 2    SMS_DISTRIBUTION_MANAGER    5/27/2014 11:54:46 AM  
     5920 (0x1720)
    STATMSG: ID=2306 SEV=E LEV=M SOURCE="SMS Server" COMP="SMS_DISTRIBUTION_MANAGER" SYS=SCCM-Corp.pdcarea.lcl SITE=PDC PID=6008 TID=5920 GMTDATE=Tue May 27 16:54:46.962 2014 ISTR0="\\sccm-corp\updates\endpoint\6bd81fde-3a3f-4aa9-bf70-ba007891ca68" ISTR1="PDC00063"
    ISTR2="" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=1 AID0=400 AVAL0="PDC00063"    SMS_DISTRIBUTION_MANAGER    5/27/2014 11:54:46 AM    5920 (0x1720)
    Failed to take snapshot of one or more contents in package PDC00063    SMS_DISTRIBUTION_MANAGER    5/27/2014 11:54:46 AM    5920 (0x1720)
    CDistributionSrcSQL::UpdateAvailableVersion PackageID=PDC00063, Version=10, Status=2302    SMS_DISTRIBUTION_MANAGER    5/27/2014 11:54:46 AM    5920 (0x1720)
    STATMSG: ID=2302 SEV=E LEV=M SOURCE="SMS Server" COMP="SMS_DISTRIBUTION_MANAGER" SYS=SCCM-Corp.pdcarea.lcl SITE=PDC PID=6008 TID=5920 GMTDATE=Tue May 27 16:54:46.990 2014 ISTR0="Endpoint Protection Definition Updates" ISTR1="PDC00063" ISTR2="" ISTR3=""
    ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=1 AID0=400 AVAL0="PDC00063"    SMS_DISTRIBUTION_MANAGER    5/27/2014 11:54:46 AM    5920 (0x1720)
    Failed to process package PDC00063 after 33 retries, will retry 67 more times    SMS_DISTRIBUTION_MANAGER    5/27/2014 11:54:47 AM    5920 (0x1720)

  • Updating Endpoint Protection definitions via SCCM 2012 R2

    I've successfully deployed System Center Endpoint Protection to a device collection using SCCM 2012 R2.  However, the PC Status is "At Risk" because it's out of date.  Can someone please explain how I'm supposed to get the clients to
    update the definition files.  I realized I didn't have "Definition Updates" checked under the Classifications tab of the Software Update Point Components Properties which I've now checked.  I'm not sure which Product to check under the
    Products tab.
    Also not sure what the process is to deploy definition updates to Endpoint clients and have them update automatically with the latest definitions.  Thank You

    You need to check "Forefront Endpoint Protection 2010" as the Product. Yes yes its the old name.
    After that you need to create an ADR using the template Definition Updates under Software Updates and deploy it to a Collection that holds all clients with SCEP installed. The ADR will run directly after each syncronization of the SUP, so you should change
    the SUP to sync to Windows Update at least once every 8 hour (definition updates are released that often).
    Thats the short version.
    Tim Nilimaa | Blog: http://infoworks.tv | Twitter: @timnilimaa

  • Forefront Endpoint Protection Definitions Not Updated via SCCM (SCCM 2012 SP1)

    Hi All
    We have an issue of FEP definitions not updating correctly.
    1. Clients getting definitions updates from the internet, not SCCM. Any solution?
    2. Currently, we have around 20 workstations installed with FEP but having more than 7 different definitions versions within those. Waited for a couple of days but still not updating.. kind of random.
    Any advice where to check or what is to be done?
    Regards,
    Xavier

    (Assuming you are using ConfigMgr 2012)
    Part of the Antimalware policy is the tab Definition Updates, in this tab you can define the update location(s). Also, in the normal client settings you can disable the client from going online for their initial definitions.
    Make sure you are deploying the latest updates via ConfigMgr (either via an ADR, or a custom Software Update Group).
    My Blog: http://www.petervanderwoude.nl/
    Follow me on twitter: pvanderwoude

  • Endpoint Protection not updating

    Hi all,
    Not sure if this is the right forum but I couldn't see one for Endpoint Protection
    I've been having some troubles updating EP on 2 of my 40 of so machines for a while and I can't work it out.  Basically they aren't seeing that EP updates are available to install for them.
    I've uninstalled EP and the CM client.  They re-installed fine.  The 2 machines are getting the same policies as the others.  I've deleted the Software Distribution directory, reset BITS, deleted the qr*.dat files.
    When I initiate a Software Updates scan from the Configuration Mgr client this is what appears in my WindowsUpdate.log
    2013-05-13 09:18:15:205 5704 19b8 COMAPI -------------
    2013-05-13 09:18:15:205 5704 19b8 COMAPI -- START --  COMAPI: Search [ClientId = CcmExec]
    2013-05-13 09:18:15:205 5704 19b8 COMAPI ---------
    2013-05-13 09:18:15:210  948 a04 Agent *************
    2013-05-13 09:18:15:210 5704 19b8 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
    2013-05-13 09:18:15:210  948 a04 Agent ** START **  Agent: Finding updates [CallerId = CcmExec]
    2013-05-13 09:18:15:210  948 a04 Agent *********
    2013-05-13 09:18:15:210  948 a04 Agent   * Include potentially superseded updates
    2013-05-13 09:18:15:210  948 a04 Agent   * Online = Yes; Ignore download priority = Yes
    2013-05-13 09:18:15:210  948 a04 Agent   * Criteria = "(DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')"
    2013-05-13 09:18:15:210  948 a04 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2013-05-13 09:18:15:210  948 a04 Agent   * Search Scope = {Machine}
    2013-05-13 09:18:15:538  948 a04 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2013-05-13 09:18:15:538  948 a04 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL =
    HTTP://%FQDN%8530/ClientWebService/client.asmx
    2013-05-13 09:19:16:523  948 a04 Misc WARNING: SendRequest failed with hr = 80072ee2. Proxy List used: <%PROXYIP%> Bypass List used : <(null)> Auth Schemes used : <>
    2013-05-13 09:19:16:523  948 a04 PT   + Last proxy send request failed with hr = 0x80072EE2, HTTP status code = 0
    2013-05-13 09:19:16:523  948 a04 PT   + Caller provided proxy = No
    2013-05-13 09:19:16:523  948 a04 PT   + Proxy list used = %PROXYIP%
    2013-05-13 09:19:16:523  948 a04 PT   + Bypass list used = <NULL>
    2013-05-13 09:19:16:523  948 a04 PT   + Caller provided credentials = No
    2013-05-13 09:19:16:523  948 a04 PT   + Impersonate flags = 0
    2013-05-13 09:19:16:523  948 a04 PT   + Possible authorization schemes used =
    2013-05-13 09:19:16:523  948 a04 PT WARNING: GetConfig failure, error = 0x80072EE2, soap client error = 5, soap error code = 0, HTTP status code = 200
    2013-05-13 09:19:16:524  948 a04 PT WARNING: PTError: 0x80072ee2
    2013-05-13 09:19:16:524  948 a04 PT WARNING: GetConfig_WithRecovery failed: 0x80072ee2
    2013-05-13 09:19:16:524  948 a04 PT WARNING: RefreshConfig failed: 0x80072ee2
    2013-05-13 09:19:16:524  948 a04 PT WARNING: RefreshPTState failed: 0x80072ee2
    2013-05-13 09:19:16:524  948 a04 PT WARNING: Sync of Updates: 0x80072ee2
    2013-05-13 09:19:16:524  948 a04 PT WARNING: SyncServerUpdatesInternal failed: 0x80072ee2
    2013-05-13 09:19:16:524  948 a04 Agent   * WARNING: Failed to synchronize, error = 0x80072EE2
    2013-05-13 09:19:16:525  948 a04 Agent   * WARNING: Exit code = 0x80072EE2
    2013-05-13 09:19:16:525  948 a04 Agent *********
    2013-05-13 09:19:16:525  948 a04 Agent **  END  **  Agent: Finding updates [CallerId = CcmExec]
    2013-05-13 09:19:16:525  948 a04 Agent *************
    2013-05-13 09:19:16:525  948 a04 Agent WARNING: WU client failed Searching for update with error 0x80072ee2
    2013-05-13 09:19:16:526 5704 19b8 COMAPI >>--  RESUMED  -- COMAPI: Search [ClientId = CcmExec]
    2013-05-13 09:19:16:527 5704 19b8 COMAPI   - Updates found = 0
    2013-05-13 09:19:16:527 5704 19b8 COMAPI   - WARNING: Exit code = 0x00000000, Result code = 0x80072EE2
    2013-05-13 09:19:16:527 5704 19b8 COMAPI ---------
    2013-05-13 09:19:16:527 5704 19b8 COMAPI --  END  --  COMAPI: Search [ClientId = CcmExec]
    2013-05-13 09:19:16:527 5704 19b8 COMAPI -------------
    2013-05-13 09:19:16:527 5704 19b8 COMAPI WARNING: Operation failed due to earlier error, hr=80072EE2
    2013-05-13 09:19:16:527 5704 19b8 COMAPI FATAL: Unable to complete asynchronous search. (hr=80072EE2)
    2013-05-13 09:19:21:526  948 a04 Report REPORT EVENT: {4F1FD932-6FB2-4909-BB14-B58ECB839A4B} 2013-05-13 09:19:16:524+1000 1 148 101 {00000000-0000-0000-0000-000000000000} 0 80072ee2 CcmExec Failure Software
    Synchronization Windows Update Client failed to detect with error 0x80072ee2.
    2013-05-13 09:19:21:543  948 a04 Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2013-05-13 09:19:21:543  948 a04 Report WER Report sent: 7.6.7600.256 0x80072ee2 00000000-0000-0000-0000-000000000000 Scan 101 Managed
    2013-05-13 09:19:21:543  948 a04 Report CWERReporter finishing event handling. (00000000)
    From my research this indicates to me that these computers are trying to access the internet to perform their updates.  They should be going to Config Mgr as specified in the policy and then WSUS (MS Updates is not selected in my policy).  These
    machines do not have internet access.  The machines that are updating correctly also don't have internet access
    Below is the WUAHandler.log
    Its a WSUS Update Source type ({E6405AF2-4712-4848-8E46-A6AFF1872B0A}), adding it. WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
    Existing WUA Managed server was already set (%FQDN%:8530), skipping Group Policy registration. WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
    Added Update Source ({E6405AF2-4712-4848-8E46-A6AFF1872B0A}) of content type: 2 WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
    Scan results will include superseded updates only when they are superseded by service packs and definition updates. WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
    Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver') WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
    Async searching of updates using WUAgent started. WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
    Async searching completed. WUAHandler 13/05/2013 9:19:16 AM 5152 (0x1420)
    OnSearchComplete - Failed to end search job. Error = 0x80072ee2. WUAHandler 13/05/2013 9:19:16 AM 6584 (0x19B8)
    Scan failed with error = 0x80072ee2. WUAHandler 13/05/2013 9:19:16 AM 6584 (0x19B8)
    Any help would be awesome
    Thanks

    Thanks for the reply.
    It shouldn't be a proxy issue as the computers aren't configured to use a proxy.  Nothing is ticked in IE settings about connecting to the Internet and the netsh winhttp show proxy gives me a direct connection
    Nothing in bypass list as well
    I check these settings on a machine that is working and the settings are the same
    I looked in the scanagent.log and got this
    - -Processing Scan Job TTL invalidity request ScanAgent 16/05/2013 3:02:17 PM 4376 (0x1118)
    Message received: '<?xml version='1.0' ?> <UpdateSourceMessage MessageType='ScanByUpdateSource'>
      <ForceScan>TRUE</ForceScan>
      <UpdateSourceIDs>
       <ID>{E6405AF2-4712-4848-8E46-A6AFF1872B0A}   </ID>
      </UpdateSourceIDs>
     </UpdateSourceMessage>'
     ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
    *****ScanByUpdateSource request received with ForceReScan=2, ScanOptions=0x0000000a,  WSUSLocationTimeout = 604800 ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
    Sources are not current ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
    ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): - - - - - -Locations requested for ScanJobID={9B789A83-3229-4658-99E4-0FD797B48AB0} (LocationRequestID={5D090B44-18AC-4153-AEB4-55CE285A7CD1}), will process the scan request once locations are available. ScanAgent 16/05/2013
    3:02:19 PM 5348 (0x14E4)
    *****WSUSLocationUpdate received for location request guid={5D090B44-18AC-4153-AEB4-55CE285A7CD1} ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
    Sources are not current ScanAgent 16/05/2013 3:02:19 PM 3680 (0x0E60)
    ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): CScanJob::OnScanComplete -Scan Failed with Error=0x80244019 ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
    ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): CScanJob::ScheduleScanRetry- ScanRetry Timer task successfully scheduled. Will wake up in next 1800 seconds ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
    ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): CScanJob::OnScanComplete - Scan Retry successfully scheduled ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
    ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): CScanJobManager::OnScanComplete- Scan has failed, scan request will be pending for scan retry cycle. ScanAgent 16/05/2013 3:02:20 PM 5348 (0x14E4)
    CScanAgent::ScanCompleteCallback - failed at OnScanComplete with error=0x87d00631 ScanAgent 16/05/2013 3:02:20 PM 5348 (0x14E4)
    Doesn't make any sense to me
    I can use IE to hit the wsus/sccm server (roles installed on same machine).  It will prompt me to download or save the *.cab files as well.

  • SCEP 2012R2 downloading Endpoint Protection definitions from Microsoft, rather than using internal Distribution Point

    Hi all, 
    Need your help figuring out why SCEP definitions are being updated from Microsoft and not from the local DP. 
    * I have a new 5 site SCCM hierarchy with a Primary site installed in EMEA HQ and a secondary site in 4 x USA offices. 
    * A Software update point and Endpoint protection point are deployed in HQ primary site. 
    * Software updates for SCEP have been synched down to the Primary site server which has WSUS role installed, a software update group created and an Automatic Deployment rule created to push these definition updates to the relevant device collection. 
    * Distribution > Content Status shows the software update package has been replicated successfully to all 5 DP's in the environment. 
    * An antimalware policy that specifies only SCCM as the definition updates has been created and is deployed to the relevant device collection. 
    * Custom client settings that disable alternate sources for initial definition update have also been created and deployed to the relevant device collection. 
    **** Yet, a closer look at the MPRUNCMD.log on client machines, shows that definition updates are coming from Microsoft
    I'm baffled why they still download from Microsoft despite disallowing this and making the DP the only source. 
    MpCmdRun: Command Line: "c:\Program Files\Microsoft Security Client\MpCmdRun.exe" SignaturesUpdateService -UnmanagedUpdate
     Start Time: ‎Mon ‎Apr ‎27 ‎2015 07:28:02
    Start: Signatures Update Service
    Update Started
    Search Started (MU/WU update) (Path: http://www.microsoft.com)...
    Time Info - ‎Mon ‎Apr ‎27 ‎2015 07:28:55 Search Completed 
    Update completed succesfully. no updates needed
    End: Signatures Update Service
    MpCmdRun: End Time: ‎Mon ‎Apr ‎27 ‎2015 07:28:55
    Note - One of the secondary sites has a very poor internet connection, so it's not feasible for definitions to be downloaded from the web. This is why a solution is required. 
    Thanks....

    Hi,
    Could these clients get other updates from SCCM?
    You could check the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CCM\EPAgent\LastAppliedPolicy to see if the definition updates policy is applied to the client.
    Best Regards,
    Joyce
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected]

  • Endpoint Protection Signature Updates taking up Terabytes of Internet Data

    I have my antimalware policy set up as below. I've been looking a web traffic reports on our firewalls and I can see that as of mid-December a lot of clients are going to the internet for their EP definition updates. In January alone client machines used
    up 44 TB of data going to download.windowsupdate.com for updates.
    I don't really understand why as my policy says not to even use Microsoft Update as a source at all.
    What I've noticed on the firewall reports is that Monday resulted in literally 100 times more traffic than Wednesday which led to me thinking it might having something to do with the "If configuration manager is used as a source for definition updates
    ...." setting. This setting has a default value of 72 hours so if a client gets an update at 8 am on Friday morning then is turned off on Friday afternoon for the weekend and doesn't get turned on until 9 am on Monday morning this would mean it hasn't
    had an update in 73 hours.
    What happens at this point? I looks like the client goes to download.windowsupdate.com even when the policy says not to. It also looks like it doesn't first check for updates from Config Manager before it does this.
    Another thing that doesn't make much sense is that this only started happening mid-December and I had been using SCCM for EP updates for nearly two months by that time.
    Any ideas?
    Hibs Ya Bass!

    There is no value in that registry key.
    HHowever I have noticed that my ADRs have the below setting. I'm not sure what will happen with this setting enabled when I have no fallback locations configured.
    Here are some logs of a typical PC going to the internet for updates - remember not all PCs are doing this.
    From the mplogxxxx.log below you can see the EP client starting up at 23:50 UTC with version 1.67.1843.0 signatures installed. This version is out of date.
    **************************END RTP Perf Log*************************
    2014-03-16T23:50:33.339Z Verifying license file...
    2014-03-16T23:50:33.339Z verified!
    2014-03-16T23:50:33.339Z Product supports installmode: 0
    2014-03-16T23:50:33.620Z Auto purger task is scheduled to run in 600000(ms) from now with period 86400000(ms)
    Product Version: 4.4.304.0
    Service Version: 4.4.304.0
    Engine Version: 1.1.10302.0
    AS Signature Version: 1.167.1843.0
    AV Signature Version: 1.167.1843.0
    2014-03-16T23:51:24.971Z Process scan (poststartupscan) started.
    2014-03-16T23:51:26.572Z Process scan (poststartupscan) completed.
    2014-03-16T23:53:05.128Z IWscAVStatus::UpdateStatus() succceeded writing instance with state (1) and up-to-date state(1)
    2014-03-16T23:53:05.128Z IWscASStatus::UpdateStatus() succceeded writing instance with state (1) and up-to-date state(1)
    2014-03-16T23:57:58.214Z Task(SpyNetService -RestrictPrivileges -AccessKey 613C3C1F-F85A-BCED-39AF-C0B481FC03E0) launched
    2014-03-17T00:00:31.917Z Task(Scan -ScheduleJob -RestrictPrivileges) is scheduled to run in 604800000(ms) from now with period 190246545(ms)
    2014-03-17T00:00:31.917Z Task(SignatureUpdate -ScheduleJob -RestrictPrivileges) is scheduled to run in 86400000(ms) from now with period 1454570(ms)
    2014-03-17T00:00:31.918Z Task(Scan -ScheduleJob -RestrictPrivileges -ScanType 2) is scheduled to run in 86400000(ms) from now with period 65506808(ms)
    2014-03-17T00:00:32.197Z AutoPurgeWorker triggered with dwWork=0x3
    2014-03-17T00:00:32.197Z Product supports installmode: 0
    ==========================================================================
    A few minutes later at 23:55 (07:53 local time) the below happens in the WindowsUpdate.log where you can clearly see the client downloading the latest signatures from download.windowsupsate.com (i've removed some of the rows where the WU engine goes through
    all the updates to get under the 60,000 character limit)
    ================================================================
    2014-03-17    07:53:03:403     452    1398    Misc    ===========  Logging initialized (build: 7.6.7600.256, tz: +0800)  ===========
    2014-03-17    07:53:03:465     452    1398    Misc      = Process: C:\windows\system32\svchost.exe
    2014-03-17    07:53:03:480     452    1398    Misc      = Module: c:\windows\system32\wuaueng.dll
    2014-03-17    07:53:03:403     452    1398    Service    *************
    2014-03-17    07:53:03:480     452    1398    Service    ** START **  Service: Service startup
    2014-03-17    07:53:03:480     452    1398    Service    *********
    2014-03-17    07:53:04:351     452    1398    Agent      * WU client version 7.6.7600.256
    2014-03-17    07:53:04:351     452    1398    Agent      * Base directory: C:\windows\SoftwareDistribution
    2014-03-17    07:53:04:351     452    1398    Agent      * Access type: No proxy
    2014-03-17    07:53:04:366     452    1398    Agent      * Network state: Connected
    2014-03-17    07:53:17:688     452    bf4    Report    CWERReporter::Init succeeded
    2014-03-17    07:53:17:688     452    bf4    Agent    ***********  Agent: Initializing Windows Update Agent  ***********
    2014-03-17    07:53:17:688     452    bf4    Agent    ***********  Agent: Initializing global settings cache  ***********
    2014-03-17    07:53:17:688     452    bf4    Agent      * WSUS server: HTTP://mySiteServer.domain.GLOBAL:8530
    2014-03-17    07:53:17:688     452    bf4    Agent      * WSUS status server: HTTP://mySiteServer.domain.GLOBAL:8530
    2014-03-17    07:53:17:688     452    bf4    Agent      * Target group: (Unassigned Computers)
    2014-03-17    07:53:17:688     452    bf4    Agent      * Windows Update access disabled: No
    2014-03-17    07:53:17:719     452    bf4    DnldMgr    Download manager restoring 0 downloads
    2014-03-17    07:53:18:045     452    1398    Report    ***********  Report: Initializing static reporting data  ***********
    2014-03-17    07:53:18:045     452    1398    Report      * OS Version = 6.1.7601.1.0.65792
    2014-03-17    07:53:18:045     452    1398    Report      * OS Product Type = 0x00000004
    2014-03-17    07:53:18:061     452    1398    Report      * Computer Brand = Hewlett-Packard
    2014-03-17    07:53:18:061     452    1398    Report      * Computer Model = HP Z210 Workstation
    2014-03-17    07:53:18:061     452    1398    Report      * Bios Revision = J51 v01.20
    2014-03-17    07:53:18:061     452    1398    Report      * Bios Name = Default System BIOS
    2014-03-17    07:53:18:061     452    1398    Report      * Bios Release Date = 2011-09-16T00:00:00
    2014-03-17    07:53:18:061     452    1398    Report      * Locale ID = 3081
    2014-03-17    07:53:23:144     452    9fc    Report    CWERReporter finishing event handling. (00000000)
    2014-03-17    07:53:23:362    4672    a50    Misc    ===========  Logging initialized (build: 7.6.7600.256, tz: +0800)  ===========
    2014-03-17    07:53:23:362    4672    a50    Misc      = Process: C:\windows\CCM\CcmExec.exe
    2014-03-17    07:53:23:362    4672    a50    Misc      = Module: C:\Windows\system32\wuapi.dll
    2014-03-17    07:53:23:362    4672    a50    COMAPI    -------------
    2014-03-17    07:53:23:362    4672    a50    COMAPI    -- START --  COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:53:23:362    4672    a50    COMAPI    ---------
    2014-03-17    07:53:23:470     452    9fc    Agent    *************
    2014-03-17    07:53:23:470     452    9fc    Agent    ** START **  Agent: Finding updates [CallerId = CcmExec]
    2014-03-17    07:53:23:470     452    9fc    Agent    *********
    2014-03-17    07:53:23:470    4672    a50    COMAPI    <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:53:23:470     452    9fc    Agent      * Include potentially superseded updates
    2014-03-17    07:53:23:470     452    9fc    Agent      * Online = No; Ignore download priority = Yes
    2014-03-17    07:53:23:470     452    9fc    Agent      * Criteria = "((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E6CF1350-C01B-414D-A61F-263D14D133B4'))"
    2014-03-17    07:53:23:470     452    9fc    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-03-17    07:53:23:470     452    9fc    Agent      * Search Scope = {Machine}
    2014-03-17    07:53:50:191     452    1398    AU    ###########  AU: Initializing Automatic Updates  ###########
    2014-03-17    07:53:50:378     452    1398    AU    AU setting next sqm report timeout to 2014-03-16 23:53:50
    2014-03-17    07:53:50:378     452    1398    AU      # AU disabled through Policy
    2014-03-17    07:53:50:378     452    1398    AU      # Will interact with non-admins (Non-admins are elevated (User preference))
    2014-03-17    07:53:50:409     452    1398    AU    Initializing featured updates
    2014-03-17    07:53:50:409     452    1398    AU    Found 0 cached featured updates
    2014-03-17    07:53:50:409     452    1398    AU    Successfully wrote event for AU health state:0
    2014-03-17    07:53:50:409     452    1398    AU    Successfully wrote event for AU health state:0
    2014-03-17    07:53:50:409     452    1398    AU    AU finished delayed initialization
    2014-03-17    07:53:50:409     452    1398    AU    AU setting next sqm report timeout to 2014-03-17 23:53:50
    2014-03-17    07:55:40:569     452    9fc    Agent    *************
    2014-03-17    07:55:40:591     452    9fc    Report    CWERReporter finishing event handling. (00000000)
    2014-03-17    07:55:40:592    4672    e6c    COMAPI    >>--  RESUMED  -- COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:55:40:936    4672    e6c    COMAPI      - Updates found = 96
    2014-03-17    07:55:40:936    4672    e6c    COMAPI    ---------
    2014-03-17    07:55:40:936    4672    e6c    COMAPI    --  END  --  COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:55:40:936    4672    e6c    COMAPI    -------------
    2014-03-17    07:56:38:889    4672    1534    COMAPI    -------------
    2014-03-17    07:56:38:889    4672    1534    COMAPI    -- START --  COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:56:38:889    4672    1534    COMAPI    ---------
    2014-03-17    07:56:38:891     452    9fc    Agent    *************
    2014-03-17    07:56:38:891     452    9fc    Agent    ** START **  Agent: Finding updates [CallerId = CcmExec]
    2014-03-17    07:56:38:891     452    9fc    Agent    *********
    2014-03-17    07:56:38:891    4672    1534    COMAPI    <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:56:38:891     452    9fc    Agent      * Include potentially superseded updates
    2014-03-17    07:56:38:891     452    9fc    Agent      * Online = No; Ignore download priority = Yes
    2014-03-17    07:56:38:891     452    9fc    Agent      * Criteria = "((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E6CF1350-C01B-414D-A61F-263D14D133B4'))"
    2014-03-17    07:56:38:891     452    9fc    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-03-17    07:56:38:891     452    9fc    Agent      * Search Scope = {Machine}
    279C58FA-1C7C-41B2-81F5-F9D92DD1D8E6}.200 to search result
    2014-03-17    07:56:46:433     452    9fc    Agent      * Added update {B1D0B8FF-1023-438F-BE07-CD893F229A68}.200 to search result
    2014-03-17    07:56:46:462     452    9fc    Agent      * Found 96 updates and 10 categories in search; evaluated appl. rules of 1952 out of 3516 deployed entities
    2014-03-17    07:56:46:463     452    9fc    Agent    *********
    2014-03-17    07:56:46:463     452    9fc    Agent    **  END  **  Agent: Finding updates [CallerId = CcmExec]
    2014-03-17    07:56:46:463     452    9fc    Agent    *************
    2014-03-17    07:56:46:488    4672    a34    COMAPI    >>--  RESUMED  -- COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:56:46:515    4672    a34    COMAPI      - Updates found = 96
    2014-03-17    07:56:46:515    4672    a34    COMAPI    ---------
    2014-03-17    07:56:46:515    4672    a34    COMAPI    --  END  --  COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:56:46:515    4672    a34    COMAPI    -------------
    2014-03-17    07:59:28:666    4672    1ba0    COMAPI    -------------
    2014-03-17    07:59:28:666    4672    1ba0    COMAPI    -- START --  COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:59:28:666    4672    1ba0    COMAPI    ---------
    2014-03-17    07:59:28:668    4672    1ba0    COMAPI    <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:59:28:668     452    9fc    Agent    *************
    2014-03-17    07:59:28:668     452    9fc    Agent    ** START **  Agent: Finding updates [CallerId = CcmExec]
    2014-03-17    07:59:28:668     452    9fc    Agent    *********
    2014-03-17    07:59:28:668     452    9fc    Agent      * Include potentially superseded updates
    2014-03-17    07:59:28:668     452    9fc    Agent      * Online = Yes; Ignore download priority = Yes
    2014-03-17    07:59:28:668     452    9fc    Agent      * Criteria = "((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'A38C835C-2950-4E87-86CC-6911A52C34A3'))"
    2014-03-17    07:59:28:668     452    9fc    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-03-17    07:59:28:668     452    9fc    Agent      * Search Scope = {Machine}
    2014-03-17    07:59:28:755     452    9fc    PT    WARNING: Cached cookie has expired or new PID is available
    2014-03-17    07:59:28:755     452    9fc    PT    Initializing simple targeting cookie, clientId = 553c311c-66c6-4896-a549-521f549398a5, target group = , DNS name = mySiteServer.domain.global
    2014-03-17    07:59:28:755     452    9fc    PT      Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/SimpleAuthWebService/SimpleAuth.asmx
    2014-03-17    07:59:29:227     452    9fc    PT    +++++++++++  PT: Starting category scan  +++++++++++
    2014-03-17    07:59:29:227     452    9fc    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
    2014-03-17    07:59:29:406     452    9fc    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-03-17    07:59:29:406     452    9fc    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
    2014-03-17    07:59:30:089     452    9fc    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2014-03-17    07:59:30:089     452    9fc    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
    2014-03-17    07:59:55:387    4672    1534    COMAPI    ---------
    2014-03-17    07:59:55:388    4672    1534    COMAPI    <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
    2014-03-17    07:59:55:388     452    9fc    Agent    *************
    2014-03-17    07:59:55:388     452    9fc    Agent    ** START **  Agent: Finding updates [CallerId = CcmExec]
    2014-03-17    07:59:55:388     452    9fc    Agent    *********
    2014-03-17    07:59:55:388     452    9fc    Agent      * Include potentially superseded updates
    2014-03-17    07:59:55:388     452    9fc    Agent      * Online = Yes; Ignore download priority = Yes
    2014-03-17    07:59:55:388     452    9fc    Agent      * Criteria = "((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E0789628-CE08-4437-BE74-2495B842F43B'))"
    2014-03-17    07:59:55:389     452    9fc    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-03-17    07:59:55:389     452    9fc    Agent      * Search Scope = {Machine}
    2014-03-17    07:59:55:433     452    9fc    PT    +++++++++++  PT: Starting category scan  +++++++++++
    2014-03-17    07:59:55:433     452    9fc    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
    2014-03-17    08:00:02:360     452    9fc    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-03-17    08:00:02:360     452    9fc    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
    2014-03-17    08:00:16:100     452    9fc    Agent    WARNING: Failed to evaluate Installed rule, updateId = {189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB}.101, hr = 80242013
    2014-03-17    08:00:18:951     452    9fc    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2014-03-17    08:00:18:951     452    9fc    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
    2014-03-17    08:00:19:974     452    1398    AU    Can not perform non-interactive scan if AU is interactive-only
    2014-03-17    08:00:19:979     452    9fc    Agent    *************
    2014-03-17    08:00:20:008     452    9fc    Report    REPORT EVENT: {B2A79652-BABC-46DE-B505-B6CB6D5CD9A8}    2014-03-17 08:00:19:978+0800    1  
     147    101    {00000000-0000-0000-0000-000000000000}    0    0    CcmExec    Success    Software Synchronization    Windows Update
    Client successfully detected 12 updates.
    2014-03-17    08:00:20:008     452    9fc    Report    CWERReporter finishing event handling. (00000000)
    2014-03-17    08:00:20:008    4672    1534    COMAPI    >>--  RESUMED  -- COMAPI: Search [ClientId = CcmExec]
    2014-03-17    08:00:20:013    4672    1534    COMAPI      - Updates found = 12
    2014-03-17    08:00:20:013    4672    1534    COMAPI    ---------
    2014-03-17    08:00:20:013    4672    1534    COMAPI    --  END  --  COMAPI: Search [ClientId = CcmExec]
    2014-03-17    08:00:20:013    4672    1534    COMAPI    -------------
    2014-03-17    08:00:24:973     452    9fc    Report    CWERReporter finishing event handling. (00000000)
    2014-03-17    08:24:46:620    5620    1890    Misc    ===========  Logging initialized (build: 7.6.7600.256, tz: +0800)  ===========
    2014-03-17    08:24:46:620    5620    1890    Misc      = Process: c:\Program Files\Microsoft Security Client\MpCmdRun.exe
    2014-03-17    08:24:46:620    5620    1890    Misc      = Module: C:\Windows\system32\wuapi.dll
    2014-03-17    08:24:46:620    5620    1890    COMAPI    -------------
    2014-03-17    08:24:46:620    5620    1890    COMAPI    -- START --  COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:46:620    5620    1890    COMAPI    ---------
    2014-03-17    08:24:46:623    5620    1890    COMAPI    <<-- SUBMITTED -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:46:623     452    1a78    Agent    *************
    2014-03-17    08:24:46:623     452    1a78    Agent    ** START **  Agent: Finding updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:46:623     452    1a78    Agent    *********
    2014-03-17    08:24:46:623     452    1a78    Agent      * Online = Yes; Ignore download priority = No
    2014-03-17    08:24:46:623     452    1a78    Agent      * Criteria = "(IsInstalled = 0 and IsHidden = 0 and CategoryIDs contains 'a38c835c-2950-4e87-86cc-6911a52c34a3' and
    CategoryIDs contains 'e0789628-ce08-4437-be74-2495b842f43b')"
    2014-03-17    08:24:46:623     452    1a78    Agent      * ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service
    2014-03-17    08:24:46:623     452    1a78    Agent      * Search Scope = {Machine}
    2014-03-17    08:24:46:657     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\muv4wuredir.cab:
    2014-03-17    08:24:46:706     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:48:018     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\muv4wuredir.cab:
    2014-03-17    08:24:48:025     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:48:073     452    1a78    Agent    Checking for updated auth cab for service 7971f918-a847-4430-9279-4a52d1efe18d at http://ds.download.windowsupdate.com/v10/1/microsoftupdate/redir/muauth.cab
    2014-03-17    08:24:48:073     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\AuthCabs\authcab.cab:
    2014-03-17    08:24:48:083     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:48:644     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\AuthCabs\authcab.cab:
    2014-03-17    08:24:48:650     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:48:755     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
    2014-03-17    08:24:48:762     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:49:139     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
    2014-03-17    08:24:49:146     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:49:156     452    1a78    PT    WARNING: Cached cookie has expired or new PID is available
    2014-03-17    08:24:51:859     452    1a78    PT    +++++++++++  PT: Starting category scan  +++++++++++
    2014-03-17    08:24:51:860     452    1a78    PT      + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://update.microsoft.com/v6/ClientWebService/client.asmx
    2014-03-17    08:24:52:293     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
    2014-03-17    08:24:52:296     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:52:570     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
    2014-03-17    08:24:52:577     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:52:584     452    1a78    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-03-17    08:24:52:584     452    1a78    PT      + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://update.microsoft.com/v6/ClientWebService/client.asmx
    2014-03-17    08:24:52:584     452    1a78    PT    WARNING: Cached cookie has expired or new PID is available
    2014-03-17    08:24:54:237     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
    2014-03-17    08:24:54:241     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:54:851     452    1a78    Misc    Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
    2014-03-17    08:24:54:857     452    1a78    Misc     Microsoft signed: Yes
    2014-03-17    08:24:54:864     452    1a78    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2014-03-17    08:24:54:864     452    1a78    PT      + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://update.microsoft.com/v6/ClientWebService/client.asmx
    2014-03-17    08:24:55:403     452    1398    AU    Can not perform non-interactive scan if AU is interactive-only
    2014-03-17    08:24:55:405     452    1a78    Agent    Update {59B2BB4D-839D-4719-8905-48902D4F9E0B}.200 is pruned out due to potential supersedence
    2014-03-17    08:24:55:405     452    1a78    Agent    Update {759CD48D-010A-42E7-84DE-AC43603E653D}.200 is pruned out due to potential supersedence
    2014-03-17    08:24:55:405     452    1a78    Agent    Update {B31982D9-2558-4A53-8EC7-9FF0E865698C}.200 is pruned out due to potential supersedence
    2014-03-17    08:24:55:406     452    1a78    Agent    Update {DB9D9C73-2729-4248-9314-663B427AF113}.200 is pruned out due to potential supersedence
    2014-03-17    08:24:55:406     452    1a78    Agent    Update {7AF502C1-C821-414B-9FD3-47F52F3FD523}.200 is pruned out due to potential supersedence
    2014-03-17    08:24:55:406     452    1a78    Agent      * Added update {33FBE82E-BE96-48C4-9C34-F6AEC8569DC7}.200 to search result
    2014-03-17    08:24:55:406     452    1a78    Agent      * Found 1 updates and 4 categories in search; evaluated appl. rules of 61 out of 76 deployed entities
    2014-03-17    08:24:55:413     452    1a78    Agent    *********
    2014-03-17    08:24:55:413     452    1a78    Agent    **  END  **  Agent: Finding updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:55:413     452    1a78    Agent    *************
    2014-03-17    08:24:55:414    5620    1518    COMAPI    >>--  RESUMED  -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:55:416    5620    1518    COMAPI      - Updates found = 1
    2014-03-17    08:24:55:416    5620    1518    COMAPI    ---------
    2014-03-17    08:24:55:416    5620    1518    COMAPI    --  END  --  COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:55:416    5620    1518    COMAPI    -------------
    2014-03-17    08:24:55:419    5620    b4c    COMAPI    -------------
    2014-03-17    08:24:55:419    5620    b4c    COMAPI    -- START --  COMAPI: Download [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:55:419    5620    b4c    COMAPI    ---------
    2014-03-17    08:24:55:419    5620    b4c    COMAPI      - Forced: No; Download priority: 2
    2014-03-17    08:24:55:419    5620    b4c    COMAPI      - Updates in request: 1
    2014-03-17    08:24:55:419    5620    b4c    COMAPI      - ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service
    2014-03-17    08:24:55:422    5620    b4c    COMAPI    <<-- SUBMITTED -- COMAPI: Download [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:55:422     452    1a78    DnldMgr    *************
    2014-03-17    08:24:55:422     452    1a78    DnldMgr    ** START **  DnldMgr: Downloading updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:55:422     452    1a78    DnldMgr    *********
    2014-03-17    08:24:55:422     452    1a78    DnldMgr      * Call ID = {E0013492-D13F-43AB-896F-8521DE916FCD}
    2014-03-17    08:24:55:422     452    1a78    DnldMgr      * Priority = 2, Interactive = 1, Owner is system = 1, Explicit proxy = 1, Proxy session id = -1, ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}
    2014-03-17    08:24:55:422     452    1a78    DnldMgr      * Updates to download = 1
    2014-03-17    08:24:55:422     452    1a78    Agent      *   Title = Definition Update for Microsoft Endpoint Protection - KB2461484 (Definition 1.167.2113.0)
    2014-03-17    08:24:55:422     452    1a78    Agent      *   UpdateId = {33FBE82E-BE96-48C4-9C34-F6AEC8569DC7}.200
    2014-03-17    08:24:55:422     452    1a78    Agent      *     Bundles 3 updates:
    2014-03-17    08:24:55:422     452    1a78    Agent      *       {7E4CD222-2348-4617-A8FD-4608CA0F5D9C}.200
    2014-03-17    08:24:55:422     452    1a78    Agent      *       {85F7798B-FE1C-4AAB-8B5C-313B2ACB1778}.200
    2014-03-17    08:24:55:422     452    1a78    Agent      *       {F7095866-6910-4D42-B4BE-AA4ECE02D6CA}.200
    2014-03-17    08:24:55:441     452    1a78    DnldMgr    ***********  DnldMgr: New download job [UpdateId = {85F7798B-FE1C-4AAB-8B5C-313B2ACB1778}.200]  ***********
    2014-03-17    08:24:55:492     452    1a78    DnldMgr      * BITS job initialized, JobId = {774F570F-FF72-408E-B8F9-1A9EC2A9DFEC}
    2014-03-17    08:24:55:492     452    1a78    DnldMgr    BITS job {774F570F-FF72-408E-B8F9-1A9EC2A9DFEC} using proxy = nzpr01.domain.co.nz:8080;proxy.domain.co.nz:8080, bypass = <NULL>
    2014-03-17    08:24:55:539     452    1a78    DnldMgr      * Downloading from http://download.windowsupdate.com/msdownload/update/software/defu/2014/03/nis_delta_patch_35110c44392d4ed2952852248b7d4e98730d59d7.exe
    to C:\windows\SoftwareDistribution\Download\5d16f20387cc485e8ab3f76cf00d482d\35110c44392d4ed2952852248b7d4e98730d59d7 (full file).
    2014-03-17    08:24:55:617     452    1a78    DnldMgr    ***********  DnldMgr: New download job [UpdateId = {F7095866-6910-4D42-B4BE-AA4ECE02D6CA}.200]  ***********
    2014-03-17    08:24:55:676     452    1a78    DnldMgr      * BITS job initialized, JobId = {34C6823B-B255-429F-ABB3-31D850C69994}
    2014-03-17    08:24:55:676     452    1a78    DnldMgr    BITS job {34C6823B-B255-429F-ABB3-31D850C69994} using proxy = nzpr01.domain.co.nz:8080;proxy.domain.co.nz:8080, bypass = <NULL>
    2014-03-17    08:24:55:792     452    1a78    DnldMgr      * Downloading from http://download.windowsupdate.com/msdownload/update/software/defu/2014/03/am_delta_4561a4006e1295d251371592cbebc2c18adcca43.exe
    to C:\windows\SoftwareDistribution\Download\8439bb6ce5944930522a2c27c57de50e\4561a4006e1295d251371592cbebc2c18adcca43 (full file).
    2014-03-17    08:24:55:943     452    1a78    Agent    *********
    2014-03-17    08:24:55:943     452    1a78    Agent    **  END  **  Agent: Downloading updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
    2014-03-17    08:24:55:943     452    1a78    Agent    *************
    2014-03-17    08:25:00:411     452    1a78    Report    REPORT EVENT: {4215F4AF-AAF5-4BB5-BE2C-BB09A9BA6176}    2014-03-17 08:24:55:412+0800    1  
     147    101    {00000000-0000-0000-0000-000000000000}    0    0    System Center Endpoint Protecti    Success    Software Synchronization  
     Windows Update Client successfully detected 1 updates.
    2014-03-17    08:25:00:411     452    1a78    Report    CWERReporter finishing event handling. (00000000)
    2014-03-17    08:25:17:443     452    134c    DnldMgr    BITS job {774F570F-FF72-408E-B8F9-1A9EC2A9DFEC} completed successfully
    2014-03-17    08:25:17:486     452    134c    Misc    Validating signature for C:\windows\SoftwareDistribution\Download\5d16f20387cc485e8ab3f76cf00d482d\35110c44392d4ed2952852248b7d4e98730d59d7:
    2014-03-17    08:25:17:496     452    134c    Misc     Microsoft signed: Yes
    2014-03-17    08:25:17:499     452    134c    DnldMgr      Download job bytes total = 76056, bytes transferred = 76056
    2014-03-17    08:25:17:500     452    134c    DnldMgr    ***********  DnldMgr: New download job [UpdateId = {85F7798B-FE1C-4AAB-8B5C-313B2ACB1778}.200]  ***********
    2014-03-17    08:25:17:501     452    134c    DnldMgr      * All files for update were already downloaded and are valid.
    2014-03-17    08:25:22:501     452    1a78    Report    CWERReporter finishing event handling. (00000000)
    Hibs Ya Bass!

  • SCCM 2012 Endpoint Protection initial update not downloaded

    Hi,
    I'm new to SCCM 2012. I recently started deploying the Endpoint  Protection to all of clients (Windos 7 and XP Pro). 
    I've noticed that some clients have not been updating their initial definitions after the Endpoint Protection Software is installed. 
    Since they are not updating their detonation the client remains unprotected with the status icon in red.
    The odd thing is that some of our computers do the initial update just fine while others are effected. 
    Also if I click update manually then the update goes through no issue, but with 100+ clients not updated its not something I want to do manually. 
    The clients are set to receive auto updates via a auto deployment rule. 
    Also the antimalware policy is set to do updates as well in this order: 
    Config Mgr
    WSUS
    Microsoft Malware Protection Center
    Microsoft Update
    Has anyone seen this before? 
    If I need to upload any specific logs just let me know. 
    Many Thanks

    Do you have Software update configured (and working) thru ConfigMgr or using a standalone WSUS?
    Kent Agerlund | My blogs: blog.coretech.dk/kea and
    SCUG.dk/ | Twitter:
    @Agerlund | Linkedin: Kent Agerlund |
    Mastering ConfigMgr 2012 The Fundamentals

  • Why is KB2884678 Endpoint Protection Client Update Expired?

    Hi,
    KB2884678 Update for System Center Endpoint Protection 2012 suddenly expired in my SCCM Software Update Library.  This was just released 10/9/2013.  After testing and planned deployment, I was able to install this to the majority of my clients
    and servers.  However, now it is expired and I am not done yet.
    Why did this update suddenly expired on SCCM? Is there something going on? I don't see a replacement either.

    Thanks! Although it's a bit confusing because it says it superseded KB2865173 and not mentions 2884678.  But you are right.  This must be the replacement because 2884678 brings the client to version 4.3 while 2907566 brings
    the client to 4.4.
    So I guess, do you know by any chance if installing Cumulative Update 3 will upgrade my clients to 4.4 or still 4.3?

  • Forefront Endpoint Protection 2010 updates are not listed as expired

    Hello, so I am working on getting the right update groups setup within SCCM2012.
    I ran into a bunch of updates for FEP2010 that should be expired, but they are not, how do I expire them?
    To be more specific, these are listed as good updates but should be expired in my opinion -
    KB2461484 (Definition 1.123.832)
    KB2461484 (Definition 1.145.1695)
    KB2461484 (Definition 1.155.997)
    KB2461484 (Definition 1.175.1328)
    The latest definitions update as of today is KB2461484 (Definition 1.191.3456) which is in green which is normal.

    Perhaps, somehow, I have no idea how, they were missed is your catalog update process.
    See the answer from Lawrence Garvin in this thread:
    Windows 8
    Defender Showing Hundreds of Needed Definitions After Most Recent Definition Installed
    "This is a known issue. It's caused by the limited number of *superseded* updates that can be listed
    on the newest update."
    Rolf Lidvall, Swedish Radio (Ltd)

  • SCEP 2012 Definition Updates for Linux machines thru SCCM

    We have a situation where SCEP definition needs to be updated on Linux machines which don't have access to internet.
    All I have read is that SCEP functions as stand alone for Linux & Mac machines. Can someone guide thru how do SCEP definitions get updated on Linux machines that are not connected to internet.

    Pls check the below link
    http://www.niallbrady.com/2013/02/22/how-can-i-deploy-system-center-2012-endpoint-protection-definition-updates-from-a-unc-file-shares/
    Thanks, Prabha G

  • Endpoint Protection Client - definitions couldn't be updated

    Am on SCCM 2012 SP2 and have EndPoint protection client deployed to computers during the Task Sequence, and they get the update.
    The next day I will try an update from the client's GUI and will get the error "Virus and spyware definitions couldn't be updated". 
    In the antimalway policy applied to the collection the device is a member of, I indeed have its definition update source set to "Updates from UNC file shares", then in the server path for the UNC, it is set to "\\server.domain.com\D$\sources\Packages\Apps\Microsoft\EP_Definitions\Updates\x86"
    which is where the "mpam-fe.exe" and "nis_full/exe" files are. 
    I have no maintenance windows set on the device collection that this antimalware policy is applied to. 

    Hi, I just wanted to clarify, I only have the "UNC" path as the option for the source of updates. 
    I have also verified that in the registry in hklm policies Microsoft AntiMalware that the UNC path is indeed there and I can manually access the path from Start > Run. 
    I've tried running the Endpoint definitions update manually as an Administrator, and with the Windows Update service in every combo of state I could try, and still nothing (not that I want Endpoint getting updates from the internet anyways). 
    Not sure what we're looking for in the windowsupdate.log but here are the last few lines before the time I tried running the update. The error from definition update doesn't appear to add anything to this log file.
    2014-11-19 18:50:01:854
    1012 10a0
    Service *************
    2014-11-19 18:54:12:693
    2068 1398
    Misc ===========  Logging initialized (build: 7.5.7601.17514, tz: -0600)  ===========
    2014-11-19 18:54:12:693
    2068 1398
    Misc  = Process: C:\WINDOWS\CCM\CcmExec.exe
    2014-11-19 18:54:12:693
    2068 1398
    Misc  = Module: c:\Windows\system32\wuapi.dll
    2014-11-19 18:54:12:693
    2068 1398
    COMAPI FATAL: Unable to connect to the service (hr=80070422)
    2014-11-19 18:54:12:693
    2068 1398
    COMAPI WARNING: Unable to establish connection to the service. (hr=80070422)
    2014-11-19 18:54:33:507
    2068 1098
    COMAPI FATAL: Unable to connect to the service (hr=80070422)
    2014-11-19 18:54:33:507
    2068 1098
    COMAPI WARNING: Unable to establish connection to the service. (hr=80070422)

Maybe you are looking for

  • Share screen not working

    I have OS 10.5.1. So does my colleague. I have an iMac with a camera. He has an iMac without a camera. He has DSL (1.5 mbps), while I have cable modem (16 mbps). From everything I have read about iChat, he should still be able to share his screen wit

  • File Save As not working properly in Photoshop after upgrading to Lion

    I have recently upgraded to Lion and I am finding that I cannot browse the disk when using file save as in Photoshop. I click on the icons to expand the folders but nothing happens. Does anybody know a solution to this problem?

  • Safari not displaying certain texts on YouTube pages properly

    Hi, I've been having this weird problem with Safari for almost two months now even before the 5.1.4 update. I even went to Apple Genius with my macbook pro and they said the problem is minor and should be fixed with the new update (5.1.4), but the pr

  • How to override hashcode() in String

    I need to override the hashcode() method in java.lang.String with a cyclic shift hash code. how do I do this? String is final so I cannot extend it. I've looked at all the postings regarding the logic of why hashcode() must be overwritten with equals

  • How to open PDF files online within IE8 or IE9 ?

    IE8 and IE9, how to set up to display the PDF link open button, at present can only display the save button and cancel button. While IE7 can display the open, save and cancel three buttons. if you know, please tell me. or email to [removed]