Group Policy Configure Automatic Updates to DISABLED

 Single Primary Site running SCCM 2012 R2. SUP configured using port 8530/8531.
Group Policy Configure Automatic Updates to DISABLED. is in place.
Do we need to disable the group policy for SCCM to deploy updates?
if it stays then how do we distribute an updated WUA using software distribution in ConfigMgr?
http://blog.configmgrftw.com/software-updates-management-and-group-policy-for-configmgr-cont/  

It used to be possible by using the links provided in the cab file mentioned in this article:
http://msdn.microsoft.com/en-us/library/windows/desktop/aa387285(v=vs.85).aspx
I have to admit that I did not do that recently..
My Blog: http://www.petervanderwoude.nl/
Follow me on twitter: pvanderwoude

Similar Messages

  • WSUS and GPO - Configure Automatic Updates

    if Configure Automatic Updates is disabled for all of my domain, can I still use WSUS to update my clients?

    Hi,
    In brief, no.
    If we change Configure Automatic Updates to Disabled, any client updates that are available from the public Windows Update service must be manually downloaded from the Internet and installed.
    For detailed information, please refer to the link below,
    http://technet.microsoft.com/en-us/library/dn595129.aspx#BKMK_Comp5
    Best Regards.
    Steven Lee Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • I need to know how I can disable the automatic updates of Firefox, since I work in a company that is requiring this. Ideally, by group policy or some means to disable all network computers

    I need to know how I can disable the automatic updates of Firefox, since I work in a company that is requiring this.
    Ideally, by group policy or some means to disable all network computers

    Some info here (group policy) --> http://www.unidesk.com/blog/how-disable-firefox-auto-updates<br />
    Above article refers to --> http://sourceforge.net/projects/firefoxadm/
    '''If this reply solves your problem, please click "Solved It" next to this reply when <u>signed-in</u> to the forum.'''

  • How can I deploy EFS using Group Policy and automatically encrypt computers for ALL users who login?

    How can I deploy EFS using Group Policy and Active Directory with a goal to automatically encrypt computers for ALL users who login? (NOT an option for me to use BitLocker)
    I was asked to deploy EFS to encrypt the user my documents folder and profile on all of the users laptops. The laptops are in common areas (board meeting rooms, etc) and security of files is a must.
    I successfully created a recovery certificate in AD. I created an OU and setup an EFS policy and users can now login and select to encrypt their own files. The issue is that management would like to have automaticy Encrypt ALL users my documents AUTOMATICALLY
    when a user login.
    Can this be done?
    Please help

    Hi,
    Any update?
    Just checking in to see if the suggestions were helpful. Please let us know if you would like further assistance.
    Best Regards,
    Andy Qi
    TechNet Subscriber Support
    If you are
    TechNet Subscription user and have any feedback on our support quality, please send your feedback
    here.
    Andy Qi
    TechNet Community Support

  • Configuring Automatic Updates using Powershell for Server 2012: wsuaserv service invalid

    This server is configured as a core server (no gui).
    In the following article, to enable automatic updates, one method is to configure the wsuaserv service:
    http://technet.microsoft.com/en-us/library/jj574100.aspx
    Doing the first step, I get the following:
    c:\windows>net stop wsuaserv
    The service name is invalid.
    More help is available by typing NET HELPMSG 2185.
    Why do I get this and how can I fix it?
    Thanks
    -- aeoril
    Scott Sanbar, Chief Engineer, Sanbar Computing http://www.sanbarcomputing.com

    Uh, he meant the command at the bottom on the referenced web page, not the net helpmsg.
    If you look at the original post, the name of the service IS incorrect, just as you specified it incorrectly.  The service name is 'wuauserv'.  So it is not Microsoft has renamed the service; you have tried to rename the service. <wink>
    . : | : . : | : . tim

  • IOS 7 App automatic update even disabled

    Hi,
    My iPhone 4s on iOS 7.0.2 automatically updates its Apps using 3G, even all Automatical Downloads and Use Cellular Data are disabled. I almost run out of my data allowance in one day. I wonder what is going on and how to prevent it.
    Any idea is highly appreciated.
    allanzh

    Well, this morning when I was in bus I checked the app update and was going to do the update at work using office wifi. When I got off bus I found it was already done. And without a prompt for my password. In the afternoon, I checked the my data usage and confirmed that it had been done through 3G.
    Anyway, I will test it later when more updates are coming.

  • Automatically update option disabled in iTunes summary - no push happening!

    Changes I am making in Calendar and contacts does not appear to be pushing to my iPhone which is on 2.0. In iTunes summary page, the option to Automatically update the iPhone is disabled and unchecked - I can't change it - is this why the facility is not working. Also, in the Settings > Fetch menu it just says that Push is happening for Mail, I never had the option to select Calendars and Contacts as detailed in the Apple MobileMe tutorial. Can someone help, also perhaps explain how this Push thing is working - is it happening over 3G as I don't get the best 3G coverage and am inclined ot switch it off - will I still be eligiible for Push?

    The Podcasts tab in iPod preferences only applies to podcasts you've downloaded via iTunes. Podcasts in your library are considered music even when the Genre is set to "Podcast".
    To automatically transfer those files to you iPod, create a (smart) playlist with just the podcasts and choose "Automatically update selected playlists only" from the Music tab in iPod preferences.

  • App Store won't show updates if automatic update is disabled

    After updating to iOS 7, I enabled automatic updating of Apps in the App Store.   I decided I didn't want to do that so I then disabled it.  That was yesterday.  Today the App Store update page didn't show any pending updates despite having a badge number (which went away when I went into the store).  I knew there were updates since they downloaded to iTunes yesterday so I tried killing the App Store app and loading it again, but nothing changed.  Finally I enable automatic updates and sure enough the App Store showed there were 11 pending updates and started downloading them. 
    When it was done, I turned automatic updates off again, but the App Store doesn't appear to check for or show updates if downloading of automatic updates is turned on and then back of.  Is this working for anyone?

    I am having similar problems.  The App Store icon badge is not updating.  I do not use automatic updates.  I update all my apps on iTunes on a Windows PC and then sync my iPads and iPhone.  The icon badge does not update until the App Store is initiated and Updates is selected.  Another strange behavior is that if App Store was initiated and Updates was selected with one or more updates displayed AND the the device is locked, when the device is unlocked the Updates display will be cleared and indicate that all apps are up to date!!!!  The App Store must be exited and Updates reselected before the updates are displayed and the appropriate icon badge count is displayed.
    You can only rely on an appropriate update count on the device by initiating the App Store (from the Home screen) and selecting Updates.

  • How to configure automatic updation of check number in FCHU from FCH5

    Dear all,
    My requirement is after posting to FCH5 system automatically update this check number in Payment document number  (posted in F-53) with out using FCHU

    Dear friend,
    We are currently following the below steps
    1) out going payment in F-53
    2) Manual check creation in FCH5
    3) entering check number in posted document (step 1) above in FCHU
    we would like to combine the process of ste2 and 3.
    Thanks,
    Srini.

  • X220 Windows Automatic Updates Keep Disabling

    We have 2 new Thinkpad X220's, both running Win 7 Pro, and they both have this same problem.  We have Windows Update set to 'Install Updates Automatically'.  Every 30 minutes or so, that setting gets disabled to 'Never Check for Updates'.
    I've run scans for malware and viruses but both systems appear to be clean.
    Any help would really be appreciated.

    If you don't think its a being caused by malware,try re-installing Windows update agent. (or) you can use the built in Diagnostics of Windows 7 to resolve your issue.
    Go to Control Panel--> System and Security--> Troubleshoot common computer problems(Under Action center) -->Fix problem with Windows update.
    The agent may figure out what went wrong and may give you suggestions or reslve your issue. I hope this heps
    Cheers and regards,
    • » νιנαソѕαяα∂нι ѕαмανє∂αм ™ « •
    ●๋•کáŕádhí'ک díáŕý ツ
    I am a volunteer here. I don't work for Lenovo

  • Windows Update Group Policy Settings?

    I browsed through SCCM 2012 documentation for an answer of what to set in a GPO when wanting to use SCCM 2012 SP1 to handle updates.
    At the moment I have:
    WSUS/Reporting pointing to wsus server and its appropriate ports
    Allow Automatic Updates immediate installation: Enabled
    All signed updates from intranet Microsoft Updates: Enabled
    Configure Automatic Updates: Enabled
      Configure automatic Updating - 4 Auto download and schedule the install
      Scheduled install day: Every Friday
      Scheduled install time: 21:00
    Enabling Windows Update Power Management to auto wakeup the system to install Enabled
    No auto-restart with logged on users for scheduled automatic updates installations: Enabled
    Reschedule Automatic Updates scheduled installation: Disabled
    I didn't see any hint, perhaps it is there and I missed it, on what might be the prescribed settings for a GPO.
    What is happening is Windows 8ish is drawing a band across the screen and reporting that your computer needs to reboot; and then reboots.  From what I could tell in the WindowsUpdate.log file is that round the time it was observed rebooting smsexec
    requested a reboot. But oddly I also saw in the Windows Update log was a reboot was scheduled to expire on the 26th, two days after the observed behavior and I also saw that other reboot requests either expired or had been scheduled.
    What I have recently done to various Windows Update deployments was to remove the check boxes for Deadline behavior to prevent Software Updates and System restarts outside the Maintenance Window and also checked Device restart behavior
    Suppress system restart on the following devices Servers and Workstations.
    At the moment I would like to figure out what the GPO settings should be and also how to determine what had requested reboot and when and if the reboot actually happened.
    Thanks!

    This blog series by Jason should help you with that (it's still applicable):
    http://blog.configmgrftw.com/software-update-management-and-group-policy-for-configmgr-what-else/
    http://blog.configmgrftw.com/software-updates-management-and-group-policy-for-configmgr-cont/
    My Blog: http://www.petervanderwoude.nl/
    Follow me on twitter: pvanderwoude

  • Question on a specific Group Policy setting for SCCM Updates

    Hello,
    This may not exactly be the correct forum for this question but in looking around I didn't come up with an immediate answer and was hoping someone else had this issue.
    I have a WSUS server and am moving over to SCCM for updates. I've actually had success in getting 2 sets of patches installed after some very frustrating days thanks to people here.
    I've noticed that when I switch workstations to my AD folder that has the SCCM Updates GPO instead of our standard WSUS GPO that we get action center errors "Set up Windows Update", "Windows Update is not set up". When we click
    the flag it tells us to "Choose an Update Option".
    In my new GPO I  do have Configure Automatic Updates Enabled for "Auto Download and notify for install" but we still get this warning. Is there a differnet setting that controls this action that anyone is aware of in their experience? I looked
    through the other settings but didn't se anything obvious.
    Thanks for any help!

    Hi Dustin,
    I'd read a number of different things trying to solve the problem. That article looked a little familiar but I re-read it carefully.
    I do have "specify intranet Microsoft Update service location" set to Not Configured as someone had correctly pointed me to that as the reason I was not getting updates.
    I did not have "Allow signed updates from an Intranet Micorsoft update server" enabled so that shoudl help some.
    "Configure Automatic Updates" was enabled because I, incorectly, thoguth that's all that might be needed since Ihad to make sure I'd Not Configured the first setting.
    I had "Turn on Recommended Updates" Enabled so I put it back to not configured.
    I understand that turning things to Not Configured doesn't necessarily change any previous group policy settings so I may be getting some fallout from having a WSUS server on these systems before. I'd just like to aviod having to have everyone go into the
    action center and manually click to configure updates.
    I'll see if my one setting change has any effect.
    UPDATE: I forced a gpupdate and the red flag in the action center has not disappeared.

  • Compliance Settings Adobe flash Player disable Automatic Updates Powershell Scripts fail

    Hello,
    I have setup compliance to check and remediate if Adobe flash Player automatic updates is enabled by using PowerShell scripts.
    If I run the scripts below manually on my pc they work fine, but if I run in sccm 2012 compliance I get:
    Setting Discovery Error
    0x87d00327
    Script is not signed
    CCM
    I tried contacting the person that created the scripts, but didn't get a response.
    Discovery Script
    Set-ExecutionPolicy Unrestricted -force
    <#
      This script will check if automatic updates is disabled and return a Compliant/Non-Compliant string.
      Created:     04.08.2014
      Version:     1.0
      Author:      Odd-Magne Kristoffersen
      Homepage:    https://sccmguru.wordpress.com/
      References:
      - Configure auto-update notification Flash Player
    http://helpx.adobe.com/flash-player/kb/administration-configure-auto-update-notification.html
      - Adobe Flash Player Administration Guide for Flash Player 14
    http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/devnet/flashplayer/pdfs/flash_player_14_0_admin_guide.pdf
      - Adobe Flash Player Administration Guide for Microsoft Windows 8
    http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/devnet/flashplayer/pdfs/flash_player_13_0_admin_guide.pdf
    #>
    $OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture
    If($OSArchitecture.OSArchitecture -ne "32-bit")
        $CFGExists = Test-Path -Path "$Env:WinDir\SysWow64\Macromed\Flash\mms.cfg"
             if($CFGExists -eq $True)
             {$UpdateCheck = Select-String "$Env:WinDir\SysWow64\Macromed\Flash\mms.cfg" -pattern "AutoUpdateDisable=1" | Select-Object Line}
                if($UpdateCheck.Line -eq 'AutoUpdateDisable=1') {Write-Host 'Compliant'}
                else {Write-Host 'Non-Compliant'}
    else
        $CFGExists = Test-Path -Path "$Env:WinDir\System32\Macromed\Flash\mms.cfg"
             if($CFGExists -eq $True)
             {$UpdateCheck = Select-String "$Env:WinDir\System32\Macromed\Flash\mms.cfg" -pattern "AutoUpdateDisable=1" | Select-Object Line}
                if($UpdateCheck.Line -eq 'AutoUpdateDisable=1') {Write-Host 'Compliant'}
                else {Write-Host 'Non-Compliant'}
    Remediation Script
    Set-ExecutionPolicy Unrestricted -force
    <#
      This script will check if automatic updates is disabled and return a Compliant/Non-Compliant string.
      Created:     04.08.2014
      Version:     1.0
      Author:      Odd-Magne Kristoffersen
      Homepage:    https://sccmguru.wordpress.com/
      References:
      - Configure auto-update notification Flash Player
    http://helpx.adobe.com/flash-player/kb/administration-configure-auto-update-notification.html
      - Adobe Flash Player Administration Guide for Flash Player 14
    http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/devnet/flashplayer/pdfs/flash_player_14_0_admin_guide.pdf
      - Adobe Flash Player Administration Guide for Microsoft Windows 8
    http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/devnet/flashplayer/pdfs/flash_player_13_0_admin_guide.pdf
    #>
    $OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture
    If($OSArchitecture.OSArchitecture -ne "32-bit")
        $CFGExists = Test-Path -Path "$Env:WinDir\SysWow64\Macromed\Flash\mms.cfg"
             if($CFGExists -eq $True)
             {$UpdateCheck = Select-String "$Env:WinDir\SysWow64\Macromed\Flash\mms.cfg" -pattern "AutoUpdateDisable=1" | Select-Object Line}
                if($UpdateCheck.Line -eq 'AutoUpdateDisable=1') {Write-Host 'Compliant'}
                else {Write-Host 'Non-Compliant'}
    else
        $CFGExists = Test-Path -Path "$Env:WinDir\System32\Macromed\Flash\mms.cfg"
             if($CFGExists -eq $True)
             {$UpdateCheck = Select-String "$Env:WinDir\System32\Macromed\Flash\mms.cfg" -pattern "AutoUpdateDisable=1" | Select-Object Line}
                if($UpdateCheck.Line -eq 'AutoUpdateDisable=1') {Write-Host 'Compliant'}
                else {Write-Host 'Non-Compliant'}
    Thanks,
    Mark

    Hi Jeff,
    You were correct, Default client settings was set to All signed and once I set to bypass, PowerShell Scripts executed.  But now I am getting:    If I run them both from PowerShell, they work fine. Thanks again for your help, Mark
    Error Type
    Error Code
    Error Description
    Error Source
     Enforcement Error
    0x87d00329
    Application requirement evaluation or detection failed
    CCM

  • Windows automatic update disabled

    I removed a Lenovo program thinking it was extraneous and now my automatic update for windows no longer functions. I can't remember the name of the program I discarded but it's absence is sorely felt, any ideas?

    I am using Windows xp. I get a message telling me that Window Automatic update is disabled. When I go to System, Automatic updates the setting is checked for automatic but it is "greyed over". If I go to the Windows Update site I get the following messsage
    Automatic Updates (allows the site to find, download and install high-priority updates for your computer)
    Background Intelligent Transfer Service (BITS) (helps updates download more quickly and without problems if the download process is interrupted)
    Event Log (keeps a record of updating activities to help with troubleshooting, if needed)
    To make sure these services are running:
    1. Click Start, and then click Run.
    2. Type services.msc and then click OK.
    3. In the list of services, double-click on Automatic Updates and then click Properties.
    4. In the Startup type list, select Automatic and click Apply.
    5. Verify that the Service status is started, if the Service Status is Stopped click on the Start Button.
    6. In the list of services, double-click on Background Intelligent Transfer Service (BITS) and then click Properties.
    7. In the Startup type list, select Manual and click Apply.
    8. Verify that the Service status is started, If the Service Status is Stopped click on the Start Button.
    9. In the list of services, double-click on Event Log and then click Properties.
    10. In the Startup type list, select Automatic and click Apply.
    11. Verify that the Service status is started, If the Service Status is Stopped click on the Start Button.
    When I try to enable the Automatic Backup I get "Error #1058"

  • "Failure configuring Windows updates. Reverting changes" - Post-reboot status 0x800f0922

    Server 2012 [6.2.9200] Standard Core
    VMWare VM running in BIOS mode (*not* UEFI)
    It is a production Read-Only Domain Controller. DC functionality is currently unaffected. Replication and diag all show 'green'
    We have an internal WSUS server and there are currently 8 pending updates:
    Security Update for Windows Server 2012 (KB2853587)
    Security Update for Windows Server 2012 (KB2923392)
    Security Update for Windows Server 2012 (KB2973501)
    Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 8 and Windows Server 2012 x64 (KB2978042)
    Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 8 and Windows Server 2012 x64 (KB2979577)
    Update for Windows Server 2012 (KB2995387)
    Security Update for Windows Server 2012 (KB3000061)
    Update for Windows Server 2012 (KB3000988)
    Regardless of whether I install them all at once or go through them one by one, upon reboot, I get the error message ""Failure configuring Windows updates. Reverting changes". This box has previously had updates applied successfully however
    the last successful update was prior to installing the ADDS role and promoting it to a RODC.
    ReportingEvents.log
    {A94C6378-4107-430E-9B9D-76088CE63CFF} 2014-10-17 09:30:16:165-0400 1 147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 (null) Success Software Synchronization Windows Update Client successfully detected 8 updates.
    {ED5CABD7-8DB0-4C53-AFD1-E292BB5A8198} 2014-10-17 09:30:16:165-0400 1 156 [AGENT_STATUS_30] 101 {00000000-0000-0000-0000-000000000000} 0 0 (null) Success Pre-Deployment Check Reporting client status.
    {559FBACF-6FCB-4540-A999-A566C128FEAF} 2014-10-17 09:35:31:851-0400 1 147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 (null) Success Software Synchronization Windows Update Client successfully detected 8 updates.
    {0C901AA0-07A7-4540-8A12-39F30770E2D5} 2014-10-17 09:35:40:665-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {CD2A752F-FF51-46A5-8134-54DD0AE32D2A} 202 0 (null) Success Content Download Download succeeded.
    {2B0E6215-61FA-4A5E-9C61-3926CA038D4C} 2014-10-17 09:35:42:256-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {4193EAE0-AE33-4774-B479-D9660D15E5F2} 201 0 (null) Success Content Download Download succeeded.
    {200D0802-2103-42D7-B827-D8D030CD088F} 2014-10-17 09:35:45:953-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {2346EB42-185C-49CC-9856-190C294FE502} 202 0 (null) Success Content Download Download succeeded.
    {BAE97C9F-94AB-4E09-8388-471B101153C3} 2014-10-17 09:35:48:418-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {8001616A-1D31-4D17-B3DC-861E3CE0C3E3} 202 0 (null) Success Content Download Download succeeded.
    {DD2DDC26-4878-4341-A624-6554B0265CB9} 2014-10-17 09:35:50:493-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {C822D00A-FEC3-4B65-8F63-6E6BEA292944} 203 0 (null) Success Content Download Download succeeded.
    {A6036EBE-D66E-4840-B6C8-409F036106BC} 2014-10-17 09:35:56:405-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {FD33CBA9-736E-4E42-8FC6-91F5534670C6} 200 0 (null) Success Content Download Download succeeded.
    {62F5A078-93F6-45FE-934F-E4F443E6BE69} 2014-10-17 09:35:57:029-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {DF82A201-7E54-420E-A08C-3281F731C3D7} 202 0 (null) Success Content Download Download succeeded.
    {CFAE64D9-FFCA-49A7-911D-134F7307D308} 2014-10-17 09:36:01:897-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {957ACF74-78FB-4045-91E5-A8714DD0915F} 200 0 (null) Success Content Download Download succeeded.
    {A3ADCF16-5037-493E-BB35-D9CB373DAA3D} 2014-10-17 09:36:03:831-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {CD2A752F-FF51-46A5-8134-54DD0AE32D2A} 202 240005 (null) Success Content Install Installation pending.
    {178EA9C2-BF23-4219-946A-66DA592F88D9} 2014-10-17 09:36:04:642-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {4193EAE0-AE33-4774-B479-D9660D15E5F2} 201 240005 (null) Success Content Install Installation pending.
    {15D42F71-652C-4D52-92F5-BD5453AC9E5E} 2014-10-17 09:36:06:171-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {2346EB42-185C-49CC-9856-190C294FE502} 202 240005 (null) Success Content Install Installation pending.
    {09EA6B96-82E0-4E60-9927-E05905FAEFEA} 2014-10-17 09:36:07:793-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {8001616A-1D31-4D17-B3DC-861E3CE0C3E3} 202 240005 (null) Success Content Install Installation pending.
    {42CEC48F-3F9D-461A-8E27-C906775E8828} 2014-10-17 09:36:09:868-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {C822D00A-FEC3-4B65-8F63-6E6BEA292944} 203 240005 (null) Success Content Install Installation pending.
    {8726869B-6485-4754-BAD6-6F4B475F46B4} 2014-10-17 09:36:15:999-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {FD33CBA9-736E-4E42-8FC6-91F5534670C6} 200 240005 (null) Success Content Install Installation pending.
    {409A3494-2A03-4F15-825D-1D41371DC87F} 2014-10-17 09:36:19:322-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {DF82A201-7E54-420E-A08C-3281F731C3D7} 202 240005 (null) Success Content Install Installation pending.
    {52965D52-2DB3-4E88-9481-4D3D59AD52D5} 2014-10-17 09:36:26:810-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {957ACF74-78FB-4045-91E5-A8714DD0915F} 200 240005 (null) Success Content Install Installation pending.
    {F43E4A5F-E53C-4554-A905-A1B41EE024E0} 2014-10-17 09:40:24:927-0400 1 182 [AGENT_INSTALLING_FAILED] 101 {957ACF74-78FB-4045-91E5-A8714DD0915F} 200 800f0922 (null) Failure Content Install Installation Failure: Windows failed to install the following update with error 0x800f0922: Update for Windows Server 2012 (KB3000988).
    {B7504C25-377E-4FB2-83DD-6B8EF50AA081} 2014-10-17 09:40:24:942-0400 1 182 [AGENT_INSTALLING_FAILED] 101 {DF82A201-7E54-420E-A08C-3281F731C3D7} 202 800f0922 (null) Failure Content Install Installation Failure: Windows failed to install the following update with error 0x800f0922: Security Update for Windows Server 2012 (KB3000061).
    {0B2C14FB-5000-4BFD-A06B-73AB944D7297} 2014-10-17 09:40:24:942-0400 1 182 [AGENT_INSTALLING_FAILED] 101 {FD33CBA9-736E-4E42-8FC6-91F5534670C6} 200 800f0922 (null) Failure Content Install Installation Failure: Windows failed to install the following update with error 0x800f0922: Update for Windows Server 2012 (KB2995387).
    {8FDB7384-BD2B-4B29-9A12-02075A4B0A55} 2014-10-17 09:40:24:942-0400 1 182 [AGENT_INSTALLING_FAILED] 101 {C822D00A-FEC3-4B65-8F63-6E6BEA292944} 203 800f0922 (null) Failure Content Install Installation Failure: Windows failed to install the following update with error 0x800f0922: Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 8 and Windows Server 2012 x64 (KB2979577).
    {AB2869B9-963E-445B-BC05-655B1D007912} 2014-10-17 09:40:24:942-0400 1 182 [AGENT_INSTALLING_FAILED] 101 {8001616A-1D31-4D17-B3DC-861E3CE0C3E3} 202 800f0922 (null) Failure Content Install Installation Failure: Windows failed to install the following update with error 0x800f0922: Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 8 and Windows Server 2012 x64 (KB2978042).
    {70C10EF0-4C29-4333-9DB3-F9F6A24E33F2} 2014-10-17 09:40:24:942-0400 1 182 [AGENT_INSTALLING_FAILED] 101 {2346EB42-185C-49CC-9856-190C294FE502} 202 800f0922 (null) Failure Content Install Installation Failure: Windows failed to install the following update with error 0x800f0922: Security Update for Windows Server 2012 (KB2973501).
    {AE7088FF-7517-46DE-ABB5-873A0B8B8B09} 2014-10-17 09:40:24:957-0400 1 182 [AGENT_INSTALLING_FAILED] 101 {4193EAE0-AE33-4774-B479-D9660D15E5F2} 201 800f0922 (null) Failure Content Install Installation Failure: Windows failed to install the following update with error 0x800f0922: Security Update for Windows Server 2012 (KB2923392).
    {3577AE7C-A861-43B6-A7B4-65383F6148F3} 2014-10-17 09:40:24:973-0400 1 182 [AGENT_INSTALLING_FAILED] 101 {CD2A752F-FF51-46A5-8134-54DD0AE32D2A} 202 800f0922 (null) Failure Content Install Installation Failure: Windows failed to install the following update with error 0x800f0922: Security Update for Windows Server 2012 (KB2853587).
    {FE35AF71-70B3-4637-AED1-F2F9CBF2B282} 2014-10-17 10:08:14:141-0400 1 147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 (null) Success Software Synchronization Windows Update Client successfully detected 8 updates.
    {CBD02322-EA98-4C5C-8DD2-137FFAC595B7} 2014-10-17 10:08:14:141-0400 1 156 [AGENT_STATUS_30] 101 {00000000-0000-0000-0000-000000000000} 0 0 (null) Success Pre-Deployment Check Reporting client status.
    I have taken the following steps based on research without success:
    Restarted the box - try again
    Complete shutdown - try again
    verified with my VMWare admins that there is no 'Secure Boot' or similar option set on the VM
    Shutdown wuauserv, renamed SoftwareDistribution, started the service back up, reattempt
    installed, but did not enable/configure, BitLocker Drive Encryption feature
    sfc /scannow - no errors found
    dism /online /cleanup-image /checkhealth and /scanhealth - neither found any issues
    verified that the 'System Reserved Partition' is the correct size (350MB) and has free space (115MB)
    deactivated the OS license, reactivated the OS license - no change
    Pointed to the MS Windows Update servers instead of local WSUS
    I have a little flexibility in how I repair this box. Given that DC functionality is unaffected and that this specific DC is not used heavily I want to try to repair it rather than wipe it out and rebuild it. I have not yet attempted to run updates on our
    other, non-Read-Only DCs. If I run in to the same problem on them, I won't have as much leeway so I want to try to come up with a repair process if needed. I also have some concern regarding my ability to demote it from it's DC role given its current state.
    There is nothing to indicate that that would also be a problem, but I would prefer to get it in working order before attempting a demotion.
    Any help and insight would be greatly appreciated.
    Full WindowsUpdate.log to follow due to post size restrictions.
    Justin Cervero - MS Enterprise Admin - Appalachian State University

    Pre-Reboot WindowsUpdate.log
    Misc =========== Logging initialized (build: 7.8.9200.17099, tz: -0400) ===========
    Misc = Process: C:\Windows\system32\svchost.exe
    Misc = Module: c:\windows\system32\wuaueng.dll
    Service *************
    Service ** START ** Service: Service startup
    Service *********
    Agent * WU client version 7.8.9200.17099
    Agent * Base directory: C:\Windows\SoftwareDistribution
    Agent * Access type: No proxy
    Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    Service UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
    Agent * Network state: Connected
    Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    Service UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
    DtaStor Default service for AU is {00000000-0000-0000-0000-000000000000}
    DtaStor Default service for AU is {9482F4B4-E343-43B6-B170-9A65BC822C77}
    DtaStor Data store successfully created
    Agent *********** Agent: Initializing global settings cache ***********
    Agent * Endpoint Provider: 00000000-0000-0000-0000-000000000000
    Agent * WSUS server: http://wsusserver
    Agent * WSUS status server: http://wsusserver
    Agent * Target group: Systems
    Agent * Windows Update access disabled: No
    Misc WARNING: Network Cost is assumed to be not supported as something failed with trying to get handles to wcmapi.dll
    WuTask WuTaskManager delay initialize completed successfully..
    Report CWERReporter::Init succeeded
    Agent *********** Agent: Initializing Windows Update Agent ***********
    DnldMgr Download manager restoring 0 downloads
    AU ########### AU: Initializing Automatic Updates ###########
    AU AIR Mode is disabled
    AU # Policy Driven Provider: http://wsusserver
    AU # Detection frequency: 22
    AU # Target group: Systems
    AU # Approval type: Pre-install notify (Policy)
    AU # Auto-install minor updates: No (User preference)
    AU # Will interact with non-admins (Non-admins are elevated (Policy))
    AU WARNING: Failed to get Wu Exemption info from NLM, assuming not exempt, error = 0x80240037
    AU AU finished delayed initialization
    Misc =========== Logging initialized (build: 7.8.9200.17099, tz: -0400) ===========
    Misc = Process: C:\Windows\System32\cscript.exe
    Misc = Module: C:\Windows\System32\wuapi.dll
    COMAPI -------------
    COMAPI -- START -- COMAPI: Init Search [ClientId = <NULL>]
    COMAPI ---------
    COMAPI -------------
    COMAPI -- START -- COMAPI: Search [ClientId = <NULL>]
    COMAPI ---------
    Report *********** Report: Initializing static reporting data ***********
    Report * OS Version = 6.2.9200.0.0.131344
    Report * OS Product Type = 0x00000007
    Report * Computer Brand = VMware, Inc.
    Report * Computer Model = VMware Virtual Platform
    Report * Platform Role = 1
    Report * AlwaysOn/AlwaysConnected (AOAC) = 0
    Report * Bios Revision = 6.00
    Report * Bios Name = PhoenixBIOS 4.0 Release 6.0
    Report * Bios Release Date = 2013-07-30T00:00:00
    Report * Bios Sku Number unavailable.
    Report * Bios Vendor = Phoenix Technologies LTD
    Report * Bios Family unavailable.
    Report * Bios Major Release = 4
    Report * Bios Minor Release = 6
    Report * Locale ID = 1033
    COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = <NULL>]
    Agent *************
    Agent ** START ** Agent: Finding updates [CallerId = ]
    Agent *********
    Agent * Online = Yes; Ignore download priority = No
    Agent * Criteria = "IsInstalled=0 and Type='Software'"
    Agent * ServiceID = {00000000-0000-0000-0000-000000000000} Third party service
    Agent * Search Scope = {Machine}
    Agent * Caller SID for Applicability: S-1-5-21-3125904992-2106718063-2989486192-100700
    EP Got WSUS Client/Server URL: "http://wsusserver/ClientWebService/client.asmx"
    PT +++++++++++ PT: Synchronizing server updates +++++++++++
    PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsusserver/ClientWebService/client.asmx
    PT WARNING: Cached cookie has expired or new PID is available
    EP Got WSUS SimpleTargeting URL: "http://wsusserver"
    PT Initializing simple targeting cookie, clientId = 5cb617c5-4bcc-44a6-a8bc-6f5d116a9dc3, target group = Systems, DNS name = rodcserver
    PT Server URL = http://wsusserver/SimpleAuthWebService/SimpleAuth.asmx
    Driver WARNING: No system hardware ids found
    PT +++++++++++ PT: Synchronizing extended update info +++++++++++
    PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsusserver/ClientWebService/client.asmx
    Agent * Added update {CD2A752F-FF51-46A5-8134-54DD0AE32D2A}.202 to search result
    Agent * Added update {4193EAE0-AE33-4774-B479-D9660D15E5F2}.201 to search result
    Agent * Added update {2346EB42-185C-49CC-9856-190C294FE502}.202 to search result
    Agent * Added update {8001616A-1D31-4D17-B3DC-861E3CE0C3E3}.202 to search result
    Agent * Added update {C822D00A-FEC3-4B65-8F63-6E6BEA292944}.203 to search result
    Agent * Added update {FD33CBA9-736E-4E42-8FC6-91F5534670C6}.200 to search result
    Agent * Added update {DF82A201-7E54-420E-A08C-3281F731C3D7}.202 to search result
    Agent * Added update {957ACF74-78FB-4045-91E5-A8714DD0915F}.200 to search result
    Agent * Found 8 updates and 73 categories in search; evaluated appl. rules of 693 out of 1048 deployed entities
    Agent Reporting status event with 8 installable, 92 installed, 0 installed pending, 0 failed and 0 downloaded updates
    Agent *********
    Agent ** END ** Agent: Finding updates [CallerId = ]
    Agent *************
    Report REPORT EVENT: {A4CA39D6-71D6-48DB-B678-7A793B95B2A0} 2014-10-16 21:01:20:736-0400 1 147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 (null) Success Software Synchronization Windows Update Client successfully detected 8 updates.
    Report REPORT EVENT: {3F841CDC-22AC-4A45-8A6A-C426A1CA65C9} 2014-10-16 21:01:20:736-0400 1 156 [AGENT_STATUS_30] 101 {00000000-0000-0000-0000-000000000000} 0 0 (null) Success Pre-Deployment Check Reporting client status.
    COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = <NULL>]
    Report CWERReporter finishing event handling. (00000000)
    COMAPI - Updates found = 8
    COMAPI ---------
    COMAPI -- END -- COMAPI: Search [ClientId = <NULL>]
    COMAPI -------------
    COMAPI -------------
    COMAPI -- START -- COMAPI: Download [ClientId = <NULL>]
    COMAPI ---------
    COMAPI - Forced: No; Download priority: 3; Network Cost Policy: 0
    COMAPI - Updates in request: 8
    COMAPI - ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    COMAPI <<-- SUBMITTED -- COMAPI: Download [ClientId = <NULL>]
    DnldMgr *********** DnldMgr: Begin Downloading Updates [CallerId = ] ***********
    DnldMgr * Call ID = {BD88591F-3074-490D-8D97-2D2018AA40F0}
    DnldMgr * Priority = 3, NetworkCostPolicy = 0, Interactive = 1, Owner is system = 0, Explicit proxy = 1, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    DnldMgr * Updates to download = 8
    Agent * Title = Security Update for Windows Server 2012 (KB2853587)
    Agent * UpdateId = {CD2A752F-FF51-46A5-8134-54DD0AE32D2A}.202
    Agent * Bundles 1 updates:
    Agent * {1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE}.202
    Agent * Title = Security Update for Windows Server 2012 (KB2923392)
    Agent * UpdateId = {4193EAE0-AE33-4774-B479-D9660D15E5F2}.201
    Agent * Bundles 1 updates:
    Agent * {86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6}.201
    Agent * Title = Security Update for Windows Server 2012 (KB2973501)
    Agent * UpdateId = {2346EB42-185C-49CC-9856-190C294FE502}.202
    Agent * Bundles 1 updates:
    Agent * {041EDA5D-FF28-450B-AA8C-557161884100}.201
    Agent * Title = Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 8 and Windows Server 2012 x64 (KB2978042)
    Agent * UpdateId = {8001616A-1D31-4D17-B3DC-861E3CE0C3E3}.202
    Agent * Bundles 1 updates:
    Agent * {5CFECF17-2661-4D81-9211-6B85CF760867}.202
    Agent * Title = Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 8 and Windows Server 2012 x64 (KB2979577)
    Agent * UpdateId = {C822D00A-FEC3-4B65-8F63-6E6BEA292944}.203
    Agent * Bundles 1 updates:
    Agent * {0D796BFF-1B7A-41D0-9E20-D7087F570410}.201
    Agent * Title = Update for Windows Server 2012 (KB2995387)
    Agent * UpdateId = {FD33CBA9-736E-4E42-8FC6-91F5534670C6}.200
    Agent * Bundles 1 updates:
    Agent * {D5D6C690-7BCA-441B-9319-3278EB1E55AE}.200
    Agent * Title = Security Update for Windows Server 2012 (KB3000061)
    Agent * UpdateId = {DF82A201-7E54-420E-A08C-3281F731C3D7}.202
    Agent * Bundles 1 updates:
    Agent * {E396BB10-86E0-4C7D-8E26-8B864103FE74}.201
    Agent * Title = Update for Windows Server 2012 (KB3000988)
    Agent * UpdateId = {957ACF74-78FB-4045-91E5-A8714DD0915F}.200
    Agent * Bundles 1 updates:
    Agent * {7380A2AB-4BC4-476C-8AAF-8A045C6BA908}.200
    DnldMgr No locked revisions found for update CD2A752F-FF51-46A5-8134-54DD0AE32D2A; locking the user-specified revision.
    DnldMgr Adding revision ID 202 for update CD2A752F-FF51-46A5-8134-54DD0AE32D2A to the lock revision cache.
    DnldMgr No locked revisions found for update 1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE; locking the user-specified revision.
    DnldMgr Adding revision ID 202 for update 1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE to the lock revision cache.
    DnldMgr No locked revisions found for update 4193EAE0-AE33-4774-B479-D9660D15E5F2; locking the user-specified revision.
    DnldMgr Adding revision ID 201 for update 4193EAE0-AE33-4774-B479-D9660D15E5F2 to the lock revision cache.
    DnldMgr No locked revisions found for update 86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6; locking the user-specified revision.
    DnldMgr Adding revision ID 201 for update 86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6 to the lock revision cache.
    DnldMgr No locked revisions found for update 2346EB42-185C-49CC-9856-190C294FE502; locking the user-specified revision.
    DnldMgr Adding revision ID 202 for update 2346EB42-185C-49CC-9856-190C294FE502 to the lock revision cache.
    DnldMgr No locked revisions found for update 041EDA5D-FF28-450B-AA8C-557161884100; locking the user-specified revision.
    DnldMgr Adding revision ID 201 for update 041EDA5D-FF28-450B-AA8C-557161884100 to the lock revision cache.
    DnldMgr No locked revisions found for update 8001616A-1D31-4D17-B3DC-861E3CE0C3E3; locking the user-specified revision.
    DnldMgr Adding revision ID 202 for update 8001616A-1D31-4D17-B3DC-861E3CE0C3E3 to the lock revision cache.
    DnldMgr No locked revisions found for update 5CFECF17-2661-4D81-9211-6B85CF760867; locking the user-specified revision.
    DnldMgr Adding revision ID 202 for update 5CFECF17-2661-4D81-9211-6B85CF760867 to the lock revision cache.
    DnldMgr No locked revisions found for update C822D00A-FEC3-4B65-8F63-6E6BEA292944; locking the user-specified revision.
    DnldMgr Adding revision ID 203 for update C822D00A-FEC3-4B65-8F63-6E6BEA292944 to the lock revision cache.
    DnldMgr No locked revisions found for update 0D796BFF-1B7A-41D0-9E20-D7087F570410; locking the user-specified revision.
    DnldMgr Adding revision ID 201 for update 0D796BFF-1B7A-41D0-9E20-D7087F570410 to the lock revision cache.
    DnldMgr No locked revisions found for update FD33CBA9-736E-4E42-8FC6-91F5534670C6; locking the user-specified revision.
    DnldMgr Adding revision ID 200 for update FD33CBA9-736E-4E42-8FC6-91F5534670C6 to the lock revision cache.
    DnldMgr No locked revisions found for update D5D6C690-7BCA-441B-9319-3278EB1E55AE; locking the user-specified revision.
    DnldMgr Adding revision ID 200 for update D5D6C690-7BCA-441B-9319-3278EB1E55AE to the lock revision cache.
    DnldMgr No locked revisions found for update DF82A201-7E54-420E-A08C-3281F731C3D7; locking the user-specified revision.
    DnldMgr Adding revision ID 202 for update DF82A201-7E54-420E-A08C-3281F731C3D7 to the lock revision cache.
    DnldMgr No locked revisions found for update E396BB10-86E0-4C7D-8E26-8B864103FE74; locking the user-specified revision.
    DnldMgr Adding revision ID 201 for update E396BB10-86E0-4C7D-8E26-8B864103FE74 to the lock revision cache.
    DnldMgr No locked revisions found for update 957ACF74-78FB-4045-91E5-A8714DD0915F; locking the user-specified revision.
    DnldMgr Adding revision ID 200 for update 957ACF74-78FB-4045-91E5-A8714DD0915F to the lock revision cache.
    DnldMgr No locked revisions found for update 7380A2AB-4BC4-476C-8AAF-8A045C6BA908; locking the user-specified revision.
    DnldMgr Adding revision ID 200 for update 7380A2AB-4BC4-476C-8AAF-8A045C6BA908 to the lock revision cache.
    EP Got WSUS Client/Server URL: "http://wsusserver/ClientWebService/client.asmx"
    PT +++++++++++ PT: Synchronizing file locations +++++++++++
    PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsusserver/ClientWebService/client.asmx
    DnldMgr *********** DnldMgr: New download job [UpdateId = {1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE}.202] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE}.202
    Handler Generating request for CBS update 1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE in sandbox C:\Windows\SoftwareDistribution\Download\8c62f0bd9a2a79c738ff67ff2d3dc530
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsStart
    Handler Adding windows8-rt-kb2853587-x64.cab (entire file) to request list.
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE}.202] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * BITS job initialized, JobId = {B74E24AD-0BC1-4F12-8562-2EACC741B4B3}
    DnldMgr * Downloading from http://wsusserver/Content/DD/E5743ACAD2AEFCD99979F1680501AD9D120A0BDD.cab to C:\Windows\SoftwareDistribution\Download\8c62f0bd9a2a79c738ff67ff2d3dc530\windows8-rt-kb2853587-x64.cab (full file).
    DnldMgr *********
    DnldMgr ** END ** DnldMgr: Begin Downloading Updates [CallerId = ]
    DnldMgr *************
    DnldMgr BITS job {B74E24AD-0BC1-4F12-8562-2EACC741B4B3} completed successfully
    DnldMgr CUpdateDownloadJob::GetNetworkCostSwitch() Neither unrestricted or restricted network cost used, so using current cost
    DnldMgr CUpdateDownloadJob::GetNetworkCostSwitch() Neither unrestricted or restricted network cost used, so using current cost
    Misc Validating signature for C:\Windows\SoftwareDistribution\Download\8c62f0bd9a2a79c738ff67ff2d3dc530\windows8-rt-kb2853587-x64.cab with dwProvFlags 0x00000080:
    Misc Microsoft signed: Yes
    DnldMgr Download job bytes total = 58979, bytes transferred = 58979
    DnldMgr *********** DnldMgr: New download job [UpdateId = {1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE}.202] ***********
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE}.202
    Handler Generating request for CBS update 1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE in sandbox C:\Windows\SoftwareDistribution\Download\8c62f0bd9a2a79c738ff67ff2d3dc530
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsHavePackage
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE}.202] ***********
    DnldMgr * All files for update were already downloaded and are valid.
    DnldMgr *********** DnldMgr: New download job [UpdateId = {86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6}.201] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6}.201
    Handler Generating request for CBS update 86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6 in sandbox C:\Windows\SoftwareDistribution\Download\0d3ba17529129e6f7a167d67d018a0a7
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsStart
    Handler Adding windows8-rt-kb2923392-x64.cab (entire file) to request list.
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6}.201] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * BITS job initialized, JobId = {810D170F-D6E6-494B-98F9-6EA8EAAFB70C}
    DnldMgr * Downloading from http://wsusserver/Content/56/2CAD1BFE488CF3B0EB93F48400A542CB72965056.cab to C:\Windows\SoftwareDistribution\Download\0d3ba17529129e6f7a167d67d018a0a7\windows8-rt-kb2923392-x64.cab (full file).
    DnldMgr BITS job {810D170F-D6E6-494B-98F9-6EA8EAAFB70C} completed successfully
    DnldMgr CUpdateDownloadJob::GetNetworkCostSwitch() Neither unrestricted or restricted network cost used, so using current cost
    Misc Validating signature for C:\Windows\SoftwareDistribution\Download\0d3ba17529129e6f7a167d67d018a0a7\windows8-rt-kb2923392-x64.cab with dwProvFlags 0x00000080:
    Misc Microsoft signed: Yes
    DnldMgr Download job bytes total = 500177, bytes transferred = 500177
    DnldMgr *********** DnldMgr: New download job [UpdateId = {86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6}.201] ***********
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6}.201
    Handler Generating request for CBS update 86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6 in sandbox C:\Windows\SoftwareDistribution\Download\0d3ba17529129e6f7a167d67d018a0a7
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsHavePackage
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6}.201] ***********
    DnldMgr * All files for update were already downloaded and are valid.
    DnldMgr *********** DnldMgr: New download job [UpdateId = {041EDA5D-FF28-450B-AA8C-557161884100}.201] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {041EDA5D-FF28-450B-AA8C-557161884100}.201
    Handler Generating request for CBS update 041EDA5D-FF28-450B-AA8C-557161884100 in sandbox C:\Windows\SoftwareDistribution\Download\debc00fbc52d73e267c6bc2e1d2d04de
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsStart
    Handler Adding windows8-rt-kb2973501-x64.cab (entire file) to request list.
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {041EDA5D-FF28-450B-AA8C-557161884100}.201] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * BITS job initialized, JobId = {5D9BAB80-C055-4BB5-A445-58D78D37D7AA}
    DnldMgr * Downloading from http://wsusserver/Content/D3/05BDA5A7A88A70739E71C166263CC40C45A2ADD3.cab to C:\Windows\SoftwareDistribution\Download\debc00fbc52d73e267c6bc2e1d2d04de\windows8-rt-kb2973501-x64.cab (full file).
    DnldMgr BITS job {5D9BAB80-C055-4BB5-A445-58D78D37D7AA} completed successfully
    DnldMgr CUpdateDownloadJob::GetNetworkCostSwitch() Neither unrestricted or restricted network cost used, so using current cost
    Misc Validating signature for C:\Windows\SoftwareDistribution\Download\debc00fbc52d73e267c6bc2e1d2d04de\windows8-rt-kb2973501-x64.cab with dwProvFlags 0x00000080:
    Misc Microsoft signed: Yes
    DnldMgr Download job bytes total = 8580759, bytes transferred = 8580759
    DnldMgr *********** DnldMgr: New download job [UpdateId = {041EDA5D-FF28-450B-AA8C-557161884100}.201] ***********
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {041EDA5D-FF28-450B-AA8C-557161884100}.201
    Handler Generating request for CBS update 041EDA5D-FF28-450B-AA8C-557161884100 in sandbox C:\Windows\SoftwareDistribution\Download\debc00fbc52d73e267c6bc2e1d2d04de
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsHavePackage
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {041EDA5D-FF28-450B-AA8C-557161884100}.201] ***********
    DnldMgr * All files for update were already downloaded and are valid.
    DnldMgr *********** DnldMgr: New download job [UpdateId = {5CFECF17-2661-4D81-9211-6B85CF760867}.202] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {5CFECF17-2661-4D81-9211-6B85CF760867}.202
    Handler Generating request for CBS update 5CFECF17-2661-4D81-9211-6B85CF760867 in sandbox C:\Windows\SoftwareDistribution\Download\68f04df682752774f0b5441ae642a9a4
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsStart
    Handler Adding windows8-rt-kb2978042-x64.cab (entire file) to request list.
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {5CFECF17-2661-4D81-9211-6B85CF760867}.202] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * BITS job initialized, JobId = {717CEFF6-05A0-4E81-83EC-DD900B1D675E}
    DnldMgr * Downloading from http://wsusserver/Content/8B/E6C82EE971D152ADB9DEC1906EA9D53D7638328B.cab to C:\Windows\SoftwareDistribution\Download\68f04df682752774f0b5441ae642a9a4\windows8-rt-kb2978042-x64.cab (full file).
    DnldMgr BITS job {717CEFF6-05A0-4E81-83EC-DD900B1D675E} completed successfully
    DnldMgr CUpdateDownloadJob::GetNetworkCostSwitch() Neither unrestricted or restricted network cost used, so using current cost
    Misc Validating signature for C:\Windows\SoftwareDistribution\Download\68f04df682752774f0b5441ae642a9a4\windows8-rt-kb2978042-x64.cab with dwProvFlags 0x00000080:
    Misc Microsoft signed: Yes
    DnldMgr Download job bytes total = 2951091, bytes transferred = 2951091
    DnldMgr *********** DnldMgr: New download job [UpdateId = {5CFECF17-2661-4D81-9211-6B85CF760867}.202] ***********
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {5CFECF17-2661-4D81-9211-6B85CF760867}.202
    Handler Generating request for CBS update 5CFECF17-2661-4D81-9211-6B85CF760867 in sandbox C:\Windows\SoftwareDistribution\Download\68f04df682752774f0b5441ae642a9a4
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsHavePackage
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {5CFECF17-2661-4D81-9211-6B85CF760867}.202] ***********
    DnldMgr * All files for update were already downloaded and are valid.
    DnldMgr *********** DnldMgr: New download job [UpdateId = {0D796BFF-1B7A-41D0-9E20-D7087F570410}.201] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {0D796BFF-1B7A-41D0-9E20-D7087F570410}.201
    Handler Generating request for CBS update 0D796BFF-1B7A-41D0-9E20-D7087F570410 in sandbox C:\Windows\SoftwareDistribution\Download\9fea4aca66b4c2de886ddcea9c313b57
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsStart
    Handler Adding windows8-rt-kb2979577-x64.cab (entire file) to request list.
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {0D796BFF-1B7A-41D0-9E20-D7087F570410}.201] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * BITS job initialized, JobId = {F801B6AB-04F3-4783-8E64-C5E816022C6A}
    DnldMgr * Downloading from http://wsusserver/Content/DE/02C29E96F798623EDDB7ADDA4C53C80C705455DE.cab to C:\Windows\SoftwareDistribution\Download\9fea4aca66b4c2de886ddcea9c313b57\windows8-rt-kb2979577-x64.cab (full file).
    DnldMgr BITS job {F801B6AB-04F3-4783-8E64-C5E816022C6A} completed successfully
    DnldMgr CUpdateDownloadJob::GetNetworkCostSwitch() Neither unrestricted or restricted network cost used, so using current cost
    Misc Validating signature for C:\Windows\SoftwareDistribution\Download\9fea4aca66b4c2de886ddcea9c313b57\windows8-rt-kb2979577-x64.cab with dwProvFlags 0x00000080:
    Misc Microsoft signed: Yes
    DnldMgr Download job bytes total = 969469, bytes transferred = 969469
    DnldMgr *********** DnldMgr: New download job [UpdateId = {0D796BFF-1B7A-41D0-9E20-D7087F570410}.201] ***********
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {0D796BFF-1B7A-41D0-9E20-D7087F570410}.201
    Handler Generating request for CBS update 0D796BFF-1B7A-41D0-9E20-D7087F570410 in sandbox C:\Windows\SoftwareDistribution\Download\9fea4aca66b4c2de886ddcea9c313b57
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsHavePackage
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {0D796BFF-1B7A-41D0-9E20-D7087F570410}.201] ***********
    DnldMgr * All files for update were already downloaded and are valid.
    DnldMgr *********** DnldMgr: New download job [UpdateId = {D5D6C690-7BCA-441B-9319-3278EB1E55AE}.200] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {D5D6C690-7BCA-441B-9319-3278EB1E55AE}.200
    Handler Generating request for CBS update D5D6C690-7BCA-441B-9319-3278EB1E55AE in sandbox C:\Windows\SoftwareDistribution\Download\2018d4c85979fa8f21eb9e2fecda5f75
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsStart
    Handler Adding windows8-rt-kb2995387-x64.cab (entire file) to request list.
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {D5D6C690-7BCA-441B-9319-3278EB1E55AE}.200] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * BITS job initialized, JobId = {4E0BFB47-4E72-418A-AB0E-8F342AE5DB56}
    DnldMgr * Downloading from http://wsusserver/Content/A9/6CB3E80BD08277A99B0A11D90DD2081B34B82BA9.cab to C:\Windows\SoftwareDistribution\Download\2018d4c85979fa8f21eb9e2fecda5f75\windows8-rt-kb2995387-x64.cab (full file).
    Report REPORT EVENT: {C61B89A2-C92F-45C0-9955-E07145849911} 2014-10-16 21:01:32:874-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {CD2A752F-FF51-46A5-8134-54DD0AE32D2A} 202 0 (null) Success Content Download Download succeeded.
    Report REPORT EVENT: {9DB84D85-ED5E-47EF-B397-16AD39A03D70} 2014-10-16 21:01:32:998-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {4193EAE0-AE33-4774-B479-D9660D15E5F2} 201 0 (null) Success Content Download Download succeeded.
    Report REPORT EVENT: {E0940842-C059-4B40-BE78-27E063853CB1} 2014-10-16 21:01:33:342-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {2346EB42-185C-49CC-9856-190C294FE502} 202 0 (null) Success Content Download Download succeeded.
    Report REPORT EVENT: {30E65A27-7451-48DE-839E-83CA4E1A6927} 2014-10-16 21:01:33:544-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {8001616A-1D31-4D17-B3DC-861E3CE0C3E3} 202 0 (null) Success Content Download Download succeeded.
    Report REPORT EVENT: {95C04AD5-642D-4002-9CB5-8B4231C46837} 2014-10-16 21:01:33:700-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {C822D00A-FEC3-4B65-8F63-6E6BEA292944} 203 0 (null) Success Content Download Download succeeded.
    Report CWERReporter finishing event handling. (00000000)
    DnldMgr BITS job {4E0BFB47-4E72-418A-AB0E-8F342AE5DB56} completed successfully
    DnldMgr CUpdateDownloadJob::GetNetworkCostSwitch() Neither unrestricted or restricted network cost used, so using current cost
    Misc Validating signature for C:\Windows\SoftwareDistribution\Download\2018d4c85979fa8f21eb9e2fecda5f75\windows8-rt-kb2995387-x64.cab with dwProvFlags 0x00000080:
    Misc Microsoft signed: Yes
    DnldMgr Download job bytes total = 20260063, bytes transferred = 20260063
    DnldMgr *********** DnldMgr: New download job [UpdateId = {D5D6C690-7BCA-441B-9319-3278EB1E55AE}.200] ***********
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {D5D6C690-7BCA-441B-9319-3278EB1E55AE}.200
    Handler Generating request for CBS update D5D6C690-7BCA-441B-9319-3278EB1E55AE in sandbox C:\Windows\SoftwareDistribution\Download\2018d4c85979fa8f21eb9e2fecda5f75
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsHavePackage
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {D5D6C690-7BCA-441B-9319-3278EB1E55AE}.200] ***********
    DnldMgr * All files for update were already downloaded and are valid.
    DnldMgr *********** DnldMgr: New download job [UpdateId = {E396BB10-86E0-4C7D-8E26-8B864103FE74}.201] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {E396BB10-86E0-4C7D-8E26-8B864103FE74}.201
    Handler Generating request for CBS update E396BB10-86E0-4C7D-8E26-8B864103FE74 in sandbox C:\Windows\SoftwareDistribution\Download\47d1a26b6ef9995305b237cc1c7f3432
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsStart
    Handler Adding windows8-rt-kb3000061-x64.cab (entire file) to request list.
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {E396BB10-86E0-4C7D-8E26-8B864103FE74}.201] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * BITS job initialized, JobId = {E47CFB47-5B8F-4A37-B639-0C2386F033FA}
    DnldMgr * Downloading from http://wsusserver/Content/2B/30A068C8F4A986FB1DA95E6C16A8376927D6332B.cab to C:\Windows\SoftwareDistribution\Download\47d1a26b6ef9995305b237cc1c7f3432\windows8-rt-kb3000061-x64.cab (full file).
    DnldMgr BITS job {E47CFB47-5B8F-4A37-B639-0C2386F033FA} completed successfully
    DnldMgr CUpdateDownloadJob::GetNetworkCostSwitch() Neither unrestricted or restricted network cost used, so using current cost
    Misc Validating signature for C:\Windows\SoftwareDistribution\Download\47d1a26b6ef9995305b237cc1c7f3432\windows8-rt-kb3000061-x64.cab with dwProvFlags 0x00000080:
    Misc Microsoft signed: Yes
    DnldMgr Download job bytes total = 2323339, bytes transferred = 2323339
    DnldMgr *********** DnldMgr: New download job [UpdateId = {E396BB10-86E0-4C7D-8E26-8B864103FE74}.201] ***********
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {E396BB10-86E0-4C7D-8E26-8B864103FE74}.201
    Handler Generating request for CBS update E396BB10-86E0-4C7D-8E26-8B864103FE74 in sandbox C:\Windows\SoftwareDistribution\Download\47d1a26b6ef9995305b237cc1c7f3432
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsHavePackage
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {E396BB10-86E0-4C7D-8E26-8B864103FE74}.201] ***********
    DnldMgr * All files for update were already downloaded and are valid.
    DnldMgr *********** DnldMgr: New download job [UpdateId = {7380A2AB-4BC4-476C-8AAF-8A045C6BA908}.200] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {7380A2AB-4BC4-476C-8AAF-8A045C6BA908}.200
    Handler Generating request for CBS update 7380A2AB-4BC4-476C-8AAF-8A045C6BA908 in sandbox C:\Windows\SoftwareDistribution\Download\5758d9b681af82eac26404b1316f8e5e
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsStart
    Handler Adding windows8-rt-kb3000988-x64.cab (entire file) to request list.
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {7380A2AB-4BC4-476C-8AAF-8A045C6BA908}.200] ***********
    DnldMgr WARNING: CheckIfDirExists returned error 0x80070002.
    DnldMgr * BITS job initialized, JobId = {C51DECC8-58EF-45BA-A4E0-1849221356A6}
    DnldMgr * Downloading from http://wsusserver/Content/1D/CA446010058397415CCD8CDC80C2B9F1AA04C11D.cab to C:\Windows\SoftwareDistribution\Download\5758d9b681af82eac26404b1316f8e5e\windows8-rt-kb3000988-x64.cab (full file).
    DnldMgr BITS job {C51DECC8-58EF-45BA-A4E0-1849221356A6} completed successfully
    DnldMgr CUpdateDownloadJob::GetNetworkCostSwitch() Neither unrestricted or restricted network cost used, so using current cost
    Misc Validating signature for C:\Windows\SoftwareDistribution\Download\5758d9b681af82eac26404b1316f8e5e\windows8-rt-kb3000988-x64.cab with dwProvFlags 0x00000080:
    Misc Microsoft signed: Yes
    DnldMgr Download job bytes total = 9959275, bytes transferred = 9959275
    DnldMgr *********** DnldMgr: New download job [UpdateId = {7380A2AB-4BC4-476C-8AAF-8A045C6BA908}.200] ***********
    DnldMgr * Queueing update for download handler request generation.
    DnldMgr Generating download request for update {7380A2AB-4BC4-476C-8AAF-8A045C6BA908}.200
    Handler Generating request for CBS update 7380A2AB-4BC4-476C-8AAF-8A045C6BA908 in sandbox C:\Windows\SoftwareDistribution\Download\5758d9b681af82eac26404b1316f8e5e
    Handler Selecting self-contained because update has express payload but server doesn't support it.
    Handler Selected payload type is ptSelfContained
    Handler Detected download state is dsHavePackage
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    DnldMgr *********** DnldMgr: New download job [UpdateId = {7380A2AB-4BC4-476C-8AAF-8A045C6BA908}.200] ***********
    DnldMgr * All files for update were already downloaded and are valid.
    COMAPI >>-- RESUMED -- COMAPI: Download [ClientId = <NULL>]
    COMAPI - Download call complete (succeeded = 8, succeeded with errors = 0, failed = 0, unaccounted = 0)
    COMAPI ---------
    COMAPI -- END -- COMAPI: Download [ClientId = <NULL>]
    COMAPI -------------
    COMAPI -------------
    COMAPI -- START -- COMAPI: Install [ClientId = <NULL>]
    COMAPI ---------
    COMAPI - Allow source prompts: Yes; Forced: No; Force quiet: No; Attempt close apps if necessary: No
    COMAPI - Updates in request: 8
    COMAPI - ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    Agent Beginning install of conventional work item
    COMAPI - Updates to install = 8
    COMAPI <<-- SUBMITTED -- COMAPI: Install [ClientId = <NULL>]
    Agent *************
    Agent ** START ** Agent: Installing updates [CallerId = ]
    Agent *********
    Agent * Updates to install = 8
    Agent * Title = Security Update for Windows Server 2012 (KB2853587)
    Agent * UpdateId = {CD2A752F-FF51-46A5-8134-54DD0AE32D2A}.202
    Agent * Bundles 1 updates:
    Agent * {1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE}.202
    Agent * Title = Security Update for Windows Server 2012 (KB2923392)
    Agent * UpdateId = {4193EAE0-AE33-4774-B479-D9660D15E5F2}.201
    Agent * Bundles 1 updates:
    Agent * {86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6}.201
    Agent * Title = Security Update for Windows Server 2012 (KB2973501)
    Agent * UpdateId = {2346EB42-185C-49CC-9856-190C294FE502}.202
    Agent * Bundles 1 updates:
    Agent * {041EDA5D-FF28-450B-AA8C-557161884100}.201
    Agent * Title = Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 8 and Windows Server 2012 x64 (KB2978042)
    Agent * UpdateId = {8001616A-1D31-4D17-B3DC-861E3CE0C3E3}.202
    Agent * Bundles 1 updates:
    Agent * {5CFECF17-2661-4D81-9211-6B85CF760867}.202
    Agent * Title = Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 8 and Windows Server 2012 x64 (KB2979577)
    Agent * UpdateId = {C822D00A-FEC3-4B65-8F63-6E6BEA292944}.203
    Agent * Bundles 1 updates:
    Agent * {0D796BFF-1B7A-41D0-9E20-D7087F570410}.201
    Agent * Title = Update for Windows Server 2012 (KB2995387)
    Agent * UpdateId = {FD33CBA9-736E-4E42-8FC6-91F5534670C6}.200
    Agent * Bundles 1 updates:
    Agent * {D5D6C690-7BCA-441B-9319-3278EB1E55AE}.200
    Agent * Title = Security Update for Windows Server 2012 (KB3000061)
    Agent * UpdateId = {DF82A201-7E54-420E-A08C-3281F731C3D7}.202
    Agent * Bundles 1 updates:
    Agent * {E396BB10-86E0-4C7D-8E26-8B864103FE74}.201
    Agent * Title = Update for Windows Server 2012 (KB3000988)
    Agent * UpdateId = {957ACF74-78FB-4045-91E5-A8714DD0915F}.200
    Agent * Bundles 1 updates:
    Agent * {7380A2AB-4BC4-476C-8AAF-8A045C6BA908}.200
    Handler Attempting to create remote handler process as myuser in session 2
    DnldMgr Preparing update for install, updateId = {1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE}.202.
    Misc =========== Logging initialized (build: 7.8.9200.17099, tz: -0400) ===========
    Misc = Process: C:\Windows\system32\wuauclt.exe
    Misc = Module: C:\Windows\SYSTEM32\wuaueng.dll
    Handler :::::::::::::
    Handler :: START :: Handler: CBS Install
    Handler :::::::::
    Handler Starting install of CBS update 1AAF7D9A-3BFF-4DA1-8809-E120E4B5EECE
    Handler CBS session identity: 30402981_3864500492
    Handler CBS package identity: Package_for_KB2853587~31bf3856ad364e35~amd64~~6.2.1.1
    Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\c21818e00e3275900ed08a1e2ff5db7f\windows8-rt-kb2853587-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\c21818e00e3275900ed08a1e2ff5db7f\inst
    Handler Requesting post-reboot reporting for package Package_for_KB2853587~31bf3856ad364e35~amd64~~6.2.1.1.
    Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
    Handler :::::::::
    Handler :: END :: Handler: CBS Install
    Handler :::::::::::::
    AU Preventing expiration of polled reporting events until next restart
    DnldMgr Preparing update for install, updateId = {86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6}.201.
    Handler :::::::::::::
    Handler :: START :: Handler: CBS Install
    Handler :::::::::
    Handler Starting install of CBS update 86CCFF78-28E7-4C1A-98E6-2B2C762D4BB6
    Handler CBS session identity: 30402981_3878852909
    Handler CBS package identity: Package_for_KB2923392~31bf3856ad364e35~amd64~~6.2.1.1
    Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\e5fa293e91f546a672ac78699659796b\windows8-rt-kb2923392-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\e5fa293e91f546a672ac78699659796b\inst
    Report REPORT EVENT: {4E21F200-6A83-4346-804A-1A4F34A308DE} 2014-10-16 21:01:34:356-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {FD33CBA9-736E-4E42-8FC6-91F5534670C6} 200 0 (null) Success Content Download Download succeeded.
    Report REPORT EVENT: {A506EF29-8D86-44D8-80A8-BD4C49FBD6D5} 2014-10-16 21:01:34:527-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {DF82A201-7E54-420E-A08C-3281F731C3D7} 202 0 (null) Success Content Download Download succeeded.
    Report REPORT EVENT: {B24BAB44-6287-4C91-87B3-A1A3B135A5AE} 2014-10-16 21:01:34:855-0400 1 162 [AGENT_DOWNLOAD_SUCCEEDED] 101 {957ACF74-78FB-4045-91E5-A8714DD0915F} 200 0 (null) Success Content Download Download succeeded.
    Report REPORT EVENT: {ABA9513E-9FDF-4195-9061-D886BAB2F448} 2014-10-16 21:01:37:476-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {CD2A752F-FF51-46A5-8134-54DD0AE32D2A} 202 240005 (null) Success Content Install Installation pending.
    Report CWERReporter finishing event handling. (00000000)
    Handler Requesting post-reboot reporting for package Package_for_KB2923392~31bf3856ad364e35~amd64~~6.2.1.1.
    Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
    Handler :::::::::
    Handler :: END :: Handler: CBS Install
    Handler :::::::::::::
    AU Preventing expiration of polled reporting events until next restart
    DnldMgr Preparing update for install, updateId = {041EDA5D-FF28-450B-AA8C-557161884100}.201.
    Handler :::::::::::::
    Handler :: START :: Handler: CBS Install
    Handler :::::::::
    Handler Starting install of CBS update 041EDA5D-FF28-450B-AA8C-557161884100
    Handler CBS session identity: 30402981_3898977768
    Handler CBS package identity: Package_for_KB2973501~31bf3856ad364e35~amd64~~6.2.1.4
    Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\85932643c90c0498263f0303ff003e2d\windows8-rt-kb2973501-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\85932643c90c0498263f0303ff003e2d\inst
    Report REPORT EVENT: {54547F34-7356-49A5-BE8F-384636863D8F} 2014-10-16 21:01:39:473-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {4193EAE0-AE33-4774-B479-D9660D15E5F2} 201 240005 (null) Success Content Install Installation pending.
    Report CWERReporter finishing event handling. (00000000)
    Handler Requesting post-reboot reporting for package Package_for_KB2973501~31bf3856ad364e35~amd64~~6.2.1.4.
    Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
    Handler :::::::::
    Handler :: END :: Handler: CBS Install
    Handler :::::::::::::
    AU Preventing expiration of polled reporting events until next restart
    DnldMgr Preparing update for install, updateId = {5CFECF17-2661-4D81-9211-6B85CF760867}.202.
    Handler :::::::::::::
    Handler :: START :: Handler: CBS Install
    Handler :::::::::
    Handler Starting install of CBS update 5CFECF17-2661-4D81-9211-6B85CF760867
    Handler CBS session identity: 30402981_3996325907
    Handler CBS package identity: Package_for_KB2978042~31bf3856ad364e35~amd64~~6.2.1.0
    Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\66f978e263d5de45076a28c052dd7777\windows8-rt-kb2978042-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\66f978e263d5de45076a28c052dd7777\inst
    Handler Requesting post-reboot reporting for package Package_for_KB2978042~31bf3856ad364e35~amd64~~6.2.1.0.
    Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
    Handler :::::::::
    Handler :: END :: Handler: CBS Install
    Handler :::::::::::::
    AU Preventing expiration of polled reporting events until next restart
    DnldMgr Preparing update for install, updateId = {0D796BFF-1B7A-41D0-9E20-D7087F570410}.201.
    Handler :::::::::::::
    Handler :: START :: Handler: CBS Install
    Handler :::::::::
    Handler Starting install of CBS update 0D796BFF-1B7A-41D0-9E20-D7087F570410
    Handler CBS session identity: 30402981_4035015583
    Handler CBS package identity: Package_for_KB2979577~31bf3856ad364e35~amd64~~6.2.1.1
    Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\3e28b9501903e8c5723f4b8e55d15df8\windows8-rt-kb2979577-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\3e28b9501903e8c5723f4b8e55d15df8\inst
    Report REPORT EVENT: {0EA6046F-846C-4C19-93EA-AB0E71B76F52} 2014-10-16 21:01:49:207-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {2346EB42-185C-49CC-9856-190C294FE502} 202 240005 (null) Success Content Install Installation pending.
    Report REPORT EVENT: {E0203371-F1E3-4FE2-8D7A-7DED17BE48F1} 2014-10-16 21:01:53:092-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {8001616A-1D31-4D17-B3DC-861E3CE0C3E3} 202 240005 (null) Success Content Install Installation pending.
    Report CWERReporter finishing event handling. (00000000)
    Handler Requesting post-reboot reporting for package Package_for_KB2979577~31bf3856ad364e35~amd64~~6.2.1.1.
    Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
    Handler :::::::::
    Handler :: END :: Handler: CBS Install
    Handler :::::::::::::
    AU Preventing expiration of polled reporting events until next restart
    DnldMgr Preparing update for install, updateId = {D5D6C690-7BCA-441B-9319-3278EB1E55AE}.200.
    Handler :::::::::::::
    Handler :: START :: Handler: CBS Install
    Handler :::::::::
    Handler Starting install of CBS update D5D6C690-7BCA-441B-9319-3278EB1E55AE
    Handler CBS session identity: 30402981_4075265308
    Handler CBS package identity: Package_for_KB2995387~31bf3856ad364e35~amd64~~6.2.1.2
    Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\5c380797af1ae165bf813d087411c52a\windows8-rt-kb2995387-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\5c380797af1ae165bf813d087411c52a\inst
    Report REPORT EVENT: {3F463EB9-DA95-46B4-9FA0-AEA26AFE9AC7} 2014-10-16 21:01:57:101-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {C822D00A-FEC3-4B65-8F63-6E6BEA292944} 203 240005 (null) Success Content Install Installation pending.
    Report CWERReporter finishing event handling. (00000000)
    Handler Requesting post-reboot reporting for package Package_for_KB2995387~31bf3856ad364e35~amd64~~6.2.1.2.
    Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
    Handler :::::::::
    Handler :: END :: Handler: CBS Install
    Handler :::::::::::::
    AU Preventing expiration of polled reporting events until next restart
    DnldMgr Preparing update for install, updateId = {E396BB10-86E0-4C7D-8E26-8B864103FE74}.201.
    Handler :::::::::::::
    Handler :: START :: Handler: CBS Install
    Handler :::::::::
    Handler Starting install of CBS update E396BB10-86E0-4C7D-8E26-8B864103FE74
    Handler CBS session identity: 30402981_4242192660
    Handler CBS package identity: Package_for_KB3000061~31bf3856ad364e35~amd64~~6.2.1.2
    Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\792e73d5df6aed16fbb300b8eb82dd6e\windows8-rt-kb3000061-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\792e73d5df6aed16fbb300b8eb82dd6e\inst
    Report REPORT EVENT: {2EBB3A05-7213-40EC-B38E-209493B8019D} 2014-10-16 21:02:13:810-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {FD33CBA9-736E-4E42-8FC6-91F5534670C6} 200 240005 (null) Success Content Install Installation pending.
    Report CWERReporter finishing event handling. (00000000)
    Handler Requesting post-reboot reporting for package Package_for_KB3000061~31bf3856ad364e35~amd64~~6.2.1.2.
    Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
    Handler :::::::::
    Handler :: END :: Handler: CBS Install
    Handler :::::::::::::
    AU Preventing expiration of polled reporting events until next restart
    DnldMgr Preparing update for install, updateId = {7380A2AB-4BC4-476C-8AAF-8A045C6BA908}.200.
    Handler :::::::::::::
    Handler :: START :: Handler: CBS Install
    Handler :::::::::
    Handler Starting install of CBS update 7380A2AB-4BC4-476C-8AAF-8A045C6BA908
    Handler CBS session identity: 30402982_579441
    Handler CBS package identity: Package_for_KB3000988~31bf3856ad364e35~amd64~~6.2.1.1
    Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\a7c10dd1ff9315f43981eefa8c4fa1c7\windows8-rt-kb3000988-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\a7c10dd1ff9315f43981eefa8c4fa1c7\inst
    Report REPORT EVENT: {1C3D36EC-A8EA-4D6A-9919-A3975E5AD2F4} 2014-10-16 21:02:19:130-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {DF82A201-7E54-420E-A08C-3281F731C3D7} 202 240005 (null) Success Content Install Installation pending.
    Report CWERReporter finishing event handling. (00000000)
    Handler Requesting post-reboot reporting for package Package_for_KB3000988~31bf3856ad364e35~amd64~~6.2.1.1.
    Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
    Handler :::::::::
    Handler :: END :: Handler: CBS Install
    Handler :::::::::::::
    AU Preventing expiration of polled reporting events until next restart
    RebootNotify UpdateRebootRequiredNotification, set reboot grace timeout reg value SecurityUpdatesRebootRequiredNotificationTime to 2014-10-20 01:02:33
    Agent *********
    Agent ** END ** Agent: Installing updates [CallerId = ]
    Agent *************
    COMAPI >>-- RESUMED -- COMAPI: Install [ClientId = <NULL>]
    COMAPI - Install call complete (succeeded = 8, succeeded with errors = 0, failed = 0, unaccounted = 0)
    COMAPI - Reboot required = Yes
    COMAPI ---------
    COMAPI -- END -- COMAPI: Install [ClientId = <NULL>]
    COMAPI -------------
    Report REPORT EVENT: {3080CEFC-A045-48BA-A639-1D323FE053B8} 2014-10-16 21:02:33:077-0400 1 201 [AGENT_INSTALLING_PENDING] 101 {957ACF74-78FB-4045-91E5-A8714DD0915F} 200 240005 (null) Success Content Install Installation pending.
    Report CWERReporter finishing event handling. (00000000)
    EP Got WSUS Client/Server URL: "http://wsusserver/ClientWebService/client.asmx"
    PT WARNING: Cached cookie has expired or new PID is available
    EP Got WSUS SimpleTargeting URL: "http://wsusserver"
    PT Initializing simple targeting cookie, clientId = 5cb617c5-4bcc-44a6-a8bc-6f5d116a9dc3, target group = Systems, DNS name = rodcserver
    PT Server URL = http://wsusserver/SimpleAuthWebService/SimpleAuth.asmx
    EP Got WSUS Reporting URL: "http://wsusserver/ReportingWebService/ReportingWebService.asmx"
    Report Uploading 18 events using cached cookie, reporting URL = http://wsusserver/ReportingWebService/ReportingWebService.asmx
    Report Reporter successfully uploaded 18 events.
    Shutdwn Checking to see whether install at shutdown is appropriate
    Shutdwn user declined update at shutdown
    AU AU initiates service shutdown
    AU ########### AU: Uninitializing Automatic Updates ###########
    WuTask Uninit WU Task Manager
    Agent Sending shutdown notification to client
    Report CWERReporter finishing event handling. (00000000)
    Service *********
    Service ** END ** Service: Service exit [Exit code = 0x240001]
    Service *************
    Justin Cervero - MS Enterprise Admin - Appalachian State University

Maybe you are looking for