Lenovo Updates - History

I have a T400s that's 4 years old - through Toolbox I get Windows and Lenovo system updates - I can see all the Windows updates back to when I bought the machine , 2009 but only a year back for Lenovo.
Is there a way to see more history for the Lenovo updates ??

I use Lenovo's System Update program (SU).  You might have a smilar version called Lenovo updates? There is a Lenovo driver utiltiy around, which I am clueless about.
I believe during SU version 4  to SU version 5, the internal structure of SU changed and previous history in the older version was not carried forward to the newer release.  There may be some older posts on here stateing previous install history not available. I should have been more specific in my previous post, ie when did install current SU?
Please post the specific machine and model type of your T400s.  Running xp/vista or win 7?
Check control panel/program and features for the install date of your current SU, and current release level.
For a T400s I see Su 3.16.006 (30 July 2013) for Vista/XP and 5.03.008 (22 Nov 2013) for win 7/8. 
If it was about a year ago, this is when you may have gone from SU 4 to SU 5. (or similar).    This link might help:
http://forums.lenovo.com/t5/ThinkVantage-Technologies/TVSU-5-01-upgrade-has-deleted-installation-his...
I keep a  txt file of my Lenovo updates so I know what I installed when (either thru SU or manual install).   

Similar Messages

  • How can I see my software update history?

    Hi guys I just wonder how can I see my system software update history?
    on Lion we can see in Preferences/Sofware Updates/History but Mountain Lion we dont see to same place?

    go to applications - utlilities - system information.app - software - installations
    this may help you

  • Windows 2008 R2 Server not showing update history and not detecting new updates

    Hi Sirs,
    We have a Windows 2008 R2 server which is showing an empty windows update history, and is not detecting new updates from the WSUS server. It says that the windows is up to date, no error when trying to detect new updates, but I doubt it because when I checked
    the installed updates menu, it shows that that the most recent update date installed was last 2013, it just stop detecting and installing updates. I've already tried the ff workarounds but to no avail:
    1. restart wuauserv and bits service
    2. rename/delete the software distribution folder
    3. reinstalled the update agent/restarted the server
    4. deleted the susclientid on the registry
    Thanks in advanced for your help.
    here's the windowsupdate.log:
    2014-07-22    00:57:06:728     928    a34    AU    #############
    2014-07-22    00:57:06:728     928    a34    AU    Successfully wrote event for AU health state:0
    2014-07-22    00:57:06:728     928    a34    AU    Featured notifications is disabled.
    2014-07-22    00:57:06:728     928    a34    AU    AU setting next detection timeout to 2014-07-21 20:50:56
    2014-07-22    00:57:06:728     928    a34    AU    Successfully wrote event for AU health state:0
    2014-07-22    00:57:06:728     928    a34    AU    Successfully wrote event for AU health state:0
    2014-07-22    00:57:11:727     928    abc    Report    REPORT EVENT: {AF0753F1-F6F9-4583-87B0-A0B0AEA0C6A7}    2014-07-22 00:57:06:728+0800    1  
     147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows
    Update Client successfully detected 0 updates.
    2014-07-22    00:57:11:727     928    abc    Report    REPORT EVENT: {188957AA-577F-4DC5-9CDB-2D8CFEE96670}    2014-07-22 00:57:06:728+0800    1  
     156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting
    client status.
    2014-07-22    00:57:11:727     928    abc    Report    CWERReporter finishing event handling. (00000000)
    2014-07-22    01:11:10:931     928    abc    Report    Uploading 2 events using cached cookie, reporting URL = http://mtp-wsus2/ReportingWebService/ReportingWebService.asmx
    2014-07-22    01:11:10:947     928    abc    Report    Reporter successfully uploaded 2 events.
    2014-07-22    04:50:56:736     928    1130    AU    #############
    2014-07-22    04:50:56:736     928    1130    AU    ## START ##  AU: Search for updates
    2014-07-22    04:50:56:736     928    1130    AU    #########
    2014-07-22    04:50:56:736     928    1130    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {F40B494F-91F1-4FFB-B7A5-46CEA397AA52}]
    2014-07-22    04:50:56:736     928    d08    Agent    *************
    2014-07-22    04:50:56:736     928    d08    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-07-22    04:50:56:736     928    d08    Agent    *********
    2014-07-22    04:50:56:736     928    d08    Agent      * Online = Yes; Ignore download priority = No
    2014-07-22    04:50:56:736     928    d08    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
    or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-07-22    04:50:56:736     928    d08    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-07-22    04:50:56:736     928    d08    Agent      * Search Scope = {Machine}
    2014-07-22    04:50:57:017     928    d08    Setup    Checking for agent SelfUpdate
    2014-07-22    04:50:57:017     928    d08    Setup    Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
    2014-07-22    04:50:57:017     928    d08    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-07-22    04:50:57:017     928    d08    Misc     Microsoft signed: Yes
    2014-07-22    04:50:59:611     928    d08    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-07-22    04:50:59:611     928    d08    Misc     Microsoft signed: Yes
    2014-07-22    04:50:59:611     928    d08    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-07-22    04:50:59:611     928    d08    Misc     Microsoft signed: Yes
    2014-07-22    04:50:59:626     928    d08    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-07-22    04:50:59:626     928    d08    Misc     Microsoft signed: Yes
    2014-07-22    04:50:59:626     928    d08    Setup    Determining whether a new setup handler needs to be downloaded
    2014-07-22    04:50:59:626     928    d08    Setup    SelfUpdate handler is not found.  It will be downloaded
    2014-07-22    04:50:59:626     928    d08    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    04:51:01:095     928    d08    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    04:51:01:095     928    d08    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    04:51:01:110     928    d08    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    04:51:01:110     928    d08    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    04:51:01:142     928    d08    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    04:51:01:142     928    d08    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
    2014-07-22    04:51:01:860     928    d08    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-07-22    04:51:01:860     928    d08    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
    2014-07-22    04:51:01:891     928    d08    PT    WARNING: Cached cookie has expired or new PID is available
    2014-07-22    04:51:01:891     928    d08    PT    Initializing simple targeting cookie, clientId = 487b95fe-31a4-44f7-9989-bd77766ce5fa, target group = , DNS name = itg-soatrainsvr.mbtc.mgc.local
    2014-07-22    04:51:01:891     928    d08    PT      Server URL = http://mtp-wsus2/SimpleAuthWebService/SimpleAuth.asmx
    2014-07-22    04:51:04:485     928    d08    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2014-07-22    04:51:04:485     928    d08    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
    2014-07-22    04:51:04:875     928    d08    Agent      * Found 0 updates and 68 categories in search; evaluated appl. rules of 503 out of 777 deployed entities
    2014-07-22    04:51:04:875     928    d08    Agent    *********
    2014-07-22    04:51:04:875     928    d08    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-07-22    04:51:04:875     928    d08    Agent    *************
    2014-07-22    04:51:04:875     928    1278    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {F40B494F-91F1-4FFB-B7A5-46CEA397AA52}]
    2014-07-22    04:51:04:875     928    1278    AU      # 0 updates detected
    2014-07-22    04:51:04:875     928    1278    AU    #########
    2014-07-22    04:51:04:875     928    1278    AU    ##  END  ##  AU: Search for updates [CallId = {F40B494F-91F1-4FFB-B7A5-46CEA397AA52}]
    2014-07-22    04:51:04:875     928    1278    AU    #############
    2014-07-22    04:51:04:875     928    1278    AU    Successfully wrote event for AU health state:0
    2014-07-22    04:51:04:875     928    1278    AU    Featured notifications is disabled.
    2014-07-22    04:51:04:875     928    1278    AU    AU setting next detection timeout to 2014-07-22 00:38:28
    2014-07-22    04:51:04:875     928    1278    AU    Successfully wrote event for AU health state:0
    2014-07-22    04:51:04:875     928    1278    AU    Successfully wrote event for AU health state:0
    2014-07-22    04:51:09:874     928    d08    Report    REPORT EVENT: {FE398C01-75A1-4AD8-8C43-0894FCFCE13F}    2014-07-22 04:51:04:875+0800    1  
     147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows
    Update Client successfully detected 0 updates.
    2014-07-22    04:51:09:874     928    d08    Report    REPORT EVENT: {CDA386AD-6392-4C34-859E-35307BCB5EA0}    2014-07-22 04:51:04:875+0800    1  
     156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting
    client status.
    2014-07-22    04:51:09:874     928    d08    Report    CWERReporter finishing event handling. (00000000)
    2014-07-22    05:05:09:109     928    d08    Report    Uploading 2 events using cached cookie, reporting URL = http://mtp-wsus2/ReportingWebService/ReportingWebService.asmx
    2014-07-22    05:05:09:109     928    d08    Report    Reporter successfully uploaded 2 events.
    2014-07-22    08:38:28:883     928    1130    AU    #############
    2014-07-22    08:38:28:883     928    1130    AU    ## START ##  AU: Search for updates
    2014-07-22    08:38:28:883     928    1130    AU    #########
    2014-07-22    08:38:28:883     928    1130    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {9A097F9F-88DD-4037-A4DD-48B9CC891327}]
    2014-07-22    08:38:28:883     928    53c    Agent    *************
    2014-07-22    08:38:28:883     928    53c    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-07-22    08:38:28:883     928    53c    Agent    *********
    2014-07-22    08:38:28:883     928    53c    Agent      * Online = Yes; Ignore download priority = No
    2014-07-22    08:38:28:883     928    53c    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
    or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-07-22    08:38:28:883     928    53c    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-07-22    08:38:28:883     928    53c    Agent      * Search Scope = {Machine}
    2014-07-22    08:38:29:195     928    53c    Setup    Checking for agent SelfUpdate
    2014-07-22    08:38:29:195     928    53c    Setup    Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
    2014-07-22    08:38:29:195     928    53c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-07-22    08:38:29:195     928    53c    Misc     Microsoft signed: Yes
    2014-07-22    08:38:31:804     928    53c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-07-22    08:38:31:804     928    53c    Misc     Microsoft signed: Yes
    2014-07-22    08:38:31:804     928    53c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-07-22    08:38:31:820     928    53c    Misc     Microsoft signed: Yes
    2014-07-22    08:38:31:820     928    53c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-07-22    08:38:31:820     928    53c    Misc     Microsoft signed: Yes
    2014-07-22    08:38:31:835     928    53c    Setup    Determining whether a new setup handler needs to be downloaded
    2014-07-22    08:38:31:835     928    53c    Setup    SelfUpdate handler is not found.  It will be downloaded
    2014-07-22    08:38:31:835     928    53c    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    08:38:33:241     928    53c    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    08:38:33:241     928    53c    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    08:38:33:272     928    53c    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    08:38:33:272     928    53c    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    08:38:33:288     928    53c    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    08:38:33:288     928    53c    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
    2014-07-22    08:38:33:991     928    53c    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-07-22    08:38:33:991     928    53c    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
    2014-07-22    08:38:34:038     928    53c    PT    WARNING: Cached cookie has expired or new PID is available
    2014-07-22    08:38:34:038     928    53c    PT    Initializing simple targeting cookie, clientId = 487b95fe-31a4-44f7-9989-bd77766ce5fa, target group = , DNS name = itg-soatrainsvr.mbtc.mgc.local
    2014-07-22    08:38:34:038     928    53c    PT      Server URL = http://mtp-wsus2/SimpleAuthWebService/SimpleAuth.asmx
    2014-07-22    08:38:36:616     928    53c    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2014-07-22    08:38:36:616     928    53c    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
    2014-07-22    08:38:37:022     928    53c    Agent      * Found 0 updates and 68 categories in search; evaluated appl. rules of 503 out of 777 deployed entities
    2014-07-22    08:38:37:022     928    53c    Agent    *********
    2014-07-22    08:38:37:022     928    53c    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-07-22    08:38:37:022     928    53c    Agent    *************
    2014-07-22    08:38:37:022     928    aa8    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {9A097F9F-88DD-4037-A4DD-48B9CC891327}]
    2014-07-22    08:38:37:022     928    aa8    AU      # 0 updates detected
    2014-07-22    08:38:37:022     928    aa8    AU    #########
    2014-07-22    08:38:37:022     928    aa8    AU    ##  END  ##  AU: Search for updates [CallId = {9A097F9F-88DD-4037-A4DD-48B9CC891327}]
    2014-07-22    08:38:37:022     928    aa8    AU    #############
    2014-07-22    08:38:37:022     928    aa8    AU    Successfully wrote event for AU health state:0
    2014-07-22    08:38:37:022     928    aa8    AU    Featured notifications is disabled.
    2014-07-22    08:38:37:022     928    aa8    AU    AU setting next detection timeout to 2014-07-22 04:15:53
    2014-07-22    08:38:37:022     928    aa8    AU    Successfully wrote event for AU health state:0
    2014-07-22    08:38:37:022     928    aa8    AU    Successfully wrote event for AU health state:0
    2014-07-22    08:38:42:021     928    53c    Report    REPORT EVENT: {45B5AD35-C612-4C43-8FE0-DFC63B114FC9}    2014-07-22 08:38:37:022+0800    1  
     147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows
    Update Client successfully detected 0 updates.
    2014-07-22    08:38:42:021     928    53c    Report    REPORT EVENT: {BA606714-0153-41BA-ADC8-78520F678D97}    2014-07-22 08:38:37:022+0800    1  
     156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting
    client status.
    2014-07-22    08:38:42:021     928    53c    Report    CWERReporter finishing event handling. (00000000)
    2014-07-22    08:52:41:224     928    53c    Report    Uploading 2 events using cached cookie, reporting URL = http://mtp-wsus2/ReportingWebService/ReportingWebService.asmx
    2014-07-22    08:52:41:240     928    53c    Report    Reporter successfully uploaded 2 events.
    2014-07-22    12:15:53:027     928    1130    AU    #############
    2014-07-22    12:15:53:027     928    1130    AU    ## START ##  AU: Search for updates
    2014-07-22    12:15:53:027     928    1130    AU    #########
    2014-07-22    12:15:53:027     928    1130    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {9BDC1D71-5139-49D4-88F0-E2B639CE8846}]
    2014-07-22    12:15:53:043     928    a58    Agent    *************
    2014-07-22    12:15:53:043     928    a58    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-07-22    12:15:53:043     928    a58    Agent    *********
    2014-07-22    12:15:53:043     928    a58    Agent      * Online = Yes; Ignore download priority = No
    2014-07-22    12:15:53:043     928    a58    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
    or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-07-22    12:15:53:043     928    a58    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-07-22    12:15:53:043     928    a58    Agent      * Search Scope = {Machine}
    2014-07-22    12:15:53:308     928    a58    Setup    Checking for agent SelfUpdate
    2014-07-22    12:15:53:308     928    a58    Setup    Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
    2014-07-22    12:15:53:308     928    a58    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-07-22    12:15:53:324     928    a58    Misc     Microsoft signed: Yes
    2014-07-22    12:15:55:901     928    a58    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-07-22    12:15:55:901     928    a58    Misc     Microsoft signed: Yes
    2014-07-22    12:15:55:901     928    a58    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-07-22    12:15:55:917     928    a58    Misc     Microsoft signed: Yes
    2014-07-22    12:15:55:917     928    a58    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-07-22    12:15:55:917     928    a58    Misc     Microsoft signed: Yes
    2014-07-22    12:15:55:933     928    a58    Setup    Determining whether a new setup handler needs to be downloaded
    2014-07-22    12:15:55:933     928    a58    Setup    SelfUpdate handler is not found.  It will be downloaded
    2014-07-22    12:15:55:933     928    a58    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    12:15:57:167     928    a58    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    12:15:57:167     928    a58    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    12:15:57:167     928    a58    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    12:15:57:167     928    a58    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    12:15:57:198     928    a58    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    12:15:57:198     928    a58    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
    2014-07-22    12:15:57:917     928    a58    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-07-22    12:15:57:917     928    a58    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
    2014-07-22    12:15:57:963     928    a58    PT    WARNING: Cached cookie has expired or new PID is available
    2014-07-22    12:15:57:963     928    a58    PT    Initializing simple targeting cookie, clientId = 487b95fe-31a4-44f7-9989-bd77766ce5fa, target group = , DNS name = itg-soatrainsvr.mbtc.mgc.local
    2014-07-22    12:15:57:963     928    a58    PT      Server URL = http://mtp-wsus2/SimpleAuthWebService/SimpleAuth.asmx
    2014-07-22    12:16:00:572     928    a58    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2014-07-22    12:16:00:572     928    a58    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
    2014-07-22    12:16:00:932     928    a58    Agent      * Found 0 updates and 68 categories in search; evaluated appl. rules of 503 out of 777 deployed entities
    2014-07-22    12:16:00:932     928    a58    Agent    *********
    2014-07-22    12:16:00:932     928    a58    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-07-22    12:16:00:932     928    a58    Agent    *************
    2014-07-22    12:16:00:932     928    1120    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {9BDC1D71-5139-49D4-88F0-E2B639CE8846}]
    2014-07-22    12:16:00:932     928    1120    AU      # 0 updates detected
    2014-07-22    12:16:00:932     928    1120    AU    #########
    2014-07-22    12:16:00:932     928    1120    AU    ##  END  ##  AU: Search for updates [CallId = {9BDC1D71-5139-49D4-88F0-E2B639CE8846}]
    2014-07-22    12:16:00:932     928    1120    AU    #############
    2014-07-22    12:16:00:932     928    1120    AU    Successfully wrote event for AU health state:0
    2014-07-22    12:16:00:932     928    1120    AU    Featured notifications is disabled.
    2014-07-22    12:16:00:932     928    1120    AU    AU setting next detection timeout to 2014-07-22 08:15:22
    2014-07-22    12:16:00:932     928    1120    AU    Successfully wrote event for AU health state:0
    2014-07-22    12:16:00:932     928    1120    AU    Successfully wrote event for AU health state:0
    2014-07-22    12:16:05:931     928    a58    Report    REPORT EVENT: {25E75367-1205-4F59-A812-02DA28BB3234}    2014-07-22 12:16:00:932+0800    1  
     147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows
    Update Client successfully detected 0 updates.
    2014-07-22    12:16:05:931     928    a58    Report    REPORT EVENT: {FE1434F8-C6AF-4F87-B3DF-6E4D6C4B05FB}    2014-07-22 12:16:00:932+0800    1  
     156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting
    client status.
    2014-07-22    12:16:05:931     928    a58    Report    CWERReporter finishing event handling. (00000000)
    2014-07-22    12:30:05:116     928    a58    Report    Uploading 2 events using cached cookie, reporting URL = http://mtp-wsus2/ReportingWebService/ReportingWebService.asmx
    2014-07-22    12:30:05:131     928    a58    Report    Reporter successfully uploaded 2 events.
    2014-07-22    14:05:29:584     928    10a0    AU    Triggering AU detection through DetectNow API
    2014-07-22    14:05:29:584     928    10a0    AU    Triggering Online detection (interactive)
    2014-07-22    14:05:29:584     928    1130    AU    #############
    2014-07-22    14:05:29:584     928    1130    AU    ## START ##  AU: Search for updates
    2014-07-22    14:05:29:584     928    1130    AU    #########
    2014-07-22    14:05:29:584     928    1130    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {CC67CC44-7DFB-49DE-AA83-8D6A7995ABFA}]
    2014-07-22    14:05:29:584     928    8e0    Agent    *************
    2014-07-22    14:05:29:584     928    8e0    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-07-22    14:05:29:584     928    8e0    Agent    *********
    2014-07-22    14:05:29:584     928    8e0    Agent      * Online = Yes; Ignore download priority = No
    2014-07-22    14:05:29:584     928    8e0    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
    or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-07-22    14:05:29:584     928    8e0    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-07-22    14:05:29:584     928    8e0    Agent      * Search Scope = {Machine}
    2014-07-22    14:05:29:584     928    8e0    Setup    Checking for agent SelfUpdate
    2014-07-22    14:05:29:584     928    8e0    Setup    Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
    2014-07-22    14:05:29:584     928    8e0    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-07-22    14:05:29:600     928    8e0    Misc     Microsoft signed: Yes
    2014-07-22    14:05:29:616     928    8e0    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-07-22    14:05:29:631     928    8e0    Misc     Microsoft signed: Yes
    2014-07-22    14:05:29:631     928    8e0    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-07-22    14:05:29:631     928    8e0    Misc     Microsoft signed: Yes
    2014-07-22    14:05:29:647     928    8e0    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-07-22    14:05:29:662     928    8e0    Misc     Microsoft signed: Yes
    2014-07-22    14:05:29:662     928    8e0    Setup    Determining whether a new setup handler needs to be downloaded
    2014-07-22    14:05:29:662     928    8e0    Setup    SelfUpdate handler is not found.  It will be downloaded
    2014-07-22    14:05:29:662     928    8e0    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    14:05:29:662     928    8e0    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    14:05:29:662     928    8e0    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    14:05:29:694     928    8e0    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    14:05:29:694     928    8e0    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-07-22    14:05:29:709     928    8e0    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-07-22    14:05:29:725     928    8e0    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
    2014-07-22    14:05:30:037     928    8e0    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-07-22    14:05:30:037     928    8e0    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
    2014-07-22    14:05:30:053     928    8e0    PT    WARNING: Cached cookie has expired or new PID is available
    2014-07-22    14:05:30:053     928    8e0    PT    Initializing simple targeting cookie, clientId = 487b95fe-31a4-44f7-9989-bd77766ce5fa, target group = , DNS name = itg-soatrainsvr.mbtc.mgc.local
    2014-07-22    14:05:30:053     928    8e0    PT      Server URL = http://mtp-wsus2/SimpleAuthWebService/SimpleAuth.asmx
    2014-07-22    14:05:35:630     928    8e0    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2014-07-22    14:05:35:630     928    8e0    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
    2014-07-22    14:05:36:411     928    8e0    Agent      * Found 0 updates and 68 categories in search; evaluated appl. rules of 503 out of 777 deployed entities
    2014-07-22    14:05:36:411     928    8e0    Agent    *********
    2014-07-22    14:05:36:411     928    8e0    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-07-22    14:05:36:411     928    8e0    Agent    *************
    2014-07-22    14:05:36:411     928    1360    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {CC67CC44-7DFB-49DE-AA83-8D6A7995ABFA}]
    2014-07-22    14:05:36:411     928    1360    AU      # 0 updates detected
    2014-07-22    14:05:36:411     928    1360    AU    #########
    2014-07-22    14:05:36:411     928    1360    AU    ##  END  ##  AU: Search for updates [CallId = {CC67CC44-7DFB-49DE-AA83-8D6A7995ABFA}]
    2014-07-22    14:05:36:411     928    1360    AU    #############
    2014-07-22    14:05:36:411     928    1360    AU    Successfully wrote event for AU health state:0
    2014-07-22    14:05:36:411     928    1360    AU    Featured notifications is disabled.
    2014-07-22    14:05:36:411     928    1360    AU    AU setting next detection timeout to 2014-07-22 10:01:01
    2014-07-22    14:05:36:411     928    1360    AU    Successfully wrote event for AU health state:0
    2014-07-22    14:05:36:411     928    1360    AU    Successfully wrote event for AU health state:0
    2014-07-22    14:05:41:410     928    8e0    Report    REPORT EVENT: {6A2B180E-A95F-42F7-B775-5750DFFD6ECD}    2014-07-22 14:05:36:411+0800    1  
     147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows
    Update Client successfully detected 0 updates.
    2014-07-22    14:05:41:410     928    8e0    Report    REPORT EVENT: {83041427-693D-4A42-AED0-E8E7BFB8E7E3}    2014-07-22 14:05:36:411+0800    1  
     156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting
    client status.
    2014-07-22    14:05:41:410     928    8e0    Report    CWERReporter finishing event handling. (00000000)

    No Service Pack 1 installed. Does this mean that no updates will be detected if SP1 is not installed? thanks
    That's exactly what that means!
    Updates have not been available for Windows Server 2008 R2 *RTM* systems since April, 2013.
    http://support.microsoft.com/lifecycle/?p1=14134
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Report on "Status updates history"

    Hi,
    i need to check if resource are updating task from "My Task". Is it possible to estract a report on "Status updates history"?
    I mean this type of data:
    Approval Date
    Action
    Status
    Info
    Task Name
    Project
    Type
    Start
    Finish
    Actual Work
    Remaining Work
    % Complete
    Assigned To
    Approved By
    Thanks
    Daniele

    Hi Daniel,
    You will probably have to create a join with the MSP_ASSIGNMENT_TRANSACTIONS Table.
    See reference here:
    http://blogs.msdn.com/b/project_programmability/archive/2008/01/03/statusing-transactions-partial-documentation.aspx
    Hope this helps.
    Guillaume Rouyre - MBA, MCP, MCTS

  • Update showing as succeeded in update history but still pending installation (KB2975719)

    I just installed September patches. KB2975719 is showing as downloaded but not installed in both the WSUS console, and the Windows Update control panel of servers.
    The WindowsUpdate.log file shows the patch as successfully installed:
    2014-09-20    19:10:07:325     704    a0c    Report    REPORT EVENT: {FE320875-D2A9-44A5-8F8F-5EEA2782EE27}    2014-09-20 19:09:50:763+0100   
    1    190 [AU_SCHEDULED_INSTALL_SUCCESS]    101    {756F8A5D-1588-4CFA-9B00-3DC89266CEE0}    204    0    AutomaticUpdates    Success    Content
    Install    Installation Successful: Windows successfully installed the following update: Update for Windows Server 2012 R2 (KB2975719)
    The WindowsUpdate control panel "View update history" also shows it as succeeded
    And so does the event viewer - SYSTEM:
    Source: WindowsUpdateClient; ID 19; Message: Installation Successful: Windows successfully installed the following update: Update for Windows Server 2012 R2 (KB2975719)
    Despite these, the KB2975719 still shows as ready to install in the Windows Update control panel. "One important update is available" -> "Update for Windows Server 2012 R2 (KB2975719).
    I installed the patch manually on one server and it did install correctly. I now have two lines showing success for KB2975719 in the "view update history".
    I noticed this like in my update log and was wondering if it could be part of the problem:
    2014-09-20    19:03:32:274     708    a18    Shutdwn    user declined update at shutdown
    It's not the first time I face patches that do not install. It seems to be a recurring issue on my servers. Not sure if I did something wrong with the configuration of WSUS. Each month I have 1-2 patches that do not install while other are installing properly.
    Has anyone seen this already of have an idea of how I could troubleshoot this further?

    Please read the KB article for 2975719. It clearly lists update 2993651 as a pre-requisite.
    Okay, so why are we having this conversation? It's a documented prerequisite. Having access to that information, it's then incumbent upon you to install the August KB2993651 Security Update, before the September KB2975719 Update Rollup as indicated
    by the documentation for the update.
    That's pretty much the way 99% of people are going to patch their systems anyway. (FWIW, I never encountered this issue on any of my systems because I always install Security Updates first and I installed the Update Rollup last.)
    Yes, the Update Rollup does not detect that prerequisite. Fact is, there are a LOT of updates that do not have logic to detect for prerequisites, so in that this is not really unusual at all., albeit somewhat inconvenient if you're trying to throw months
    of updates at a machine in a single pass.
    What I'd say is more disconcerting, is not that the detection logic fails to detect the prereq, but that the "Update Rollup" didn't include the prerequisite update in the first place.
    In any event, you're right, this is something for the Windows SE team to fix. That would be something to discuss with them in the Windows OS forum.
    We use MDT to "build and capture" the fully-patched image that we then deploy with SCCM.
    But that's not what I said. What I said was to patch the IMAGE (not patch a reference machine and recapture a patched image), so that the IMAGE is always up to date.
    But even if you patch a reference machine, and recapture the image, and keep the reference machine up-to-date on a monthly basis, or only patch one-month-at-a-time of updates, you would have never encountered this issue. Fundamentally you
    hit this issue because you're deploying multiple months of update simultaneously.
    Patching the IMAGE as the update are released would completely avoid this issue (as well as eliminate the need to regularly recapture the image) as the August Security Updates would have almost certainly been applied prior to a September Update Rollup.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Status updates history period default

    Hi
    Is there any way to change the default status updates history date range from 3 months please?  Currently as the status approver for a major change program I'm getting several hundred tasks to approve every day across multiple project plans; the problem
    is that when I go in to clear down to run my weekly reports it lists every task submission for the last 3 months.  The thing is, IE can take several minutes before it displays the page in full as it chews through all of the data which is annoying
    to say the least.
    I'd quite like it to show only the last 3 weeks, not the last 3 months.
    Does anyone have any suggestions please?
    Thanks.

    Hi,
    As far as I tested, changing the default 3 months range from the date range feature will unfortunaltely not be kept in your IE cache next time you'll navigate to the status update history page. Thus you'll have to set it again every time you access
    the page.
    I guess this 3 months default value might be changed programmabily but I can't help on this.
    Hope this helps,
    Guillaume Rouyre, MBA, MCP, MCTS |

  • App Update History Somewhere?

    Is there some way to check and see, either on your phone or on itunes, which apps were udpated most recently? A number of apps had updates from the app store this morning and I did the "Update All" and now one of those updated apps is killing my battery. But without a list of which apps were updated, there's no way to know which ones to delete and reinstall. I know that you have a purchase history in itunes but I haven't found any app update history.

    I'm amazed that only six of us have this question.  It seems like something we should be able to find without keeping a list ourselves.
    I'm in a simliar situation in that suddenly my phone is sucking down between 1 and 2 GB of data around 2 AM, but I cant' figure out which app it is.  It would be great if I could see what I updated recently to see if removing those from the phone would fix the (very expensive) problem, since anything that I've been running for months or years and not updated should not suddenly be causing me problems.
    I'm suspicious of one app in particular, since others have reported problems that sound just like what I've experienced, but I'd like to have a little more data.
    Maybe a little over a year after this original question was posted someone will have an idea or an answer?

  • I had an "update" that auto-updated (despite my ASK ME setting) today, June 29th. It doesn't appear in the update history. What's with that?

    Today as soon as I logged on I got an automated Firefox update (no explanation, no choice) -June 29, 11. It ran concurrently with a Windows update and yet when my computer restarted, there was no documentation of this update in "Update History", which listed my last update occurring on June 22. (security update to 5.o version....argh...)
    Was this a VALID update that occurred today or if not what was it and how do I get rid of whatever happened?

    Your iPhone was almost certainly jailbroken to unlock it from the original carrier. Restoring the iPhone has now removed that jailbreak and the iPhone has relocked back to the original carrier. Only that carrier can authorize an official, permanent unlock, so you will need to contact that original carrier and ask if you would qualify for unlocking.
    Regards.

  • How do you clear or delete app update history?

    hi everyone, and apple, how do you delete or clear the app update history in the appstore? its a highly annoying 'feature' to list by date all updated apps....

    raf1984uk wrote:
    hi everyone, and apple, how do you delete or clear the app update history in the appstore? its a highly annoying 'feature' to list by date all updated apps....
    I'm curious (sincerely, not trying to be critical), but what is really so annoying about it? Unless you access it directly, you don't see it; the newest updates always filter to the top of the list and thus are much more prominent than past updates; you always have a record of updates to refer to including the date you took them and what was changed - potentially useful information. You're not first person to post about this, but I honestly do not get why it is an issue.

  • How to remove update history

    I know how to stop the automatic updates but how do I remove or hide the history of every update?
    I.E "updated 23 October 2013", "updated 29 September 2013"
    Please help

    Hey,
    What update history do you mean?
    Do you mean the Windows update history?
    In your case I wouldnt delete it because in my opinion its important to know what updates are installed if an update causes a problem for example.
    I wouldnt delete, thats my personal opinion

  • [WMI] QFE InstalledOn date property differs from GUI "update history", WMI bug?

    Hello,
    When I use get-hotfix (uses WMI under the hood) on a Windows 2012 box to retrieve the Installdate for windows hotfixes, there is a difference between the date Powershell reports and the date visible in the update history GUI.
    http://i.imgur.com/HJVdsY4.png
    The GUI shows an install date of July 11th, where the get-hotfix shows an install date of September 21st.
    The hotfix is installed in July, not in September. it doesn't seem to be a date formatting issue.
    Is this a known issue? if so is there a fix available?
    thanks in advance,
    Sander

    Hello,
    When I use get-hotfix (uses WMI under the hood) on a Windows 2012 box to retrieve the Installdate for windows hotfixes, there is a difference between the date Powershell reports and the date visible in the update history GUI.
    http://i.imgur.com/HJVdsY4.png
    The GUI shows an install date of July 11th, where the get-hotfix shows an install date of September 21st.
    The hotfix is installed in July, not in September. it doesn't seem to be a date formatting issue.
    Is this a known issue? if so is there a fix available?
    thanks in advance,
    Sander

  • Sysprep removes Windows Update History -- good or bad?

    My Windows 7 SP1 reference image was not showing IE 9 as an optional update to install.  IE9 was not blocked by any Group Policy and I should have had all the prerequisites installed as there was nothing left to install in Windows Update (before today's
    Patch Tuesday updates, that is...)
    So I rolled back my reference image from 6 months ago and everything showed correctly and updated properly through Windows Update.   I then sysprepped that system again and let it come up normally.
    But in doing this, I noticed that the Windows Update history -- was blanked out after the system came back up   Is this expected when running sysprep?
    If so, is it *possible* that IE9 was not visible as an update to be installed in Windows Update because it couldn't see the prerequisites in the Windows Update history?
    Or am I reading too much into sysprep blanking the windows update history here?

    Hi,
    Based on my research, I found that the Windows update history data which stored in %windir%softwaredistribution would be deleted when after running sysprep.
    So the Windows Update do not display the update history. But it still do not flag the updates which are already installed as available if you click “Check updates online” button.
    Also, I need to advise that the IE 9 is an important update rather than the optional. Just have not been selected in the list of important category by default.
    TechNet Subscriber Support in forum. If you have any feedback on our support, please contact
    [email protected]
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. ”

  • T420 (4236) - Lenovo Update Retreiver is missing the Intel Wireless Driver Package

    Hi,
    I'm using Lenovo Update Retreiver with ThinInstaller. We got our new model T420 and got everything except the driver for Intel Wireless Driver.
    The new version Power Manager 3.62 is also fail. Missing information and won't install.
    Could you please add it!

    After seeing the above comment, I again tried to update Power Manager on my 3 ThinkPads, without success.
    On my R500 running Windows 7 professional with SP1, Update Retriever (version 4.02.0011) still fails to download the package for Power Manager version 3.62. Of interest here is that when you try to list the details for this package, you still get a blank screen. If you try to bypass Update retriever, and go with System Update (version 4.01.0015) directly,  the update still fails with message "1 package did not download".
    On an R500, running Windows XP SP3, Power Manager (version 1.99j) still fails with similar messages. Update Retriever (version 4.02.0011) still reports "1 update failed to be downloaded" and System Update (version 3.15.0017) still reports "1 package did not download".
    On an R61, running Windows XP SP3, Power Manager (version 1.99j) still fails with similar messages. Update Retriever (version 4.02.0011) still reports "1 update failed to be downloaded" and System Update (version 3.15.0017) still reports "1 package did not download".
    I know that I can update these packages manually, but the point is that System Update and Update Retriever still cannot process this update. I use the update logs within System Update to keep track of what has been installed. Doing the update manually defeats that purpose.
    ThinkPad R61 8932-CTO T8300 2.40 Ghz 3GB RAM Win XP
    ThinkPad R500 2714-CTO P8600 2.40 Ghz 3GB RAM Win XP; Two ThinkPad R500's 2714-CTO T9600 2.80 Ghz 4GB RAM Win 7
    ThinkPad T500 2241-DB9 T9600 2.80 Ghz 4GB RAM Win 7
    ThinkCenter A63 5237-CTO 3GB Ram Win XP; A21m and a pair of 380XD's

  • Windows 8 - VPN 720 error after installing some of the lenovo updates

    Hi,
    I have T530 and windows 8 x64 on it, I have noticed that after some time of using it I was unable to connect to PPTP VPN or my SSL VPN.
    The error stated during the connection to the PPTP VPN (windows client) was 720 error.
    I restored my windows via recovery to the point one week before and VPN started to work again. I was trying to isolate the problem after which installing I became having such problem. What I have noticed is that there are two lenovo updates that are casing this problem (I'm not excatly sure which one it is, becouse after installing them I had to restart computer about 2 or 3 times to reproduce the problem). After the problem occurs it's constant and I could not find a solution this.
    The updates I am talking about are:
    - Intel PRO/1000 LAN Adapter Software for Windows 8 64-bit (ver 12.1.77.0 - no previous ver installed)
    - Lenovo Settings Dependency Package - 8 [32,64] (ver 1.0.5.8 - no previous ver installed)
    I've notcied that there was a similar problems on older versions of windows - does anybody know if those instrucions are valid for win8?
    http://forums.lenovo.com/t5/Windows-XP-and-Vista-discussion/Error-720-Dial-Up-Networking-could-not-n...

    look and search 720 in MS  Windows 8 networking forum  , you are not alone
    Jiří Cvrk
    TP YOGA S1 .. X220, X61, T22, ms w8nd8ws

  • How to uninstall lenovo updates

    when i installed the latest update from lenovo, my computer got really slow and fingerprint reader is not working anymore.im not sure if im the only one who has the same problem but howcan i uninstall  the lenovo update?

    To remove an Apple Application Update requires deleting and re-installing the Application from the Tiger install disc or if you purchased iLife 05 which includes Garage Band, deleting and re-installing Garage Band from the iLife 05 install disc and then don't re-install the application update.
    The same for a Tiger OS or Security Update. If your Tiger install disc includes 10.4.0 and you updated to 10.4.2 and want to revert back to 10.4.1 requires re-installing Tiger from the install disc via an Archive & Install and then install the 10.4.1 Update only.
    If you want to remove Garage Band or another application from the hard drive you don't need or use, check Uninstalling applications and to free up additional hard drive space, check Freeing space on your Mac OS X startup disk.

Maybe you are looking for