MBSA Windows Update Agent installation

I'm implementing MBSA on our domain.  I've worked through the various firewall issues, etc.  Next I received a Security Update Scan Result that "Computer has an older version of the client and security database demands a newer
version. Current version is and minmum required version is ."  This is pasted directly from the screen.  It appears information is missing from the message.
Based on research of the message, I reran the scan with the "Configure computers for Microsoft Update and scanning prerequisites" option selected.  Then I get the result "Windows Update Agent installation succeeded.Restart
the target computer to have Windows Update Agent updated completely."  Scanning the computer after a restart just repeats the same results.  Looking in the WindowsUpdate.log on the target computer, there are messages stating that 3
CBS packages were evaluated and that each is not applicable.  "WUESTUP has finished.  Exit code is 0.  Reboot is NOT needed."  I have checked and the
wuaueng.dll version is 7.6.7600.256, which I believe is the latest.
I have seen this result on multiple Windows 7 computers I have tested.  None have worked so far.  What is causing MBSA to report one thing and the target to indicate something else?
Ken Kemp Eddy County, NM IT

At this point, no.  Since I didn't turn up an answer here, I've had to set this aside for more pressing matters.  I hope to get back to it at some point soon.
If you are fortunate enough to find an answer, please be sure to share it here.
Ken Kemp Eddy County, NM IT

Similar Messages

  • [SCCM 2012 R2] Windows Update Agent do not scan correctly thus SCCM has bad reports

    Hi All,
    My colleagues reported that after manual download and installation of update Office 2010 SP2 ... SCCM still do not report as Installed:
    https://support.microsoft.com/en-us/kb/2687455
    KB2687455 update on SCCM is reported as:
    Update ID: 9c5e43a3-3ae9-434d-b105-a9d7902d5f9f
    Update Title: Service Pack 2 for Microsoft Office 2010 (KB2687455) 32-Bit Edition
    Test Computer:
    After investigation I found out that Windows Update Agent (verbose logging) is reporting that this update is really not installed:  Agent Update {9C5E43A3-3AE9-434D-B105-A9D7902D5F9F} is deployed for scan, and is installable. It will be reported
    as installable.
    Update KB2687455 is shown in Programs and Features/Installed Updates as installed on this computer.
    Question:
    This update is MSP (not standard update) so it cannot be queried by win32_quickfixengineering WMI class. How to query all installed updates on system (registry, API, ...)?
    How WUA query ALL installed updates?
    Thank you in advance.
    Regards,

    Hi,
    You could check the version number. The version number of Office 2010 SP2 is greater than or equal to
    14.0.7015.1000.
    The script in the blog below could get List of installed Windows / office Updates.
    http://www.blackforce.co.uk/2013/01/27/get-list-of-installed-windows-office-updates-command-line
    The sample in the following article can be used to determine if a critical security update is installed on a computer. If the update isn't installed, the user can ensure that the update is downloaded and installed. The user can also ensure that
    they are notified about the status of the installation.
    https://msdn.microsoft.com/en-us/library/windows/desktop/aa387101(v=vs.85).aspx
    Note: Microsoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft
    does not guarantee the accuracy of this third-party contact information.
    Best Regards,
    Joyce
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected]

  • [Windows 7] Windows Update Agent does not scan correctly

    Hi All,
    After manual installation of update Office 2010 SP2 (KB2687455) ... WUA does not report (KB2687455)
    as Installed:
    https://support.microsoft.com/en-us/kb/2687455
    KB2687455 update is reported as:
    Update ID: 9c5e43a3-3ae9-434d-b105-a9d7902d5f9f
    Update Title: Service Pack 2 for Microsoft Office 2010 (KB2687455) 32-Bit Edition
    MSI Product: {90140000-0015-0409-0000-0000000FF1CE}
    MSI Patch: {D6A2CD7F-C90C-4B90-BBA7-2BADE2E08610}
    After investigation I found out that Windows Update Agent (verbose logging) is reporting this update as not installed: 
    EEHndlr   MSI PatchInfo for product {90140000-0015-0409-0000-0000000FF1CE} and patch {D6A2CD7F-C90C-4B90-BBA7-2BADE2E08610} returned 0x8007066f with state ''
    EEHndlr   MSI PatchInfo for product {90140000-0015-0409-0000-0000000FF1CE} and patch {D6A2CD7F-C90C-4B90-BBA7-2BADE2E08610} returned 'Unknown Patch'
    Perf, PatchStateForProduct, time, 4, patch, primary, {D6A2CD7F-C90C-4B90-BBA7-2BADE2E08610}, product, {90140000-0015-0409-0000-0000000FF1CE}, context, 112456208
    Agent Update {9C5E43A3-3AE9-434D-B105-A9D7902D5F9F} is deployed for scan, and is installable. It will be reported as
    installable.
    Update KB2687455 is shown in Programs and Features/Installed Updates as installed on this computer.
    Question:
    This update is MSP (not standard update) so it cannot be queried by win32_quickfixengineering WMI class. How to query all installed updates on system (registry, API, ...)?
    How WUA query ALL installed updates?
    How to fix this issue?
    Thank you in advance.
    Regards,

    Hi,
    You could check the version number. The version number of Office 2010 SP2 is greater than or equal to
    14.0.7015.1000.
    The script in the blog below could get List of installed Windows / office Updates.
    http://www.blackforce.co.uk/2013/01/27/get-list-of-installed-windows-office-updates-command-line
    The sample in the following article can be used to determine if a critical security update is installed on a computer. If the update isn't installed, the user can ensure that the update is downloaded and installed. The user can also ensure that
    they are notified about the status of the installation.
    https://msdn.microsoft.com/en-us/library/windows/desktop/aa387101(v=vs.85).aspx
    Note: Microsoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft
    does not guarantee the accuracy of this third-party contact information.
    Best Regards,
    Joyce
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected]

  • Some computers download and install the two approved updates, others only download Windows Update Agent and not the approved updates.

    Some computers download and install the two approved updates, others only download Windows Update Agent and not the approved updates.

    UN-successful Windows Update Log:
    2014-05-07 09:33:56:180
    1036 e70
    Misc ===========  Logging initialized (build: 7.6.7600.256, tz: -0400)  ===========
    2014-05-07 09:33:56:220
    1036 e70
    Misc  = Process: C:\Windows\system32\svchost.exe
    2014-05-07 09:33:56:221
    1036 e70
    Misc  = Module: c:\windows\system32\wuaueng.dll
    2014-05-07 09:33:56:180
    1036 e70
    Service *************
    2014-05-07 09:33:56:221
    1036 e70
    Service ** START **  Service: Service startup
    2014-05-07 09:33:56:222
    1036 e70
    Service *********
    2014-05-07 09:33:56:544
    1036 e70
    Agent  * WU client version 7.6.7600.256
    2014-05-07 09:33:56:545
    1036 e70
    Agent  * Base directory: C:\Windows\SoftwareDistribution
    2014-05-07 09:33:56:546
    1036 e70
    Agent  * Access type: No proxy
    2014-05-07 09:33:56:547
    1036 e70
    Agent  * Network state: Connected
    2014-05-07 09:33:57:315
    1036 e70
    Setup Service restarting after SelfUpdate
    2014-05-07 09:33:57:545
    1036 e70
    Setup Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
    2014-05-07 09:33:57:592
    1036 e70
    Report CWERReporter::Init succeeded
    2014-05-07 09:33:58:326
    1036 e70
    Report ***********  Report: Initializing static reporting data  ***********
    2014-05-07 09:33:58:376
    1036 e70
    Report  * OS Version = 6.1.7601.1.0.65792
    2014-05-07 09:33:58:376
    1036 e70
    Report  * OS Product Type = 0x00000030
    2014-05-07 09:33:58:394
    1036 e70
    Report  * Computer Brand = Hewlett-Packard
    2014-05-07 09:33:58:444
    1036 e70
    Report  * Computer Model = HP Compaq 4000 Pro SFF PC
    2014-05-07 09:33:58:455
    1036 e70
    Report  * Bios Revision = 786H7 v02.00
    2014-05-07 09:33:58:504
    1036 e70
    Report  * Bios Name = Default System BIOS
    2014-05-07 09:33:58:554
    1036 e70
    Report  * Bios Release Date = 2011-01-31T00:00:00
    2014-05-07 09:33:58:554
    1036 e70
    Report  * Locale ID = 1033
    2014-05-07 09:34:03:562
    1036 f08
    Report REPORT EVENT: {082D455B-6E51-4238-A997-1D27D9214A72}
    2014-05-07 09:33:58:565-0400 1
    199 101
    {0011B9ED-9189-4D58-BE25-FA2F13FC3D6C}
    1 240005
    SelfUpdate Success
    Content Install Installation successful and restart required for the following update: Windows Update Aux
    2014-05-07 09:34:03:614
    1036 f08
    Report CWERReporter finishing event handling. (00000000)
    2014-05-07 09:34:42:049
    1036 e70
    Agent ***********  Agent: Initializing Windows Update Agent  ***********
    2014-05-07 09:34:42:049
    1036 e70
    Agent ***********  Agent: Initializing global settings cache  ***********
    2014-05-07 09:34:42:049
    1036 e70
    Agent  * WSUS server: http://csd26.csd.local:80
    2014-05-07 09:34:42:049
    1036 e70
    Agent  * WSUS status server: http://csd26.csd.local:80
    2014-05-07 09:34:42:049
    1036 e70
    Agent  * Target group: CO
    2014-05-07 09:34:42:049
    1036 e70
    Agent  * Windows Update access disabled: No
    2014-05-07 09:34:42:063
    1036 e70
    DnldMgr Download manager restoring 0 downloads
    2014-05-07 09:34:42:089
    1036 e70
    AU ###########  AU: Initializing Automatic Updates  ###########
    2014-05-07 09:34:42:089
    1036 e70
    AU AU setting next detection timeout to 2014-05-07 13:34:42
    2014-05-07 09:34:42:090
    1036 e70
    AU AU setting next sqm report timeout to 2014-05-07 13:34:42
    2014-05-07 09:34:42:090
    1036 e70
    AU  # WSUS server: http://csd26.csd.local:80
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Detection frequency: 22
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Target group: CO
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Approval type: Scheduled (Policy)
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Scheduled install day/time: Every day at 3:00
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Auto-install minor updates: Yes (User preference)
    2014-05-07 09:34:42:105
    1036 e70
    AU Initializing featured updates
    2014-05-07 09:34:42:116
    1036 e70
    AU Found 0 cached featured updates
    2014-05-07 09:34:42:116
    1036 e70
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:34:42:117
    1036 e70
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:34:42:117
    1036 e70
    AU AU finished delayed initialization
    2014-05-07 09:34:42:117
    1036 e70
    AU AU setting next sqm report timeout to 2014-05-08 13:34:42
    2014-05-07 09:34:42:117
    1036 e70
    AU #############
    2014-05-07 09:34:42:117
    1036 e70
    AU ## START ##  AU: Search for updates
    2014-05-07 09:34:42:117
    1036 e70
    AU #########
    2014-05-07 09:34:42:291
    1036 e70
    AU <<## SUBMITTED ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
    2014-05-07 09:34:42:341
    1036 f08
    Agent *************
    2014-05-07 09:34:42:341
    1036 f08
    Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-05-07 09:34:42:341
    1036 f08
    Agent *********
    2014-05-07 09:34:42:341
    1036 f08
    Agent  * Online = Yes; Ignore download priority = No
    2014-05-07 09:34:42:341
    1036 f08
    Agent  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0
    and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-05-07 09:34:42:341
    1036 f08
    Agent  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-05-07 09:34:42:341
    1036 f08
    Agent  * Search Scope = {Machine}
    2014-05-07 09:34:42:341
    1036 f08
    Setup Checking for agent SelfUpdate
    2014-05-07 09:34:42:342
    1036 f08
    Setup Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
    2014-05-07 09:34:42:349
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-05-07 09:34:42:392
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:669
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-05-07 09:34:44:676
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:754
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-05-07 09:34:44:777
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:781
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-05-07 09:34:44:788
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:837
    1036 f08
    Setup Determining whether a new setup handler needs to be downloaded
    2014-05-07 09:34:44:855
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe:
    2014-05-07 09:34:44:862
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:862
    1036 f08
    Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe are not trusted: Error 0x800b0001
    2014-05-07 09:34:44:862
    1036 f08
    Setup WARNING: Trust verification failed for WuSetupV.exe. It will be deleted and downloaded, error = 0x800B0001
    2014-05-07 09:34:44:863
    1036 f08
    Setup SelfUpdate handler update required: Current version: 7.6.7600.256, required version: 7.6.7600.256
    2014-05-07 09:34:44:873
    1036 f08
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256"
    2014-05-07 09:34:44:932
    1036 f08
    Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
    2014-05-07 09:34:44:933
    1036 f08
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    2014-05-07 09:34:45:048
    1036 f08
    Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
    2014-05-07 09:34:45:048
    1036 f08
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    2014-05-07 09:34:45:234
    1036 f08
    Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
    2014-05-07 09:34:45:235
    1036 f08
    Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2014-05-07 09:34:48:415
    1036 f08
    PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-05-07 09:34:48:415
    1036 f08
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://csd26.csd.local:80/ClientWebService/client.asmx
    2014-05-07 09:34:48:424
    1036 f08
    PT WARNING: Cached cookie has expired or new PID is available
    2014-05-07 09:34:48:424
    1036 f08
    PT Initializing simple targeting cookie, clientId = 97287ab2-5824-44d2-bf93-8a98da659f77, target group = CO, DNS name = c18714.csd.local
    2014-05-07 09:34:48:424
    1036 f08
    PT  Server URL = http://csd26.csd.local:80/SimpleAuthWebService/SimpleAuth.asmx
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING: GetCookie failure, error = 0x8024400D, soap client error = 7, soap error code = 300, HTTP status code = 200
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING: SOAP Fault: 0x00012c
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     faultstring:Fault occurred
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     ErrorCode:ConfigChanged(2)
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     Message:(null)
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetCookie"
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     ID:cb5babad-3a1d-4e6b-946e-736ed4746e3f
    2014-05-07 09:34:48:464
    1036 f08
    PT WARNING: Cached cookie has expired or new PID is available
    2014-05-07 09:34:48:464
    1036 f08
    PT Initializing simple targeting cookie, clientId = 97287ab2-5824-44d2-bf93-8a98da659f77, target group = CO, DNS name = c18714.csd.local
    2014-05-07 09:34:48:464
    1036 f08
    PT  Server URL = http://csd26.csd.local:80/SimpleAuthWebService/SimpleAuth.asmx
    2014-05-07 09:35:06:497
    1036 e70
    AU Forced install timer expired for scheduled install
    2014-05-07 09:35:06:497
    1036 e70
    AU UpdateDownloadProperties: 0 download(s) are still in progress.
    2014-05-07 09:35:06:497
    1036 e70
    AU Setting AU scheduled install time to 2014-05-08 07:00:00
    2014-05-07 09:35:06:498
    1036 e70
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:35:14:236
    1036 f08
    PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2014-05-07 09:35:14:236
    1036 f08
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://csd26.csd.local:80/ClientWebService/client.asmx
    2014-05-07 09:35:20:118
    1036 f08
    Agent  * Found 0 updates and 79 categories in search; evaluated appl. rules of 859 out of 1494 deployed entities
    2014-05-07 09:35:20:194
    1036 f08
    Agent *********
    2014-05-07 09:35:20:194
    1036 f08
    Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-05-07 09:35:20:194
    1036 f08
    Agent *************
    2014-05-07 09:35:20:209
    1036 f08
    Report CWERReporter finishing event handling. (00000000)
    2014-05-07 09:35:20:209
    1036 f08
    Report CWERReporter finishing event handling. (00000000)
    2014-05-07 09:35:20:209
    1036 bb8
    AU >>##  RESUMED  ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
    2014-05-07 09:35:20:209
    1036 bb8
    AU  # 0 updates detected
    2014-05-07 09:35:20:209
    1036 bb8
    AU #########
    2014-05-07 09:35:20:209
    1036 bb8
    AU ##  END  ##  AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
    2014-05-07 09:35:20:209
    1036 bb8
    AU #############
    2014-05-07 09:35:20:210
    1036 bb8
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:35:20:210
    1036 bb8
    AU Featured notifications is disabled.
    2014-05-07 09:35:20:211
    1036 bb8
    AU AU setting next detection timeout to 2014-05-08 11:19:46
    2014-05-07 09:35:20:211
    1036 bb8
    AU Setting AU scheduled install time to 2014-05-08 07:00:00
    2014-05-07 09:35:20:212
    1036 bb8
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:35:20:212
    1036 bb8
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:35:25:183
    1036 f08
    Report REPORT EVENT: {C1B39107-F517-4477-AAE3-9B1F1D6002BF}
    2014-05-07 09:35:20:193-0400 1
    147 101
    {00000000-0000-0000-0000-000000000000}
    0 0 AutomaticUpdates
    Success Software Synchronization
    Windows Update Client successfully detected 0 updates.
    2014-05-07 09:35:25:183
    1036 f08
    Report REPORT EVENT: {669B9537-BB71-4190-BA58-A97F725AE4D8}
    2014-05-07 09:35:20:194-0400 1
    156 101
    {00000000-0000-0000-0000-000000000000}
    0 0 AutomaticUpdates
    Success Pre-Deployment Check
    Reporting client status.
    2014-05-07 09:35:25:184
    1036 f08
    Report CWERReporter finishing event handling. (00000000)
    2014-05-07 09:37:32:440
    1036 f08
    Report Uploading 3 events using cached cookie, reporting URL = http://csd26.csd.local:80/ReportingWebService/ReportingWebService.asmx
    2014-05-07 09:37:32:454
    1036 f08
    Report Reporter successfully uploaded 3 events.

  • Windows Update Agent rebooting systems after Software Update deployment

    I have a software update deployment that is configured to install software updates on a collection of servers at 4:00 AM with a suppressed reboot. The updates get deployed and no reboot occurs as expected.  Then ~8 hours later WUA starts up and the
    servers get rebooted.
    There is a maintenance window applied to the collection from 4:00 AM to 6:00 AM to allow the updates to install.
    I've read a few forum and blog posts on this issue and have implemented some settings via GPO, but the reboots are still occurring.  The settings that were applied are referenced in the link below.
    https://support.microsoft.com/kb/2476479?wa=wsignin1.0
    Here is a snippet from the WindowsUpdate.log:
    2014-10-22 12:00:26:153 1428 8a88 AU Received AU Resume timeout
    2014-10-22 12:00:26:153 1428 8a88 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
    2014-10-22 12:00:26:153 1428 8a88 AU Can not perform non-interactive scan if AU is interactive-only
    2014-10-22 12:02:08:512 1428 8a88 AU AU received policy change subscription event
    2014-10-22 12:16:43:463 1428 8a88 AU ###########  AU: Uninitializing Automatic Updates  ###########
    2014-10-22 12:16:43:479 1428 8a88 WuTask Uninit WU Task Manager
    2014-10-22 12:16:43:697 1428 8a88 Service *********
    2014-10-22 12:16:43:697 1428 8a88 Service **  END  **  Service: Service exit [Exit code = 0x240001]
    2014-10-22 12:16:43:697 1428 8a88 Service *************
    2014-10-22 12:19:29:728 1428 e584 Misc ===========  Logging initialized (build: 7.8.9200.16604, tz: -0400)  ===========
    2014-10-22 12:19:29:728 1428 e584 Misc   = Process: C:\WINDOWS\system32\svchost.exe
    2014-10-22 12:19:29:728 1428 e584 Misc   = Module: c:\windows\system32\wuaueng.dll
    2014-10-22 12:19:29:728 1428 e584 Service *************
    2014-10-22 12:19:29:728 1428 e584 Service ** START **  Service: Service startup
    2014-10-22 12:19:29:728 1428 e584 Service *********
    2014-10-22 12:19:29:744 1428 e584 Agent   * WU client version 7.8.9200.16604
    2014-10-22 12:19:29:744 1428 e584 Agent   * Base directory: C:\WINDOWS\SoftwareDistribution
    2014-10-22 12:19:29:744 1428 e584 Agent   * Access type: No proxy
    2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv4, cNetworkInterfaces = 2.
    2014-10-22 12:19:29:744 1428 e584 Agent   * Network state: Connected
    2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv4, cNetworkInterfaces = 2.
    2014-10-22 12:19:29:791 1428 e584 Agent ***********  Agent: Initializing global settings cache  ***********
    2014-10-22 12:19:29:791 1428 e584 Agent   * Endpoint Provider: 00000000-0000-0000-0000-000000000000
    2014-10-22 12:19:29:791 1428 e584 Agent   * WSUS server:
    http://Internal-WSUS.Domain:8530
    2014-10-22 12:19:29:791 1428 e584 Agent   * WSUS status server:
    http://Internal-WSUS.Domain:8530
    2014-10-22 12:19:29:791 1428 e584 Agent   * Target group: (Unassigned Computers)
    2014-10-22 12:19:29:791 1428 e584 Agent   * Windows Update access disabled: No
    2014-10-22 12:19:29:791 1428 e584 Misc WARNING: Network Cost is assumed to be not supported as something failed with trying to get handles to wcmapi.dll
    2014-10-22 12:19:29:806 1428 e584 WuTask WuTaskManager delay initialize completed successfully..
    2014-10-22 12:19:29:822 1428 e584 Report CWERReporter::Init succeeded
    2014-10-22 12:19:29:822 1428 e584 Agent ***********  Agent: Initializing Windows Update Agent  ***********
    2014-10-22 12:19:29:822 1428 e584 DnldMgr Download manager restoring 0 downloads
    2014-10-22 12:19:29:838 1428 e584 AU ###########  AU: Initializing Automatic Updates  ###########
    2014-10-22 12:19:29:838 1428 e584 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
    2014-10-22 12:19:29:838 1428 e584 AU AIR Mode is disabled
    2014-10-22 12:19:29:838 1428 e584 AU   # Policy Driven Provider:
    http://Internal-WSUS.Domain:8530
    2014-10-22 12:19:29:838 1428 e584 AU   # Detection frequency: 22
    2014-10-22 12:19:29:838 1428 e584 AU   # Approval type: Disabled (User preference)
    2014-10-22 12:19:29:838 1428 e584 AU   # Auto-install minor updates: No (User preference)
    2014-10-22 12:19:29:838 1428 e584 AU   # ServiceTypeDefault: Service 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 Approval type: (Pre-install notify)
    2014-10-22 12:19:29:838 1428 e584 AU   # Will interact with non-admins (Non-admins are elevated (User preference))
    2014-10-22 12:19:29:838 1428 e584 AU WARNING: Failed to get Wu Exemption info from NLM, assuming not exempt, error = 0x80240037
    2014-10-22 12:19:29:853 1428 e584 AU AU finished delayed initialization
    2014-10-22 12:19:29:884 1428 e584 AU #############
    2014-10-22 12:19:29:884 1428 e584 AU ## START ##  AU: Search for updates
    2014-10-22 12:19:29:884 1428 e584 AU #########
    2014-10-22 12:19:29:884 1428 e584 Agent SkipSelfUpdateCheck search flag set for serverId: 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782
    2014-10-22 12:19:30:416 1428 e584 Report ***********  Report: Initializing static reporting data  ***********
    2014-10-22 12:19:30:416 1428 e584 Report   * OS Version = 6.2.9200.0.0.197008
    2014-10-22 12:19:30:416 1428 e584 Report   * OS Product Type = 0x00000008
    2014-10-22 12:19:30:416 1428 e584 Report   * Computer Brand = HP
    2014-10-22 12:19:30:416 1428 e584 Report   * Computer Model = ProLiant BL460c Gen8
    2014-10-22 12:19:30:416 1428 e584 Report   * Platform Role = 1
    2014-10-22 12:19:30:416 1428 e584 Report   * AlwaysOn/AlwaysConnected (AOAC) = 0
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Revision = I31
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Name = Default System BIOS
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Release Date = 2014-02-10T00:00:00
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Sku Number = 641016-B21     
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Vendor = HP
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Family = ProLiant
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Major Release = 255
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Minor Release = 255
    2014-10-22 12:19:30:431 1428 e584 Report   * Locale ID = 1033
    2014-10-22 12:19:30:431 1428 e584 AU <<## SUBMITTED ## AU: Search for updates  [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:30:431 1428 dae0 Agent *************
    2014-10-22 12:19:30:431 1428 dae0 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-10-22 12:19:30:431 1428 dae0 Agent *********
    2014-10-22 12:19:30:431 1428 dae0 Agent   * Online = No; Ignore download priority = No
    2014-10-22 12:19:30:431 1428 dae0 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
    or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-10-22 12:19:30:431 1428 dae0 Agent   * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
    2014-10-22 12:19:30:431 1428 dae0 Agent   * Search Scope = {Machine & All Users}
    2014-10-22 12:19:30:431 1428 dae0 Agent   * Caller SID for Applicability: S-1-5-18
    2014-10-22 12:19:30:494 1428 dae0 Agent   * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
    2014-10-22 12:19:30:494 1428 dae0 Agent *********
    2014-10-22 12:19:30:494 1428 dae0 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-10-22 12:19:30:494 1428 dae0 Agent *************
    2014-10-22 12:19:30:509 1428 d158 AU >>##  RESUMED  ## AU: Search for updates [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:30:509 1428 d158 AU   # 0 updates detected
    2014-10-22 12:19:30:509 1428 d158 AU #########
    2014-10-22 12:19:30:509 1428 d158 AU ##  END  ##  AU: Search for updates  [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:30:509 1428 d158 AU #############
    2014-10-22 12:19:30:509 1428 d158 AU All AU searches complete.
    2014-10-22 12:19:30:525 1428 e584 AU #############
    2014-10-22 12:19:30:525 1428 e584 AU ## START ##  AU: Search for updates
    2014-10-22 12:19:30:525 1428 e584 AU #########
    2014-10-22 12:19:30:525 1428 e584 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
    2014-10-22 12:19:30:525 1428 e584 Agent SkipSelfUpdateCheck search flag set for serverId: 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782
    2014-10-22 12:19:30:525 1428 e584 AU <<## SUBMITTED ## AU: Search for updates  [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:30:525 1428 dae0 Agent *************
    2014-10-22 12:19:30:525 1428 dae0 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-10-22 12:19:30:525 1428 dae0 Agent *********
    2014-10-22 12:19:30:525 1428 dae0 Agent   * Online = Yes; Ignore download priority = No
    2014-10-22 12:19:30:525 1428 dae0 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
    or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-10-22 12:19:30:525 1428 dae0 Agent   * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
    2014-10-22 12:19:30:525 1428 dae0 Agent   * Search Scope = {Machine & All Users}
    2014-10-22 12:19:30:525 1428 dae0 Agent   * Caller SID for Applicability: S-1-5-18
    2014-10-22 12:19:30:525 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\wuredir.cab:
    2014-10-22 12:19:30:541 1428 dae0 Misc  Microsoft signed: Yes
    2014-10-22 12:19:30:541 1428 dae0 Misc  Infrastructure signed: Yes
    2014-10-22 12:19:30:556 1428 dae0 EP Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: "http://fe2.ws.microsoft.com/w81/2/redir/v2-storeauth.cab"
    2014-10-22 12:19:30:588 1428 dae0 Agent Checking for updated auth cab for service 117cab2d-82b1-4b5a-a08c-4d62dbee7782 at
    http://fe2.ws.microsoft.com/w81/2/redir/v2-storeauth.cab
    2014-10-22 12:19:30:588 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\117cab2d-82b1-4b5a-a08c-4d62dbee7782.cab:
    2014-10-22 12:19:30:603 1428 dae0 Misc  Microsoft signed: Yes
    2014-10-22 12:19:30:603 1428 dae0 Misc  Infrastructure signed: Yes
    2014-10-22 12:19:30:775 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\117cab2d-82b1-4b5a-a08c-4d62dbee7782.cab:
    2014-10-22 12:19:30:791 1428 dae0 Misc  Microsoft signed: Yes
    2014-10-22 12:19:30:791 1428 dae0 Misc  Infrastructure signed: Yes
    2014-10-22 12:19:30:791 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\WuRedir\117CAB2D-82B1-4B5A-A08C-4D62DBEE7782\wuredir.cab:
    2014-10-22 12:19:30:806 1428 dae0 Misc  Microsoft signed: Yes
    2014-10-22 12:19:30:806 1428 dae0 Misc  Infrastructure signed: Yes
    2014-10-22 12:19:30:822 1428 dae0 EP Got 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 redir Client/Server URL: "https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx"
    2014-10-22 12:19:30:978 1428 dae0 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-10-22 12:19:30:978 1428 dae0 PT   + ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}, Server URL =
    https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx
    2014-10-22 12:19:31:025 1428 dae0 Agent   * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
    2014-10-22 12:19:31:025 1428 dae0 Agent *********
    2014-10-22 12:19:31:025 1428 dae0 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-10-22 12:19:31:025 1428 dae0 Agent *************
    2014-10-22 12:19:31:025 1428 d158 AU >>##  RESUMED  ## AU: Search for updates [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:31:025 1428 d158 AU   # 0 updates detected
    2014-10-22 12:19:31:025 1428 d158 AU #########
    2014-10-22 12:19:31:025 1428 d158 AU ##  END  ##  AU: Search for updates  [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:31:025 1428 d158 AU #############
    2014-10-22 12:19:31:025 1428 d158 AU All AU searches complete.
    2014-10-22 12:19:31:025 1428 d158 AU AU setting next detection timeout to 2014-10-23 14:19:28
    2014-10-22 12:19:36:025 1428 e214 Report REPORT EVENT: {E04012FD-8FFD-4259-96D5-A5A34127F0A0} 2014-10-22 12:19:31:025-0400 1 147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software
    Synchronization Windows Update Client successfully detected 0 updates.
    2014-10-22 12:19:36:025 1428 e214 Report CWERReporter finishing event handling. (00000000)
    2014-10-22 12:29:29:914 1428 e584 AU AU invoking RebootSystem (OnRebootNow)
    2014-10-22 12:29:30:055 1428 e584 AU Allowing auto firmware installs at next shutdown
    2014-10-22 12:29:30:102 1428 e584 Misc WARNING: SUS Client is rebooting system.
    2014-10-22 12:29:30:102 1428 e584 AU AU invoking RebootSystem (OnRebootRetry)
    2014-10-22 12:29:30:367 1428 e584 Shutdwn Checking to see whether install at shutdown is appropriate
    2014-10-22 12:29:30:367 1428 e584 Shutdwn user declined update at shutdown
    2014-10-22 12:29:30:367 1428 e584 AU AU initiates service shutdown
    2014-10-22 12:29:30:367 1428 e584 AU ###########  AU: Uninitializing Automatic Updates  ###########
    2014-10-22 12:29:30:399 1428 e584 WuTask Uninit WU Task Manager
    2014-10-22 12:29:30:445 1428 e584 Agent Sending shutdown notification to client
    2014-10-22 12:29:30:445 5788 8084 COMAPI WARNING: Received service shutdown/self-update notification.
    2014-10-22 12:29:30:461 1428 e584 Report CWERReporter finishing event handling. (00000000)
    2014-10-22 12:29:30:539 1428 e584 Service *********
    2014-10-22 12:29:30:539 1428 e584 Service **  END  **  Service: Service exit [Exit code = 0x240001]
    2014-10-22 12:29:30:539 1428 e584 Service *************
    Any assistance is appreciated.
    -Tim

    Hi,
    Any update?
    Best Regards,
    Joyce
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Windows Update Agent via WSUS

    Hi All,
    Is there a way to import the latest Windows Update Agent into WSUS and therefore all 3000 machines that connect to WSUS get the update?
    Reason this has cropped up is because I want to update all machines to IE9 from IE8. Have approved Internet Explorer 9 in WSUS. Some machines have updated ok. Others wont update and clicking on Check for updates (where it checks WSUS) tells me there are
    no updates to install. If I 'Check for Updates from Microsoft Online' it immediately tells me that the machine needs an update. The update that gets installed is Windows Update Agent 7.6.7600.320 which is fine except that means each user will have
    to download the update from MS Update and I want WSUS to do it like it does every other Critical and Important update. Does anyone know the KB number I should be looking for or what I need to import from the Catalogue into WSUS so the Update Agent is deployed
    to all machines. All machines are Windows 7 SP1 32bit. There must be a way otherwise machines are going to be stuck on IE8 and also not receive any future Win 7 updates from WSUS.
    I know IE8 is old and so is IE9 but due to various NHS systems out there some only support IE8 or 9. Tragic I know.
    Thanks
    Rich

    The proper way to distribute the latest WUA (.320) to the clients in a WSUS administered environment, is to update the WSUS server(s) with this update:
    An update to harden Windows Server Update Services
    then the clients WUA will be selfupdated when they connect to the WSUS server.
    Rolf Lidvall, Swedish Radio (Ltd)

  • Windows update requesting to install Windows Update Agent 7.6.7600.320

    I received this today when trying to manually scan for available updates via the windows update in control panel. It shows message as below. Seems that it will install the latest Windows Update Agent 7.6.7600.320. Will this machine able to get any patch
    deployed via SCCM if the WUA is not updated to the latest version?

    I can't say I've heard of any widespread issues with this version of the WUA so YMMV as always. If you do have an issue, you should contact CSS though.
    As for it being pushed automatically, that's correct and is no different than past WUA agent updates. It is considered an infrastructure update and is thus automatically installed via Windows Update or WSUS regardless of your client update settings unless
    you've actually disabled the WUA via group policy (not the service though) -- this includes ConfigMgr also because ConfigMgr does not in way pre-empt WSUS and leverages WSUS behind the scenes.
    Jason | http://blog.configmgrftw.com | @jasonsandys

  • Windows Update Error 800B0109 after Windows Update Agent 7.6.7600.320 Installed

    Hi, I have this error message when running windows update, it happened after Windows Update Agent 7.6.7600.320 installed.
    Any idea how to resolve this?
    Thank you.

    Hi,
    Please make sure that your antivirus application does not scan the files in the
    %windir% \SoftwareDistribution directory on any computer on which Windows Update Agent is installed.
    You can also temporarily turn off the antivirus application and check the result.
    Or run the following commands, and press Enter after each command:
    Net stop wuauserv
    cd %systemroot%
    Ren SoftwareDistribution SoftwareDistribution.old
    Net start wuauserv
    Try to install updates again.
    Yolanda Zhu
    TechNet Community Support
    I tried the commands as well, still prompting the same error.
    Thanks

  • I keep getting an error message, Windows update standalone installer (KB2857645)

    I tired to update my flash player and now its all messed up, i could not successfully update it so i tried uninstalling it and now it says in the internet options under manage-addons section that my shockwave object has no publisher where it used to say adobe... and i tried to reinstall the flash player and i keep getting that same error message? can anyone help me?

    See:Windows update standalone installer (KB2857645)
    Download the Shockwave Uninstaller here: http://www.adobe.com/shockwave/download/alternates/#sp
    You can also download the FULL installer there to reinstall, but follow the instructions from Microsoft to fix your Standalone installer first.

  • 80246002 error after installing Windows Update Agent 7.6.7600.320

    This problem prevents Windows Update from being able to search, download, and install updates.
    I am experiencing this issue on machines running Server 2008 R2 and Windows 7 Enterprise (I imagine this an issue with Windows Update and not the OS so this is probably affecting other OS' as well).
    This problem is becoming widespread quickly.
    The proposed fix (method 1) in the article below did not resolve the problem:
    http://support.microsoft.com/kb/958056/en-us
    Note: Method 2 is not viable when applying more than one update at a time especially when you are updating multiple machines.
    Several others are posting similar problems:
    http://windowsitpro.com/windows-update/tracking-error-80246002-windows-update-problem
    http://forums.techguy.org/windows-7/1132320-windows-update-problems-4.html
    This is preventing scheduled server maintenance from being performed.
    Could this be a targeted attack? Happening at the end of the week before a long holiday weekend is not leaving me with a very good feeling...
    I would hope that fixing this issue would be a very high priority.
    BTW - There is no "Windows Update Issue" forum category that I could find - If there is, sorry for posting in the wrong area.
    Cheers,
    Jeff

    My fix that worked...
    Reviewed the operational log for the WindowsUpdateClient (buried in the Event viewer here:
    Application and Services Logs -> Microsoft -> Windows -> WindowsUpdateClient -> Operational
    After review, I noticed that event 30 "Windows Updates established connectivity" was no longer occurring and that event 42 "There has been a change in the health of Windows Update" was the only thing after the error (Event 25 "Windows Update failed
    to check for updates with error 0x80246002")
    Even though the machine was restarted after applying the "Windows Update Agent 7.6.7600.320" patch and I had tried restarting the Windows Update service, the service appears to be hung.
    Solution:
    1.) restart the Windows update service
    2.) monitor the operational log for the WindowsUpdateClient (refreshing every 5-10 seconds)
    3.) verify that event 30 happens (you should see event 38 after restarting the service followed by (2) event 42, then event 30)
    4.) Once event 30 happens go to the Windows update GUI and run the "Check for updates" - yay!
    5.) You can go back into the operational log and see event 26 "Windows Update successfully found x updates" followed by an event 40 for each update found.
    What is really strange is that I checked the first machine that experienced the problem and it magically fixed itself.
    It seems like this may have been caused by DDOS attack on the source for windows updates that the Windows Update service connects to. Or the source location was having maintenance performed.
    Regardless, in my case, this was not a problem with the OS or the patch but the inability for the Windows Update Service to establish connectivity.
    Hope that helps somebody :)
    Cheers,
    Jeff 

  • NAC reports "Windows Update Agent is not the correct version"

    We just switched from CAM validation to Windows Update validation using NAC agent 4.7.2.10 (Clean access) and are begining to see lots of 64 bit Vista/Win7 machines with the "Windows Update Agent is not the correct version" issue.  We have 9 cases in less than a day and growing fast.
    Is there a resolution for this issue? Suggestions anyone?

    Hi Sam,
    I'm having the same issue, but on Windows 7 32-bits machines.  Were you able to overcome this problem?... I haven't been able to identify a pattern on machines that prompt "Windows Update Agent is not the correct version", but it happens randomly.  Our workaround is to reboot the machine, and then Agent completes posture validation without any prompt.

  • IME Installation using Windows Update Agent (WUA) APIs

    Hi All,
    We all know that IMEs are are not installed by default in Windows OS. We need to update/install them manually using Windows Update feature. I believe we can install the required IMEs programmatically. I have referred the MSDN (https://msdn.microsoft.com/en-us/library/aa387101(v=vs.85).aspx)
    for more details and ran the VB script suggested as an example without any success. 
    Any help in this regards will be highly appreciated. 
    Thanks in advance. 
    Cheers!
    Souvik

    Hello Souvik,
    From your description, this issue is related with the script, i move it to the script forum there script experts will help you. The current forum you posted to is used to discuss and ask questions about .NET Framework Base Classes (BCL) such as Collections,
    I/O, Regigistry, Globalization, Reflection.
    Regards.
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • How do I uninstall WSUS windows update agent?

    My server at some point was managed by WSUS. I removed WSUS and deleted group policy relevant to WSUS. It still seems to be having some effect and my server is trying to pull updates from some strange location "win7_prerelease" instead of proper
    URL. It also tries to pull something off test.update.microsoft.com instead. I have tried all the fixes I found but WU agent keep pulling stuff from those strange locations.
    I'm on Windows 2008 R2 SP1
    2014-03-18 15:23:24:529 900 fcc Misc WARNING: DownloadFileInternal failed for http://download.windowsupdate.com/win7_prerelease/windowsupdate/redir/win7wuredir.cab: error 0x80190194
    2014-03-18 15:23:24:568 900 fcc Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
    2014-03-18 15:23:24:568 900 fcc Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
    2014-03-18 15:23:24:568 900 fcc Misc WARNING: DownloadFileInternal failed for http://download.microsoft.com/win7_prerelease/windowsupdate/redir/win7wuredir.cab: error 0x80190194
    2014-03-18 15:23:24:575 900 fcc Misc WARNING: Send failed with hr = 80072ee7.
    2014-03-18 15:23:24:575 900 fcc Misc WARNING: SendRequest failed with hr = 80072ee7. Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <None>
    2014-03-18 15:23:24:575 900 fcc Misc WARNING: WinHttp: SendRequestUsingProxy failed for <http://test.update.microsoft.com/win7_prerelease/windowsupdate/redir/win7wuredir.cab>. error 0x8024402c
    2014-03-18 15:23:24:575 900 fcc Misc WARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed. error 0x8024402c
    2014-03-18 15:23:24:575 900 fcc Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x8024402c
    2014-03-18 15:23:24:575 900 fcc Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x8024402c

    Hi,
    I noticed that the server is trying to connect to a proxy server but failed. And there are several way to configure a proxy server. I recommend you follow the article find
    out where it is configured.
    How the Windows Update client determines which proxy server to use to connect to the Windows Update Web site
    http://support.microsoft.com/kb/900935
    Hope this helps.

  • Windows Update Error 80080005 Windows 7 Client with WSUS 3.0 SP2 server

    Hello everyone, I've looked around at other threads related to my issue, and I can't seem to find a correct answer.
    I have a computer lab that I've recently installed a Windows 7 Enterprise image onto 35 Dell Optiplex computers (most are 380's, a few older 360's).
    I created the image using MDT2010 and used one of the 380's as a reference.
    All has been well for about a month or two but recently 6 computers are giving me Windows Update errors with the error code of 80080005.
    I have a WSUS 3.0 SP2 server running, and all of my other computers seem to be getting their updates just fine.  WSUS has the problematic computers in it's database, but it shows that they haven't checked in for "x" days.
    I have Avast 4.8 Professional installed, I have OpenDNS configured to block bad websites, ____, etc. and I also use an Untangle server to prevent access to bad websites.  I've ran a Malwarebytes' Anti-Malware scan on the affected computers, as well
    as Windows Defender scan, and Windows Live OneCare scans, and all have found no malicious software.
    I have also tried resetting the Windows update service as described here: http://support.microsoft.com/kb/971058 as well as a script that supposedly does the same thing, but also resets all previous
    update events, but I can't find the script source right now (I had ran it last week, and it didn't work).
    I'm currently running a SFC /Scannow on one of the computers, and now it has finished.  It gives the error: Windows Resource Protection could not start the repair service.  I'll have to google that next.
    The last windows update that ran on the computer that I'm working on now was installed on 11-18-2010 and was a Windows Defender Update (KB915597 Def: 1.93.1985.0)
    Previous to that was 11/9/2010 2 updates: KB977165 and KB981852.
    I guess I'll have to look at all of the other machines to see if they have the same updates installed.
    Anyway, has anyone else had this problem?  I've seen vista home editions, and RC's but no real Windows 7 Pro+ RTM versions in business environments where updates were controlled by WSUS.
    Thanks for any help that you can provide!
    By the way, I only work at this location once a week (tuesdays, well thursdays too, but I'm next door to this building, but I have remote access), so bare with me on trying to fix things.

    Ok, for the sake of completeness, I have completed the instructions given by Miya Yao.
    After stopping the Windows Update Service (from an Admin Command prompt window), renaming the SoftwareDistribution folder to SDold, then starting the update service again, I still receive the same error when checking for updates.
    The windows update log shows this (starting from about 4am) and I just reset the service at about 9:10, which you can see in the log.
    2010-12-21 04:19:02:342 940 f20 Agent WARNING: WU client failed Searching for update with error 0x80080005
    2010-12-21 04:19:02:342 940 cd4 AU >>## RESUMED ## AU: Search for updates [CallId = {8957B50F-46F1-44C4-A347-20D4C5E91D47}]
    2010-12-21 04:19:02:342 940 cd4 AU # WARNING: Search callback failed, result = 0x80080005
    2010-12-21 04:19:02:342 940 f20 Report CWERReporter finishing event handling. (00000000)
    2010-12-21 04:19:02:342 940 cd4 AU # WARNING: Failed to find updates with error code 80080005
    2010-12-21 04:19:02:342 940 cd4 AU #########
    2010-12-21 04:19:02:342 940 cd4 AU ## END ## AU: Search for updates [CallId = {8957B50F-46F1-44C4-A347-20D4C5E91D47}]
    2010-12-21 04:19:02:342 940 cd4 AU #############
    2010-12-21 04:19:02:342 940 cd4 AU Successfully wrote event for AU health state:0
    2010-12-21 04:19:02:342 940 cd4 AU AU setting next detection timeout to 2010-12-21 14:19:02
    2010-12-21 04:19:02:342 940 cd4 AU Setting AU scheduled install time to 2010-12-22 08:00:00
    2010-12-21 04:19:02:342 940 cd4 AU Successfully wrote event for AU health state:0
    2010-12-21 04:19:02:342 940 cd4 AU Successfully wrote event for AU health state:0
    2010-12-21 04:19:07:350 940 f20 Report REPORT EVENT: {A472759C-BEE7-4161-84E8-41F1C1D03AB4} 2010-12-21 04:19:02:342-0500 1 148 101 {61CA813A-7585-442E-A66B-B0D15CE6BDC0} 1 80080005 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x80080005.
    2010-12-21 04:19:07:350 940 f20 Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2010-12-21 04:19:07:350 940 f20 Report WER Report sent: 7.4.7600.226 0x80080005 61CA813A-7585-442E-A66B-B0D15CE6BDC0 Scan 101 Managed
    2010-12-21 04:19:07:350 940 f20 Report CWERReporter finishing event handling. (00000000)
    2010-12-21 04:24:22:767 940 f20 PT WARNING: Cached cookie has expired or new PID is available
    2010-12-21 04:24:22:767 940 f20 PT Initializing simple targeting cookie, clientId = a6d6dc1c-d844-451c-8609-3879e6cacb33, target group = , DNS name = lab24.sja.local
    2010-12-21 04:24:22:767 940 f20 PT Server URL = http://server2:8530/SimpleAuthWebService/SimpleAuth.asmx
    2010-12-21 04:24:22:814 940 f20 Report Uploading 2 events using cached cookie, reporting URL = http://server2:8530/ReportingWebService/ReportingWebService.asmx
    2010-12-21 04:24:22:814 940 f20 Report Reporter successfully uploaded 2 events.
    2010-12-21 06:59:23:020 940 b4c AU AU was unable to detect updates for more than 48 hours
    2010-12-21 06:59:28:027 940 c78 Report REPORT EVENT: {511B1C92-939C-4E97-A51B-50E75FCB7AEF} 2010-12-21 06:59:23:020-0500 1 149 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Failure Software Synchronization Unable to Connect: Windows is unable to connect to the automatic updates service and therefore cannot download and install updates according to the set schedule. Windows will continue to try to establish a connection.
    2010-12-21 06:59:28:027 940 c78 Report CWERReporter finishing event handling. (00000000)
    2010-12-21 09:02:03:476 940 2f4 AU Triggering AU detection through DetectNow API
    2010-12-21 09:02:03:476 940 2f4 AU Triggering Online detection (interactive)
    2010-12-21 09:02:03:476 940 b4c AU #############
    2010-12-21 09:02:03:476 940 b4c AU ## START ## AU: Search for updates
    2010-12-21 09:02:03:477 940 b4c AU #########
    2010-12-21 09:02:03:488 940 b4c AU <<## SUBMITTED ## AU: Search for updates [CallId = {B65ACC67-ED84-45D4-9774-D0475806E74B}]
    2010-12-21 09:02:03:488 940 e38 Agent *************
    2010-12-21 09:02:03:488 940 e38 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
    2010-12-21 09:02:03:488 940 e38 Agent *********
    2010-12-21 09:02:03:488 940 e38 Agent * Online = Yes; Ignore download priority = No
    2010-12-21 09:02:03:488 940 e38 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2010-12-21 09:02:03:488 940 e38 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2010-12-21 09:02:03:488 940 e38 Agent * Search Scope = {Machine}
    2010-12-21 09:02:03:488 940 e38 Setup Checking for agent SelfUpdate
    2010-12-21 09:02:03:489 940 e38 Setup Client version: Core: 7.4.7600.226 Aux: 7.4.7600.226
    2010-12-21 09:02:03:489 940 e38 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2010-12-21 09:02:03:496 940 e38 Misc Microsoft signed: Yes
    2010-12-21 09:02:06:071 940 e38 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2010-12-21 09:02:06:078 940 e38 Misc Microsoft signed: Yes
    2010-12-21 09:02:06:080 940 e38 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2010-12-21 09:02:06:087 940 e38 Misc Microsoft signed: Yes
    2010-12-21 09:02:06:100 940 e38 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2010-12-21 09:02:06:107 940 e38 Misc Microsoft signed: Yes
    2010-12-21 09:02:06:123 940 e38 Setup Determining whether a new setup handler needs to be downloaded
    2010-12-21 09:02:06:123 940 e38 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe:
    2010-12-21 09:02:06:129 940 e38 Misc Microsoft signed: Yes
    2010-12-21 09:02:06:129 940 e38 Setup SelfUpdate handler update NOT required: Current version: 7.4.7600.226, required version: 7.4.7600.226
    2010-12-21 09:02:06:129 940 e38 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.4.7600.226"
    2010-12-21 09:02:15:386 940 b4c AU AU received policy change subscription event
    2010-12-21 09:02:36:165 940 e38 Setup WARNING: Cbs StartSession, error = 0x80080005
    2010-12-21 09:02:36:165 940 e38 Setup FATAL: Applicability evaluation for setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.4.7600.226" failed, error = 0x80080005
    2010-12-21 09:02:36:165 940 e38 Setup FATAL: SelfUpdate check failed, err = 0x80080005
    2010-12-21 09:02:36:165 940 e38 Agent * WARNING: Skipping scan, self-update check returned 0x80080005
    2010-12-21 09:02:36:165 940 e38 Agent * WARNING: Exit code = 0x80080005
    2010-12-21 09:02:36:165 940 e38 Agent *********
    2010-12-21 09:02:36:165 940 e38 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
    2010-12-21 09:02:36:165 940 e38 Agent *************
    2010-12-21 09:02:36:165 940 e38 Agent WARNING: WU client failed Searching for update with error 0x80080005
    2010-12-21 09:02:36:165 940 e8c AU >>## RESUMED ## AU: Search for updates [CallId = {B65ACC67-ED84-45D4-9774-D0475806E74B}]
    2010-12-21 09:02:36:165 940 e8c AU # WARNING: Search callback failed, result = 0x80080005
    2010-12-21 09:02:36:165 940 e8c AU # WARNING: Failed to find updates with error code 80080005
    2010-12-21 09:02:36:165 940 e8c AU #########
    2010-12-21 09:02:36:165 940 e8c AU ## END ## AU: Search for updates [CallId = {B65ACC67-ED84-45D4-9774-D0475806E74B}]
    2010-12-21 09:02:36:165 940 e8c AU #############
    2010-12-21 09:02:36:165 940 e8c AU Successfully wrote event for AU health state:0
    2010-12-21 09:02:36:165 940 e8c AU AU setting next detection timeout to 2010-12-21 19:02:36
    2010-12-21 09:02:36:165 940 e8c AU Setting AU scheduled install time to 2010-12-22 08:00:00
    2010-12-21 09:02:36:165 940 e8c AU Successfully wrote event for AU health state:0
    2010-12-21 09:02:36:165 940 e8c AU Successfully wrote event for AU health state:0
    2010-12-21 09:02:41:172 940 e38 Report REPORT EVENT: {678C2913-B3B3-4F14-9310-C2E2B1F3334A} 2010-12-21 09:02:36:165-0500 1 148 101 {61CA813A-7585-442E-A66B-B0D15CE6BDC0} 1 80080005 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x80080005.
    2010-12-21 09:02:41:172 940 e38 Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2010-12-21 09:02:41:172 940 e38 Report WER Report sent: 7.4.7600.226 0x80080005 61CA813A-7585-442E-A66B-B0D15CE6BDC0 Scan 101 Managed
    2010-12-21 09:02:41:172 940 e38 Report CWERReporter finishing event handling. (00000000)
    2010-12-21 09:06:07:779 940 b4c AU ########### AU: Uninitializing Automatic Updates ###########
    2010-12-21 09:06:37:809 940 b4c Handler FATAL: UH: 0x80080005: StartSession failed in CCbs::IsCbsPending
    2010-12-21 09:06:37:840 940 b4c Report CWERReporter finishing event handling. (00000000)
    2010-12-21 09:06:37:872 940 b4c Service *********
    2010-12-21 09:06:37:872 940 b4c Service ** END ** Service: Service exit [Exit code = 0x240001]
    2010-12-21 09:06:37:872 940 b4c Service *************
    2010-12-21 09:08:37:104 940 e84 Misc =========== Logging initialized (build: 7.4.7600.226, tz: -0500) ===========
    2010-12-21 09:08:37:104 940 e84 Misc = Process: C:\Windows\system32\svchost.exe
    2010-12-21 09:08:37:104 940 e84 Misc = Module: c:\windows\system32\wuaueng.dll
    2010-12-21 09:08:37:104 940 e84 Service *************
    2010-12-21 09:08:37:104 940 e84 Service ** START ** Service: Service startup
    2010-12-21 09:08:37:104 940 e84 Service *********
    2010-12-21 09:08:37:108 940 e84 Agent * WU client version 7.4.7600.226
    2010-12-21 09:08:37:108 940 e84 Agent * Base directory: C:\Windows\SoftwareDistribution
    2010-12-21 09:08:37:108 940 e84 Agent * Access type: No proxy
    2010-12-21 09:08:37:108 940 e84 Agent * Network state: Connected
    2010-12-21 09:08:37:453 940 e84 DtaStor Default service for AU is {00000000-0000-0000-0000-000000000000}
    2010-12-21 09:08:37:462 940 e84 DtaStor Default service for AU is {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2010-12-21 09:08:37:464 940 e84 Agent WARNING: failed to access the auth cab, fatal error 0x80070003
    2010-12-21 09:08:37:464 940 e84 Agent WARNING: Invalid service in the backup data store; cleaning up
    2010-12-21 09:08:37:465 940 e84 Agent WARNING: Failed to add and register service 7971f918-a847-4430-9279-4a52d1efe18d to the data store 0x80240031
    2010-12-21 09:08:37:465 940 e84 Agent WARNING: Default Service Recovery: Attempting to add pending registration for service 7971f918-a847-4430-9279-4a52d1efe18d to the data store
    2010-12-21 09:09:22:474 940 e84 Report CWERReporter::Init succeeded
    2010-12-21 09:09:22:474 940 e84 Agent *********** Agent: Initializing Windows Update Agent ***********
    2010-12-21 09:09:22:475 940 e84 Agent *********** Agent: Initializing global settings cache ***********
    2010-12-21 09:09:22:475 940 e84 Agent * WSUS server: http://server2:8530
    2010-12-21 09:09:22:475 940 e84 Agent * WSUS status server: http://server2:8530
    2010-12-21 09:09:22:475 940 e84 Agent * Target group: (Unassigned Computers)
    2010-12-21 09:09:22:475 940 e84 Agent * Windows Update access disabled: No
    2010-12-21 09:09:22:475 940 e84 DnldMgr Download manager restoring 0 downloads
    2010-12-21 09:09:22:476 940 e84 AU ########### AU: Initializing Automatic Updates ###########
    2010-12-21 09:09:22:477 940 e84 AU # WSUS server: http://server2:8530
    2010-12-21 09:09:22:477 940 e84 AU # Detection frequency: 22
    2010-12-21 09:09:22:477 940 e84 AU # Approval type: Scheduled (Policy)
    2010-12-21 09:09:22:477 940 e84 AU # Scheduled install day/time: Every day at 3:00
    2010-12-21 09:09:22:477 940 e84 AU # Auto-install minor updates: Yes (Policy)
    2010-12-21 09:09:22:478 940 e84 AU Setting AU scheduled install time to 2010-12-22 08:00:00
    2010-12-21 09:09:22:751 940 e84 Report *********** Report: Initializing static reporting data ***********
    2010-12-21 09:09:22:751 940 e84 Report * OS Version = 6.1.7600.0.0.65792
    2010-12-21 09:09:22:751 940 e84 Report * OS Product Type = 0x00000004
    2010-12-21 09:09:22:772 940 e84 Report * Computer Brand = Dell Inc.
    2010-12-21 09:09:22:772 940 e84 Report * Computer Model = OptiPlex 380
    2010-12-21 09:09:22:775 940 e84 Report * Bios Revision = A01
    2010-12-21 09:09:22:775 940 e84 Report * Bios Name = Phoenix ROM BIOS PLUS Version 1.10 A01
    2010-12-21 09:09:22:775 940 e84 Report * Bios Release Date = 2010-03-11T00:00:00
    2010-12-21 09:09:22:775 940 e84 Report * Locale ID = 1033
    2010-12-21 09:09:22:777 940 e84 AU Successfully wrote event for AU health state:0
    2010-12-21 09:09:22:777 940 e84 AU Initializing featured updates
    2010-12-21 09:09:22:777 940 e84 AU Found 0 cached featured updates
    2010-12-21 09:09:22:777 940 e84 AU Successfully wrote event for AU health state:0
    2010-12-21 09:09:22:778 940 e84 AU Successfully wrote event for AU health state:0
    2010-12-21 09:09:22:778 940 e84 AU AU finished delayed initialization
    2010-12-21 09:09:27:781 940 36c Report CWERReporter finishing event handling. (00000000)
    2010-12-21 09:10:20:421 940 bf0 AU Triggering AU detection through DetectNow API
    2010-12-21 09:10:20:422 940 bf0 AU Triggering Online detection (interactive)
    2010-12-21 09:10:20:422 940 e84 AU #############
    2010-12-21 09:10:20:422 940 e84 AU ## START ## AU: Search for updates
    2010-12-21 09:10:20:422 940 e84 AU #########
    2010-12-21 09:10:20:425 940 e84 AU <<## SUBMITTED ## AU: Search for updates [CallId = {F1E8D669-5A48-4C25-832F-4A5ABD80270F}]
    2010-12-21 09:10:20:425 940 36c Agent *************
    2010-12-21 09:10:20:425 940 36c Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
    2010-12-21 09:10:20:425 940 36c Agent *********
    2010-12-21 09:10:20:425 940 36c Agent * Online = Yes; Ignore download priority = No
    2010-12-21 09:10:20:425 940 36c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2010-12-21 09:10:20:425 940 36c Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2010-12-21 09:10:20:425 940 36c Agent * Search Scope = {Machine}
    2010-12-21 09:10:20:425 940 36c Setup Checking for agent SelfUpdate
    2010-12-21 09:10:20:426 940 36c Setup Client version: Core: 7.4.7600.226 Aux: 7.4.7600.226
    2010-12-21 09:10:22:715 940 36c Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2010-12-21 09:10:22:725 940 36c Misc Microsoft signed: Yes
    2010-12-21 09:10:22:745 940 36c Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2010-12-21 09:10:22:750 940 36c Misc Microsoft signed: Yes
    2010-12-21 09:10:22:765 940 36c Setup Determining whether a new setup handler needs to be downloaded
    2010-12-21 09:10:22:765 940 36c Setup SelfUpdate handler is not found. It will be downloaded
    2010-12-21 09:10:22:765 940 36c Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.4.7600.226"
    2010-12-21 09:10:52:778 940 36c Setup WARNING: Cbs StartSession, error = 0x80080005
    2010-12-21 09:10:52:778 940 36c Setup FATAL: Applicability evaluation for setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.4.7600.226" failed, error = 0x80080005
    2010-12-21 09:10:52:778 940 36c Setup FATAL: SelfUpdate check failed, err = 0x80080005
    2010-12-21 09:10:52:779 940 36c Agent * WARNING: Skipping scan, self-update check returned 0x80080005
    2010-12-21 09:10:52:779 940 36c Agent * WARNING: Exit code = 0x80080005
    2010-12-21 09:10:52:779 940 36c Agent *********
    2010-12-21 09:10:52:779 940 36c Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
    2010-12-21 09:10:52:779 940 36c Agent *************
    2010-12-21 09:10:52:779 940 36c Agent WARNING: WU client failed Searching for update with error 0x80080005
    2010-12-21 09:10:52:779 940 ba0 AU >>## RESUMED ## AU: Search for updates [CallId = {F1E8D669-5A48-4C25-832F-4A5ABD80270F}]
    2010-12-21 09:10:52:780 940 ba0 AU # WARNING: Search callback failed, result = 0x80080005
    2010-12-21 09:10:52:780 940 ba0 AU # WARNING: Failed to find updates with error code 80080005
    2010-12-21 09:10:52:780 940 ba0 AU #########
    2010-12-21 09:10:52:780 940 ba0 AU ## END ## AU: Search for updates [CallId = {F1E8D669-5A48-4C25-832F-4A5ABD80270F}]
    2010-12-21 09:10:52:780 940 ba0 AU #############
    2010-12-21 09:10:52:783 940 ba0 AU Successfully wrote event for AU health state:0
    2010-12-21 09:10:52:783 940 ba0 AU AU setting next detection timeout to 2010-12-21 19:10:52
    2010-12-21 09:10:52:783 940 ba0 AU Setting AU scheduled install time to 2010-12-22 08:00:00
    2010-12-21 09:10:52:783 940 ba0 AU Successfully wrote event for AU health state:0
    2010-12-21 09:10:52:784 940 ba0 AU Successfully wrote event for AU health state:0

  • Vista Home Premium - Error code 80070490 - Windows update

    Computer - Satellite 200
    Operating system - Vista Home Premium (service pack 1)
    Problem - When I try to update from Windows Update (both manual and automatic) I get error code 80070490
    I have tried - System restore, downloading and paying for "RegCure" and following instructions on Microsoft forum all without success.
    The computer was supplied with a recovery disk which does not have "repair" facility.
    If you have a solution that does not involve a full re-load I would be very grateful
    Please make instructions comprehensible to a non-techno!
    Thank you

    This error may occur if the older Windows Update engine files cannot be
    replaced by Windows Update Agent 3.0 (7.0.6000.374).
    To troubleshoot this issue, I suggest we first reset permission and
    reinstall Windows Update Agent 3.0.
    Step 1: Reset permission
    ================
    1. Please download the subinacl.msi file from the following link and save
    the installation patch onto the Desktop:
    http://www.microsoft.com/downloads/d...inityDownloads
    2. Please go to the Desktop and double click the downloaded file.
    3. Please select the C:\Windows\System32 folder as the Destination Folder
    during the installation. Later we will use this tool to reset the permission
    settings on the current machine.
    Note: If UAC (User Account Control) window is prompted for permission to
    continue, please click Continue.
    4. Click the Start Button, in the Start Search bar, type: "notepad" (without
    quotes) and press Enter.
    5. Copy the following commands and then paste them into the opened Notepad
    window:
    @echo off
    subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=administrators=f
    subinacl /subkeyreg HKEY_CURRENT_USER /grant=administrators=f
    subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=administrators=f
    subinacl /subdirectories %SystemDrive% /grant=administrators=f
    subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=system=f
    subinacl /subkeyreg HKEY_CURRENT_USER /grant=system=f
    subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=system=f
    subinacl /subdirectories %SystemDrive% /grant=system=f
    @Echo =========================
    @Echo Finished.
    @Echo =========================
    @pause
    6. After pasting the above commands, please close the Notepad window. Choose
    Save when you are prompted to save the file. Type "reset.bat" as the file
    name and choose Desktop from the left panel as the save location.
    7. Refer to the Desktop and right click the reset.bat file, then choose "Run
    as administrator."
    8. You will see a DOS-like window processing.
    NOTE: It may take several minutes, please be patient. When it is finished,
    you will be prompted with the message: "Finished, press any key to continue".
    Step 2: Reinstall Windows Update Agent 3.0
    ===========================
    1. Please download the file from the following link:
    Windows Vista (32bit)
    http://download.windowsupdate.com/v7...gent30-x86.exe
    Windows Vista (64bit)
    http://download.windowsupdate.com/v7...gent30-x64.exe
    2. Save the file to D: drive.
    Note: Please select a drive where Windows Vista was not loaded because the
    file cannot be launched directly from the system root directory.
    3. Click Start->Run, type: "D:\WindowsUpdateAgent30-x86.exe /wuforce"
    (without quotations) and then press Enter to install the Windows Update
    engine.
    Note: There is a space between "D:\WindowsUpdateAgent30-x86.exe" and
    "/wuforce"
    Now, let's run Windows Update again.

Maybe you are looking for