I have a WSUS server in my firm and we manually approve updates to various computer containers. When we approve updates, we never set a deadline on when they need to be installed. We also have WSUS GPOs per site OU (for client side targeting purposes) which
direct computers download and install updates every Saturday at 3AM. Most of the computers in our firm follow the scheduled installation of approved updates.
For some reason, we have seen some computers disregard the update schedule and install updates on their own during the day. We used to only have the advanced settings for Automatic Approvals enabled to so we can use the WSUS Server Cleanup Wizard to clean
out expired and superseded updates:
WSUS Updates > Automatically approve updates to the WSUS product itself
Revisions to Updates > Automatically approve new revisions of updates that are already approved
I cleared these options out in case they were the cause of issue. I also confirmed the computers affected by this issue are living in their proper OUs where the WSUS GPO is being applied. I am still waiting to see if this pattern will exhibit itself again
this weekend after I approve more updates, but still do not understand why this is happening.
Below is a sample of one of our WSUS GPOs and after that is a snippet from the WindowsUpdate log.
GPO
Allow Automatic Updates immediate installation: Disabled
Allow signed updates from an intranet Microsoft update service location: Enabled
Automatic Updates detection frequency: Enabled
Check for updates at the following
interval (hours): 4
Configure Automatic Updates: Enabled
Configure automatic updating: 4 - Auto download and schedule the install
The following settings are only required
and applicable if 4 is selected.
Scheduled install day: 7 - Every Saturday
Scheduled install time: 03:00
Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog box: Enabled
Enable client-side targeting: Enabled
Target group name for this computer: "SF Computers"
Enabling Windows Update Power Management to automatically wake up the system to install scheduled updates: Enabled
No auto-restart with logged on users for scheduled automatic updates installations: Disabled
Re-prompt for restart with scheduled installations: Enabled
Wait the following period before
prompting again with a scheduled
restart (minutes): 360
Specify intranet Microsoft update service location Enabled
Set the intranet update service for detecting updates: http: //**WSUSServer**/
Set the intranet statistics server: http: //**WSUSServer**/
Policy Setting Comment
Turn on recommended updates via Automatic Updates Enabled
Windows Updates Log
015-07-25 19:03:38:941 816 ad0 AU ########### AU: Initializing Automatic Updates ###########
2015-07-25 19:03:38:957 816 ad0 AU AU setting next detection timeout to 2015-07-26 02:03:38
2015-07-25 19:03:38:957 816 ad0 AU AU setting next sqm report timeout to 2015-07-26 02:03:38
2015-07-25 19:03:38:957 816 ad0 AU # WSUS server: http: //**WSUSServer**/
2015-07-25 19:03:38:957 816 ad0 AU # Detection frequency: 4
2015-07-25 19:03:38:957 816 ad0 AU # Target group: SF Computers
2015-07-25 19:03:38:957 816 ad0 AU # Approval type: Scheduled (Policy)
2015-07-25 19:03:38:957 816 ad0 AU # Scheduled install day/time: Saturday at 3:00
2015-07-25 19:03:38:957 816 ad0 AU # Auto-install minor updates: No (Policy)
2015-07-25 19:03:38:957 816 ad0 AU # Will interact with non-admins (Non-admins are elevated (User preference))
2015-07-25 19:03:39:206 816 ad0 Report *********** Report: Initializing static reporting data ***********
2015-07-25 19:03:39:206 816 ad0 Report * OS Version = 6.1.7601.1.0.65792
2015-07-25 19:03:39:206 816 ad0 Report * OS Product Type = 0x00000004
2015-07-25 19:03:39:222 816 ad0 Report * Computer Brand = Hewlett-Packard
2015-07-25 19:03:39:222 816 ad0 Report * Computer Model = HP EliteBook Folio 9470m
2015-07-25 19:03:39:222 816 ad0 Report * Bios Revision = 68IBD Ver. F.47
2015-07-25 19:03:39:222 816 ad0 Report * Bios Name = Default System BIOS
2015-07-25 19:03:39:222 816 ad0 Report * Bios Release Date = 2013-10-08T00:00:00
2015-07-25 19:03:39:222 816 ad0 Report * Locale ID = 1033
2015-07-25 19:03:39:347 816 ad0 AU Initializing featured updates
2015-07-25 19:03:39:347 816 ad0 AU Found 0 cached featured updates
2015-07-25 19:03:39:347 816 ad0 AU Successfully wrote event for AU health state:0
2015-07-25 19:03:39:347 816 ad0 AU AU setting pending client directive to 'Install Approval'
2015-07-25 19:03:39:362 816 ad0 AU Successfully wrote event for AU health state:0
2015-07-25 19:03:39:362 816 ad0 AU AU finished delayed initialization
2015-07-25 19:03:39:362 816 ad0 AU AU setting next sqm report timeout to 2015-07-27 02:03:39
2015-07-25 19:03:39:362 816 ad0 AU #############
2015-07-25 19:03:39:362 816 ad0 AU ## START ## AU: Search for updates
2015-07-25 19:03:39:362 816 ad0 AU #########
2015-07-25 19:03:39:362 816 ad0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {B9D11034-8F4D-4129-A70D-085299FA05E2}]
2015-07-25 19:03:39:487 816 12f4 Agent *************
2015-07-25 19:03:39:487 816 12f4 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2015-07-25 19:03:39:487 816 12f4 Agent *********
2015-07-25 19:03:39:487 816 12f4 Agent * Online = Yes; Ignore download priority = No
2015-07-25 19:03:39:487 816 12f4 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2015-07-25 19:03:39:487 816 12f4 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2015-07-25 19:03:39:487 816 12f4 Agent * Search Scope = {Machine}
2015-07-25 19:03:39:487 816 12f4 Setup Checking for agent SelfUpdate
2015-07-25 19:03:39:487 816 12f4 Setup Client version: Core: 7.6.7601.18847 Aux: 7.6.7601.18847
2015-07-25 19:03:44:464 816 12f4 Misc WARNING: Send failed with hr = 80072ee7.
2015-07-25 19:03:44:464 816 12f4 Misc WARNING: SendRequest failed with hr = 80072ee7. Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <>
2015-07-25 19:03:44:464 816 12f4 Misc WARNING: WinHttp: SendRequestUsingProxy failed for <http: //**WSUSServer**//selfupdate/wuident.cab>. error 0x8024402c
2015-07-25 19:03:44:464 816 12f4 Misc WARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed. error 0x8024402c
2015-07-25 19:03:44:464 816 12f4 Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x8024402c
2015-07-25 19:03:44:464 816 12f4 Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x8024402c
2015-07-25 19:03:44:464 816 12f4 Misc WARNING: DownloadFileInternal failed for http: //**WSUSServer**//selfupdate/wuident.cab: error 0x8024402c
2015-07-25 19:03:44:464 816 12f4 Setup FATAL: DownloadCab failed, err = 0x8024402C
2015-07-25 19:03:44:464 816 12f4 Setup WARNING: SelfUpdate check failed to download package information, error = 0x8024402C
2015-07-25 19:03:44:464 816 12f4 Setup FATAL: SelfUpdate check failed, err = 0x8024402C
2015-07-25 19:03:44:464 816 12f4 Agent * WARNING: Skipping scan, self-update check returned 0x8024402C
2015-07-25 19:03:44:464 816 12f4 Agent * WARNING: Exit code = 0x8024402C
2015-07-25 19:03:44:464 816 12f4 Agent *********
2015-07-25 19:03:44:464 816 12f4 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2015-07-25 19:03:44:464 816 12f4 Agent *************
2015-07-25 19:03:44:464 816 12f4 Agent WARNING: WU client failed Searching for update with error 0x8024402c
2015-07-25 19:03:44:464 816 1b4 AU >>## RESUMED ## AU: Search for updates [CallId = {B9D11034-8F4D-4129-A70D-085299FA05E2}]
2015-07-25 19:03:44:464 816 1b4 AU # WARNING: Search callback failed, result = 0x8024402C
2015-07-25 19:03:44:464 816 12f4 Report REPORT EVENT: {137EA465-1405-4514-BFA1-CF378B2E38E0} 2015-07-25 19:03:38:972-0700 1 188 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Content
Install Installation Ready: The following updates are downloaded and ready for installation. This computer is currently scheduled to install these updates on Saturday, July 25, 2015 at 7:04 PM: - Security Update for Windows 7 for x64-based Systems
(KB3079904)
2015-07-25 19:03:44:464 816 1b4 AU # WARNING: Failed to find updates with error code 8024402C
2015-07-25 19:03:44:464 816 1b4 AU #########
2015-07-25 19:03:44:464 816 1b4 AU ## END ## AU: Search for updates [CallId = {B9D11034-8F4D-4129-A70D-085299FA05E2}]
2015-07-25 19:03:44:464 816 1b4 AU #############
2015-07-25 19:03:44:479 816 1b4 AU Successfully wrote event for AU health state:0
2015-07-25 19:03:44:479 816 1b4 AU AU setting next detection timeout to 2015-07-26 05:39:26
2015-07-25 19:03:44:479 816 1b4 AU Successfully wrote event for AU health state:0
2015-07-25 19:03:54:370 816 ad0 AU Launched new AU client for directive 'Install Approval', session id = 0x1
2015-07-25 19:04:03:605 816 ad0 AU Forced install timer expired for AUInstallType = 4
2015-07-25 19:04:03:605 816 ad0 AU UpdateDownloadProperties: 0 download(s) are still in progress.
2015-07-25 19:04:03:605 816 ad0 AU #############
2015-07-25 19:04:03:605 816 ad0 AU ## START ## AU: Install updates
2015-07-25 19:04:03:605 816 ad0 AU #########
2015-07-25 19:04:03:605 816 ad0 AU # Initiating scheduled install
2015-07-25 19:04:03:605 816 ad0 AU # Approved updates = 1
2015-07-25 19:04:03:605 816 ad0 AU <<## SUBMITTED ## AU: Install updates / installing updates [CallId = {3DED3327-50BD-478E-AC52-679078357047}]
2015-07-25 19:04:03:605 816 de0 Agent *************
2015-07-25 19:04:03:605 816 de0 Agent ** START ** Agent: Installing updates [CallerId = AutomaticUpdates]
2015-07-25 19:04:03:605 816 de0 Agent *********
2015-07-25 19:04:03:605 816 de0 Agent * Updates to install = 1
2015-07-25 19:04:03:620 816 ad0 AU AU received handle event
2015-07-25 19:04:03:652 816 de0 Agent * Title = Security Update for Windows 7 for x64-based Systems (KB3079904)
2015-07-25 19:04:03:652 816 de0 Agent * UpdateId = {6D0FC6F5-8079-41BB-B8FE-5240D76FF9E1}.200
2015-07-25 19:04:03:652 816 de0 Agent * Bundles 1 updates:
2015-07-25 19:04:03:652 816 de0 Agent * {78EE0C4C-298A-4962-8F5F-9E7FB226A606}.200
2015-07-25 19:04:12:076 816 de0 DnldMgr Preparing update for install, updateId = {78EE0C4C-298A-4962-8F5F-9E7FB226A606}.200.
2015-07-25 19:04:12:076 4860 d6c Misc =========== Logging initialized (build: 7.6.7601.18847, tz: -0700) ===========
2015-07-25 19:04:12:076 4860 d6c Misc = Process: C:\Windows\system32\wuauclt.exe
2015-07-25 19:04:12:076 4860 d6c Misc = Module: C:\Windows\system32\wuaueng.dll
2015-07-25 19:04:12:076 4860 d6c Handler :::::::::::::
2015-07-25 19:04:12:076 4860 d6c Handler :: START :: Handler: CBS Install
2015-07-25 19:04:12:076 4860 d6c Handler :::::::::
2015-07-25 19:04:12:076 4860 d6c Handler Starting install of CBS update 78EE0C4C-298A-4962-8F5F-9E7FB226A606
2015-07-25 19:04:12:091 4860 d6c Handler CBS package identity: Package_for_KB3079904~31bf3856ad364e35~amd64~~6.1.1.0
2015-07-25 19:04:12:107 4860 d6c Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\3642240aed3fb5f38057dac1e44c2de6\windows6.1-kb3079904-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\3642240aed3fb5f38057dac1e44c2de6\inst
2015-07-25 19:04:15:149 4860 d6c Handler Requesting post-reboot reporting for package Package_for_KB3079904~31bf3856ad364e35~amd64~~6.1.1.0.
2015-07-25 19:04:15:149 4860 d6c Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
2015-07-25 19:04:15:149 4860 d6c Handler :::::::::
2015-07-25 19:04:15:149 4860 d6c Handler :: END :: Handler: CBS Install
2015-07-25 19:04:15:149 4860 d6c Handler :::::::::::::
2015-07-25 19:04:15:149 816 1b4 AU >>## RESUMED ## AU: Installing update [UpdateId = {6D0FC6F5-8079-41BB-B8FE-5240D76FF9E1}, succeeded]
2015-07-25 19:04:15:149 816 de0 Agent LogHistory called. idUpdate={6D0FC6F5-8079-41BB-B8FE-5240D76FF9E1}.200, resultMapped=80242014, resultUnMapped=0
2015-07-25 19:04:15:180 816 de0 Agent *********
2015-07-25 19:04:15:180 816 de0 Agent ** END ** Agent: Installing updates [CallerId = AutomaticUpdates]
2015-07-25 19:04:15:180 816 1b4 AU Install call completed.
2015-07-25 19:04:15:180 816 de0 Agent *************
2015-07-25 19:04:15:180 816 1b4 AU # WARNING: Install call completed, reboot required = Yes, error = 0x00000000
2015-07-25 19:04:15:180 816 1b4 AU #########
2015-07-25 19:04:15:180 816 1b4 AU ## END ## AU: Installing updates [CallId = {3DED3327-50BD-478E-AC52-679078357047}]
2015-07-25 19:04:15:180 816 1b4 AU #############
2015-07-25 19:04:15:180 816 1b4 AU Install complete for all calls, reboot needed
2015-07-25 19:04:15:180 816 1b4 AU Setting AU scheduled install time to 2015-08-01 10:00:00
2015-07-25 19:04:15:180 816 1b4 AU Successfully wrote event for AU health state:0
2015-07-25 19:04:15:180 816 1b4 AU AU setting pending client directive to 'Reboot Warning'
2015-07-25 19:04:15:180 816 1b4 AU Successfully wrote event for AU health state:0
2015-07-25 19:04:15:180 816 1b4 AU Triggering Offline detection (non-interactive)
2015-07-25 19:04:15:180 816 ad0 AU #############
2015-07-25 19:04:15:180 816 ad0 AU ## START ## AU: Search for updates
2015-07-25 19:04:15:180 816 ad0 AU #########
2015-07-25 19:04:15:196 816 ad0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {5D75EF71-245D-429C-B459-A83914DBE8B1}]
2015-07-25 19:04:15:196 816 12f4 Agent *************
2015-07-25 19:04:15:196 816 12f4 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2015-07-25 19:04:15:196 816 12f4 Agent *********
2015-07-25 19:04:15:196 816 12f4 Agent * Online = No; Ignore download priority = No
2015-07-25 19:04:15:196 816 12f4 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2015-07-25 19:04:15:196 816 12f4 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2015-07-25 19:04:15:196 816 12f4 Agent * Search Scope = {Machine}
2015-07-25 19:04:30:187 816 ad0 Misc WARNING: IsSessionNonstandardUI: session 65536 is an unknown session type 0; treating it as a standard session
2015-07-25 19:04:30:187 816 ad0 AU Launched new AU client for directive 'Reboot Warning', session id = 0x1
2015-07-25 19:04:45:226 816 ad0 Misc WARNING: IsSessionNonstandardUI: session 65536 is an unknown session type 0; treating it as a standard session
2015-07-25 19:06:51:071 816 12f4 Agent * Added update {6D0FC6F5-8079-41BB-B8FE-5240D76FF9E1}.200 to search result
2015-07-25 19:06:51:071 816 12f4 Agent * Found 1 updates and 85 categories in search; evaluated appl. rules of 2393 out of 4570 deployed entities
2015-07-25 19:06:51:071 816 12f4 Agent *********
2015-07-25 19:06:51:071 816 12f4 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]