I have an odd situation where some computers are updating just fine, and others do not seem to update completely.
We have a WSUS server pulling updates from Microsoft nightly. Clients check in once per day.
As an example my desktop shows 24 updates approved and pending on WSUS, but my laptop shows as up to date. I also ran into a machine today that is on the shelf and has not been updated for a while. It reports as up to date on the client but has 90+ updates approved and pending.
Here is what the client log shows after an update check:
e64 AU AU setting next detection timeout to 2014-04-12 13:15:46
e64 AU Successfully wrote event for AU health state:0
e64 AU Successfully wrote event for AU health state:0
668 Report REPORT EVENT: {121D5AE0-826F-4F3C-AABA-E147CF4864FB} 2014-04-11 12:28:57:327-0400 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows
Update Client successfully detected 0 updates.
668 Report REPORT EVENT: {8C38B0CB-1781-429A-9CAC-318C433348AD} 2014-04-11 12:28:57:343-0400 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting
client status.
668 Report CWERReporter finishing event handling. (00000000)
d6c AU Windows Update is disabled by policy for user
d6c AU Triggering AU detection through DetectNow API
d6c AU Triggering Online detection (non-interactive)
fd8 AU #############
fd8 AU ## START ## AU: Search for updates
fd8 AU #########
fd8 AU <<## SUBMITTED ## AU: Search for updates [CallId = {8C83C1B9-6652-41EA-85C6-90A8529176B4}]
668 Agent *************
668 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
668 Agent *********
668 Agent * Online = Yes; Ignore download priority = No
668 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation'
and RebootRequired=1"
668 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
668 Agent * Search Scope = {Machine}
668 Setup Checking for agent SelfUpdate
668 Setup Client version: Core: 7.6.7600.256 Aux: 7.6.7600.256
668 Misc Validating signature for C:\windows\SoftwareDistribution\SelfUpdate\wuident.cab:
668 Misc Microsoft signed: Yes
668 Misc Validating signature for C:\windows\SoftwareDistribution\SelfUpdate\wuident.cab:
668 Misc Microsoft signed: Yes
668 Misc Validating signature for C:\windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
668 Misc Microsoft signed: Yes
668 Misc Validating signature for C:\windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
668 Misc Microsoft signed: Yes
668 Setup Determining whether a new setup handler needs to be downloaded
Setup SelfUpdate handler is not found. It will be downloaded
668 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256"
688 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
668 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
668 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
668 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
668 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
668 Setup SelfUpdate check completed. SelfUpdate is NOT required.
668 PT +++++++++++ PT: Synchronizing server updates +++++++++++
668 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = web://****/ClientWebService/client.asmx
668 Agent * Found 0 updates and 73 categories in search; evaluated appl. rules of 1094 out of 1835 deployed entities
668 Agent *********
668 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
668 Agent *************
e64 AU >>## RESUMED ## AU: Search for updates [CallId = {8C83C1B9-6652-41EA-85C6-90A8529176B4}]
e64 AU # 0 updates detected
e64 AU #########
e64 AU ## END ## AU: Search for updates [CallId = {8C83C1B9-6652-41EA-85C6-90A8529176B4}]
e64 AU #############
e64 AU Successfully wrote event for AU health state:0
e64 AU Featured notifications is disabled.
e64 AU AU setting next detection timeout to 2014-04-12 11:07:31
e64 AU Successfully wrote event for AU health state:0
e64 AU Successfully wrote event for AU health state:0
668 Report REPORT EVENT: {47E0AACC-0D9D-4FEB-BADD-3D3257D60C56} 2014-04-11 12:33:46:421-0400 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows
Update Client successfully detected 0 updates.
668 Report REPORT EVENT: {6A2C1C72-DA60-4481-B967-F0A3A6BE011D} 2014-04-11 12:33:46:421-0400 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting
client status.
668 Report CWERReporter finishing event handling. (00000000)
668 Report Uploading 4 events using cached cookie, reporting URL = web://*******/ReportingWebService/ReportingWebService.asmx
668 Report Reporter successfully uploaded 4 events.
I've compared this to a log on a computer that is fully up to date and it matches line for line. I'm really puzzled by this.
Any suggestions for where to go with this would be appreciated.