locked
Update pushed without being scheduled and 4 months late RRS feed

  • Question

  • I just had the following update push to every one of my servers out of the blue. KB3192391 "October 2016, Security only Quality update for Windows Server 2008 R2"

    This update was approved via WSUS back in early November and showed installed on numerous machines (same servers were updated this morning). There was no deadline set on the approval either. Also, when manually searching for new updates prior to this push, the above patch wasn't on the list of needed updates. It was only showing the most recent month's rollup being needed.

    Here's the update log showing when it popped up as needing the update.

    2017-01-24 14:37:53:720 1212 2104 Agent *************
    2017-01-24 14:37:53:720 1212 2104 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2017-01-24 14:37:53:720 1212 2104 Agent *********
    2017-01-24 14:37:53:720 1212 2104 Agent   * Online = Yes; Ignore download priority = No
    2017-01-24 14:37:53:720 1212 2104 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2017-01-24 14:37:53:720 1212 2104 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2017-01-24 14:37:53:720 1212 2104 Agent   * Search Scope = {Machine}
    2017-01-24 14:37:54:048 1212 2104 Setup Checking for agent SelfUpdate
    2017-01-24 14:37:55:423 1212 2104 Setup Client version: Core: 7.6.7601.19016  Aux: 7.6.7601.19016
    2017-01-24 14:37:58:048 1212 2104 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2017-01-24 14:37:58:095 1212 2104 Misc  Microsoft signed: NA
    2017-01-24 14:37:58:095 1212 2104 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP2383.tmp with dwProvFlags 0x00000080:
    2017-01-24 14:37:58:126 1212 2104 Misc  Microsoft signed: NA
    2017-01-24 14:37:58:173 1212 2104 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2017-01-24 14:37:58:189 1212 2104 Misc  Microsoft signed: NA
    2017-01-24 14:37:58:189 1212 2104 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2017-01-24 14:37:58:189 1212 2104 Misc  Microsoft signed: NA
    2017-01-24 14:37:58:298 1212 2104 Setup Determining whether a new setup handler needs to be downloaded
    2017-01-24 14:37:58:376 1212 2104 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe with dwProvFlags 0x00000080:
    2017-01-24 14:37:58:376 1212 2104 Misc  Microsoft signed: NA
    2017-01-24 14:37:58:376 1212 2104 Setup SelfUpdate handler update NOT required: Current version: 7.6.7600.320, required version: 7.6.7600.320
    2017-01-24 14:37:58:376 1212 2104 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
    2017-01-24 14:38:02:814 1212 2104 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
    2017-01-24 14:38:02:814 1212 2104 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2017-01-24 14:38:02:829 1212 2104 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
    2017-01-24 14:38:02:829 1212 2104 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2017-01-24 14:38:02:845 1212 2104 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
    2017-01-24 14:38:02:845 1212 2104 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2017-01-24 14:38:06:298 1212 2104 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2017-01-24 14:38:06:298 1212 2104 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ashvmwsus01/ClientWebService/client.asmx
    2017-01-24 14:38:06:329 1212 2104 PT WARNING: Cached cookie has expired or new PID is available
    2017-01-24 14:38:06:329 1212 2104 PT Initializing simple targeting cookie, clientId = c24bd2dc-47e0-450a-b8b7-3922aefb6c56, target group = , DNS name = ashvmmf114.us.neosys.dom
    2017-01-24 14:38:06:329 1212 2104 PT   Server URL = http://ashvmwsus01/SimpleAuthWebService/SimpleAuth.asmx
    2017-01-24 14:41:14:219 1212 2104 PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2017-01-24 14:41:14:219 1212 2104 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ashvmwsus01/ClientWebService/client.asmx
    2017-01-24 14:41:14:781 1212 2104 Agent   * Added update {EBFC9751-8279-4037-BF2B-11170BEFEA0D}.209 to search result
    2017-01-24 14:41:14:781 1212 2104 Agent   * Found 1 updates and 81 categories in search; evaluated appl. rules of 1213 out of 2362 deployed entities
    2017-01-24 14:41:15:156 1212 2104 Agent *********
    2017-01-24 14:41:15:156 1212 2104 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2017-01-24 14:41:15:156 1212 2104 Agent *************
    2017-01-24 14:41:15:156 1212 1fbc AU >>##  RESUMED  ## AU: Search for updates [CallId = {002B39CC-6BC7-476A-BDC9-5C09124B3274}]
    2017-01-24 14:41:15:156 1212 1fbc AU   # 1 updates detected
    2017-01-24 14:41:15:156 1212 1fbc AU #########
    2017-01-24 14:41:15:156 1212 1fbc AU ##  END  ##  AU: Search for updates [CallId = {002B39CC-6BC7-476A-BDC9-5C09124B3274}]
    2017-01-24 14:41:15:156 1212 1fbc AU #############
    2017-01-24 14:41:15:156 1212 1fbc AU Successfully wrote event for AU health state:0
    2017-01-24 14:41:15:156 1212 1fbc AU Featured notifications is disabled.
    2017-01-24 14:41:15:156 1212 1fbc AU AU setting next detection timeout to 2017-01-25 06:49:48
    2017-01-24 14:41:15:156 1212 1fbc AU Setting AU scheduled install time to 2017-01-25 09:00:00
    2017-01-24 14:41:15:156 1212 1fbc AU Successfully wrote event for AU health state:0
    2017-01-24 14:41:15:156 1212 1fbc AU Auto-approving update for download, updateId = {EBFC9751-8279-4037-BF2B-11170BEFEA0D}.209, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0, IsOSUpgrade=0
    2017-01-24 14:41:15:156 1212 1fbc AU Auto-approved 1 update(s) for download (NOT for Ux)
    2017-01-24 14:41:15:156 1212 1fbc AU #############
    2017-01-24 14:41:15:156 1212 1fbc AU ## START ##  AU: Download updates
    2017-01-24 14:41:15:156 1212 1fbc AU #########
    2017-01-24 14:41:15:156 1212 1fbc AU   # Approved updates = 1
    2017-01-24 14:41:15:172 1212 2104 DnldMgr *************
    2017-01-24 14:41:15:172 1212 2104 DnldMgr ** START **  DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
    2017-01-24 14:41:15:172 1212 2104 DnldMgr *********
    2017-01-24 14:41:15:172 1212 2104 DnldMgr   * Call ID = {CBD08887-86FB-43E5-98BB-BE5CFD6012BF}
    2017-01-24 14:41:15:172 1212 2104 DnldMgr   * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2017-01-24 14:41:15:172 1212 2104 DnldMgr   * Updates to download = 1
    2017-01-24 14:41:15:172 1212 2104 Agent   *   Title = October, 2016 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB3192391)
    2017-01-24 14:41:15:187 1212 2104 Agent   *   UpdateId = {EBFC9751-8279-4037-BF2B-11170BEFEA0D}.209
    2017-01-24 14:41:15:187 1212 2104 Agent   *     Bundles 1 updates:
    2017-01-24 14:41:15:187 1212 2104 Agent   *       {DAD4DE12-5E49-40C0-AF55-D49C15631F50}.204
    2017-01-24 14:41:15:187 1212 1fbc AU AU initiated download, updateId = {EBFC9751-8279-4037-BF2B-11170BEFEA0D}.209, callId = {CBD08887-86FB-43E5-98BB-BE5CFD6012BF}
    2017-01-24 14:41:15:187 1212 1fbc AU Setting AU scheduled install time to 2017-01-25 09:00:00
    2017-01-24 14:41:15:187 1212 1fbc AU Successfully wrote event for AU health state:0
    2017-01-24 14:41:15:187 1212 1fbc AU AU setting pending client directive to 'Download Progress'
    2017-01-24 14:41:15:187 1212 2104 PT +++++++++++  PT: Synchronizing file locations  +++++++++++
    2017-01-24 14:41:15:187 1212 2104 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ashvmwsus01/ClientWebService/client.asmx
    2017-01-24 14:41:15:265 1212 1fbc AU Successfully wrote event for AU health state:0
    2017-01-24 14:41:15:265 1212 1fbc AU   # Pending download calls = 1
    2017-01-24 14:41:15:265 1212 1fbc AU <<## SUBMITTED ## AU: Download updates
    2017-01-24 14:41:15:265 1212 2104 DnldMgr ***********  DnldMgr: New download job [UpdateId = {DAD4DE12-5E49-40C0-AF55-D49C15631F50}.204]  ***********
    2017-01-24 14:41:15:281 1212 2104 DnldMgr   * Queueing update for download handler request generation.
    2017-01-24 14:41:15:281 1212 2104 DnldMgr Generating download request for update {DAD4DE12-5E49-40C0-AF55-D49C15631F50}.204
    2017-01-24 14:41:19:859 1212 1fbc AU Successfully wrote event for AU health state:0
    2017-01-24 14:41:19:859 1212 2104 Handler Generating request for CBS update DAD4DE12-5E49-40C0-AF55-D49C15631F50 in sandbox C:\Windows\SoftwareDistribution\Download\a753cf3456d83323300cd97c709071b8
    2017-01-24 14:41:19:859 1212 2104 Handler Selecting self-contained because update has express payload but server doesn't support it.
    2017-01-24 14:41:19:859 1212 2104 Handler Selected payload type is ptSelfContained
    2017-01-24 14:41:19:859 1212 2104 Handler Detected download state is dsStart
    2017-01-24 14:41:19:859 1212 2104 Handler Adding windows6.1-kb3192391-x64.cab (entire file) to request list.
    2017-01-24 14:41:19:859 1212 2104 Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    2017-01-24 14:41:19:859 1212 2104 DnldMgr ***********  DnldMgr: New download job [UpdateId = {DAD4DE12-5E49-40C0-AF55-D49C15631F50}.204]  ***********
    2017-01-24 14:41:20:156 1212 2104 DnldMgr   * BITS job initialized, JobId = {7FC37A50-D592-4ECE-904E-BC26C3E0020F}
    2017-01-24 14:41:20:156 1212 2104 DnldMgr   * Downloading from http://ashvmwsus01/Content/76/46FF895C96395A951E39305E226694D0702D6A76.cab to C:\Windows\SoftwareDistribution\Download\a753cf3456d83323300cd97c709071b8\windows6.1-kb3192391-x64.cab (full file).
    2017-01-24 14:41:20:203 1212 2104 Agent *********
    2017-01-24 14:41:20:203 1212 2104 Agent **  END  **  Agent: Downloading updates [CallerId = AutomaticUpdates]
    2017-01-24 14:41:20:203 1212 2104 Agent *************
    2017-01-24 14:41:20:203 1212 2104 Report REPORT EVENT: {BDD372C5-C731-4FFB-B663-DCAD0BC26941} 2017-01-24 14:41:15:156-0500 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 1 updates.
    2017-01-24 14:41:20:203 1212 2104 Report REPORT EVENT: {FECFBECC-006F-46E6-8F9A-E145E0FD977C} 2017-01-24 14:41:15:156-0500 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
    2017-01-24 14:41:20:203 1212 2104 Report REPORT EVENT: {32EBFBC0-1690-440D-9293-5518876AD06A} 2017-01-24 14:41:15:281-0500 1 167 101 {EBFC9751-8279-4037-BF2B-11170BEFEA0D} 209 0 AutomaticUpdates Success Content Download Download started.
    2017-01-24 14:41:20:234 1212 1fbc AU AU checked download status and it changed: Downloading is paused
    2017-01-24 14:41:29:234 1212 1fbc AU AU checked download status and it changed: Downloading is not paused
    2017-01-24 14:41:29:234 1212 1fbc AU AU setting pending client directive to 'Download Progress'
    2017-01-24 14:41:30:187 1212 1ce8 AU WARNING: AU found no suitable session to launch client in
    2017-01-24 14:41:58:593 1212 20c4 DnldMgr BITS job {7FC37A50-D592-4ECE-904E-BC26C3E0020F} completed successfully
    2017-01-24 14:41:59:515 1212 20c4 Misc Validating signature for C:\Windows\SoftwareDistribution\Download\a753cf3456d83323300cd97c709071b8\windows6.1-kb3192391-x64.cab with dwProvFlags 0x00000080:
    2017-01-24 14:42:00:437 1212 20c4 Misc  Microsoft signed: Yes
    2017-01-24 14:42:00:437 1212 20c4 DnldMgr   Download job bytes total = 82989243, bytes transferred = 82989243
    2017-01-24 14:42:00:437 1212 20c4 DnldMgr ***********  DnldMgr: New download job [UpdateId = {DAD4DE12-5E49-40C0-AF55-D49C15631F50}.204]  ***********
    2017-01-24 14:42:00:437 1212 20c4 DnldMgr   * Queueing update for download handler request generation.
    2017-01-24 14:42:00:437 1212 20c4 DnldMgr Generating download request for update {DAD4DE12-5E49-40C0-AF55-D49C15631F50}.204
    2017-01-24 14:42:01:234 1212 20c4 Handler Generating request for CBS update DAD4DE12-5E49-40C0-AF55-D49C15631F50 in sandbox C:\Windows\SoftwareDistribution\Download\a753cf3456d83323300cd97c709071b8
    2017-01-24 14:42:01:234 1212 20c4 Handler Selecting self-contained because update has express payload but server doesn't support it.
    2017-01-24 14:42:01:234 1212 20c4 Handler Selected payload type is ptSelfContained
    2017-01-24 14:42:01:234 1212 20c4 Handler Detected download state is dsHavePackage
    2017-01-24 14:42:01:234 1212 20c4 Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
    2017-01-24 14:42:01:250 1212 20c4 DnldMgr ***********  DnldMgr: New download job [UpdateId = {DAD4DE12-5E49-40C0-AF55-D49C15631F50}.204]  ***********
    2017-01-24 14:42:01:250 1212 20c4 DnldMgr   * All files for update were already downloaded and are valid.
    2017-01-24 14:42:01:265 1212 1fbc AU >>##  RESUMED  ## AU: Download update [UpdateId = {EBFC9751-8279-4037-BF2B-11170BEFEA0D}, succeeded]
    2017-01-24 14:42:01:265 1212 1fbc AU #########
    2017-01-24 14:42:01:265 1212 1fbc AU ##  END  ##  AU: Download updates
    2017-01-24 14:42:01:265 1212 1fbc AU #############
    2017-01-24 14:42:01:265 1212 1fbc AU Setting AU scheduled install time to 2017-01-25 09:00:00
    2017-01-24 14:42:01:265 1212 1fbc AU Successfully wrote event for AU health state:0
    2017-01-24 14:42:01:265 1212 1fbc AU AU setting pending client directive to 'Install Approval'
    2017-01-24 14:42:01:281 1212 1fbc AU Successfully wrote event for AU health state:0
    2017-01-24 14:42:06:265 1212 2104 Report REPORT EVENT: {E4CC3808-1F9C-4CE8-B81B-1FDB2D40C040} 2017-01-24 14:42:01:265-0500 1 162 101 {EBFC9751-8279-4037-BF2B-11170BEFEA0D} 209 0 AutomaticUpdates Success Content Download Download succeeded.
    2017-01-24 14:42:06:265 1212 2104 Report REPORT EVENT: {40016B8A-17F4-4BC3-BDF9-CB34568647CB} 2017-01-24 14:42:01:265-0500 1 188 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Content Install Installation Ready: The following updates are downloaded and ready for installation. This computer is currently scheduled to install these updates on ‎Wednesday, ‎January ‎25, ‎2017 at 4:00 AM:  - October, 2016 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB3192391)
    2017-01-24 14:42:16:281 1212 1ce8 AU WARNING: AU found no suitable session to launch client in
    2017-01-24 14:43:43:311 1212 2104 Report Uploading 4 events using cached cookie, reporting URL = http://ashvmwsus01/ReportingWebService/ReportingWebService.asmx
    2017-01-24 14:43:43:311 1212 2104 Report Reporter successfully uploaded 4 events.
    2017-01-25 01:49:48:080 1212 1ce8 AU #############
    2017-01-25 01:49:48:080 1212 1ce8 AU ## START ##  AU: Search for updates
    2017-01-25 01:49:48:080 1212 1ce8 AU #########
    2017-01-25 01:49:48:127 1212 1ce8 AU <<## SUBMITTED ## AU: Search for updates [CallId = {B146F3B1-83B3-48E3-A19A-328A6AFD5F57}]
    2017-01-25 01:49:48:127 1212 20f8 Agent *************
    2017-01-25 01:49:48:127 1212 20f8 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2017-01-25 01:49:48:127 1212 20f8 Agent *********
    2017-01-25 01:49:48:127 1212 20f8 Agent   * Online = Yes; Ignore download priority = No
    2017-01-25 01:49:48:127 1212 20f8 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2017-01-25 01:49:48:127 1212 20f8 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2017-01-25 01:49:48:127 1212 20f8 Agent   * Search Scope = {Machine}
    2017-01-25 01:49:48:580 1212 20f8 Setup Checking for agent SelfUpdate
    2017-01-25 01:49:49:846 1212 20f8 Setup Client version: Core: 7.6.7601.19016  Aux: 7.6.7601.19016
    2017-01-25 01:49:52:455 1212 20f8 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2017-01-25 01:49:52:486 1212 20f8 Misc  Microsoft signed: NA
    2017-01-25 01:49:52:502 1212 20f8 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP49F9.tmp with dwProvFlags 0x00000080:
    2017-01-25 01:49:52:580 1212 20f8 Misc  Microsoft signed: NA
    2017-01-25 01:49:52:643 1212 20f8 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2017-01-25 01:49:52:643 1212 20f8 Misc  Microsoft signed: NA
    2017-01-25 01:49:52:643 1212 20f8 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2017-01-25 01:49:52:643 1212 20f8 Misc  Microsoft signed: NA
    2017-01-25 01:49:52:799 1212 20f8 Setup Determining whether a new setup handler needs to be downloaded
    2017-01-25 01:49:52:939 1212 20f8 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe with dwProvFlags 0x00000080:
    2017-01-25 01:49:52:939 1212 20f8 Misc  Microsoft signed: NA
    2017-01-25 01:49:52:939 1212 20f8 Setup SelfUpdate handler update NOT required: Current version: 7.6.7600.320, required version: 7.6.7600.320
    2017-01-25 01:49:52:939 1212 20f8 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
    2017-01-25 01:49:57:377 1212 20f8 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
    2017-01-25 01:49:57:377 1212 20f8 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2017-01-25 01:49:57:393 1212 20f8 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
    2017-01-25 01:49:57:393 1212 20f8 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2017-01-25 01:49:57:424 1212 20f8 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
    2017-01-25 01:49:57:424 1212 20f8 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2017-01-25 01:50:01:471 1212 20f8 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2017-01-25 01:50:01:471 1212 20f8 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ashvmwsus01/ClientWebService/client.asmx
    2017-01-25 01:50:01:486 1212 20f8 PT WARNING: Cached cookie has expired or new PID is available
    2017-01-25 01:50:01:486 1212 20f8 PT Initializing simple targeting cookie, clientId = c24bd2dc-47e0-450a-b8b7-3922aefb6c56, target group = , DNS name = ashvmmf114.us.neosys.dom
    2017-01-25 01:50:01:486 1212 20f8 PT   Server URL = http://ashvmwsus01/SimpleAuthWebService/SimpleAuth.asmx
    2017-01-25 01:52:11:032 1212 20f8 PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2017-01-25 01:52:11:032 1212 20f8 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ashvmwsus01/ClientWebService/client.asmx
    2017-01-25 01:52:11:345 1212 20f8 Agent   * Added update {EBFC9751-8279-4037-BF2B-11170BEFEA0D}.209 to search result
    2017-01-25 01:52:11:345 1212 20f8 Agent   * Found 1 updates and 81 categories in search; evaluated appl. rules of 1213 out of 2362 deployed entities
    2017-01-25 01:52:11:392 1212 20f8 Agent *********
    2017-01-25 01:52:11:392 1212 20f8 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2017-01-25 01:52:11:392 1212 20f8 Agent *************
    2017-01-25 01:52:11:392 1212 2548 AU >>##  RESUMED  ## AU: Search for updates [CallId = {B146F3B1-83B3-48E3-A19A-328A6AFD5F57}]
    2017-01-25 01:52:11:392 1212 2548 AU   # 1 updates detected
    2017-01-25 01:52:11:392 1212 2548 AU #########
    2017-01-25 01:52:11:392 1212 2548 AU ##  END  ##  AU: Search for updates [CallId = {B146F3B1-83B3-48E3-A19A-328A6AFD5F57}]
    2017-01-25 01:52:11:392 1212 2548 AU #############
    2017-01-25 01:52:11:392 1212 2548 AU Successfully wrote event for AU health state:0
    2017-01-25 01:52:11:392 1212 2548 AU Featured notifications is disabled.
    2017-01-25 01:52:11:392 1212 2548 AU AU setting next detection timeout to 2017-01-25 18:28:33
    2017-01-25 01:52:11:392 1212 2548 AU Setting AU scheduled install time to 2017-01-25 09:00:00
    2017-01-25 01:52:11:392 1212 2548 AU Successfully wrote event for AU health state:0
    2017-01-25 01:52:11:407 1212 2548 AU Successfully wrote event for AU health state:0
    2017-01-25 01:52:16:423 1212 20f8 Report REPORT EVENT: {763598CA-B151-4C65-97CE-7B92D313146A} 2017-01-25 01:52:11:392-0500 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 1 updates.
    2017-01-25 01:52:16:423 1212 20f8 Report REPORT EVENT: {5CD16FF9-5AC6-438A-B05B-9D084479009F} 2017-01-25 01:52:11:392-0500 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
    2017-01-25 01:54:39:469 1212 20f8 Report Uploading 2 events using cached cookie, reporting URL = http://ashvmwsus01/ReportingWebService/ReportingWebService.asmx
    2017-01-25 01:54:39:469 1212 20f8 Report Reporter successfully uploaded 2 events.
    2017-01-25 04:00:09:952 1212 1ce8 AU Forced install timer expired for AUInstallType = 4
    2017-01-25 04:00:09:952 1212 1ce8 AU UpdateDownloadProperties: 0 download(s) are still in progress.
    2017-01-25 04:00:09:952 1212 1ce8 AU #############
    2017-01-25 04:00:09:952 1212 1ce8 AU ## START ##  AU: Install updates
    2017-01-25 04:00:09:952 1212 1ce8 AU #########
    2017-01-25 04:00:09:952 1212 1ce8 AU   # Initiating scheduled install
    2017-01-25 04:00:09:952 1212 1ce8 AU   # Approved updates = 1
    2017-01-25 04:00:10:030 1212 1ce8 AU <<## SUBMITTED ## AU: Install updates / installing updates [CallId = {9395A123-D240-494D-9856-642303C42AEB}]
    2017-01-25 04:00:10:030 1212 2728 Agent *************
    2017-01-25 04:00:10:030 1212 2728 Agent ** START **  Agent: Installing updates [CallerId = AutomaticUpdates]
    2017-01-25 04:00:10:311 1212 2728 Agent *********
    2017-01-25 04:00:10:311 1212 2728 Agent   * Updates to install = 1
    2017-01-25 04:00:10:343 1212 2728 Agent   *   Title = October, 2016 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB3192391)
    2017-01-25 04:00:10:343 1212 2728 Agent   *   UpdateId = {EBFC9751-8279-4037-BF2B-11170BEFEA0D}.209
    2017-01-25 04:00:10:343 1212 2728 Agent   *     Bundles 1 updates:
    2017-01-25 04:00:10:343 1212 2728 Agent   *       {DAD4DE12-5E49-40C0-AF55-D49C15631F50}.204
    2017-01-25 04:00:18:155 1212 2728 Agent WARNING: failed to calculate prior restore point time with error 0x80070002; setting restore point
    2017-01-25 04:00:18:186 1212 2728 Agent WARNING: LoadLibrary failed for srclient.dll with hr:8007007e
    2017-01-25 04:00:23:186 1212 2214 Report REPORT EVENT: {DAF5974C-3246-4261-ABC3-12DF0B77DF9E} 2017-01-25 04:00:18:186-0500 1 181 101 {EBFC9751-8279-4037-BF2B-11170BEFEA0D} 209 0 AutomaticUpdates Success Content Install Installation Started: Windows successfully started the following update: October, 2016 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB3192391)
    2017-01-25 04:00:26:421 1212 2728 DnldMgr Preparing update for install, updateId = {DAD4DE12-5E49-40C0-AF55-D49C15631F50}.204.
    2017-01-25 04:00:26:421 10160 2558 Misc ===========  Logging initialized (build: 7.6.7601.19016, tz: -0500)  ===========
    2017-01-25 04:00:26:421 10160 2558 Misc   = Process: C:\Windows\system32\wuauclt.exe
    2017-01-25 04:00:26:421 10160 2558 Misc   = Module: C:\Windows\system32\wuaueng.dll
    2017-01-25 04:00:26:421 10160 2558 Handler :::::::::::::
    2017-01-25 04:00:26:421 10160 2558 Handler :: START ::  Handler: CBS Install
    2017-01-25 04:00:26:421 10160 2558 Handler :::::::::
    2017-01-25 04:00:26:421 10160 2558 Handler Starting install of CBS update DAD4DE12-5E49-40C0-AF55-D49C15631F50
    2017-01-25 04:00:26:514 10160 2558 Handler CBS package identity: Package_for_KB3192391~31bf3856ad364e35~amd64~~6.1.1.3
    2017-01-25 04:00:26:514 10160 2558 Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\884e1220319795fa445567947287e341\windows6.1-kb3192391-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\884e1220319795fa445567947287e341\inst
    2017-01-25 04:02:46:185 1212 2214 PT WARNING: Cached cookie has expired or new PID is available
    2017-01-25 04:02:46:185 1212 2214 PT Initializing simple targeting cookie, clientId = c24bd2dc-47e0-450a-b8b7-3922aefb6c56, target group = , DNS name = ashvmmf114.us.neosys.dom
    2017-01-25 04:02:46:185 1212 2214 PT   Server URL = http://ashvmwsus01/SimpleAuthWebService/SimpleAuth.asmx
    2017-01-25 04:02:55:607 1212 2214 Report Uploading 1 events using cached cookie, reporting URL = http://ashvmwsus01/ReportingWebService/ReportingWebService.asmx
    2017-01-25 04:02:55:607 1212 2214 Report Reporter successfully uploaded 1 events.
    2017-01-25 04:14:52:056 10160 2558 Handler Requesting post-reboot reporting for package Package_for_KB3192391~31bf3856ad364e35~amd64~~6.1.1.3.
    2017-01-25 04:14:52:056 10160 2558 Handler Completed install of CBS update with type=3, requiresReboot=1, installerError=0, hr=0x0
    2017-01-25 04:14:52:056 10160 2558 Handler :::::::::
    2017-01-25 04:14:52:056 10160 2558 Handler ::  END  ::  Handler: CBS Install
    2017-01-25 04:14:52:056 10160 2558 Handler :::::::::::::
    2017-01-25 04:14:52:056 1212 2530 AU >>##  RESUMED  ## AU: Installing update [UpdateId = {EBFC9751-8279-4037-BF2B-11170BEFEA0D}, succeeded]
    2017-01-25 04:14:52:103 1212 2728 Agent LogHistory called. idUpdate={EBFC9751-8279-4037-BF2B-11170BEFEA0D}.209, resultMapped=80242014, resultUnMapped=0
    2017-01-25 04:14:53:306 1212 2728 Agent *********
    2017-01-25 04:14:53:306 1212 2728 Agent **  END  **  Agent: Installing updates [CallerId = AutomaticUpdates]
    2017-01-25 04:14:53:306 1212 2728 Agent *************
    2017-01-25 04:14:53:306 1212 2530 AU Install call completed.
    2017-01-25 04:14:53:306 1212 2530 AU   # WARNING: Install call completed, reboot required = Yes, error = 0x00000000
    2017-01-25 04:14:53:306 1212 2530 AU #########
    2017-01-25 04:14:53:306 1212 2530 AU ##  END  ##  AU: Installing updates [CallId = {9395A123-D240-494D-9856-642303C42AEB}]
    2017-01-25 04:14:53:306 1212 2530 AU #############
    2017-01-25 04:14:53:306 1212 2530 AU Install complete for all calls, reboot  needed
    2017-01-25 04:14:53:321 1212 2530 AU Setting AU scheduled install time to 2017-01-26 09:00:00
    2017-01-25 04:14:53:321 1212 2530 AU Successfully wrote event for AU health state:0
    2017-01-25 04:14:53:353 1212 2530 AU AU setting pending client directive to 'Reboot Warning'
    2017-01-25 04:14:53:353 1212 2530 AU AU scheduling auto reboot check since no user is logged on and reboot is required.
    2017-01-25 04:14:53:353 1212 2530 AU Successfully wrote event for AU health state:0
    2017-01-25 04:14:53:353 1212 2530 AU Triggering Offline detection (non-interactive)
    2017-01-25 04:14:53:446 1212 1ce8 AU #############
    2017-01-25 04:14:53:446 1212 1ce8 AU ## START ##  AU: Search for updates
    2017-01-25 04:14:53:446 1212 1ce8 AU #########
    2017-01-25 04:14:53:837 1212 1ce8 AU <<## SUBMITTED ## AU: Search for updates [CallId = {E4FD8A74-FED5-4872-A248-D60A6D0D8476}]
    2017-01-25 04:14:53:837 1212 2214 Agent *************
    2017-01-25 04:14:53:837 1212 2214 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2017-01-25 04:14:53:837 1212 2214 Agent *********
    2017-01-25 04:14:53:837 1212 2214 Agent   * Online = No; Ignore download priority = No
    2017-01-25 04:14:53:837 1212 2214 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2017-01-25 04:14:53:837 1212 2214 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2017-01-25 04:14:53:837 1212 2214 Agent   * Search Scope = {Machine}
    2017-01-25 04:16:53:352 1212 1ce8 AU WARNING: Initiating reboot since no user logged on
    2017-01-25 04:16:53:352 1212 1ce8 AU AU invoking RebootSystem (OnRebootNow)
    2017-01-25 04:16:57:867 1212 1ce8 Misc WARNING: SUS Client is rebooting system.
    2017-01-25 04:16:57:867 1212 1ce8 AU AU invoking RebootSystem (OnRebootRetry)
    2017-01-25 04:17:07:867 1212 1ce8 AU AU invoking RebootSystem (OnRebootRetry)
    2017-01-25 04:17:08:430 1212 1ce8 Misc WARNING: SUS Client is rebooting system.
    2017-01-25 04:17:18:430 1212 1ce8 AU AU invoking RebootSystem (OnRebootRetry)
    2017-01-25 04:17:18:430 1212 1ce8 Misc WARNING: SUS Client is rebooting system.
    2017-01-25 04:17:28:430 1212 1ce8 AU AU invoking RebootSystem (OnRebootRetry)
    2017-01-25 04:17:28:430 1212 1ce8 Misc WARNING: SUS Client is rebooting system.
    2017-01-25 04:17:35:336 1212 1ce8 AU Initiating Install-at-shutdown
    2017-01-25 04:17:35:336 1212 1ce8 Shutdwn user declined update at shutdown
    2017-01-25 04:17:35:336 1212 1ce8 AU Successfully wrote event for AU health state:0
    2017-01-25 04:17:35:336 1212 1ce8 AU AU initiates service shutdown
    2017-01-25 04:17:35:336 1212 1ce8 AU ###########  AU: Uninitializing Automatic Updates  ###########
    2017-01-25 04:19:39:585 1212 2214 Handler FATAL: UH: 0x80010108: CreatePackage failed in CCbs::CreatePackage
    2017-01-25 04:19:39:585 1212 2214 Agent WARNING: Failed to evaluate Installed rule, updateId = {CCDF62B2-FC94-485A-A273-3024C38E1BD7}.205, hr = 80010108
    2017-01-25 04:19:39:585 1212 2214 Agent   * WARNING: Exit code = 0x8024000B
    2017-01-25 04:19:39:585 1212 2214 Agent *********
    2017-01-25 04:19:39:585 1212 2214 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2017-01-25 04:19:39:585 1212 2214 Agent *************
    2017-01-25 04:19:39:585 1212 2214 Agent WARNING: WU client failed Searching for update with error 0x8024000b
    2017-01-25 04:19:40:491 1212 1ce8 Report REPORT EVENT: {5796BAF0-6F6F-471E-94A1-D0689672BFB4} 2017-01-25 04:14:53:321-0500 1 194 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Content Install Restart Required: To complete the installation of the following updates, the computer will be restarted within 15 minutes:  - October, 2016 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB3192391)
    2017-01-25 04:19:40:976 1212 1ce8 Service *********
    2017-01-25 04:19:40:976 1212 1ce8 Service **  END  **  Service: Service exit [Exit code = 0x240001]
    2017-01-25 04:19:40:976 1212 1ce8 Service *************
    2017-01-25 04:46:23:879 1220 79c Misc ===========  Logging initialized (build: 7.6.7601.19016, tz: -0500)  ===========
    2017-01-25 04:46:23:879 1220 79c Misc   = Process: C:\Windows\system32\svchost.exe
    2017-01-25 04:46:23:879 1220 79c Misc   = Module: c:\windows\system32\wuaueng.dll
    2017-01-25 04:46:23:863 1220 79c Service *************
    2017-01-25 04:46:23:879 1220 79c Service ** START **  Service: Service startup
    2017-01-25 04:46:23:895 1220 79c Service *********
    2017-01-25 04:46:25:160 1220 79c Agent   * WU client version 7.6.7601.19016
    2017-01-25 04:46:25:207 1220 79c Agent   * Base directory: C:\Windows\SoftwareDistribution
    2017-01-25 04:46:25:207 1220 79c Agent   * Access type: No proxy
    2017-01-25 04:46:25:301 1220 79c Agent   * Network state: Connected
    2017-01-25 04:47:17:105 1220 79c Report CWERReporter::Init succeeded
    2017-01-25 04:47:17:105 1220 79c Agent ***********  Agent: Initializing Windows Update Agent  ***********
    2017-01-25 04:47:17:105 1220 79c Agent   * Prerequisite roots succeeded.
    2017-01-25 04:47:17:105 1220 79c Agent ***********  Agent: Initializing global settings cache  ***********
    2017-01-25 04:47:17:105 1220 79c Agent   * WSUS server: http://ashvmwsus01
    2017-01-25 04:47:17:105 1220 79c Agent   * WSUS status server: http://ashvmwsus01
    2017-01-25 04:47:17:105 1220 79c Agent   * Target group: (Unassigned Computers)
    2017-01-25 04:47:17:105 1220 79c Agent   * Windows Update access disabled: No
    2017-01-25 04:47:17:152 1220 79c DnldMgr Download manager restoring 0 downloads
    2017-01-25 04:47:17:262 1220 79c Agent Attempt 0 to obtain post-reboot results.
    2017-01-25 04:47:18:277 1220 79c Handler Post-reboot status for package Package_for_KB3192391~31bf3856ad364e35~amd64~~6.1.1.3: 0x00000000.
    2017-01-25 04:47:21:511 1220 79c Report ***********  Report: Initializing static reporting data  ***********
    2017-01-25 04:47:21:511 1220 79c Report   * OS Version = 6.1.7601.1.0.196752
    2017-01-25 04:47:21:511 1220 79c Report   * OS Product Type = 0x00000008
    2017-01-25 04:47:21:933 1220 79c Report   * Computer Brand = VMware, Inc.
    2017-01-25 04:47:21:933 1220 79c Report   * Computer Model = VMware Virtual Platform
    2017-01-25 04:47:21:933 1220 79c Report   * Bios Revision = 6.00
    2017-01-25 04:47:21:933 1220 79c Report   * Bios Name = PhoenixBIOS 4.0 Release 6.0    
    2017-01-25 04:47:21:933 1220 79c Report   * Bios Release Date = 2012-02-22T00:00:00
    2017-01-25 04:47:21:933 1220 79c Report   * Locale ID = 1033
    2017-01-25 04:47:26:135 1220 79c AU ###########  AU: Initializing Automatic Updates  ###########
    2017-01-25 04:47:26:135 1220 79c AU   # WSUS server: http://ashvmwsus01
    2017-01-25 04:47:26:135 1220 79c AU   # Detection frequency: 12
    2017-01-25 04:47:26:135 1220 79c AU   # Approval type: Scheduled (Policy)
    2017-01-25 04:47:26:135 1220 79c AU   # Scheduled install day/time: Every day at 4:00
    2017-01-25 04:47:26:135 1220 79c AU   # Auto-install minor updates: Yes (User preference)
    2017-01-25 04:47:26:151 1220 79c AU Setting AU scheduled install time to 2017-01-26 09:00:00
    2017-01-25 04:47:26:166 1220 79c AU Successfully wrote event for AU health state:0
    2017-01-25 04:47:26:166 1220 79c AU Initializing featured updates
    2017-01-25 04:47:26:166 1220 79c AU Found 0 cached featured updates
    2017-01-25 04:47:26:166 1220 79c AU Successfully wrote event for AU health state:0
    2017-01-25 04:47:26:166 1220 79c AU Obtained Post reboot hr from Agent:0
    2017-01-25 04:47:26:307 1220 79c AU AU setting pending client directive to 'Forced Reboot'
    2017-01-25 04:47:26:307 1220 79c AU Successfully wrote event for AU health state:0
    2017-01-25 04:47:26:307 1220 79c AU Triggering Offline detection (non-interactive)
    2017-01-25 04:47:26:307 1220 79c AU Successfully wrote event for AU health state:0
    2017-01-25 04:47:26:307 1220 79c AU AU finished delayed initialization
    2017-01-25 04:47:26:307 1220 79c AU #############
    2017-01-25 04:47:26:307 1220 79c AU ## START ##  AU: Search for updates
    2017-01-25 04:47:26:307 1220 79c AU #########
    2017-01-25 04:47:26:510 1220 79c AU <<## SUBMITTED ## AU: Search for updates [CallId = {C123E34A-1EBE-4865-BFE1-18086C751EEC}]
    2017-01-25 04:47:37:524 1220 950 Report REPORT EVENT: {C0EA3357-31EF-4528-8C71-4BC557D8916B} 2017-01-25 04:47:26:135-0500 1 190 101 {EBFC9751-8279-4037-BF2B-11170BEFEA0D} 209 0 AutomaticUpdates Success Content Install Installation Successful: Windows successfully installed the following update: October, 2016 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB3192391)
    2017-01-25 04:47:37:524 1220 950 Report REPORT EVENT: {E8209449-C051-4A95-A3F6-830293013B1F} 2017-01-25 04:47:26:166-0500 1 202 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Content Install Reboot completed.
    2017-01-25 04:47:37:758 1220 950 Agent *************
    2017-01-25 04:47:37:758 1220 950 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2017-01-25 04:47:37:758 1220 950 Agent *********
    2017-01-25 04:47:37:758 1220 950 Agent   * Online = No; Ignore download priority = No
    2017-01-25 04:47:37:758 1220 950 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2017-01-25 04:47:37:758 1220 950 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2017-01-25 04:47:37:758 1220 950 Agent   * Search Scope = {Machine}
    2017-01-25 04:47:41:320 1220 79c AU WARNING: AU found no suitable session to launch client in
    2017-01-25 04:49:35:132 1220 950 Agent   * Found 0 updates and 81 categories in search; evaluated appl. rules of 347 out of 2362 deployed entities
    2017-01-25 04:49:35:320 1220 950 Agent *********
    2017-01-25 04:49:35:320 1220 950 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2017-01-25 04:49:35:320 1220 950 Agent *************
    2017-01-25 04:49:35:320 1220 13e8 AU >>##  RESUMED  ## AU: Search for updates [CallId = {C123E34A-1EBE-4865-BFE1-18086C751EEC}]
    2017-01-25 04:49:35:320 1220 13e8 AU   # 0 updates detected
    2017-01-25 04:49:35:320 1220 13e8 AU #########
    2017-01-25 04:49:35:320 1220 13e8 AU ##  END  ##  AU: Search for updates [CallId = {C123E34A-1EBE-4865-BFE1-18086C751EEC}]
    2017-01-25 04:49:35:320 1220 13e8 AU #############
    2017-01-25 04:49:35:320 1220 13e8 AU Featured notifications is disabled.
    2017-01-25 04:49:35:320 1220 13e8 AU Setting AU scheduled install time to 2017-01-26 09:00:00
    2017-01-25 04:49:35:320 1220 13e8 AU Successfully wrote event for AU health state:0
    2017-01-25 04:49:35:320 1220 13e8 AU Successfully wrote event for AU health state:0
    2017-01-25 04:52:48:168 1220 950 Report Uploading 2 events using cached cookie, reporting URL = http://ashvmwsus01/ReportingWebService/ReportingWebService.asmx
    2017-01-25 04:52:50:511 1220 950 Report Reporter successfully uploaded 2 events.
    2017-01-25 07:34:32:054 1220 79c AU AU setting next sqm report timeout to 2017-01-26 12:34:32
    2017-01-25 08:16:37:773 1220 79c AU Launched new AU client for directive 'Forced Reboot', session id = 0x2
    2017-01-25 08:16:37:836 5936 1734 Misc ===========  Logging initialized (build: 7.6.7601.19016, tz: -0500)  ===========
    2017-01-25 08:16:37:836 5936 1734 Misc   = Process: C:\Windows\system32\wuauclt.exe
    2017-01-25 08:16:37:836 5936 1734 AUClnt Launched Client UI process
    2017-01-25 08:16:38:867 5936 1734 Misc ===========  Logging initialized (build: 7.6.7601.19016, tz: -0500)  ===========
    2017-01-25 08:16:38:867 5936 1734 Misc   = Process: C:\Windows\system32\wuauclt.exe
    2017-01-25 08:16:38:867 5936 1734 Misc   = Module: C:\Windows\system32\wucltux.dll
    2017-01-25 08:16:38:867 5936 1734 CltUI AU client got new directive = 'Forced Reboot', serviceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, return = 0
    2017-01-25 08:16:39:008 5936 1734 AUClnt WARNING: Shell_NotifyIcon failed (dwMessage=0x0, uFlags=0x7, hr=0x800705B4)
    2017-01-25 08:16:39:008 5936 1734 AUClnt WARNING: Shell_NotifyIcon failed (dwMessage=0x0, uFlags=0x7, hr=0x800705B4)
    2017-01-25 08:16:39:008 5936 1734 AUClnt WARNING: Shell_NotifyIcon failed (dwMessage=0x0, uFlags=0x7, hr=0x800705B4)
    2017-01-25 08:16:39:008 5936 1734 AUClnt WARNING: Shell_NotifyIcon failed (dwMessage=0x0, uFlags=0x7, hr=0x800705B4)
    2017-01-25 08:16:39:008 1220 79c AU AU received handle event
    2017-01-25 08:16:39:039 1220 79c AU Successfully wrote event for AU health state:0

    Wednesday, January 25, 2017 3:39 PM

All replies

  • Hi  jerm,

    >Also, when manually searching for new updates prior to this push, the above patch wasn't on the list of needed updates. It was only showing the most recent month's rollup being needed.

    If the later monthly rollup is also approved, then, the pervious monthly rollup may be superseded, we just need to install the latest ones.

    Best Regards,

    Anne


    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Thursday, January 26, 2017 7:49 AM
  • The November rollup was approved as well though. And in most server cases, already installed on those servers. And on the servers that I manually dealt with, when searching for updates, the latest months rollup was what came up as needed. Not the October rollup.
    Thursday, January 26, 2017 12:48 PM
  • Question...if I decline an update, if it superseded an update, will that superseded update then attempt to install even if the declined update was already installed on machines?

    I declined the November rollup on the 24th and the October rollup pushed to the servers on the 25th.

    Thursday, January 26, 2017 7:58 PM
  • Question...if I decline an update, if it superseded an update, will that superseded update then attempt to install even if the declined update was already installed on machines?

    I declined the November rollup on the 24th and the October rollup pushed to the servers on the 25th.

    No, declined updates are not approved so the clients will NOT download or install them. 
    • Edited by antwesor Thursday, January 26, 2017 8:41 PM
    Thursday, January 26, 2017 8:40 PM
  • But would the October rollup (which was also approved but not installed, due to bulk approving it and the November rollup) then install after I declined the superseding November rollup?
    Monday, January 30, 2017 8:18 PM
  • Hi jerm,

    When clients detect update from WSUS server, it won't detect the declined updates. So, if clients haven't downloaded the update from WSUS server, the declined updates won't be detected or downloaded later, if the clients have already downloaded the update before declining, then, clients will still follow its own schedule to install the update, WSUS server won't call back the update.

    Best Regards,

    Anne


    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Tuesday, January 31, 2017 7:06 AM
  • Hi,

    Just to check if the above reply could be of help? If yes, you may mark useful as answer, if not, welcome to feedback.

    Best Regards,

    Anne


    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Tuesday, February 7, 2017 3:00 AM