Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 251
  • Last Modified:

SUS Client - Scheduled Time Problem

Hi all,

Actually, we have SUS clientes scheduled/configured in the
registry at 10.00 with the ScheduledInstallTime=10(Dec)
parameter, but doesn't work.
The SUS client are connecting to the SUS Server at 12.00AM.

Anybody know what's happenning?
Thanks in advance......
2 Solutions
Make sure the ScheduledInstallTime is a DWORD value and set that to 00000005 (for 5am as an example), 00000010 for 10am.  

Here is the client reg key


If you know how to use VBScript, here is a SUSClientUpdate function that works to install updates automatically at 10:00PM every night.  Just pass the name of the SUS server you wish to be used (i.e. SERVER).  Also, you must declare g_oShell globally in the main area of the script to be bound to:

Set g_oShell = CreateObject("Wscript.Shell")

Otherwise if you don't know how to use VBScript, you should be able to decipher what registry keys are getting updated.


' SUSClientUpdate
' Applies Software Update Services related patches/registry entries
' g_oShell          WshShell object
' Returns          
Function SUSClientUpdate(sSUSServer)

     'Create Entries under HKLM\SOFTWARE\Polices\Microsoft\WindowsUpdate
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\WUServer", "http://" & sSUSServer, "REG_SZ")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\WUStatusServer", "http://" & sSUSServer, "REG_SZ")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\AUOptions", "4", "REG_DWORD")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\NoAutoUpdate", "0", "REG_DWORD")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\ScheduledInstallDay", "0", "REG_DWORD")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\ScheduledInstallTime", "22", "REG_DWORD")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU\UseWUServer", "1", "REG_DWORD")
     'Create Entries under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\BytesPerSec", "44288", "REG_DWORD")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\URL", "http://windowsupdate.microsoft.com/?Start", "REG_SZ")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\AUOptions", "0", "REG_DWORD")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\AUState", "2", "REG_DWORD")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\DetectionStartTime", "2002.10.24 19:10:35", "REG_SZ")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\LastWaitTimeout", "2002.10.22 23:15:35", "REG_SZ")
     g_bResult = WriteRegistry("HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\CriticalUpdate\SelfUpdServer", "http://" & sSUSServer & "/SelfUpdate/CUN5_4", "REG_SZ")

End Function 'SUSClientUpdate
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
Post your closing recommendations!  No comment means you don't care.

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now