An Azure service to centrally manages updates and compliance at scale.
Hello Ariel, it sounds like your server rebooted because the Windows Update client or the VM’s patch settings overrode your maintenance window—even without a GPO in place, certain registry keys or Azure Update Manager defaults can force a restart. Here’s what to check and adjust:
- Review your Maintenance Configuration in Azure Update Manager
- In the Azure portal, go to your maintenance configuration and verify the “Reboot behavior” setting. If it’s set to “Always” or “IfRequired,” the platform may restart the VM once patches are applied, regardless of active hours.
- Inspect Windows Update registry settings on the server Under HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU • AlwaysAutoRebootAtScheduledTime = 0 (disable auto reboot) • NoAutoRebootWithLoggedOnUsers = 1 (don’t reboot if someone’s logged in) • AUOptions = 4 (automatic download + schedule install) • ScheduledInstallTime = <hour you want> And under HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate • ActiveHoursStart/End & SetActiveHours = 1 These keys control Windows-level restart behavior and can override your Update Manager schedule.
- Check the VM’s patchSettings JSON In the portal, open your VM’s JSON view and look for: "patchSettings": { "patchMode": "AutomaticByPlatform", "bypassPlatformSafetyChecksOnUserSchedule": false } If patchMode is AutomaticByPlatform (and no user schedule or bypass flag), the VM is eligible for platform‐initiated patching and reboots.
- Review the patch extension logs On the VM: C:\WindowsAzure\Logs\Plugins\Microsoft.CPlat.Core.WindowsPatchExtension<version>\ • WindowsUpdateExtension.log – shows which updates were installed • CommandExecution.log – shows when the reboot was triggered
- Confirm no other patching tools applied updates If you have WSUS, SCCM, Intune or any other service enabled, they might have pulled and installed updates outside of your Azure Update Manager window.
the restart looks like a planned OS restart initiated by the Windows update stack, and having two maintenance configurations on the same machine can create schedule conflict behavior. Here is the clean RCA in your preferred format.
The empty registry results do not prove that Windows Update was not involved. Microsoft explicitly documents that on Arc-enabled machines, Update Manager does not write those registry values. So those keys being absent is expected for Arc scenarios.
Configure Windows Update Settings in Azure Update Manager | Microsoft Learn
The disabled UpdateOrchestrator\Reboot scheduled task also does not by itself prove that no update-triggered restart happened, because Microsoft documents that Update Manager performs update operations through its Arc/patch extensions and the Windows Update client, not through that single task alone.
Azure Update Manager Operations | Microsoft Learn
The strongest clue is your Event 1074 text:
-
svchost.exeunderNT AUTHORITY\SYSTEM - reason: Operating System: Service pack (Planned)
- shutdown type: restart
That points to a planned operating system restart initiated by a Windows service, not a crash. While Event 1074 by itself does not name Azure Update Manager, Microsoft documents that Update Manager uses the native Windows Update client on Arc servers.
Why the missing registry keys do not rule this out Because Microsoft explicitly states:
- Arc-enabled machines are OS orchestrated only
- Update Manager doesn’t modify the registry on Arc-enabled machines
So seeing those registry paths empty is consistent with Arc behavior, not evidence against Update Manager.
About the two maintenance configurations
Yes, two maintenance configurations can conflict if their schedules overlap or otherwise contend. Microsoft’s troubleshooting document says that in a concurrent or conflicting schedule, only one schedule is triggered, and the other runs after the first finishes.
What the documentation does not explicitly say is that this conflict by itself causes an unexpected reboot. So I would phrase it accurately like this:
- Yes, multiple maintenance configurations can conflict in scheduling behavior.
- The documentation does not explicitly say that the conflict itself causes the reboot.
- The reboot is still more directly supported by the planned OS restart evidence in Event 1074 plus the fact that Update Manager on Arc relies on the Windows Update client / OS-side orchestration.
Verify which maintenance configuration actually ran: Microsoft’s own troubleshooting guidance says to confirm the maintenance configuration settings and specifically confirm the reboot status in the Maintenance Configuration settings assigned to the target machine.
So for this machine, check:
- Which of the two maintenance configurations actually targeted the server at the reboot time
- The reboot setting on each one (Never reboot, If required, or Always)
- Whether the two schedules overlapped or were close enough to be treated as conflicting. Microsoft says conflicting schedules do not run together; one runs after the other.
Review Update Manager / extension logs on the server: Microsoft documents that Update Manager uses extensions on Arc servers for assessment and scheduled patching. For Arc-enabled servers, Update Manager installs the update extensions automatically when operations are triggered.
Review the Update Manager/extension logs around the reboot timestamp, because that is the best way to tie the restart to an actual install operation. Microsoft’s Update Manager troubleshooting content also points to extension logs for diagnosing operations.
Correlate the reboot timestamp with the patch installation job: Microsoft’s internal support TSG for “machine restarted unexpectedly after patching” lists:
- possible causes including Update Manager scheduled update + reboot,
- and recommends gathering logs and confirming maintenance configuration settings.
Once you align your maintenance configuration, VM patchSettings, and registry keys, your server should stay up until your defined maintenance window. Let me know what you find!
Reference list:
- Configure reboot settings
- Deploy updates now and track results with Azure Update Manager
- What is Azure Update Manager Hope this helps! If the provided answer was helpful, please click Accept the Answer and upvote if the above was helpful. Thanks