Share via

Windows Server Automatically rebooted - Azure Update Manager

Ariel Arivara 26 Reputation points
2026-04-16T04:02:47.2366667+00:00

Hi,

I have a problem with one of our server.
It restarted automatically even it have maintenance configurations.
Found some event logs 1074, shutdown type: restart but it has no GPO applied for Windows Update and only managed by Arc and Azure Update Manager.

May I know why is this the case?

Kind regards,

Ariel

Azure Update Manager
Azure Update Manager

An Azure service to centrally manages updates and compliance at scale.


Answer accepted by question author

  1. Bharath Y P 8,495 Reputation points Microsoft External Staff Moderator
    2026-04-16T04:54:57.43+00:00

    Hello Ariel, it sounds like your server rebooted because the Windows Update client or the VM’s patch settings overrode your maintenance window—even without a GPO in place, certain registry keys or Azure Update Manager defaults can force a restart. Here’s what to check and adjust:

    1. Review your Maintenance Configuration in Azure Update Manager
      • In the Azure portal, go to your maintenance configuration and verify the “Reboot behavior” setting. If it’s set to “Always” or “IfRequired,” the platform may restart the VM once patches are applied, regardless of active hours.
    2. Inspect Windows Update registry settings on the server Under HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate\AU • AlwaysAutoRebootAtScheduledTime = 0 (disable auto reboot) • NoAutoRebootWithLoggedOnUsers = 1 (don’t reboot if someone’s logged in) • AUOptions = 4 (automatic download + schedule install) • ScheduledInstallTime = <hour you want> And under HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate • ActiveHoursStart/End & SetActiveHours = 1 These keys control Windows-level restart behavior and can override your Update Manager schedule.
    3. Check the VM’s patchSettings JSON In the portal, open your VM’s JSON view and look for: "patchSettings": { "patchMode": "AutomaticByPlatform", "bypassPlatformSafetyChecksOnUserSchedule": false } If patchMode is AutomaticByPlatform (and no user schedule or bypass flag), the VM is eligible for platform‐initiated patching and reboots.
    4. Review the patch extension logs On the VM: C:\WindowsAzure\Logs\Plugins\Microsoft.CPlat.Core.WindowsPatchExtension<version>\ • WindowsUpdateExtension.log – shows which updates were installed • CommandExecution.log – shows when the reboot was triggered
    5. Confirm no other patching tools applied updates If you have WSUS, SCCM, Intune or any other service enabled, they might have pulled and installed updates outside of your Azure Update Manager window.

    the restart looks like a planned OS restart initiated by the Windows update stack, and having two maintenance configurations on the same machine can create schedule conflict behavior. Here is the clean RCA in your preferred format.

    The empty registry results do not prove that Windows Update was not involved. Microsoft explicitly documents that on Arc-enabled machines, Update Manager does not write those registry values. So those keys being absent is expected for Arc scenarios.

    Configure Windows Update Settings in Azure Update Manager | Microsoft Learn

    The disabled UpdateOrchestrator\Reboot scheduled task also does not by itself prove that no update-triggered restart happened, because Microsoft documents that Update Manager performs update operations through its Arc/patch extensions and the Windows Update client, not through that single task alone.

    Azure Update Manager Operations | Microsoft Learn

    The strongest clue is your Event 1074 text:

    • svchost.exe under NT AUTHORITY\SYSTEM
    • reason: Operating System: Service pack (Planned)
    • shutdown type: restart

    That points to a planned operating system restart initiated by a Windows service, not a crash. While Event 1074 by itself does not name Azure Update Manager, Microsoft documents that Update Manager uses the native Windows Update client on Arc servers.

    Why the missing registry keys do not rule this out Because Microsoft explicitly states:

    • Arc-enabled machines are OS orchestrated only
    • Update Manager doesn’t modify the registry on Arc-enabled machines

    So seeing those registry paths empty is consistent with Arc behavior, not evidence against Update Manager.

    About the two maintenance configurations

    Yes, two maintenance configurations can conflict if their schedules overlap or otherwise contend. Microsoft’s troubleshooting document says that in a concurrent or conflicting schedule, only one schedule is triggered, and the other runs after the first finishes.

    What the documentation does not explicitly say is that this conflict by itself causes an unexpected reboot. So I would phrase it accurately like this:

    • Yes, multiple maintenance configurations can conflict in scheduling behavior.
    • The documentation does not explicitly say that the conflict itself causes the reboot.
    • The reboot is still more directly supported by the planned OS restart evidence in Event 1074 plus the fact that Update Manager on Arc relies on the Windows Update client / OS-side orchestration.

    Verify which maintenance configuration actually ran: Microsoft’s own troubleshooting guidance says to confirm the maintenance configuration settings and specifically confirm the reboot status in the Maintenance Configuration settings assigned to the target machine.

    So for this machine, check:

    • Which of the two maintenance configurations actually targeted the server at the reboot time
    • The reboot setting on each one (Never reboot, If required, or Always)
    • Whether the two schedules overlapped or were close enough to be treated as conflicting. Microsoft says conflicting schedules do not run together; one runs after the other.

    Review Update Manager / extension logs on the server: Microsoft documents that Update Manager uses extensions on Arc servers for assessment and scheduled patching. For Arc-enabled servers, Update Manager installs the update extensions automatically when operations are triggered.

    Review the Update Manager/extension logs around the reboot timestamp, because that is the best way to tie the restart to an actual install operation. Microsoft’s Update Manager troubleshooting content also points to extension logs for diagnosing operations.

    Correlate the reboot timestamp with the patch installation job: Microsoft’s internal support TSG for “machine restarted unexpectedly after patching” lists:

    • possible causes including Update Manager scheduled update + reboot,
    • and recommends gathering logs and confirming maintenance configuration settings.

    Once you align your maintenance configuration, VM patchSettings, and registry keys, your server should stay up until your defined maintenance window. Let me know what you find!

    Reference list:


1 additional answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-16T04:03:00.9466667+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The reboot can still occur even when the server is managed only by Azure Arc and Azure Update Manager and appears to have “no GPO” for Windows Update, because reboot behavior is also controlled locally on the OS and by how updates are applied, not only by GPO.

    Key points for this scenario:

    1. Event ID 1074 explains what initiated the restart
      • Event ID 1074 (source: User32) indicates a planned restart and shows the process and account that requested it, plus a reason code and shutdown type.
      • On Azure / Arc-managed machines, this process might be the Windows Update client, Azure guest/management agents, or another update-related component, even if no domain GPO is configured.
      • To understand the cause, review the full text of the 1074 event: process name, user (for example, NT AUTHORITY\SYSTEM), and reason code. This usually points to an update or management component.
    2. Local Windows Update / restart settings can override “Never reboot” in Update Manager
      • Azure Update Manager allows configuration of schedules and a Never Reboot option in the maintenance configuration.
      • However, Windows itself has registry-based policies that control automatic updates and restarts. These can cause a reboot even if the maintenance configuration is set to never reboot.
      • The documentation explicitly notes that the registry keys described in:
        • “Configure Automatic Updates by editing the registry”, and
        • “Registry keys used to manage restart” can trigger reboots regardless of the Never Reboot setting.
      • If those keys are configured (for example by local policy, image baseline, or manual registry edits), Windows may restart after installing updates initiated by Azure Update Manager.
    3. How to investigate and prevent this going forward
      • In Event Viewer on the server, filter the System log for:
        • Event ID 1074 (User32) to see who/what initiated the restart and why.
        • Event ID 19 (WindowsUpdateClient) around the same time to confirm if a Windows update was installed just before the reboot.
      • If the 1074 event shows an update-related process and reason, then:
        1. Review the machine’s local Windows Update / restart registry settings as described in the Windows Update registry documentation referenced by Azure Update Manager.
        2. Adjust those registry keys so they align with the desired behavior (for example, to avoid automatic restarts outside the intended maintenance window).
      • Continue to use Azure Update Manager maintenance configurations for scheduling, but ensure the local OS restart policies do not conflict with the “Never Reboot” or other schedule settings.

    In summary, the automatic reboot is most likely caused by Windows update/restart policies configured via registry or local settings on the server, which can still trigger a restart even when the machine is managed only by Azure Arc and Azure Update Manager and no domain GPO is applied. Event ID 1074 plus the related update events and registry configuration will show the exact cause.


    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.