A manual software update deployment is the process of selecting software updates from the Configuration Manager console and manually starting the deployment process. Or add selected software updates to an update group, and then manually deploy the update group. Download content from Microsoft Updates: Select this setting to have intranet. Nov 01, 2012 Hi, Version 7.6.7600.256 of the Windows Update Agent is the latest version.There is no direct link to download the agent.There is no standalone installer of the latest version of the Windows Update Agent.If you have WSUS server within your organization,you just need to install KB2720211 on a WSUS server.Then,all the WUA will get the latest version of 7.6.7600.256 thru WSUS.Without.
- Download Windows Update Agent
- Microsoft Manual Update Download
- Microsoft Updates Microsoft Download Center
- Microsoft Windows 7 Updates Download
- Update Windows Update Agent Manually
Download Windows Update Agent
-->The Microsoft Azure Virtual Machine Agent (VM Agent) is a secure, lightweight process that manages virtual machine (VM) interaction with the Azure Fabric Controller. The VM Agent has a primary role in enabling and executing Azure virtual machine extensions. VM Extensions enable post-deployment configuration of VM, such as installing and configuring software. VM extensions also enable recovery features such as resetting the administrative password of a VM. Without the Azure VM Agent, VM extensions cannot be run.
This article details installation, detection, and removal of the Azure Virtual Machine Agent.
Install the VM Agent
Azure Marketplace image
The Azure VM Agent is installed by default on any Windows VM deployed from an Azure Marketplace image. When you deploy an Azure Marketplace image from the portal, PowerShell, Command Line Interface, or an Azure Resource Manager template, the Azure VM Agent is also installed.
The Windows Guest Agent Package is broken into two parts:
- Provisioning Agent (PA)
- Windows Guest Agent (WinGA)
To boot a VM you must have the PA installed on the VM, however the WinGA does not need to be installed. At VM deploy time, you can select not to install the WinGA. The following example shows how to select the provisionVmAgent option with an Azure Resource Manager template:
If you do not have the Agents installed, you cannot use some Azure services, such as Azure Backup or Azure Security. These services require an extension to be installed. If you have deployed a VM without the WinGA, you can install the latest version of the agent later.
Manual installation
The Windows VM agent can be manually installed with a Windows installer package. Manual installation may be necessary when you create a custom VM image that is deployed to Azure. To manually install the Windows VM Agent, download the VM Agent installer. The VM Agent is supported on Windows Server 2008 R2 and later.
The VM Agent can be installed by double-clicking the Windows installer file. For an automated or unattended installation of the VM agent, run the following command:
Prerequisites
The Windows VM Agent needs at least Windows Server 2008 R2 (64-bits) to run, with the .Net Framework 4.0. See Minimum version support for virtual machine agents in Azure
Detect the VM Agent
PowerShell
The Azure Resource Manager PowerShell module can be used to retrieve information about Azure VMs. To see information about a VM, such as the provisioning state for the Azure VM Agent, use Get-AzVM:
The following condensed example output shows the ProvisionVMAgent property nested inside OSProfile. This property can be used to determine if the VM agent has been deployed to the VM:
The following script can be used to return a concise list of VM names and the state of the VM Agent:

Manual Detection
When logged in to a Windows VM, Task Manager can be used to examine running processes. To check for the Azure VM Agent, open Task Manager, click the Details tab, and look for a process name WindowsAzureGuestAgent.exe. The presence of this process indicates that the VM agent is installed.
Upgrade the VM Agent
The Azure VM Agent for Windows is automatically upgraded. As new VMs are deployed to Azure, they receive the latest VM agent at VM provision time. Custom VM images should be manually updated to include the new VM agent at image creation time.
Windows Guest Agent Automatic Logs Collection
Windows Guest Agent has a feature to automatically collect some logs. This feature is controller by the CollectGuestLogs.exe process.It exists for both PaaS Cloud Services and IaaS Virtual Machines and its goal is to quickly & automatically collect some diagnostics logs from a VM - so they can be used for offline analysis.The collected logs are Event Logs, OS Logs, Azure Logs and some registry keys. It produces a ZIP file that is transferred to the VM’s Host. This ZIP file can then be looked at by Engineering Teams and Support professionals to investigate issues on request of the customer owning the VM.
Next steps
For more information about VM extensions, see Azure virtual machine extensions and features overview.
-->You can use MOMAgent.msi to deploy System Center Operations Manager agents from the command line or by using the Setup Wizard. Deploying agents from the command line is also referred to as a manual install. For a list of the supported operating system versions, see Microsoft Monitoring Agent Operating System requirements.
Before you use either method to manually deploy the agent, ensure the following conditions are met:
The account that is used to run MOMAgent.msi must have administrative privileges on the computer on which you are installing agent.
Each agent that is installed with the Setup Wizard or from the command line must be approved by a management group. For more information, see Process Manual Agent Installations.
If an agent is manually deployed to a domain controller and the Active Directory management pack is later deployed, errors might occur during deployment of the management pack. The Active Directory helper object is used by the Active Directory management pack on Windows domain controllers. The Active Directory Management Pack helper object is normally installed automatically when the agent is deployed using the Discovery Wizard. To prevent errors from occurring or recover from errors already occurring, you need to manually install the Windows installer package OomADs.msi on the affected domain controller. The file can be located on the domain controller in the %ProgramFiles%Microsoft Monitoring AgentAgentHelperObjects folder.
A management group (or single management server) must be configured to accept agents installed with MOMAgent.msi or they will be automatically rejected and therefore not display in the Operations console. For more information, see Process Manual Agent Installations. If the management group or server is configured to accept manually installed agents after the agents have been manually installed, the agents will display in the console after approximately one hour.
Note
For information about port requirements for agents, see Communication Between Agents and Management Servers.
MOMAgent.msi can be found in the Operations Manager installation media and in the following folder on a System Center - Operations Manager management server %ProgramFiles%Microsoft System Center 2016Operations ManagerServerAgentManagement<platform>. For a version 1801 or higher management server, the agent installation files can be found in the following folder - %ProgramFiles%Microsoft System CenterOperations ManagerServerAgentManagement<platform>.
Important
The Application Performance Monitoring (APM) feature in System Center 2016 Operations Manager and version 1801 agent causes a crash with IIS Application Pools that are running under the .NET Framework 2.0 runtime. By default when the agent is installed on a Windows computer, the APM components are installed by default. To avoid issues and prevent installation of the APM components on target Windows servers when you deploy the agent, add the NOAPM=true parameter
To deploy the Operations Manager agent with the Agent Setup Wizard
Use local administrator privileges to log on to the computer where you want to install the agent.
On the Operations Manager installation media, double-click Setup.exe.
In Optional Installations, click Local agent.
On the Welcome page, click Next.
On the Important Notice page, review the Microsoft software license terms and then click I Agree.
On the Destination Folder page, leave the installation folder set to the default, or click Change and type a path, and then click Next.
On the Agent Setup Options page, you can choose whether you want to connect the agent to Operations Manager. When you connect the agent to Operations Manager, you can manually choose the management group that this agent will participate with in monitoring. If you do not select this option, the agent can still collect Application Performance Monitoring data locally. You can change your selection in the Monitoring Agent item in Control Panel.
On the Management Group Configuration page, do the following:
a. Type the name of the management group in the Management Group Name field and the (which server?) server name in the Management Server field.
Note
To use a gateway server, enter the gateway server name in the Management Server text box.
b. Type a value for Management Server Port, or leave the default of 5723.
c. Click Next.
On the Agent Action Account page, leave it set to the default of Local System, or select Domain or Local Computer Account; type the User Account, Password, and Domain or local computer; and then click Next.
On the Ready to Install page, review the settings and then click Install to display the Installing Microsoft Monitoring Agent page.
When the Completing the Microsoft Monitoring Agent Setup Wizard page appears, click Finish.
To deploy the Operations Manager agent from the command line
Log on to the computer where you want to install the agent by using an account with local administrator privileges.
Open a command prompt as an administrator.
Run the following command:
Note
Ensure you use the correct 32-bit or 64-bit version of MOMAgent.msi for the computer you are installing the agent on.
where:
Parameter Value USE_SETTINGS_FROM_AD={0|1} Indicates whether the management group settings properties will be set on the command line. Use 0 if you want to set the properties at the command line. Use 1 to use the management group settings from Active Directory. USE_MANUALLY_SPECIFIED_SETTINGS{0|1} If USE_SETTINGS_FROM_AD=1, then USE_MANUALLY_SPECIFIED_SETTINGS must equal 0. MANAGEMENT_GROUP=MGname Specifies the management group that will manage the computer. MANAGEMENT_SERVER_DNS=MSname Specifies the fully qualified domain name for the management server. To use a gateway server, enter the gateway server FQDN as MANAGEMENT_SERVER_DNS. MANAGEMENT_SERVER_AD_NAME=ADname Use this parameter if the computer's DNS and Active Directory names differ to set to the fully qualified Active Directory Domain Services name. SECURE_PORT=PortNumber Sets the health service port number. ENABLE_ERROR_REPORTING={0|1} Optional parameter. Use this parameter with '1' to opt in to error report forwarding to Microsoft. If you do not include this parameter, the agent installation defaults to '0', which opts out of error report forwarding. QUEUE_ERROR_REPORTS={0|1} Optional parameter. Use this parameter with '1' to queue error reports or with '0' to send reports immediately. If you do not include this parameter, the agent installation defaults to '0'. INSTALLDIR=path Optional parameter. Use this parameter if you want to install the agent to a folder other than the default installation path. Note that Agent will be appended to this value. ACTIONS_USE_COMPUTER_ACCOUNT={0|1} Indicates whether to use a specified user account (0) or the Local System account (1). ACTIONSUSER=UserName Sets the Agent Action account to UserName. This parameter is required if you specified ACTIONS_USE_COMPUTER_ACCOUNT=0. ACTIONSDOMAIN= DomainName Sets the domain for the Agent Action account identified with the ACTIONSUSER parameter. ACTIONSPASSWORD= Password The password for the user identified with the ACTIONSUSER parameter. NOAPM=1 Optional parameter. Installs the Operations Manager agent without .NET Application Performance Monitoring. If you are using AVIcode 5.7, NOAPM=1 leaves the AVIcode agent in place. If you are using AVIcode 5.7 and install the Operations Manager agent by using momagent.msi without NOAPM=1, the AVIcode agent will not work correctly and an alert will be generated. AcceptEndUserLicenseAgreement=1 Used to specify that you accept the End User License Agreement (EULA). This parameter is required when you use /qn to perform a fully silent installation of the agent.
Examples of installing the agent from the command line
The following examples show different ways in which you can install the MOMAgent.msi Windows Installer package manually from the command line. You can perform new installations of agents, upgrade agents from previous releases of Operations Manager, uninstall the agent, or change the configuration of an agent (such as the management group or management server associated with the agent).
Agent installation using a specific Action Account
The following example shows a fresh installation of an agent and uses a specific Action Account.
Agent installation using the Local System account
The following example shows a fresh installation of an agent and uses the Local System for the Action Account.
Agent installation with Active Directory integration and using a specific Action Account
The following example installs an agent by using Active Directory and a specific Action Account.
Agent installation with Active Directory integration and using the Local System account
Microsoft Manual Update Download
The following example installs an agent by using Active Directory and the Local system account for the Action Account.
Microsoft Updates Microsoft Download Center
Agent upgrade from a previous release of Operations Manager
The following example upgrades an agent.
Uninstall the agent
The following example uninstalls an agent.
Deploy the agent with APM disabled using PowerShell
The following example shows how you install the Windows agent from PowerShell with the Application Performance Monitoring (APM) component disbled.
Repair the agent and disable APM using PowerShell
Microsoft Windows 7 Updates Download
The following example shows how you repair the Windows agent from PowerShell and disable the Application Performance Monitoring (APM) component.
Next steps
Update Windows Update Agent Manually
To deploy the Windows agent from the Operations console using the Discovery Wizard, review Install Agent on Windows Using the Discovery Wizard.
If you would like to install the Nano Server agent using the Discovery Wizard, from the command line or automate the deployment using a script or other automation solution, review Install Agent on Nano Server.
To learn how to upgrade the agent on Windows computers from a previous version, see How to upgrade an agent to System Center Operations Manager.
To understand how to manage the configuration settings of a Windows agent and options available, review Configuring Windows Agents.
Review Uninstall Agent from Windows-based Computers to understand what options and steps need to be performed to properly uninstall the agent from your Windows computers.