Share via

SCCM Feature Update failures when UpdateServiceUrlAlternate points to localhost:8005 – is bypassing delta downloads a supported approach?

P, Thomas Mathew 0 Reputation points
2026-02-13T21:08:49.26+00:00

We are deploying Windows Feature Updates (23H2 → 24H2 / 25H2) using Microsoft Configuration Manager (SCCM).

On affected devices, the following registry configuration is present:

HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
  WUServer                 = https://<SUP>:8531
  WUStatusServer           = https://<SUP>:8531
  UpdateServiceUrlAlternate = http://localhost:8005

The SCCM client configures this alternate service URL when delta/express downloads are enabled. Windows Update then attempts to download update content through a local listener on port 8005.

On several devices, port 8005 is not listening (netstat -ano | findstr 8005 returns no output), and Feature Updates fail with errors such as 0x80240440. The same deployment works on other devices where port 8005 is active.

Feature Update documentation does not explicitly mention delta or express downloads, and delta appears to be a delivery optimization rather than a Feature Update requirement.

Questions:

Is it expected and supported behavior that Feature Updates can fail if the local delta download endpoint (localhost:8005) is unavailable?

Is disabling delta/express downloads for Feature Updates and redeploying full content a supported and recommended mitigation in SCCM?

Is there any Microsoft-recommended method to monitor or remediate SCCM clients where the localhost delta endpoint fails to start?

We want to confirm the supported remediation path before implementing a wider change.

Windows for business | Windows Client for IT Pros | Devices and deployment | Install Windows updates, features, or roles
0 comments No comments
{count} votes

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.