ANAVEM
Languagefr
Windows Event Viewer displaying MSI installer events on a system administrator's workstation
Event ID 1034InformationMsiInstallerWindows

Windows Event ID 1034 – MsiInstaller: Windows Installer Reconfiguration Event

Event ID 1034 from MsiInstaller indicates Windows Installer has completed a product reconfiguration or repair operation, typically triggered by application self-repair or administrative maintenance tasks.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
18 March 202612 min read 0
Event ID 1034MsiInstaller 5 methods 12 min
Event Reference

What This Event Means

Windows Event ID 1034 represents a successful completion notification from the Microsoft Windows Installer service (MsiInstaller) following a product reconfiguration operation. This event occurs when the Windows Installer engine modifies an existing MSI-based application installation, whether through user-initiated changes, automatic repair processes, or administrative maintenance tasks.

The event provides detailed information about the reconfiguration operation, including the product name, product code (GUID), user account context, and operation type. This data proves invaluable for enterprise administrators tracking software compliance, troubleshooting application issues, and maintaining deployment records. The event appears in the Windows Application log and can be filtered using standard Event Viewer tools or PowerShell cmdlets.

In modern Windows environments, particularly with the enhanced MSI capabilities in Windows 11 24H2 and Server 2025, Event ID 1034 has become more granular, providing additional context about feature modifications and repair operations. The event integrates with Windows Update mechanisms and can be triggered by system maintenance routines that verify and repair installed software packages.

Understanding this event is crucial for system administrators managing large-scale deployments, as it helps distinguish between new installations, repairs, and configuration changes. The event also serves as an audit trail for compliance requirements and helps identify patterns in application maintenance across the enterprise infrastructure.

Applies to

Windows 10Windows 11Windows Server 2019/2022/2025
Analysis

Possible Causes

  • User modifying installed features through Programs and Features or Settings app
  • Application self-repair triggered by missing or corrupted files
  • Administrative repair operations initiated through command line or scripts
  • Group Policy software deployment modifications
  • Windows Update installing patches that trigger MSI reconfiguration
  • System maintenance routines verifying and repairing installed packages
  • Third-party deployment tools performing software maintenance
  • MSI package upgrade operations that modify existing installations
Resolution Methods

Troubleshooting Steps

01

Review Event Details in Event Viewer

Start by examining the specific details of the Event ID 1034 occurrence to understand what product was reconfigured.

  1. Open Event Viewer by pressing Win + R, typing eventvwr.msc, and pressing Enter
  2. Navigate to Windows LogsApplication
  3. Filter the log by clicking Filter Current Log in the Actions pane
  4. Enter 1034 in the Event IDs field and click OK
  5. Double-click on the most recent Event ID 1034 entry
  6. Review the General tab for product information and user context
  7. Check the Details tab for the complete XML data including product codes
  8. Note the timestamp to correlate with any recent software changes or maintenance windows

The event description will show the product name and whether the operation was a repair, feature modification, or other reconfiguration type.

02

Query Events Using PowerShell

Use PowerShell to retrieve detailed information about MSI reconfiguration events and analyze patterns.

  1. Open PowerShell as Administrator
  2. Run the following command to get recent Event ID 1034 entries:
Get-WinEvent -FilterHashtable @{LogName='Application'; Id=1034; StartTime=(Get-Date).AddDays(-7)} | Select-Object TimeCreated, Id, LevelDisplayName, Message | Format-Table -Wrap
  1. For more detailed analysis, extract specific properties:
Get-WinEvent -FilterHashtable @{LogName='Application'; Id=1034} -MaxEvents 10 | ForEach-Object {
    [PSCustomObject]@{
        TimeCreated = $_.TimeCreated
        User = $_.UserId
        Message = $_.Message
        ProductInfo = ($_.Message -split '\n')[0]
    }
} | Format-Table -AutoSize
  1. To export the results for further analysis:
Get-WinEvent -FilterHashtable @{LogName='Application'; Id=1034; StartTime=(Get-Date).AddDays(-30)} | Export-Csv -Path "C:\Temp\MSI_Reconfig_Events.csv" -NoTypeInformation

This method provides programmatic access to event data and enables bulk analysis of reconfiguration patterns.

03

Correlate with MSI Installation Logs

Cross-reference Event ID 1034 with detailed MSI logs to understand the complete reconfiguration process.

  1. Enable MSI logging by modifying the registry. Open Registry Editor as Administrator
  2. Navigate to HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer
  3. Create a new DWORD value named Logging with value voicewarmupx (if not already present)
  4. Check the Windows Installer log location, typically:
Get-ChildItem -Path "$env:TEMP" -Filter "MSI*.log" | Sort-Object LastWriteTime -Descending | Select-Object -First 5
  1. Locate logs corresponding to the timestamp of Event ID 1034
  2. Open the relevant MSI log file and search for reconfiguration details
  3. Look for entries containing "Reconfiguring" or "MaintenanceMode"
  4. Cross-reference the product code from the event with the log entries
  5. Use PowerShell to search log files for specific patterns:
$LogFiles = Get-ChildItem -Path "$env:TEMP" -Filter "MSI*.log"
foreach ($Log in $LogFiles) {
    $Content = Get-Content $Log.FullName | Select-String "Reconfiguring|MaintenanceMode"
    if ($Content) {
        Write-Host "Found reconfiguration entries in: $($Log.Name)"
        $Content | Select-Object -First 3
    }
}

This correlation helps identify the root cause of the reconfiguration and any issues that occurred during the process.

04

Analyze Product Installation State

Verify the current installation state of products that generated Event ID 1034 to ensure successful reconfiguration.

  1. Use PowerShell to query installed MSI products and their states:
Get-WmiObject -Class Win32_Product | Where-Object {$_.InstallState -eq 5} | Select-Object Name, Version, InstallDate, InstallState | Sort-Object InstallDate -Descending
  1. For more detailed product information, query the registry:
$UninstallKeys = @(
    "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*",
    "HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*"
)
Get-ItemProperty $UninstallKeys | Where-Object {$_.DisplayName -and $_.UninstallString -like "*msiexec*"} | Select-Object DisplayName, DisplayVersion, InstallDate | Sort-Object InstallDate -Descending
  1. Check for any products in a broken or incomplete state:
Get-WmiObject -Class Win32_Product | Where-Object {$_.InstallState -ne 5} | Select-Object Name, InstallState, @{Name="StateDescription";Expression={
    switch($_.InstallState) {
        1 {"Advertised"}
        2 {"Absent"}
        3 {"Default"}
        4 {"Source"}
        5 {"Local"}
        default {"Unknown"}
    }
}}
  1. Validate specific product features if the reconfiguration involved feature changes:
# Replace {PRODUCT-GUID} with actual product code from Event 1034
$ProductCode = "{PRODUCT-GUID}"
try {
    $Product = Get-WmiObject -Class Win32_Product -Filter "IdentifyingNumber='$ProductCode'"
    if ($Product) {
        Write-Host "Product: $($Product.Name) - State: $($Product.InstallState)"
    }
} catch {
    Write-Host "Product not found or query failed"
}

This analysis confirms whether the reconfiguration completed successfully and identifies any remaining issues.

05

Implement Monitoring and Alerting

Set up proactive monitoring for Event ID 1034 to track software maintenance patterns and identify potential issues.

  1. Create a PowerShell script for continuous monitoring:
# MSI Reconfiguration Monitor Script
$ScriptPath = "C:\Scripts\MSI-Monitor.ps1"
$LogPath = "C:\Logs\MSI-Reconfig.log"

# Create monitoring script
@'
$LastCheck = (Get-Date).AddMinutes(-5)
$Events = Get-WinEvent -FilterHashtable @{LogName="Application"; Id=1034; StartTime=$LastCheck} -ErrorAction SilentlyContinue

foreach ($Event in $Events) {
    $LogEntry = "$(Get-Date -Format "yyyy-MM-dd HH:mm:ss") - MSI Reconfiguration: $($Event.Message.Split("`n")[0])"
    Add-Content -Path "C:\Logs\MSI-Reconfig.log" -Value $LogEntry
    
    # Optional: Send alert for specific products
    if ($Event.Message -like "*Critical Application*") {
        # Add alerting logic here
        Write-EventLog -LogName Application -Source "MSI Monitor" -EventId 9999 -EntryType Warning -Message "Critical application reconfigured: $($Event.Message)"
    }
}
'@ | Out-File -FilePath $ScriptPath -Encoding UTF8
  1. Create a scheduled task to run the monitoring script:
$TaskName = "MSI Reconfiguration Monitor"
$Action = New-ScheduledTaskAction -Execute "PowerShell.exe" -Argument "-ExecutionPolicy Bypass -File C:\Scripts\MSI-Monitor.ps1"
$Trigger = New-ScheduledTaskTrigger -RepetitionInterval (New-TimeSpan -Minutes 5) -RepetitionDuration (New-TimeSpan -Days 365) -At (Get-Date)
$Settings = New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -StartWhenAvailable

Register-ScheduledTask -TaskName $TaskName -Action $Action -Trigger $Trigger -Settings $Settings -User "SYSTEM" -RunLevel Highest
  1. Set up Event Viewer custom views for easier monitoring:
# Create custom view XML (save as MSI-Reconfig-View.xml)
<?xml version="1.0" encoding="UTF-8"?>
<ViewerConfig>
  <QueryConfig>
    <QueryParams>
      <Simple>
        <Channel>Application</Channel>
        <EventId>1034</EventId>
        <RelativeTimeInfo>604800000</RelativeTimeInfo>
      </Simple>
    </QueryParams>
  </QueryConfig>
</ViewerConfig>
  1. Import the custom view in Event Viewer by right-clicking Custom Views and selecting Import Custom View
  2. Configure Windows Event Forwarding (WEF) for centralized monitoring in enterprise environments:
# On collector server, configure subscription
wecutil cs MSI-Reconfig-Subscription.xml

# Subscription XML content:
# <Subscription xmlns="http://schemas.microsoft.com/2006/03/windows/events/subscription">
#   <SubscriptionId>MSI-Reconfig</SubscriptionId>
#   <Query><![CDATA[<QueryList><Query Id="0"><Select Path="Application">*[System[EventID=1034]]</Select></Query></QueryList>]]></Query>
# </Subscription>

This comprehensive monitoring approach enables proactive management of MSI-based applications and early detection of reconfiguration issues.

Overview

Event ID 1034 fires when Windows Installer (MSI) completes a product reconfiguration operation. This event appears in the Application log whenever an installed MSI package undergoes repair, feature modification, or administrative reconfiguration. The event typically occurs during application self-repair processes, when users modify installed features through Control Panel, or when Group Policy triggers software maintenance.

This informational event provides crucial tracking for software deployment environments and helps administrators monitor MSI-based application health. The event contains details about which product was reconfigured, the user context, and the operation result. In enterprise environments running Windows 11 24H2 and Server 2025, this event becomes particularly valuable for tracking automated software maintenance and compliance operations.

Unlike installation events, Event ID 1034 specifically indicates that an existing product has been modified rather than newly installed or completely removed. The event fires after successful completion of the reconfiguration process, making it useful for confirming that maintenance operations completed successfully.

Frequently Asked Questions

What does Event ID 1034 mean and when should I be concerned?+
Event ID 1034 indicates that Windows Installer has successfully completed a product reconfiguration operation. This is typically an informational event that occurs during normal software maintenance, such as application self-repair, feature modifications, or administrative updates. You should only be concerned if you see frequent occurrences for the same product, which might indicate underlying installation issues, or if the reconfiguration was unexpected and not initiated by users or administrators. In enterprise environments, frequent Event ID 1034 entries for critical applications may signal deployment problems or corrupted installations that require investigation.
How can I determine which specific application was reconfigured in Event ID 1034?+
The Event ID 1034 message contains the product name and often includes the product code (GUID) in the event details. To identify the specific application, open Event Viewer, locate the event, and examine both the General tab message and the Details tab XML data. You can also use PowerShell to extract this information programmatically with Get-WinEvent. The product code can be cross-referenced with registry entries under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall to get complete application details. Additionally, checking the user context in the event helps determine whether the reconfiguration was user-initiated or system-triggered.
Is Event ID 1034 related to security issues or malware activity?+
Event ID 1034 itself is not a security indicator and represents legitimate Windows Installer activity. However, unexpected or frequent reconfiguration events could potentially indicate malicious activity if malware is attempting to modify or repair installed applications. To assess security implications, correlate Event ID 1034 with other security events, check if the reconfiguration occurred outside normal business hours, verify the user context, and ensure the affected applications are legitimate. Use security tools to scan the system if you observe suspicious patterns, such as reconfiguration of security software or system utilities without administrative authorization.
Can Event ID 1034 cause system performance issues?+
Event ID 1034 itself doesn't cause performance issues, but the underlying reconfiguration process it represents can temporarily impact system performance. MSI reconfiguration operations involve file system access, registry modifications, and service interactions that consume CPU and disk resources. If you're experiencing performance problems coinciding with Event ID 1034, investigate whether multiple applications are being reconfigured simultaneously, check for disk space issues that might slow MSI operations, and verify that the reconfiguration processes are completing successfully. Frequent automatic repairs indicated by repeated Event ID 1034 entries might suggest underlying system issues that need addressing.
How do I prevent unnecessary Event ID 1034 occurrences in my environment?+
To minimize unnecessary Event ID 1034 occurrences, ensure proper software deployment practices including thorough testing before deployment, maintaining healthy system images, and implementing proper change management procedures. Disable automatic repair features for applications where appropriate, keep systems updated to prevent compatibility issues that trigger repairs, and use Group Policy to control software installation and modification permissions. Regular system maintenance, including disk cleanup and registry optimization, can prevent conditions that lead to automatic application repairs. For enterprise environments, consider using application virtualization or containerization technologies that reduce the need for traditional MSI-based installations and their associated maintenance operations.
Documentation

References (2)

Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...