Quantcast
Channel: WSUS Forum
Viewing all 12331 articles
Browse latest View live

Migrated WSUS from 2008R2 to 2012R2 - WID errors and Win7/2008R2 machines don't connect

$
0
0

Recently migrated from 2008R2 WSUS to 2012R2 WSUS via a very troublesome migration (see this thread for details:  http://community.spiceworks.com/topic/535378-wsus-replica-no-computers-updates-listed?page=1#entry-3541584 ).  But I was finally able to get the migration to work, db moved and set up, sync'd w/MS, etc.  Yet for some reason none of my 2008R2 servers or Win7 machines connect to the new WSUS server.  Also, which is puzzling, is the actual WSUS server itself doesn't connect in to itself.

This is what I see on my PC's WindowsUpdate.log file:

2014-07-14 05:48:12:681 1112 2448 AU #############

2014-07-14 05:48:12:681 1112 2448 AU ## START ## AU: Search for updates

2014-07-14 05:48:12:681 1112 2448 AU #########

2014-07-14 05:48:12:683 1112 2448 AU <<## SUBMITTED ## AU: Search for updates [CallId = {E426BB1C-410A-4B3C-B37F-CAD668BA88CF}]

2014-07-14 05:48:12:683 1112 20fc Agent *************

2014-07-14 05:48:12:683 1112 20fc Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]

2014-07-14 05:48:12:683 1112 20fc Agent *********

2014-07-14 05:48:12:683 1112 20fc Agent * Online = Yes; Ignore download priority = No

2014-07-14 05:48:12:684 1112 20fc Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"

2014-07-14 05:48:12:684 1112 20fc Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed

2014-07-14 05:48:12:684 1112 20fc Agent * Search Scope = {Machine}

2014-07-14 05:48:12:758 1112 20fc Setup Checking for agent SelfUpdate

2014-07-14 05:48:12:759 1112 20fc Setup Client version: Core: 7.6.7600.256 Aux: 7.6.7600.256

2014-07-14 05:48:12:759 1112 20fc Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:

2014-07-14 05:48:12:789 1112 20fc Misc Microsoft signed: Yes

2014-07-14 05:48:15:056 1112 20fc Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:

2014-07-14 05:48:15:063 1112 20fc Misc Microsoft signed: Yes

2014-07-14 05:48:15:067 1112 20fc Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:

2014-07-14 05:48:15:082 1112 20fc Misc Microsoft signed: Yes

2014-07-14 05:48:15:085 1112 20fc Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194

2014-07-14 05:48:15:085 1112 20fc Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194

2014-07-14 05:48:15:085 1112 20fc Misc WARNING: DownloadFileInternal failed for http://ServerName-01:8530/selfupdate/WSUS3/x64/Win7SP1/wsus3setup.cab: error 0x80190194

2014-07-14 05:48:15:085 1112 20fc Setup WARNING: SelfUpdate check failed to download package information, error = 0x80244019

2014-07-14 05:48:15:085 1112 20fc Setup FATAL: SelfUpdate check failed, err = 0x80244019

2014-07-14 05:48:15:085 1112 20fc Agent * WARNING: Skipping scan, self-update check returned 0x80244019

2014-07-14 05:48:15:115 1112 20fc Agent * WARNING: Exit code = 0x80244019

2014-07-14 05:48:15:115 1112 20fc Agent *********

2014-07-14 05:48:15:115 1112 20fc Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]

2014-07-14 05:48:15:115 1112 20fc Agent *************

2014-07-14 05:48:15:115 1112 20fc Agent WARNING: WU client failed Searching for update with error 0x80244019

2014-07-14 05:48:15:116 1112 1658 AU >>## RESUMED ## AU: Search for updates [CallId = {E426BB1C-410A-4B3C-B37F-CAD668BA88CF}]

2014-07-14 05:48:15:116 1112 1658 AU # WARNING: Search callback failed, result = 0x80244019

2014-07-14 05:48:15:116 1112 1658 AU # WARNING: Failed to find updates with error code 80244019

2014-07-14 05:48:15:116 1112 1658 AU #########

2014-07-14 05:48:15:116 1112 1658 AU ## END ## AU: Search for updates [CallId = {E426BB1C-410A-4B3C-B37F-CAD668BA88CF}]

2014-07-14 05:48:15:116 1112 1658 AU #############

2014-07-14 05:48:15:116 1112 1658 AU Successfully wrote event for AU health state:0

2014-07-14 05:48:15:117 1112 1658 AU AU setting next detection timeout to 2014-07-14 17:48:15

2014-07-14 05:48:15:117 1112 1658 AU Successfully wrote event for AU health state:0

2014-07-14 05:48:15:131 1112 1658 AU Successfully wrote event for AU health state:0

2014-07-14 05:48:20:085 1112 20fc Report REPORT EVENT: {46204AF0-1316-4901-8710-817B9064F3D9} 2014-07-14 05:48:15:085-0700 1 148 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 1 80244019 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x80244019.

2014-07-14 05:48:20:107 1112 20fc Report CWERReporter::HandleEvents - WER report upload completed with status 0x8

2014-07-14 05:48:20:107 1112 20fc Report WER Report sent: 7.6.7600.256 0x80244019 D67661EB-2423-451D-BF5D-13199E37DF28 Scan 101 Managed

2014-07-14 05:48:20:107 1112 20fc Report CWERReporter finishing event handling. (00000000)

2014-07-14 05:59:19:092 1112 20fc PT WARNING: Cached cookie has expired or new PID is available

2014-07-14 05:59:19:092 1112 20fc PT Initializing simple targeting cookie, clientId = be5336c9-d649-431a-91b6-d4f8ac2cbbe5, target group = , DNS name = ComputerName.domain.local

2014-07-14 05:59:19:092 1112 20fc PT Server URL = http://ServerName-01:8530/SimpleAuthWebService/SimpleAuth.asmx

2014-07-14 05:59:19:104 1112 20fc Report Uploading 1 events using cached cookie, reporting URL = http://ServerName-01:8530/ReportingWebService/ReportingWebService.asmx

2014-07-14 05:59:19:106 1112 20fc Report Reporter successfully uploaded 1 events.

I'm also seeing a bunch of MSSQL$MICROSOFT##WID errors in event viewer.  They all are talking about the susdb file thatWAS initially associated with the WSUS install.  That was prior to my changing over to SQL2014express to get things to work...it looks as if it never fully cleared itself out.  That file is no longer in the Windows\WID folder, yet there are still other files in there...is there a way to remove MSSQL$MICROSOFT##WID and this association with susdb file?

I think this is also the reason my SBE backup jobs are failing on my Hyper-V server...because there are backup job errors on this server referencing the SQL##WID account...

errors 18210; 3041; 1 WIDVDI; 8229 VSS; 2 vmicvss; 17204

Any and all help is greatly appreciated.

Thanks


WSUS 2012 R2 totally dead

$
0
0

Hello,

I have a single Windows Server 2012 R2 server which runs AD and all other basic services, as well as WSUS with Windows Internal Database.

WSUS has been working fine for several months until it stopped working completely: all clients stopped receiving updates. Opening the WSUS console would show a hung session and after about a minute would time out with "Error: Connection Error"

I tried restarting the services and server.

Tried removing the WSUS role and reinstalling, no difference.

Tried manually deleting the WSUS website after uninstalling WSUS.

The result is that the Post Installation Task fails completely.

Tried deleting the WID susdb files but realized that broke things even further so I restored the files and I'm back to square one.

Some articles suggest uninstalling and reinstalling WID but this doesn't seem possible with 2012 R2.

Does anyone know how I can fix WSUS?

Thanks in advance!





Clean-up on the wsus hierarchy

$
0
0

Hello,

I have a problem with a wsus hierarchy/. We have one wsus upstream server (Windows Server 2008 R2 + WSUS 3 SP2 with SSL), the downstream server execute Windows Server 2003, 2008 or 2008 R2. All Wsus Server use SSL and the SP2 it's installed.

When i try to execute the cleanup wizard on the upstream server and run the synchronisation on the downstream server, i have several updatewhomoved to theunapprovedstatus.

Thus, there is a difference on the number of update between the upstream server and downstream server.

Can you please help me ?

WSUS 3.2 reports Windows 8 as "Windows 0.0"

$
0
0
WSUS 3.2 reports Windows 8 as "Windows 0.0" for both Windows 8 Release Preview and Windows Server 2012 Release Candidate. I am running WSUS 3.2.7600.226.

wmdc and wsus

$
0
0
If I install wmdc on a domain pc that is forced to connect to a wsus server through a GPO then when the device connects it tries to scan windows update but fails to find a device.

If I install wmdc on a machine not in an OU affected by the WSUS GPO it works fine and downloads the driver first time.

Does anyone know a way to keep the machines downloading from WSUS and still download the wmdc drivers from the windows update site?

Tx, in advance

False positive KB2962407 appearing on WSUS on all Windows 2012 server

$
0
0

Any facing this issue?

KB2962407 showing on WSUS server for all Windows 2012 Server where the patches has already been applied.

Try checking for updates on server and detected no new updates.

Try uninstalling the KB2962407, downloaded the patch and installing it does not solve the issue too.

Any solution?

Why can't I completely delete msxml 4.0?

$
0
0
I WAS TOLD TO DELETE MXCML 4.0 BUT IT WON'T UNINSTALL COMPLETELY; WHAT SHOULD I DO?

WSUS Console does not show anything

$
0
0

Hello,

I just set up a new WSUS on my domain, I used the Server Manger to install it and all seemed to install without issue, but when I open the WSUS Console I get the following screen:

I already checked the eventvwr and found the following errors:

Log Name:      Application
Source:        Windows Server Update Services
Date:          15.07.2014 08:52:12
Event ID:      12002
Task Category: 9
Level:         Error
Keywords:      Classic
User:          N/A
Computer:      ANBK01.andex.local
Description:
The Reporting Web Service is not working.
Event Xml:<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"><System><Provider Name="Windows Server Update Services" /><EventID Qualifiers="0">12002</EventID><Level>2</Level><Task>9</Task><Keywords>0x80000000000000</Keywords><TimeCreated SystemTime="2014-07-15T06:52:12.000Z" /><EventRecordID>1253894276</EventRecordID><Channel>Application</Channel><Computer>ANBK01.andex.local</Computer><Security /></System><EventData><Data>The Reporting Web Service is not working.</Data></EventData></Event>

Log Name:      Application
Source:        Windows Server Update Services
Date:          15.07.2014 08:52:12
Event ID:      12012
Task Category: 9
Level:         Error
Keywords:      Classic
User:          N/A
Computer:      ANBK01.andex.local
Description:
The API Remoting Web Service is not working.
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"><System><Provider Name="Windows Server Update Services" /><EventID Qualifiers="0">12012</EventID><Level>2</Level><Task>9</Task><Keywords>0x80000000000000</Keywords><TimeCreated SystemTime="2014-07-15T06:52:12.000Z" /><EventRecordID>1253894277</EventRecordID><Channel>Application</Channel><Computer>ANBK01.andex.local</Computer><Security /></System><EventData><Data>The API Remoting Web Service is not working.</Data></EventData></Event>

Log Name:      Application
Source:        Windows Server Update Services
Date:          15.07.2014 08:52:12
Event ID:      12022
Task Category: 9
Level:         Error
Keywords:      Classic
User:          N/A
Computer:      ANBK01.andex.local
Description:
The Client Web Service is not working.
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"><System><Provider Name="Windows Server Update Services" /><EventID Qualifiers="0">12022</EventID><Level>2</Level><Task>9</Task><Keywords>0x80000000000000</Keywords><TimeCreated SystemTime="2014-07-15T06:52:12.000Z" /><EventRecordID>1253894278</EventRecordID><Channel>Application</Channel><Computer>ANBK01.andex.local</Computer><Security /></System><EventData><Data>The Client Web Service is not working.</Data></EventData></Event>

Log Name:      Application
Source:        Windows Server Update Services
Date:          15.07.2014 08:52:12
Event ID:      12042
Task Category: 9
Level:         Error
Keywords:      Classic
User:          N/A
Computer:      ANBK01.andex.local
Description:
The SimpleAuth Web Service is not working.
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"><System><Provider Name="Windows Server Update Services" /><EventID Qualifiers="0">12042</EventID><Level>2</Level><Task>9</Task><Keywords>0x80000000000000</Keywords><TimeCreated SystemTime="2014-07-15T06:52:12.000Z" /><EventRecordID>1253894279</EventRecordID><Channel>Application</Channel><Computer>ANBK01.andex.local</Computer><Security /></System><EventData><Data>The SimpleAuth Web Service is not working.</Data></EventData></Event>

Log Name:      Application
Source:        Windows Server Update Services
Date:          15.07.2014 08:52:12
Event ID:      12052
Task Category: 9
Level:         Error
Keywords:      Classic
User:          N/A
Computer:      ANBK01.andex.local
Description:
The DSS Authentication Web Service is not working.
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"><System><Provider Name="Windows Server Update Services" /><EventID Qualifiers="0">12052</EventID><Level>2</Level><Task>9</Task><Keywords>0x80000000000000</Keywords><TimeCreated SystemTime="2014-07-15T06:52:12.000Z" /><EventRecordID>1253894280</EventRecordID><Channel>Application</Channel><Computer>ANBK01.andex.local</Computer><Security /></System><EventData><Data>The DSS Authentication Web Service is not working.</Data></EventData></Event>

I found multiple forum entries on the problem concerning permission issues I used the following MS article and checked and set the permissions according to it, but the problem still persists:

http://social.technet.microsoft.com/wiki/contents/articles/512.troubleshooting-guide-for-issues-where-wsus-clients-are-not-reporting-in.aspx

Can someone help me with this issue.

Thanks ion advance

Paul



SSL to Standalone Upstream WSUS Server?

$
0
0

Should configure WSUS in a high security environment. We have a WSUS Server in a DMZ that is not domain joined. a WSUS replica server in the LAN should pull updates and approvals from the WSUS server in the DMZ over SSL.

Technet, http://technet.microsoft.com/en-us/library/hh852346.aspx states that "Clients and downstream servers that are configured to use Transport Layer Security (TLS) or HTTPS must also be configured to use a fully qualified domain name (FQDN) for their upstream WSUS server."

Our upstream WSUS server is a stanalone server without a FQDN. There is no DNS suffix configured. My question: Is it possible to encrypt the traffic between the upstream and downstrem WSUS server in this case?

Thank you in advance for any help.

Franz

Update stuck in WSUS

$
0
0

Hi!

There is some threads on this forum about my problem, however i found some new aspects of it :)

The problem is that clients Windows 7 x64 SP1 Pro do not see and do not download SOME updates.

And there is a following string in WsusUpdate.log:

2013-10-10 15:41:37:369  352 578 Agent WARNING: Failed to evaluate Installed rule, updateId = {189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB}.101, hr = 80242013

I searched all over the net for solution and found on this forum that it means that update with id189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB is stuck somehow and should be declined/deleted/etc from server.

My next step was connecting to wsus database using named pipes and searching for this update id with a simple query:

use susdb

go

select * from tbprecomputedlocalizedproperty where updateid = '189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB' and shortlanguage ='en'

go

The result is:

438931 en Irish Language Pack NULL NULL 189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB 101 185397

Irish Language Pack!!! I don't need it, i want it to go away and let my clients to download updates!

But i can't because there is no such update in my wsus console - not in approved, not in declined, not in unapproved state. I tried deleting this update by id via powershell but no luck - it says that update can not be deleted.

So my question is - can i dispose of this Irish Language Pack somehow?



Client is not able to download update

$
0
0

The C:\Windows\Windowsupdate.log for the client is as follows. Can someone help me for this?

2010-12-17    08:52:17:860     824    d3c    Misc     Microsoft signed: Yes
2010-12-17    08:52:17:860     824    d3c    Setup    ***********  Setup: Checking whether self-update is required  ***********
2010-12-17    08:52:17:860     824    d3c    Setup      * Inf file: C:\WINDOWS\SoftwareDistribution\SelfUpdate\Default\wsus3setup.inf
2010-12-17    08:52:17:876     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\cdm.dll: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:892     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wuapi.dll: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:907     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wuapi.dll.mui: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:907     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wuauclt.exe: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:923     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wuaucpl.cpl: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:923     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wuaucpl.cpl.mui: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:938     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wuaueng.dll: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:938     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wuaueng.dll.mui: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:938     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wucltui.dll: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:938     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wucltui.dll.mui: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:954     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wups.dll: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:954     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wups2.dll: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:970     824    d3c    Setup    Update NOT required for C:\WINDOWS\system32\wuweb.dll: target version = 7.4.7600.226, required version = 7.4.7600.226
2010-12-17    08:52:17:970     824    d3c    Setup      * IsUpdateRequired = No
2010-12-17    08:52:19:813     824    d3c    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2010-12-17    08:52:19:813     824    d3c    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://192.168.100.157/ClientWebService/client.asmx
2010-12-17    08:52:20:407     824    d3c    PT    WARNING: Cached cookie has expired or new PID is available
2010-12-17    08:52:20:407     824    d3c    PT    Initializing simple targeting cookie, clientId = a90c9d3e-3c4d-49e3-8f74-1b4707d11b79, target group = 2003server group, DNS name = testwebserver
2010-12-17    08:52:20:407     824    d3c    PT      Server URL = http://192.168.100.157/SimpleAuthWebService/SimpleAuth.asmx
2010-12-17    08:52:25:204     824    d3c    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
2010-12-17    08:52:25:204     824    d3c    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://192.168.100.157/ClientWebService/client.asmx
2010-12-17    08:52:27:361     824    d3c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
2010-12-17    08:52:27:361     824    d3c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
2010-12-17    08:52:27:361     824    d3c    Agent    WARNING: Fail to download eula file http://192.168.100.157/Content/23/14D19C27B28CC3990260D7191F6E0FF6C7483623.txt with error 0x80244019
2010-12-17    08:52:27:361     824    d3c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
2010-12-17    08:52:27:361     824    d3c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
2010-12-17    08:52:27:361     824    d3c    Agent    WARNING: Fail to download eula file http://192.168.100.157/Content/23/14D19C27B28CC3990260D7191F6E0FF6C7483623.txt with error 0x80244019
2010-12-17    08:52:27:376     824    d3c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
2010-12-17    08:52:27:376     824    d3c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
2010-12-17    08:52:27:376     824    d3c    Agent    WARNING: Fail to download eula file http://192.168.100.157/Content/23/14D19C27B28CC3990260D7191F6E0FF6C7483623.txt with error 0x80244019
2010-12-17    08:52:27:376     824    d3c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
2010-12-17    08:52:27:376     824    d3c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
2010-12-17    08:52:27:376     824    d3c    Agent    WARNING: Fail to download eula file http://192.168.100.157/Content/BB/B763712EE43F0FD0430236022685AE9E6E5707BB.txt with error 0x80244019
2010-12-17    08:52:27:392     824    d3c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
2010-12-17    08:52:27:392     824    d3c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
2010-12-17    08:52:27:392     824    d3c    Agent    WARNING: Fail to download eula file http://192.168.100.157/Content/23/14D19C27B28CC3990260D7191F6E0FF6C7483623.txt with error 0x80244019
2010-12-17    08:52:27:392     824    d3c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
2010-12-17    08:52:27:392     824    d3c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
2010-12-17    08:52:27:392     824    d3c    Agent    WARNING: Fail to download eula file http://192.168.100.157/Content/2C/85605E276A7D714B23CCE78FACE8F915F1B7242C.txt with error 0x80244019
2010-12-17    08:52:27:704     824    d3c    Agent      * Found 0 updates and 51 categories in search; evaluated appl. rules of 919 out of 1539 deployed entities
2010-12-17    08:52:27:720     824    d3c    Agent    *********
2010-12-17    08:52:27:720     824    d3c    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2010-12-17    08:52:27:720     824    d3c    Agent    *************
2010-12-17    08:52:27:720     824    bc8    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {B14AEF4B-3F27-41F5-BF41-E943A1CECE25}]
2010-12-17    08:52:27:720     824    bc8    AU      # 0 updates detected
2010-12-17    08:52:27:720     824    bc8    AU    #########
2010-12-17    08:52:27:720     824    bc8    AU    ##  END  ##  AU: Search for updates [CallId = {B14AEF4B-3F27-41F5-BF41-E943A1CECE25}]
2010-12-17    08:52:27:720     824    bc8    AU    #############
2010-12-17    08:52:27:720     824    bc8    AU    Featured notifications is disabled.
2010-12-17    08:52:27:736     824    bc8    AU    AU setting next detection timeout to 2010-12-18 09:06:37
2010-12-17    08:52:32:720     824    d3c    Report    REPORT EVENT: {DFA7E84E-E216-49C5-8BB6-59E96C824410}    2010-12-17 08:52:27:720-0500    1    147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows Update Client successfully detected 0 updates.
2010-12-17    08:52:32:720     824    d3c    Report    REPORT EVENT: {B103238F-32CF-4551-9716-793ABC5598E5}    2010-12-17 08:52:27:720-0500    1    156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting client status.
2010-12-17    08:59:21:027     824    d3c    Report    Uploading 2 events using cached cookie, reporting URL = http://192.168.100.157/ReportingWebService/ReportingWebService.asmx
2010-12-17    08:59:21:027     824    d3c    Report    Reporter successfully uploaded 2 events.
2010-12-17    10:21:34:560     824    590    AU    AU received policy change subscription event

WSUS and SQL 2014

$
0
0

2008R2 Server

Why on Products tab  WSUS don't have "SQL 2014"?

WSUS timeout issues on SBS 2008 with WSUS 3.0

$
0
0

I am having a heck of a time using the Server Cleanup Wizard, keep getting timeouts on the Unused updates and update revisions section.

After a few hours I get the timeout message and an option to reconnect to the node.

Here is the message that I copied to the clipboard, which is also in the event viewer as event id 7042:

The WSUS administration console was unable to connect to the WSUS Server Database.
    
Verify that SQL server is running on the WSUS Server. If the problem persists, try restarting SQL.
    

System.Data.SqlClient.SqlException -- Timeout expired.  The timeout period elapsed prior to completion of the operation or the server is not responding.
The statement has been terminated.

Source
.Net SqlClient Data Provider

Stack Trace:
   at System.Windows.Forms.Control.MarshaledInvoke(Control caller, Delegate method, Object[] args, Boolean synchronous)
   at System.Windows.Forms.Control.Invoke(Delegate method, Object[] args)
   at Microsoft.UpdateServices.UI.SnapIn.Wizards.ServerCleanup.ServerCleanupWizard.OnCleanupComplete(Object sender, PerformCleanupCompletedEventArgs e)

I have tried, I believe, all of Mr. Garvin's excellent advice, like defrag the file system, run the maint. script, and do the options of the cleanup wizard one at a time.  All of the other options worked.

I have also declined all the superseded updates, checked to make sure only my products were downloaded, and made sure that updates are only in English.

I followed Mr. Garvin's excellent post at the PatchZone, and tried to read everything he has written about this subject (that was a lot of content!)  At this point I think I am stumped, what else can I try other than a re-install of WSUS, which I don't really want to do, but will if that's the only option.  Is that even possible with SBS 2008?

Thank you all in advance!

WSUS Synchronization Failed 404 , 2012 Server help!

$
0
0

Since about a week ago WSUS Synchronizations have failed . Tried uninstalling any previous windows updates. 

WebException: The request failed with HTTP status 404: Not Found.
at System.Web.Services.Protocols.SoapHttpClientProtocol.ReadResponse(SoapClientMessage message, WebResponse response, Stream responseStream, Boolean asyncCall)
   at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
   at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetAuthConfig()
   at Microsoft.UpdateServices.ServerSync.ServerSyncLib.InternetGetServerAuthConfig(ServerSyncProxy proxy, WebServiceCommunicationHelper webServiceHelper)
   at Microsoft.UpdateServices.ServerSync.ServerSyncLib.Authenticate(AuthorizationManager authorizationManager, Boolean checkExpiration, ServerSyncProxy proxy, Cookie cookie, WebServiceCommunicationHelper webServiceHelper)
   at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.SyncConfigUpdatesFromUSS()
   at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)

Tried resetting WSUS with the command line tool.

Standalone install not SCCM. 

These sites are allowed through the proxy and I can browse to them on the server.

  • http://windowsupdate.microsoft.com
  • http://*.windowsupdate.microsoft.com
  • https://*.windowsupdate.microsoft.com
  • http://*.update.microsoft.com
  • https://*.update.microsoft.com
  • http://*.windowsupdate.com
  • http://download.windowsupdate.com
  • http://download.microsoft.com
  • http://*.download.windowsupdate.com
  • http://test.stats.update.microsoft.com
  • http://ntservicepack.microsoft.com

I've Also Verified "Network Service" has read write access to the content directory. 

Only thing I can see that is changed is that download.windowsupdate.com redirects to another site (which is also unblocked.

If you reply with a link to this technet article http://technet.microsoft.com/en-us/library/cc708514(v=ws.10).aspx

 I will find you.. 

Check for updates failure 0x80244022

$
0
0

WSUS/IIS running on disconnected W2k8 R2.  Wsuscontent folder copied from connected server; export/import of metadata performed.  The server box is unable to update itself or another server connected to it.  Both produce this error:  0x80244022. 

1) Clients configured using GPO.  Update server entered as http://FQDN (also tried as http://IPAddress)
2) Stopped wu, renamed SoftwareDistribution, started wu
3) Ran fixit 50123
4) Ran WindowsUpdateDiagnostic.diagcab. Problems:
     a) Service registration is missing or corrupt   Not fixed
     b) Windows Update error 0x80070005   Not fixed
     c) Problems installing recent updates   Fixed
     d) Problems installing recent updates   Fixed
5) When selecting 'View detailed information' for the above problems:
     a) Service registration is missing or corrupt   Not fixed
          Reset service registration   Fixed
     b) Windows Update error 0x80070005   Fixed
          Resetting Windows Update data store   Fixed
6) winhttp proxy query result:  Direct access (no proxy server)



Windows 2008 R2 Server not showing update history and not detecting new updates

$
0
0

Hi Sirs,

We have a Windows 2008 R2 server which is showing an empty windows update history, and is not detecting new updates from the WSUS server. It says that the windows is up to date, no error when trying to detect new updates, but I doubt it because when I checked the installed updates menu, it shows that that the most recent update date installed was last 2013, it just stop detecting and installing updates. I've already tried the ff workarounds but to no avail:

1. restart wuauserv and bits service

2. rename/delete the software distribution folder

3. reinstalled the update agent/restarted the server

4. deleted the susclientid on the registry

Thanks in advanced for your help.

here's the windowsupdate.log:


2014-07-22    00:57:06:728     928    a34    AU    #############
2014-07-22    00:57:06:728     928    a34    AU    Successfully wrote event for AU health state:0
2014-07-22    00:57:06:728     928    a34    AU    Featured notifications is disabled.
2014-07-22    00:57:06:728     928    a34    AU    AU setting next detection timeout to 2014-07-21 20:50:56
2014-07-22    00:57:06:728     928    a34    AU    Successfully wrote event for AU health state:0
2014-07-22    00:57:06:728     928    a34    AU    Successfully wrote event for AU health state:0
2014-07-22    00:57:11:727     928    abc    Report    REPORT EVENT: {AF0753F1-F6F9-4583-87B0-A0B0AEA0C6A7}    2014-07-22 00:57:06:728+0800    1   147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows Update Client successfully detected 0 updates.
2014-07-22    00:57:11:727     928    abc    Report    REPORT EVENT: {188957AA-577F-4DC5-9CDB-2D8CFEE96670}    2014-07-22 00:57:06:728+0800    1   156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting client status.
2014-07-22    00:57:11:727     928    abc    Report    CWERReporter finishing event handling. (00000000)
2014-07-22    01:11:10:931     928    abc    Report    Uploading 2 events using cached cookie, reporting URL = http://mtp-wsus2/ReportingWebService/ReportingWebService.asmx
2014-07-22    01:11:10:947     928    abc    Report    Reporter successfully uploaded 2 events.
2014-07-22    04:50:56:736     928    1130    AU    #############
2014-07-22    04:50:56:736     928    1130    AU    ## START ##  AU: Search for updates
2014-07-22    04:50:56:736     928    1130    AU    #########
2014-07-22    04:50:56:736     928    1130    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {F40B494F-91F1-4FFB-B7A5-46CEA397AA52}]
2014-07-22    04:50:56:736     928    d08    Agent    *************
2014-07-22    04:50:56:736     928    d08    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-07-22    04:50:56:736     928    d08    Agent    *********
2014-07-22    04:50:56:736     928    d08    Agent      * Online = Yes; Ignore download priority = No
2014-07-22    04:50:56:736     928    d08    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-07-22    04:50:56:736     928    d08    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-07-22    04:50:56:736     928    d08    Agent      * Search Scope = {Machine}
2014-07-22    04:50:57:017     928    d08    Setup    Checking for agent SelfUpdate
2014-07-22    04:50:57:017     928    d08    Setup    Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
2014-07-22    04:50:57:017     928    d08    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-07-22    04:50:57:017     928    d08    Misc     Microsoft signed: Yes
2014-07-22    04:50:59:611     928    d08    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-07-22    04:50:59:611     928    d08    Misc     Microsoft signed: Yes
2014-07-22    04:50:59:611     928    d08    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-07-22    04:50:59:611     928    d08    Misc     Microsoft signed: Yes
2014-07-22    04:50:59:626     928    d08    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-07-22    04:50:59:626     928    d08    Misc     Microsoft signed: Yes
2014-07-22    04:50:59:626     928    d08    Setup    Determining whether a new setup handler needs to be downloaded
2014-07-22    04:50:59:626     928    d08    Setup    SelfUpdate handler is not found.  It will be downloaded
2014-07-22    04:50:59:626     928    d08    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    04:51:01:095     928    d08    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    04:51:01:095     928    d08    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    04:51:01:110     928    d08    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    04:51:01:110     928    d08    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    04:51:01:142     928    d08    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    04:51:01:142     928    d08    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
2014-07-22    04:51:01:860     928    d08    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2014-07-22    04:51:01:860     928    d08    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
2014-07-22    04:51:01:891     928    d08    PT    WARNING: Cached cookie has expired or new PID is available
2014-07-22    04:51:01:891     928    d08    PT    Initializing simple targeting cookie, clientId = 487b95fe-31a4-44f7-9989-bd77766ce5fa, target group = , DNS name = itg-soatrainsvr.mbtc.mgc.local
2014-07-22    04:51:01:891     928    d08    PT      Server URL = http://mtp-wsus2/SimpleAuthWebService/SimpleAuth.asmx
2014-07-22    04:51:04:485     928    d08    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
2014-07-22    04:51:04:485     928    d08    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
2014-07-22    04:51:04:875     928    d08    Agent      * Found 0 updates and 68 categories in search; evaluated appl. rules of 503 out of 777 deployed entities
2014-07-22    04:51:04:875     928    d08    Agent    *********
2014-07-22    04:51:04:875     928    d08    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-07-22    04:51:04:875     928    d08    Agent    *************
2014-07-22    04:51:04:875     928    1278    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {F40B494F-91F1-4FFB-B7A5-46CEA397AA52}]
2014-07-22    04:51:04:875     928    1278    AU      # 0 updates detected
2014-07-22    04:51:04:875     928    1278    AU    #########
2014-07-22    04:51:04:875     928    1278    AU    ##  END  ##  AU: Search for updates [CallId = {F40B494F-91F1-4FFB-B7A5-46CEA397AA52}]
2014-07-22    04:51:04:875     928    1278    AU    #############
2014-07-22    04:51:04:875     928    1278    AU    Successfully wrote event for AU health state:0
2014-07-22    04:51:04:875     928    1278    AU    Featured notifications is disabled.
2014-07-22    04:51:04:875     928    1278    AU    AU setting next detection timeout to 2014-07-22 00:38:28
2014-07-22    04:51:04:875     928    1278    AU    Successfully wrote event for AU health state:0
2014-07-22    04:51:04:875     928    1278    AU    Successfully wrote event for AU health state:0
2014-07-22    04:51:09:874     928    d08    Report    REPORT EVENT: {FE398C01-75A1-4AD8-8C43-0894FCFCE13F}    2014-07-22 04:51:04:875+0800    1   147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows Update Client successfully detected 0 updates.
2014-07-22    04:51:09:874     928    d08    Report    REPORT EVENT: {CDA386AD-6392-4C34-859E-35307BCB5EA0}    2014-07-22 04:51:04:875+0800    1   156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting client status.
2014-07-22    04:51:09:874     928    d08    Report    CWERReporter finishing event handling. (00000000)
2014-07-22    05:05:09:109     928    d08    Report    Uploading 2 events using cached cookie, reporting URL = http://mtp-wsus2/ReportingWebService/ReportingWebService.asmx
2014-07-22    05:05:09:109     928    d08    Report    Reporter successfully uploaded 2 events.
2014-07-22    08:38:28:883     928    1130    AU    #############
2014-07-22    08:38:28:883     928    1130    AU    ## START ##  AU: Search for updates
2014-07-22    08:38:28:883     928    1130    AU    #########
2014-07-22    08:38:28:883     928    1130    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {9A097F9F-88DD-4037-A4DD-48B9CC891327}]
2014-07-22    08:38:28:883     928    53c    Agent    *************
2014-07-22    08:38:28:883     928    53c    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-07-22    08:38:28:883     928    53c    Agent    *********
2014-07-22    08:38:28:883     928    53c    Agent      * Online = Yes; Ignore download priority = No
2014-07-22    08:38:28:883     928    53c    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-07-22    08:38:28:883     928    53c    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-07-22    08:38:28:883     928    53c    Agent      * Search Scope = {Machine}
2014-07-22    08:38:29:195     928    53c    Setup    Checking for agent SelfUpdate
2014-07-22    08:38:29:195     928    53c    Setup    Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
2014-07-22    08:38:29:195     928    53c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-07-22    08:38:29:195     928    53c    Misc     Microsoft signed: Yes
2014-07-22    08:38:31:804     928    53c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-07-22    08:38:31:804     928    53c    Misc     Microsoft signed: Yes
2014-07-22    08:38:31:804     928    53c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-07-22    08:38:31:820     928    53c    Misc     Microsoft signed: Yes
2014-07-22    08:38:31:820     928    53c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-07-22    08:38:31:820     928    53c    Misc     Microsoft signed: Yes
2014-07-22    08:38:31:835     928    53c    Setup    Determining whether a new setup handler needs to be downloaded
2014-07-22    08:38:31:835     928    53c    Setup    SelfUpdate handler is not found.  It will be downloaded
2014-07-22    08:38:31:835     928    53c    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    08:38:33:241     928    53c    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    08:38:33:241     928    53c    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    08:38:33:272     928    53c    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    08:38:33:272     928    53c    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    08:38:33:288     928    53c    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    08:38:33:288     928    53c    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
2014-07-22    08:38:33:991     928    53c    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2014-07-22    08:38:33:991     928    53c    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
2014-07-22    08:38:34:038     928    53c    PT    WARNING: Cached cookie has expired or new PID is available
2014-07-22    08:38:34:038     928    53c    PT    Initializing simple targeting cookie, clientId = 487b95fe-31a4-44f7-9989-bd77766ce5fa, target group = , DNS name = itg-soatrainsvr.mbtc.mgc.local
2014-07-22    08:38:34:038     928    53c    PT      Server URL = http://mtp-wsus2/SimpleAuthWebService/SimpleAuth.asmx
2014-07-22    08:38:36:616     928    53c    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
2014-07-22    08:38:36:616     928    53c    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
2014-07-22    08:38:37:022     928    53c    Agent      * Found 0 updates and 68 categories in search; evaluated appl. rules of 503 out of 777 deployed entities
2014-07-22    08:38:37:022     928    53c    Agent    *********
2014-07-22    08:38:37:022     928    53c    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-07-22    08:38:37:022     928    53c    Agent    *************
2014-07-22    08:38:37:022     928    aa8    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {9A097F9F-88DD-4037-A4DD-48B9CC891327}]
2014-07-22    08:38:37:022     928    aa8    AU      # 0 updates detected
2014-07-22    08:38:37:022     928    aa8    AU    #########
2014-07-22    08:38:37:022     928    aa8    AU    ##  END  ##  AU: Search for updates [CallId = {9A097F9F-88DD-4037-A4DD-48B9CC891327}]
2014-07-22    08:38:37:022     928    aa8    AU    #############
2014-07-22    08:38:37:022     928    aa8    AU    Successfully wrote event for AU health state:0
2014-07-22    08:38:37:022     928    aa8    AU    Featured notifications is disabled.
2014-07-22    08:38:37:022     928    aa8    AU    AU setting next detection timeout to 2014-07-22 04:15:53
2014-07-22    08:38:37:022     928    aa8    AU    Successfully wrote event for AU health state:0
2014-07-22    08:38:37:022     928    aa8    AU    Successfully wrote event for AU health state:0
2014-07-22    08:38:42:021     928    53c    Report    REPORT EVENT: {45B5AD35-C612-4C43-8FE0-DFC63B114FC9}    2014-07-22 08:38:37:022+0800    1   147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows Update Client successfully detected 0 updates.
2014-07-22    08:38:42:021     928    53c    Report    REPORT EVENT: {BA606714-0153-41BA-ADC8-78520F678D97}    2014-07-22 08:38:37:022+0800    1   156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting client status.
2014-07-22    08:38:42:021     928    53c    Report    CWERReporter finishing event handling. (00000000)
2014-07-22    08:52:41:224     928    53c    Report    Uploading 2 events using cached cookie, reporting URL = http://mtp-wsus2/ReportingWebService/ReportingWebService.asmx
2014-07-22    08:52:41:240     928    53c    Report    Reporter successfully uploaded 2 events.
2014-07-22    12:15:53:027     928    1130    AU    #############
2014-07-22    12:15:53:027     928    1130    AU    ## START ##  AU: Search for updates
2014-07-22    12:15:53:027     928    1130    AU    #########
2014-07-22    12:15:53:027     928    1130    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {9BDC1D71-5139-49D4-88F0-E2B639CE8846}]
2014-07-22    12:15:53:043     928    a58    Agent    *************
2014-07-22    12:15:53:043     928    a58    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-07-22    12:15:53:043     928    a58    Agent    *********
2014-07-22    12:15:53:043     928    a58    Agent      * Online = Yes; Ignore download priority = No
2014-07-22    12:15:53:043     928    a58    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-07-22    12:15:53:043     928    a58    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-07-22    12:15:53:043     928    a58    Agent      * Search Scope = {Machine}
2014-07-22    12:15:53:308     928    a58    Setup    Checking for agent SelfUpdate
2014-07-22    12:15:53:308     928    a58    Setup    Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
2014-07-22    12:15:53:308     928    a58    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-07-22    12:15:53:324     928    a58    Misc     Microsoft signed: Yes
2014-07-22    12:15:55:901     928    a58    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-07-22    12:15:55:901     928    a58    Misc     Microsoft signed: Yes
2014-07-22    12:15:55:901     928    a58    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-07-22    12:15:55:917     928    a58    Misc     Microsoft signed: Yes
2014-07-22    12:15:55:917     928    a58    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-07-22    12:15:55:917     928    a58    Misc     Microsoft signed: Yes
2014-07-22    12:15:55:933     928    a58    Setup    Determining whether a new setup handler needs to be downloaded
2014-07-22    12:15:55:933     928    a58    Setup    SelfUpdate handler is not found.  It will be downloaded
2014-07-22    12:15:55:933     928    a58    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    12:15:57:167     928    a58    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    12:15:57:167     928    a58    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    12:15:57:167     928    a58    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    12:15:57:167     928    a58    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    12:15:57:198     928    a58    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    12:15:57:198     928    a58    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
2014-07-22    12:15:57:917     928    a58    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2014-07-22    12:15:57:917     928    a58    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
2014-07-22    12:15:57:963     928    a58    PT    WARNING: Cached cookie has expired or new PID is available
2014-07-22    12:15:57:963     928    a58    PT    Initializing simple targeting cookie, clientId = 487b95fe-31a4-44f7-9989-bd77766ce5fa, target group = , DNS name = itg-soatrainsvr.mbtc.mgc.local
2014-07-22    12:15:57:963     928    a58    PT      Server URL = http://mtp-wsus2/SimpleAuthWebService/SimpleAuth.asmx
2014-07-22    12:16:00:572     928    a58    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
2014-07-22    12:16:00:572     928    a58    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
2014-07-22    12:16:00:932     928    a58    Agent      * Found 0 updates and 68 categories in search; evaluated appl. rules of 503 out of 777 deployed entities
2014-07-22    12:16:00:932     928    a58    Agent    *********
2014-07-22    12:16:00:932     928    a58    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-07-22    12:16:00:932     928    a58    Agent    *************
2014-07-22    12:16:00:932     928    1120    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {9BDC1D71-5139-49D4-88F0-E2B639CE8846}]
2014-07-22    12:16:00:932     928    1120    AU      # 0 updates detected
2014-07-22    12:16:00:932     928    1120    AU    #########
2014-07-22    12:16:00:932     928    1120    AU    ##  END  ##  AU: Search for updates [CallId = {9BDC1D71-5139-49D4-88F0-E2B639CE8846}]
2014-07-22    12:16:00:932     928    1120    AU    #############
2014-07-22    12:16:00:932     928    1120    AU    Successfully wrote event for AU health state:0
2014-07-22    12:16:00:932     928    1120    AU    Featured notifications is disabled.
2014-07-22    12:16:00:932     928    1120    AU    AU setting next detection timeout to 2014-07-22 08:15:22
2014-07-22    12:16:00:932     928    1120    AU    Successfully wrote event for AU health state:0
2014-07-22    12:16:00:932     928    1120    AU    Successfully wrote event for AU health state:0
2014-07-22    12:16:05:931     928    a58    Report    REPORT EVENT: {25E75367-1205-4F59-A812-02DA28BB3234}    2014-07-22 12:16:00:932+0800    1   147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows Update Client successfully detected 0 updates.
2014-07-22    12:16:05:931     928    a58    Report    REPORT EVENT: {FE1434F8-C6AF-4F87-B3DF-6E4D6C4B05FB}    2014-07-22 12:16:00:932+0800    1   156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting client status.
2014-07-22    12:16:05:931     928    a58    Report    CWERReporter finishing event handling. (00000000)
2014-07-22    12:30:05:116     928    a58    Report    Uploading 2 events using cached cookie, reporting URL = http://mtp-wsus2/ReportingWebService/ReportingWebService.asmx
2014-07-22    12:30:05:131     928    a58    Report    Reporter successfully uploaded 2 events.
2014-07-22    14:05:29:584     928    10a0    AU    Triggering AU detection through DetectNow API
2014-07-22    14:05:29:584     928    10a0    AU    Triggering Online detection (interactive)
2014-07-22    14:05:29:584     928    1130    AU    #############
2014-07-22    14:05:29:584     928    1130    AU    ## START ##  AU: Search for updates
2014-07-22    14:05:29:584     928    1130    AU    #########
2014-07-22    14:05:29:584     928    1130    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {CC67CC44-7DFB-49DE-AA83-8D6A7995ABFA}]
2014-07-22    14:05:29:584     928    8e0    Agent    *************
2014-07-22    14:05:29:584     928    8e0    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-07-22    14:05:29:584     928    8e0    Agent    *********
2014-07-22    14:05:29:584     928    8e0    Agent      * Online = Yes; Ignore download priority = No
2014-07-22    14:05:29:584     928    8e0    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-07-22    14:05:29:584     928    8e0    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-07-22    14:05:29:584     928    8e0    Agent      * Search Scope = {Machine}
2014-07-22    14:05:29:584     928    8e0    Setup    Checking for agent SelfUpdate
2014-07-22    14:05:29:584     928    8e0    Setup    Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
2014-07-22    14:05:29:584     928    8e0    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-07-22    14:05:29:600     928    8e0    Misc     Microsoft signed: Yes
2014-07-22    14:05:29:616     928    8e0    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-07-22    14:05:29:631     928    8e0    Misc     Microsoft signed: Yes
2014-07-22    14:05:29:631     928    8e0    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-07-22    14:05:29:631     928    8e0    Misc     Microsoft signed: Yes
2014-07-22    14:05:29:647     928    8e0    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-07-22    14:05:29:662     928    8e0    Misc     Microsoft signed: Yes
2014-07-22    14:05:29:662     928    8e0    Setup    Determining whether a new setup handler needs to be downloaded
2014-07-22    14:05:29:662     928    8e0    Setup    SelfUpdate handler is not found.  It will be downloaded
2014-07-22    14:05:29:662     928    8e0    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    14:05:29:662     928    8e0    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    14:05:29:662     928    8e0    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    14:05:29:694     928    8e0    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    14:05:29:694     928    8e0    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
2014-07-22    14:05:29:709     928    8e0    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
2014-07-22    14:05:29:725     928    8e0    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
2014-07-22    14:05:30:037     928    8e0    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2014-07-22    14:05:30:037     928    8e0    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
2014-07-22    14:05:30:053     928    8e0    PT    WARNING: Cached cookie has expired or new PID is available
2014-07-22    14:05:30:053     928    8e0    PT    Initializing simple targeting cookie, clientId = 487b95fe-31a4-44f7-9989-bd77766ce5fa, target group = , DNS name = itg-soatrainsvr.mbtc.mgc.local
2014-07-22    14:05:30:053     928    8e0    PT      Server URL = http://mtp-wsus2/SimpleAuthWebService/SimpleAuth.asmx
2014-07-22    14:05:35:630     928    8e0    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
2014-07-22    14:05:35:630     928    8e0    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://mtp-wsus2/ClientWebService/client.asmx
2014-07-22    14:05:36:411     928    8e0    Agent      * Found 0 updates and 68 categories in search; evaluated appl. rules of 503 out of 777 deployed entities
2014-07-22    14:05:36:411     928    8e0    Agent    *********
2014-07-22    14:05:36:411     928    8e0    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-07-22    14:05:36:411     928    8e0    Agent    *************
2014-07-22    14:05:36:411     928    1360    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {CC67CC44-7DFB-49DE-AA83-8D6A7995ABFA}]
2014-07-22    14:05:36:411     928    1360    AU      # 0 updates detected
2014-07-22    14:05:36:411     928    1360    AU    #########
2014-07-22    14:05:36:411     928    1360    AU    ##  END  ##  AU: Search for updates [CallId = {CC67CC44-7DFB-49DE-AA83-8D6A7995ABFA}]
2014-07-22    14:05:36:411     928    1360    AU    #############
2014-07-22    14:05:36:411     928    1360    AU    Successfully wrote event for AU health state:0
2014-07-22    14:05:36:411     928    1360    AU    Featured notifications is disabled.
2014-07-22    14:05:36:411     928    1360    AU    AU setting next detection timeout to 2014-07-22 10:01:01
2014-07-22    14:05:36:411     928    1360    AU    Successfully wrote event for AU health state:0
2014-07-22    14:05:36:411     928    1360    AU    Successfully wrote event for AU health state:0
2014-07-22    14:05:41:410     928    8e0    Report    REPORT EVENT: {6A2B180E-A95F-42F7-B775-5750DFFD6ECD}    2014-07-22 14:05:36:411+0800    1   147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows Update Client successfully detected 0 updates.
2014-07-22    14:05:41:410     928    8e0    Report    REPORT EVENT: {83041427-693D-4A42-AED0-E8E7BFB8E7E3}    2014-07-22 14:05:36:411+0800    1   156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting client status.
2014-07-22    14:05:41:410     928    8e0    Report    CWERReporter finishing event handling. (00000000)

wsusutil export

$
0
0

we're exporting data and metadata to an offline wsus. The initial export and import ran fine and the offline wsus server is running fine. We then did an incremental backup of the wsuscontent directory in preparation for the metadata export. When we executed the "wsusutil export export.xml.gz we received the following error message:

"Fatal error: the gzip stream can't contain more than 4 GB".

The export command is EXACTLY the same command we used when we performed the initial export. Any ideas?

Windows 2012 Server Windows Update

$
0
0

Hi all,

I have Windows 2012 Servers that take a long time to do windows update.

All servers are not connected to the internet and I have a WSUS servers where are the 2012 servers are connected to.

Whenever I click on Windows update. The server will sort of HANGED. Open up the windows update log and found it's trying to get the update from the internet world.

2014-07-2611:42:53:6799327e8MiscWARNING: Send failed with hr = 80072ee2.
2014-07-2611:42:53:6799327e8MiscWARNING: Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <None>
2014-07-2611:42:53:6799327e8MiscWARNING: Send request failed, hr:0x80072ee2
2014-07-2611:42:53:6799327e8MiscWARNING: WinHttp: SendRequestUsingProxy failed for <http://ds.download.windowsupdate.com/v11/2/windowsupdate/redir/v6-wuredir.cab>. error 0x80072ee2
2014-07-2611:42:53:6799327e8MiscWARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed. error 0x80072ee2
2014-07-2611:42:53:6799327e8MiscWARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80072ee2
2014-07-2611:42:53:6799327e8MiscWARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072ee2

I leave the W2012 Server for a while and about 15-20 mins. It will find my WSUS and get the updates accordingly..

I am using the same policy WSUS setting on the rest of my servers and do not encounter such issue.

Anyone know what is wrong or how can I stop the server from trying to get the update from the internet?

Thanks!

WSUS GPO can't apply to client

$
0
0

I have set up the WSUS GPO of the Server 2012, when I go to client and run gpupdate /force, but the gpo can't apply of the client.

So I run the gpresult /r, that have the result:

-----------------------------
     MIS Group Policy Object
     Spicework port policy
     Folder Redirection
     Office Printer

 The following GPOs were not applied because they were filtered out
 -------------------------------------------------------------------
     Default Domain Policy
         Filtering:  Not Applied (Empty)

     WSUS
         Filtering:  Denied (Security)

     Local Group Policy
         Filtering:  Not Applied (Empty)

Very unresponsive UI on WSUS 3.0 server

$
0
0
I have a Windows 2008 R2 server running WSUS 3.0 SP2 and I have noticed that the performance when trying to pull up reports is just incredibly painful and sometimes it can't pull up a report on a machine at all.  I ran the server cleanup and that removed about 14GB worth of old unneeded updates, which freed up some space.  I also tried the reindex the WSUS DB powershell script that some people suggested in other threads and it did make it a bit more responsive, but it hasn't completely eliminated timeouts when opening reports on some clients.  The WSUS DB is 12GB, which for ~25 clients sounds like an awful lot of space.  I tried connecting to it with a local SQL Server instance to see if it was possible to shrink the DB, but that didn't make much of a dent as there didn't appear to be much whitespace to remove.  I started and stopped the Windows Internal Database as I have seen periodically that makes a difference in performance with MS SQL Server, but that didn't make a huge difference either.  The server only has 4GB of RAM.  Would bumping it up to 8-16GB of RAM make much of a difference?
Viewing all 12331 articles
Browse latest View live


Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>