Quantcast
Channel: WSUS Forum
Viewing all 12331 articles
Browse latest View live

Unable to Uninstall Update KB3102429

$
0
0

Hi,

I am unable to uninstall Windows Update KB3102429 from Windows Server 2012. 

Getting Error "Update for Microsoft Windows (KB3102429) is required by  your computer and cannot be uninstalled".

We need to remove this Update to run crystal report. 

Can any one help me ?

Thanks


Windows Server 2008 R2 SP1 Security Updates Latest Release Date

$
0
0

Dear Friends,

I would like to know how do I check the latest released date of Microsoft Windows Server 2008 R2 SP1 security updates.

On which date or month Microsoft last released security updates for Windows Server 2008 R2 SP1.

Is there any way to get the notification by email when Microsoft releases security updates, Patches or Hot fixes.

I would really appreciate is anyone can provide me the link where to check latest security update releases of Windows Server 2008 R2 SP1.

Thanks,

Post Installation Tasks of WSUS fail

$
0
0

After a nightmare of trying to install and uninstall SQL Server 2008 R2 on my DC, WSUS broke. 

I edited the registry to get rid of the SQL Server stuff and uninstalled WSUS and rebooted. 

I reinstalled WSUS using WID database and now I get the following error at the end of the log file during post-installation:

016-05-18 12:09:28  Microsoft.UpdateServices.Administration.CommandException: Failed to set service MSSQL$MICROSOFT##WID to automatic start
   at Microsoft.UpdateServices.Administration.ConfigureDB.StartAndConfigWidService()
   at Microsoft.UpdateServices.Administration.ConfigureDB.Configure()
   at Microsoft.UpdateServices.Administration.PostInstall.Run()
   at Microsoft.UpdateServices.Administration.PostInstall.Execute(String[] arguments)
Fatal Error: Failed to set service MSSQL$MICROSOFT##WID to automatic start


Susan E. Russel

Windows update error 80072EFD on clients on new WSUS 3.0 SP2 install

$
0
0

My previous post seems to have disappeared into the void in terms of getting responses, and in any case, the reason for the original post has evolved. This is the original post..

https://social.technet.microsoft.com/Forums/windowsserver/en-US/69754e08-7a2a-4481-bd0b-4edd725ff960/wsus-30-server-broken-cannot-sync-recognise-clients-clear-updates?forum=winserverwsus

I apologize if this is not the right way to do it, but I'm getting frustrated and anxious to resolve this issue and I really need your help.

The situation is this. When I install the Win 2008 R2/WSUS/IIS etc at home everything works fine. When I take the hard disk and install it in another server at another location all clients get the error 80072EFD.

I've uninstalled the WSUS role (including database, content etc) at the target location and reinstalled it to no avail, then brought that drive back home and tried it to find that it works perfectly.

The only difference hardware wise between the two servers is the Video card.

Network wise, I have a 192.168.1.1/24 network, whereas it is 192.168.0.1/24 at the other location. Infrastructure wise, things are essentially identical. 8 port gigabit switches from D-Link and/or Netgear and nothing else in between.

I use NBN fiber at home and the other location uses ADSL 2+

I've run the solarwinds diagnostic utility and I've checked my server settings via the WSUS documentation.

I've tried with firewalls turned off on clients and on server.

I can only go to the other location on the weekend, hence delays in responding.

I've been holding off plugging in my valid Win 2008 R2 Technet key because things aren't working properly. I don't want to waste the activation/key.

Please help.

Thanks

Tanya

Update: I have moved hist entire network to 192.168.1.1/24. Reconfigured all static devices, and set the server to exactly the IP address it had here at my place. Disabled firewall and malware bytes on server and client.

wuauclt /reportnow does not error, but the server does not detect the PC, and attempts to check for updates still get 80072efd. So got the SSD dropped off here, and tried again. It works perfectly.

God this is sooo frustrating :(


The WSUS Content Directory is not accessible

$
0
0

Single Primary Site running SCCM 2012 R2 on Windows Server 2012 R2.

WSUS on same server using Ports Http: 8530 and HTTPS: 8531 and is using SUSDB as database.

No Proxy in place.

Everything was working and issue started last week. No changes were made.

We get following WSUS errors 

System.net.webException: The request failed with HTTP status 503: Sevice Unavailable~~~ Failures reported during periodic health check by the WSUS server. will retry check in 1 mins

I then ran the WSUSutil.exe checkhealth command and in event viewer, get a few different errors:

Event ID 13042: Self-update is not working.

Event ID 10021: The catalog was last synchronized successfully 1 or more days ago.

Event ID 12002: The Reporting Web Service is not working.

Event ID 12012: The API Remoting Web Service is not working.

Event ID 12032: The Server Synchronization Web Service is not working.

Event ID 12022: The Client Web Service is not working.

Event ID 12042: The SimpleAuth Web Service is not working.

Event ID 12052: The DSS Authentication Web Service is not working.

Event ID 12072: The WSUS content directory is not accessible.

System.Net.WebException: The remote server returned an error: (503) Server Unavailable.

   at System.Net.HttpWebRequest.GetResponse()

   at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType type, HealthEventLogger logger)

Please suggest.

WSUS client windows 7 reporting issue

$
0
0

Dear Team,

I Installed WSUS update server on windows 2012 R2 Std. and I am using Windows 7, windows 8.1 & Windows 10 client.

But only windows 8.1 and windows 10 client reporting to WSUS server and window 7 not reporting to Server

 Please help me..

Windows 7 windowslog file.

2016-05-3009:51:05:495 940fd0Misc===========  Logging initialized (build: 7.6.7600.320, tz: +0530)  ===========

2016-05-3009:51:05:526 940fd0Misc  = Process: C:\Windows\system32\svchost.exe
2016-05-3009:51:05:526 940fd0Misc  = Module: c:\windows\system32\wuaueng.dll
2016-05-3009:51:05:495 940fd0Service*************
2016-05-3009:51:05:526 940fd0Service** START **  Service: Service startup
2016-05-3009:51:05:526 940fd0Service*********
2016-05-3009:51:05:635 940fd0Agent  * WU client version 7.6.7600.320
2016-05-3009:51:05:635 940fd0Agent  * Base directory: C:\Windows\SoftwareDistribution
2016-05-3009:51:05:651 940fd0Agent  * Access type: No proxy
2016-05-3009:51:05:651 940fd0Agent  * Network state: Connected
2016-05-3009:51:51:293 940fd0ReportCWERReporter::Init succeeded
2016-05-3009:51:51:293 940fd0Agent***********  Agent: Initializing Windows Update Agent  ***********
2016-05-3009:51:51:293 940fd0Agent  * Prerequisite roots succeeded.
2016-05-3009:51:51:293 940fd0Agent***********  Agent: Initializing global settings cache  ***********
2016-05-3009:51:51:309 940fd0Agent  * WSUS server: http://DNS2012:8530
2016-05-3009:51:51:309 940fd0Agent  * WSUS status server: http://DNS2012:8530
2016-05-3009:51:51:309 940fd0Agent  * Target group: Unassigned Computers
2016-05-3009:51:51:309 940fd0Agent  * Windows Update access disabled: No
2016-05-3009:51:51:309 940fd0DnldMgrDownload manager restoring 0 downloads
2016-05-3009:51:51:324 940fd0DnldMgrRetrieved 11 persisted download jobs
2016-05-3009:51:51:324 940fd0DnldMgr***********  DnldMgr: Restoring download [no. 0]  ***********
2016-05-3009:51:51:324 940fd0DnldMgr  * BITS JobId = {8E14120C-F20F-4A23-9BC2-14D55ACAC33A}
2016-05-3009:51:51:324 940fd0DnldMgr  * ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}
2016-05-3009:51:51:340 940fd0DnldMgr  * UpdateId = {5AF1680E-4A14-4DC5-8A60-BDA7370E6D68}.200
2016-05-3009:51:51:481 940fd0DnldMgr  * Restored download job.
#########  AU: Initializing Automatic Updates  ###########
2016-05-3009:51:52:669 940fd0AUAU setting next detection timeout to 2016-05-30 04:21:52
2016-05-3009:51:52:669 940fd0AUAU setting next sqm report timeout to 2016-05-30 04:21:52
2016-05-3009:51:52:669 940fd0AU  # WSUS server: http://DNS2012:8530
2016-05-3009:51:52:669 940fd0AU  # Detection frequency: 12
2016-05-3009:51:52:669 940fd0AU  # Target group: Unassigned Computers
2016-05-3009:51:52:669 940fd0AU  # Approval type: Scheduled (Policy)
2016-05-3009:51:52:669 940fd0AU  # Scheduled install day/time: Every day at 13:00
2016-05-3009:51:52:669 940fd0AU  # Auto-install minor updates: Yes (User preference)
2016-05-3009:51:52:669 940fd0AU  # Will interact with non-admins (Non-admins are elevated (Policy))
2016-05-3009:51:52:684 940fd0AUInitializing featured updates
2016-05-3009:51:52:684 940fd0AUFound 0 cached featured updates
2016-05-3009:51:52:825 940fd0Report***********  Report: Initializing static reporting data  ***********
2016-05-3009:51:52:825 940fd0Report  * OS Version = 6.1.7601.1.0.65792
2016-05-3009:51:52:825 940fd0Report  * OS Product Type = 0x00000030
2016-05-3009:51:52:841 940fd0Report  * Computer Brand = Hewlett-Packard
2016-05-3009:51:52:841 940fd0Report  * Computer Model = HP ProDesk 400 G2 MT
2016-05-3009:51:52:856 940fd0Report  * Bios Revision = L02 v02.39
2016-05-3009:51:52:856 940fd0Report  * Bios Name = Default System BIOS
2016-05-3009:51:52:856 940fd0Report  * Bios Release Date = 2014-12-11T00:00:00
2016-05-3009:51:52:856 940fd0Report  * Locale ID = 1033
2016-05-3009:51:52:887 940fd0AUSuccessfully wrote event for AU health state:1
2016-05-3009:51:52:887 940fd0AUSuccessfully wrote event for AU health state:1
2016-05-3009:51:52:887 940fd0AUAU finished delayed initialization
2016-05-3009:51:52:887 940fd0AUAU setting next sqm report timeout to 2016-05-31 04:21:52
2016-05-3009:51:52:887 940fd0AU#############
2016-05-3009:51:52:887 940fd0AU## START ##  AU: Search for updates
2016-05-3009:51:52:887 940fd0AU#########
2016-05-3009:51:52:950 940fd0AU<<## SUBMITTED ## AU: Search for updates [CallId = {9770B439-ECF7-455B-A1D3-0EE898D2E555}]
2016-05-3009:51:53:138 940d20PTWARNING: Cached cookie has expired or new PID is available
2016-05-3009:51:53:138 940d20PTInitializing simple targeting cookie, clientId = d189aee9-c7f4-4a58-833a-999c052f514c, target group = Unassigned Computers, DNS name = atulb.mpcsdev3.com
2016-05-3009:51:53:138 940d20PT  Server URL = http://DNS2012:8530/SimpleAuthWebService/SimpleAuth.asmx
2016-05-3009:51:56:264 940d20PTWARNING: GetCookie failure, error = 0x8024400D, soap client error = 7, soap error code = 300, HTTP status code = 200
2016-05-3009:51:56:264 940d20PTWARNING: SOAP Fault: 0x00012c
2016-05-3009:51:56:264 940d20PTWARNING:     faultstring:Fault occurred
2016-05-3009:51:56:264 940d20PTWARNING:     ErrorCode:ConfigChanged(2)
2016-05-3009:51:56:264 940d20PTWARNING:     Message:(null)
2016-05-3009:51:56:264 940d20PTWARNING:     Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetCookie"
2016-05-3009:51:56:264 940d20PTWARNING:     ID:2e498158-6bc6-4631-8cd8-27791486e76f
2016-05-3009:51:56:311 940d20PTWARNING: Cached cookie has expired or new PID is available
2016-05-3009:51:56:311 940d20PTInitializing simple targeting cookie, clientId = d189aee9-c7f4-4a58-833a-999c052f514c, target group = Unassigned Computers, DNS name = atulb.mpcsdev3.com
2016-05-3009:51:56:311 940d20PT  Server URL = http://DNS2012:8530/SimpleAuthWebService/SimpleAuth.asmx
2016-05-3009:51:56:404 940d20ReportUploading 1 events using cached cookie, reporting URL = http://DNS2012:8530/ReportingWebService/ReportingWebService.asmx
2016-05-3009:51:56:436 940d20ReportReporter successfully uploaded 1 events.
2016-05-3009:51:56:436 940d20Agent*************
2016-05-3009:51:56:436 940d20Agent** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-05-3009:51:56:436 940d20Agent*********
2016-05-3009:51:56:436 940d20Agent  * Online = No; Ignore download priority = No
2016-05-3009:51:56:436 940d20Agent  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-05-3009:51:56:436 940d20Agent  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-05-3009:51:56:436 940d20Agent  * Search Scope = {Machine}
2016-05-3009:51:56:545 940d20Agent  * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
2016-05-3009:51:56:561 940d20Agent*********
2016-05-3009:51:56:561 940d20Agent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-05-3009:51:56:561 940d20Agent*************
2016-05-3009:51:56:561 940d18AU>>##  RESUMED  ## AU: Search for updates [CallId = {9770B439-ECF7-455B-A1D3-0EE898D2E555}]
2016-05-3009:51:56:561 940d18AU  # 0 updates detected
2016-05-3009:51:56:561 940d18AU#########
2016-05-3009:51:56:561 940d18AU##  END  ##  AU: Search for updates [CallId = {9770B439-ECF7-455B-A1D3-0EE898D2E555}]
2016-05-3009:51:56:561 940d18AU#############
2016-05-3009:51:56:561 940d18AUFeatured notifications is disabled.
2016-05-3009:51:56:561 940d18AUSuccessfully wrote event for AU health state:1
2016-05-3009:51:56:561 940fd0AU#############
2016-05-3009:51:56:561 940fd0AU## START ##  AU: Search for updates
2016-05-3009:51:56:561 940fd0AU#########
2016-05-3009:51:56:561 940fd0AU<<## SUBMITTED ## AU: Search for updates [CallId = {BAB3790F-22BE-4465-B0E2-EEC8A71A7EAA}]
2016-05-3009:51:56:561 940d20Agent*************
2016-05-3009:51:56:561 940d20Agent** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-05-3009:51:56:561 940d20Agent*********
2016-05-3009:51:56:561 940d20Agent  * Online = Yes; Ignore download priority = No
2016-05-3009:51:56:561 940d20Agent  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-05-3009:51:56:561 940d20Agent  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-05-3009:51:56:561 940d20Agent  * Search Scope = {Machine}
2016-05-3009:51:56:561 940d20SetupChecking for agent SelfUpdate
2016-05-3009:51:56:561 940d20SetupClient version: Core: 7.6.7600.320  Aux: 7.6.7600.320
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: WinHttpQueryHeaders(WINHTTP_QUERY_LAST_MODIFIED) failed. error 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: GetServerFileTime failed. error 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: IsFileToBeDownloaded failed with 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: WinHttpQueryHeaders(WINHTTP_QUERY_LAST_MODIFIED) failed. error 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: GetServerFileTime failed. error 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: IsFileToBeDownloaded failed with 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: WinHttpQueryHeaders(WINHTTP_QUERY_LAST_MODIFIED) failed. error 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: GetServerFileTime failed. error 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: IsFileToBeDownloaded failed with 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: WinHttpQueryHeaders(WINHTTP_QUERY_LAST_MODIFIED) failed. error 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: GetServerFileTime failed. error 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: IsFileToBeDownloaded failed with 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072f76
2016-05-3009:51:56:576 940d20MiscWARNING: DownloadFileInternal failed for http://DNS2012:8530/selfupdate/wuident.cab: error 0x80072f76
2016-05-3009:51:56:576 940d20SetupFATAL: DownloadCab failed, err = 0x80072F76

#############################################

Aggrevated with WSUS for a month now - still not working

$
0
0

You name it, I've tried it. Got the latest WSUS installed on Server2012R2 and about a month ago, for no apparent reason, workstations no longer report to the WSUS server. I've been through these forums and elsewhere on the Internet trying different things, and nothing has changed the fact that workstations will not report to the WSUS server. I've even uninstalled WSUS, removed all traces of it  from the hard drive and the registry, and reinstall it. No change. I get get from the windows update site online with no issues. but not from the WSUS server. There is one error message I'm getting for which I find nothing on it, so I don't even know why it occurs.

When I run the Windows Update diag tool on a workstation, everything is "fixed" except for this entry:

Windows Update Error 0x80072EFD (<date> T <time>)    NOT FIXED

Any takers out there? Yes, I can connect to http://server:8530/SelfUpdate/wuident.cab and download it with no issues.

WSUS keeps crashing after KB3159706

$
0
0

Hi, I still have problems with my WSUS server running on Windows Server 2012 R2.

KB3148812 broke my WSUS, like everyone, so I waited for KB3159706 to be released.

After installing KB3159706 and doing the manual steps, my WSUS seemed to work fine at first sight, but in fact it's not...

Without doing anything particular, the WSUS seems to crash randomly 2/3 times per day : when it happens I can't connect to the WSUS console, and the clients can't reach the WSUS server to get updates, that's really annoying...

The only thing I can do is reboot the Windows Server to get the WSUS back, but you understand that I can't do that every 4 hours...


BRAND NEW WORKSTATIONS DON'T CHECK FOR UPDATES

$
0
0

WINDOWS 7 WORKSTATIONS / SETUP FOR A WEEK NOW / SHOW AS "NOT REPORTED YET.: IN WSUS.....?????  lOGFILE SHOWS.....

2016-05-2423:02:58:8681424854COMAPI - Updates found = 26739
2016-05-2423:02:58:8681424854COMAPI---------
2016-05-2423:02:58:8681424854COMAPI--  END  --  COMAPI: Search [ClientId = CDM]
2016-05-2423:02:58:8681424854COMAPI-------------
2016-05-2423:02:59:41414244e8CDMCDM: Download updated files succeeded
2016-05-2423:03:38:331104412a4AUTriggering AU detection through DetectNow API
2016-05-2423:03:38:331104412a4AUTriggering Online detection (non-interactive)
2016-05-2423:03:38:3311044becAU#############
2016-05-2423:03:38:3311044becAU## START ##  AU: Search for updates
2016-05-2423:03:38:3311044becAU#########
2016-05-2423:03:38:3311044becAU<<## SUBMITTED ## AU: Search for updates [CallId = {632BCBE3-514C-45F1-9709-810776FEB16B}]
2016-05-2423:03:38:331104417dcAgent*************
2016-05-2423:03:38:331104417dcAgent** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-05-2423:03:38:331104417dcAgent*********
2016-05-2423:03:38:331104417dcAgent * Online = Yes; Ignore download priority = No
2016-05-2423:03:38:331104417dcAgent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-05-2423:03:38:331104417dcAgent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-05-2423:03:38:331104417dcAgent * Search Scope = {Machine}
2016-05-2423:03:38:331104417dcSetupChecking for agent SelfUpdate
2016-05-2423:03:38:331104417dcSetupClient version: Core: 7.6.7600.320  Aux: 7.6.7600.320
2016-05-2423:03:40:796104417dcMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2016-05-2423:03:40:811104417dcMiscMicrosoft signed: NA
2016-05-2423:03:40:811104417dcMiscWARNING: Cab does not contain correct inner CAB file.
2016-05-2423:03:40:811104417dcMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2016-05-2423:03:40:811104417dcMiscMicrosoft signed: NA
2016-05-2423:03:40:811104417dcSetupWuident for the managed service is valid but not quorum-signed. Skipping selfupdate.
2016-05-2423:03:40:811104417dcSetupSkipping SelfUpdate check based on the /SKIP directive in wuident
2016-05-2423:03:40:811104417dcSetupSelfUpdate check completed.  SelfUpdate is NOT required.
2016-05-2423:03:40:983104417dcPT+++++++++++  PT: Synchronizing server updates  +++++++++++
2016-05-2423:03:40:983104417dcPT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://king1:8530/ClientWebService/client.asmx
2016-05-2423:03:40:983104417dcPTWARNING: Cached cookie has expired or new PID is available
2016-05-2423:03:40:983104417dcPTInitializing simple targeting cookie, clientId = b0a14b48-6127-4b2a-81e7-878526cf4468, target group = Training, DNS name = f5qzn22.mtc.mansion.rosewoodhotels.local
2016-05-2423:03:40:983104417dcPT Server URL = http://king1:8530/SimpleAuthWebService/SimpleAuth.asmx
2016-05-2423:04:42:072104417dcMiscWARNING: Send failed with hr = 80072ee2.
2016-05-2423:04:42:072104417dcMiscWARNING: SendRequest failed with hr = 80072ee2. Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <>
2016-05-2423:04:42:072104417dcMiscFATAL: SOAP/WinHttp - SendRequest: SendRequestUsingProxy failed. error 0x80072ee2
2016-05-2423:04:42:072104417dcPT + Last proxy send request failed with hr = 0x80072EE2, HTTP status code = 0
2016-05-2423:04:42:072104417dcPT + Caller provided credentials = No
2016-05-2423:04:42:072104417dcPT + Impersonate flags = 0
2016-05-2423:04:42:072104417dcPT + Possible authorization schemes used = 
2016-05-2423:04:42:072104417dcPTWARNING: SyncUpdates failure, error = 0x80072EE2, soap client error = 5, soap error code = 0, HTTP status code = 200
2016-05-2423:04:42:072104417dcPTWARNING: PTError: 0x80072ee2
2016-05-2423:04:42:072104417dcPTWARNING: SyncUpdates_WithRecovery failed.: 0x80072ee2
2016-05-2423:04:42:072104417dcPTWARNING: Sync of Updates: 0x80072ee2
2016-05-2423:04:42:072104417dcPTWARNING: SyncServerUpdatesInternal failed: 0x80072ee2
2016-05-2423:04:42:072104417dcAgent * WARNING: Failed to synchronize, error = 0x80072EE2
2016-05-2423:04:42:072104417dcAgent * WARNING: Exit code = 0x80072EE2
2016-05-2423:04:42:072104417dcAgent*********
2016-05-2423:04:42:072104417dcAgent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-05-2423:04:42:072104417dcAgent*************
2016-05-2423:04:42:072104417dcAgentWARNING: WU client failed Searching for update with error 0x80072ee2
2016-05-2423:04:42:1041044660AU>>##  RESUMED  ## AU: Search for updates [CallId = {632BCBE3-514C-45F1-9709-810776FEB16B}]
2016-05-2423:04:42:1041044660AU # WARNING: Search callback failed, result = 0x80072EE2
2016-05-2423:04:42:1041044660AU # WARNING: Failed to find updates with error code 80072EE2
2016-05-2423:04:42:1041044660AU#########
2016-05-2423:04:42:1041044660AU##  END  ##  AU: Search for updates [CallId = {632BCBE3-514C-45F1-9709-810776FEB16B}]
2016-05-2423:04:42:1041044660AU#############
2016-05-2423:04:42:1041044660AUSuccessfully wrote event for AU health state:0
2016-05-2423:04:42:1041044660AUAU setting next detection timeout to 2016-05-25 09:04:42
2016-05-2423:04:42:1041044660AUSetting AU scheduled install time to 2016-05-25 08:00:00
2016-05-2423:04:42:1041044660AUSuccessfully wrote event for AU health state:0
2016-05-2423:04:42:1041044660AUSuccessfully wrote event for AU health state:0
2016-05-2423:04:47:080104417dcReportREPORT EVENT: {4860B438-D588-459B-8AFF-74B0B802001E}2016-05-24 23:04:42:072-05001148101{00000000-0000-0000-0000-000000000000} 080072ee2 AutomaticUpdatesFailureSoftware SynchronizationWindows Update Client failed to detect with error 0x80072ee2.
2016-05-2423:04:47:111104417dcReportCWERReporter::HandleEvents - WER report upload completed with status 0x8
2016-05-2423:04:47:111104417dcReportWER Report sent: 7.6.7600.320 0x80072ee2 00000000-0000-0000-0000-000000000000 Scan 101 Managed
2016-05-2423:04:47:111104417dcReportCWERReporter finishing event handling. (00000000)
2016-05-2423:19:03:292104417dcPTWARNING: Cached cookie has expired or new PID is available
2016-05-2423:19:03:292104417dcPTInitializing simple targeting cookie, clientId = b0a14b48-6127-4b2a-81e7-878526cf4468, target group = Training, DNS name = f5qzn22.mtc.mansion.rosewoodhotels.local
2016-05-2423:19:03:292104417dcPT Server URL = http://king1:8530/SimpleAuthWebService/SimpleAuth.asmx
2016-05-2423:19:05:880104417dcReportUploading 1 events using cached cookie, reporting URL = http://king1:8530/ReportingWebService/ReportingWebService.asmx
2016-05-2423:19:05:885104417dcReportReporter successfully uploaded 1 events.


Can WSUS configure when clients may download patches?

$
0
0

We have an issue where if our clients download updates during office hours, they choke off the limited bandwidth they have.  I'm wondering if there's a way for WSUS to give clients a schedule of when it's okay to download updates?  We'd like them to only download updates in the evening or at night.  

The other option may be preventing them from downloading while at certain IPs or subnets.  But that seems more complicated.  


---------- Ron Bass Systems Engineer, Confie Seguros

search in UPDATES

$
0
0

Hi,

when performing Search under All Updates node, does the result show MS Catalog search or WSUS DB search?


--- When you hit a wrong note its the next note that makes it good or bad. --- Miles Davis

Problem with folder permission WSUS

$
0
0

Good morning,

Someonehas been throughthisfolderaccess issue.
I've givenfull permission tothenetwork service andwsusadministratorsand stillcontinue withthis error.

ID error 12072.

<textarea autocomplete="off" class="goog-textarea short_text" dir="ltr" disabled="disabled" id="source-is" name="text-is" spellcheck="false" style="overflow-y:hidden;overflow-x:auto;box-sizing:border-box;padding-bottom:32px;height:69px;padding-right:20px;" wrap="SOFT"></textarea>

The WSUScontent directoryis not accessible.
System.Net.WebException:The remote server returnedan error: (401)Unauthorized.
    inSystem.Net.HttpWebRequest.GetResponse()
    inMicrosoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingTypetype,HealthEventLoggerlogger)




cumulative security update IE11 question

$
0
0

after pushing IE11 through WSUS in status report I see latest Cumulative KB is downloaded (so should be installed under next cycle). Just to be sure... I guess that all other Cumulative KB that approved for install will not be pushed to the machine.

Correct?

Also, probably all previous Cumulatives could be declined now (of course after insuring that IE11 is installed on all the machines).


--- When you hit a wrong note its the next note that makes it good or bad. --- Miles Davis


Windows Update Agent fails to detect all updates (WSUS with SCCM)

$
0
0

Howdy

So we have recently integreated WSUS into SCCM 2012, meaning that WSUS updates are now provided through Software Centre instead of through the Windows Update client. This is working as expected.

However, we are utilising Kaspersky Endpoint Security, which has a Software Vulnerability Report function that we are keen to use. This would notify us of any machines that fail to have all their updates installed. This is a simpler interface than using SCCM Reporting. When searching for vulnerabilities, Kaspersky's network agent uses the Windows Update Agent service to check into WSUS for updates. This function isn't working correctly on our clients, as it manages to detect ONE single Windows Update. I have an example transcript taken from the WindowsUpdate.log file below:

========================================================================================
2016-05-25 16:10:37:917 884 7ac Agent *************
2016-05-25 16:10:37:917 884 7ac Agent ** START ** Agent: Finding updates [CallerId = Kaspersky Network Agent]
2016-05-25 16:10:37:917 884 7ac Agent *********
2016-05-25 16:10:37:917 884 7ac Agent * Include potentially superseded updates
2016-05-25 16:10:37:917 884 7ac Agent * Online = Yes; Ignore download priority = No
2016-05-25 16:10:37:917 884 7ac Agent * Criteria = "IsInstalled = 0 AND IsHidden = 0 OR IsInstalled = 1"
2016-05-25 16:10:37:917 884 7ac Agent * ServiceID = {00000000-0000-0000-0000-000000000000} Third party service
2016-05-25 16:10:37:917 884 7ac Agent * Search Scope = {Machine}
2016-05-25 16:10:37:918 3988 d5c COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = Kaspersky Network Agent]
2016-05-25 16:10:38:826 884 7ac PT +++++++++++ PT: Synchronizing server updates +++++++++++
2016-05-25 16:10:38:826 884 7ac PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL=
http://OURSCCMSERVER:8530/ClientWebService/client.asmx 
2016-05-25 16:10:57:878 884 7ac PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2016-05-25 16:10:57:878 884 7ac PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL=
http://OURSCCMSERVER:8530/ClientWebService/client.asmx 
2016-05-25 16:10:57:986 884 7ac Agent * Added update {80FEF50B-F349-4BDC-B781-FF8CD6D913F6}.201 to search result
2016-05-25 16:10:57:986 884 7ac Agent * Found 1 updates and 123 categories in search; evaluated appl. rules of 1372 out of 2495 deployed entities
2016-05-25 16:10:57:988 884 7ac Agent *********
2016-05-25 16:10:57:988 884 7ac Agent ** END ** Agent: Finding updates [CallerId = Kaspersky Network Agent]
2016-05-25 16:10:57:988 884 7ac Agent *************
2016-05-25 16:10:57:990 3988 6b0 COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = Kaspersky Network Agent]
2016-05-25 16:10:57:991 3988 6b0 COMAPI - Updates found = 1
2016-05-25 16:10:57:991 3988 6b0 COMAPI ---------
2016-05-25 16:10:57:991 3988 6b0 COMAPI -- END -- COMAPI: Search [ClientId = Kaspersky Network Agent]
2016-05-25 16:10:57:991 3988 6b0 COMAPI -------------
========================================================================================

As you can see from this transcript only 1 update was found. This was taken from a test machine that was recently built and was missing a large chunk of updates.

We also have in our infrastructure devices running traditional WSUS on a different server (without SCCM), which are reporting in fine and Kaspersky detects missing updates correctly.

We have determined with Kaspersky that the issue lies with the Windows Update agent and not their software. Can anyone advise if the issue is because we are using SCCM for updates (and so the Windows Update agent doesn't perform correctly) or that there is another issue that can be resolved?

Russell

Clients reporting, but not detecting updates after KB3159706

$
0
0

Hi All!

This bloomin' update has caused me pain on 4 of my R2 servers. All were fixed by removal or post installation tasks, except one.

Clients are reporting in the console regularly (and are listed as needing updates), but windows update on all the clients is simply ticked green, reporting no new updates are available. The update logs are fruitless, simply saying "0 updates available in 0 categories".

Have 100 percent done post installation tasks for KB3159706 - also tried editing web.config file even though I'm not using SSL. Have also un/re-installed KB3159706, but to no avail.

Connectivity to the iuident.cab file works, and I'm prompted for download.

Logs on both server and client show nothing of note.

Any thoughts/further tests to narrow down issue would be greatly appreciated!

Many thanks,

Doug.

Here is client update log for perusal:

==================================

2016-06-0709:18:03:68916082044AU#############
2016-06-0709:18:03:68916082044AU## START ##  AU: Search for updates
2016-06-0709:18:03:68916082044AU#########
2016-06-0709:18:03:69016082044AU<<## SUBMITTED ## AU: Search for updates [CallId = {4FEE946B-1813-4E0C-B82D-48512CD088A1}]
2016-06-0709:18:03:702160820dcAgent*************
2016-06-0709:18:03:702160820dcAgent** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-06-0709:18:03:702160820dcAgent*********
2016-06-0709:18:03:702160820dcAgent * Online = No; Ignore download priority = No
2016-06-0709:18:03:702160820dcAgent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-06-0709:18:03:702160820dcAgent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-06-0709:18:03:702160820dcAgent * Search Scope = {Machine}
2016-06-0709:18:05:5441608a88AUTriggering AU detection through DetectNow API
2016-06-0709:18:05:5441608a88AUWill do the detection after current detection completes
2016-06-0709:18:05:672160820dcAgent * Found 0 updates and 83 categories in search; evaluated appl. rules of 270 out of 2342 deployed entities
2016-06-0709:18:05:673160820dcAgent*********
2016-06-0709:18:05:673160820dcAgent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-06-0709:18:05:673160820dcAgent*************
2016-06-0709:18:05:675160818a0AU>>##  RESUMED  ## AU: Search for updates [CallId = {4FEE946B-1813-4E0C-B82D-48512CD088A1}]
2016-06-0709:18:05:675160818a0AU # 0 updates detected
2016-06-0709:18:05:675160818a0AU#########
2016-06-0709:18:05:675160818a0AU##  END  ##  AU: Search for updates [CallId = {4FEE946B-1813-4E0C-B82D-48512CD088A1}]
2016-06-0709:18:05:675160818a0AU#############
2016-06-0709:18:05:675160818a0AUFeatured notifications is disabled.
2016-06-0709:18:05:675160818a0AUSuccessfully wrote event for AU health state:0
2016-06-0709:18:05:676160818a0AUSuccessfully wrote event for AU health state:0
2016-06-0709:18:05:67616082044AU#############
2016-06-0709:18:05:67616082044AU## START ##  AU: Search for updates
2016-06-0709:18:05:67616082044AU#########
2016-06-0709:18:05:67716082044AU<<## SUBMITTED ## AU: Search for updates [CallId = {720B2768-24AC-4B64-AE32-E500F0B31980}]
2016-06-0709:18:05:677160820dcAgent*************
2016-06-0709:18:05:677160820dcAgent** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-06-0709:18:05:677160820dcAgent*********
2016-06-0709:18:05:677160820dcAgent * Online = Yes; Ignore download priority = No
2016-06-0709:18:05:677160820dcAgent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-06-0709:18:05:677160820dcAgent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-06-0709:18:05:677160820dcAgent * Search Scope = {Machine}
2016-06-0709:18:05:678160820dcSetupChecking for agent SelfUpdate
2016-06-0709:18:05:678160820dcSetupClient version: Core: 7.6.7601.19161  Aux: 7.6.7601.19161
2016-06-0709:18:08:242160820dcMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2016-06-0709:18:08:249160820dcMiscMicrosoft signed: NA
2016-06-0709:18:08:252160820dcMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP374C.tmp with dwProvFlags 0x00000080:
2016-06-0709:18:08:260160820dcMiscMicrosoft signed: NA
2016-06-0709:18:08:264160820dcMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2016-06-0709:18:08:271160820dcMiscMicrosoft signed: NA
2016-06-0709:18:08:273160820dcMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2016-06-0709:18:08:280160820dcMiscMicrosoft signed: NA
2016-06-0709:18:08:326160820dcSetupDetermining whether a new setup handler needs to be downloaded
2016-06-0709:18:08:326160820dcSetupSelfUpdate handler is not found.  It will be downloaded
2016-06-0709:18:08:326160820dcSetupEvaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-06-0709:18:08:330160820dcSetupSetup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-06-0709:18:08:330160820dcSetupEvaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-06-0709:18:08:353160820dcSetupSetup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-06-0709:18:08:353160820dcSetupEvaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-06-0709:18:08:389160820dcSetupSetup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-06-0709:18:08:389160820dcSetupSelfUpdate check completed.  SelfUpdate is NOT required.
2016-06-0709:18:08:590160820dcPT+++++++++++  PT: Synchronizing server updates  +++++++++++
2016-06-0709:18:08:590160820dcPT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://sbsserver:8530/ClientWebService/client.asmx
2016-06-0709:18:40:122160820dcPT+++++++++++  PT: Synchronizing extended update info  +++++++++++
2016-06-0709:18:40:123160820dcPT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://sbsserver:8530/ClientWebService/client.asmx
2016-06-0709:18:40:262160820dcAgent * Found 0 updates and 83 categories in search; evaluated appl. rules of 1094 out of 2342 deployed entities
2016-06-0709:18:40:263160820dcAgent*********
2016-06-0709:18:40:263160820dcAgent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-06-0709:18:40:263160820dcAgent*************
2016-06-0709:18:40:265160820dcReportREPORT EVENT: {B657A40F-E720-4A52-85E3-0877161B7455}2016-06-07 09:18:03:687+01001202102{00000000-0000-0000-0000-000000000000} 00AutomaticUpdatesSuccessContent InstallReboot completed.
2016-06-0709:18:40:266160818a0AU>>##  RESUMED  ## AU: Search for updates [CallId = {720B2768-24AC-4B64-AE32-E500F0B31980}]
2016-06-0709:18:40:266160818a0AU # 0 updates detected
2016-06-0709:18:40:266160818a0AU#########
2016-06-0709:18:40:266160818a0AU##  END  ##  AU: Search for updates [CallId = {720B2768-24AC-4B64-AE32-E500F0B31980}]
2016-06-0709:18:40:266160818a0AU#############


Windows Update Scan behavior for KB955430.

$
0
0
Hi,

I have one client application which scan for missing Windows update with Microsoft Update Server.

I tried to scan for missing updates on Vista 32-bit SP1 using my client app as well as "Windows Update" UI way. One update (KB955430) was skipped while generating missing update list under "Windows Update" section (total missing update 100) but my client app able to scan this update in missing update list (total missing update 101).

I verified WinddowsUpdate.log and came to know that "Windows Update" scan also detected 101 missing updates but it excluded this KB while generating missing updates report.

It seems that KB955430 is special type of update which says:
"This update cannot be installed with other updates. Therefore, if you previously installed other updates without a restart, and then you try to install this update, you may receive error800F082F. To resolve this issue, restart your computer, and then install this update again."

I would like to know that what is the criteria to exclude such type of updates while scan and how to provide them to install as well.
I verified all the update's properties (IUpdate interface) but no property tell me about such info.


WSUS Fails

$
0
0
We are running a Windows Server 2012 Standard server and have been successfully using WSUS for quite a while. However, over the past weekend, it died and we have not been able to get it restarted. The Event Viewer shows this: "Update Services failed its initialization and stopped." And another message reads "Login failed for user 'NT AUTHORITY\NETWORK SERVICE.' Reason: Failed to open the explicitly specified database 'SUSDB'. [CLIENT: <named pipe>]". I located the SUSDB database in Windows\WID\Data\ (SUSDB.mdf) and I spent most of my day yesterday trying to figure out how to fix this, doing one Google search after another and none of the suggestions have worked.  I'd really appreciate some guidance and suggestions here because I'm at my wits end. I even tried to see if I could just re-install WSUS and it get this error when trying to run the executable: "This program has compatibility issues" and under that "Windows Server Update Services Microsoft"

 

Event ID 13042 yet WSUS is working.

$
0
0

Event ID 13042 is poping up from time to time, but when I check synchronizations and updates are working.

WSUS is placed as a custom site on the server as port 8530/8531 checked the bindings and they are in place, I followed trouble shooting at https://support.microsoft.com/en-us/kb/2000598 and the only thing that I can't change is the default site's binding towards port 443 for ssl as I need that for outlook anywhere.

I would really appreciate any kind of help regarding this issue.


EDIT: Update, put a binding to default site for port 80 and it started working , but when I try to access

http://WSUSServerName/iuident.cab or  http://WSUSServerName:8530/iuident.cab it doesn't connect on client computer, but it connects without a problem from server.

It seems that it's a DNS issue, when I tried opening the same page with IP instead of hostname is worked without a problem...


Final update: IPV6 was the issue, when I disabled it, everything started working with no problem.


Need help installing 30+ Office updates

$
0
0

We have a Windows 10 Pro laptop which was originally setup with Office 2010 Pro Plus. The machine was later repurposed to a different staff member and Office Pro Plus 2007 was installed, however WSUS reports 37 updates (all of which are Office 2007 updates) are needed which we are unable to install. This is likely due to the wrong option selected the first time Word is opened prompting the user to install updates.

Is there a registry edit that will cause the "Install Updates" pop-up to reappear which appears when one the Office 2007 Suite applications is initially installed?

Thanks


Hank Vare

client dont see windows 10 upgrade

$
0
0

Hi,

We have some clients that does not see the upgrade from windows 7 to windows 10. From the WSUS point of view, the clients reports that they need them, and the files are downloaded. But when i login to the windows 7 client, it does not show, it only say that its up to date. Sorry for Norwegian language... :)

It has found other updates, its only this one thats a problem...

Any suggestions ?


From the logs:

2016-05-31    22:06:20:321    1004    1afc    Setup    Checking for agent SelfUpdate
2016-05-31    22:06:20:321    1004    1afc    Setup    Client version: Core: 7.6.7601.19161  Aux: 7.6.7601.19161
2016-05-31    22:06:20:336    1004    1afc    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2016-05-31    22:06:22:770    1004    1708    DnldMgr    BITS job {15B06453-B139-4148-A45A-4F3BCA2D9F56} completed successfully
2016-05-31    22:06:22:863    1004    1708    Misc    Validating signature for C:\Windows\SoftwareDistribution\Download\ff74d699847dae9eb837b12cbe11d704\windowsupdatebox.exe with dwProvFlags 0x00000080:
2016-05-31    22:06:43:143    1004    1afc    Misc     Microsoft signed: NA
2016-05-31    22:06:43:143    1004    1afc    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPE0C0.tmp with dwProvFlags 0x00000080:
2016-05-31    22:06:45:312    1004    1708    Misc     Microsoft signed: Yes
2016-05-31    22:06:45:312    1004    1708    DnldMgr      Download job bytes total = 2909186308, bytes transferred = 18593112
2016-05-31    22:06:45:312    1004    1708    DnldMgr    ***********  DnldMgr: New download job [UpdateId = {C2838271-DE02-4C57-B98D-BFCA6E8C1901}.201]  ***********
2016-05-31    22:06:45:312    1004    1708    DnldMgr      * Queueing update for download handler request generation.
2016-05-31    22:06:45:312    1004    1708    DnldMgr    Generating download request for update {C2838271-DE02-4C57-B98D-BFCA6E8C1901}.201
2016-05-31    22:06:45:327    1004    1708    DnldMgr    ***********  DnldMgr: New download job [UpdateId = {C2838271-DE02-4C57-B98D-BFCA6E8C1901}.201]  ***********
2016-05-31    22:06:45:327    1004    1708    DnldMgr      * All files for update were already downloaded and are valid.
2016-05-31    22:06:45:327    1004    97c    AU    >>##  RESUMED  ## AU: Download update [UpdateId = {1F4731BA-3B6D-4ED9-A665-652AC73B5552}, succeeded]
2016-05-31    22:06:45:327    1004    97c    AU    #########
2016-05-31    22:06:45:327    1004    97c    AU    ##  END  ##  AU: Download updates
2016-05-31    22:06:45:327    1004    97c    AU    #############
2016-05-31    22:06:45:327    1004    97c    AU    Successfully wrote event for AU health state:0
2016-05-31    22:06:45:327    1004    97c    AU    Currently AUX is enabled - so not show any WU Upgrade notifications.
2016-05-31    22:06:45:327    1004    97c    AU    Evaluate OSUpgrade Notification already. Skip the regular notification
2016-05-31    22:06:45:343    1004    97c    AU    Successfully wrote event for AU health state:0
2016-05-31    22:06:45:343    1004     64    AU    Getting featured update notifications.  fIncludeDismissed = true
2016-05-31    22:06:45:343    1004     64    AU    No featured updates available.
2016-05-31    22:07:05:669    1004    1afc    Misc     Microsoft signed: NA
2016-05-31    22:07:05:685    1004    1afc    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2016-05-31    22:07:05:685    1004    1afc    Misc     Microsoft signed: NA
2016-05-31    22:07:05:700    1004    1afc    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2016-05-31    22:07:05:700    1004    1afc    Misc     Microsoft signed: NA
2016-05-31    22:07:05:747    1004    1afc    Setup    Determining whether a new setup handler needs to be downloaded
2016-05-31    22:07:05:747    1004    1afc    Setup    SelfUpdate handler is not found.  It will be downloaded
2016-05-31    22:07:05:747    1004    1afc    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-05-31    22:07:05:763    1004    1afc    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2016-05-31    22:07:05:763    1004    1afc    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-05-31    22:07:05:778    1004    1afc    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2016-05-31    22:07:05:778    1004    1afc    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-05-31    22:07:05:794    1004    1afc    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2016-05-31    22:07:05:794    1004    1afc    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
2016-05-31    22:07:05:919    1004    1afc    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2016-05-31    22:07:05:919    1004    1afc    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://WSUS:8530/ClientWebService/client.asmx
2016-05-31    22:07:34:201    1004    1afc    Agent      * Added update {1F4731BA-3B6D-4ED9-A665-652AC73B5552}.201 to search result
2016-05-31    22:07:34:201    1004    1afc    Agent      * Found 1 updates and 78 categories in search; evaluated appl. rules of 931 out of 1879 deployed entities
2016-05-31    22:07:34:201    1004    1afc    Agent    *********
2016-05-31    22:07:34:201    1004    1afc    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-05-31    22:07:34:201    1004    1afc    Agent    *************
2016-05-31    22:07:34:201    1004    1afc    Report    REPORT EVENT: {21B635AF-9BD3-4E0B-B8CC-314FE3ADA36F}    2016-05-31 22:06:16:936+0200    1   148    101    {D67661EB-2423-451D-BF5D-13199E37DF28}    1    80072efe    SelfUpdate    Failure    Software Synchronization    Windows Update Client failed to detect with error 0x80072efe.
2016-05-31    22:07:34:201    1004    97c    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {D4DE3B8E-1B8E-430B-9450-A6AAD076D0B7}]
2016-05-31    22:07:34:201    1004    97c    AU      # 1 updates detected
2016-05-31    22:07:34:201    1004    97c    AU    OSUpgrade detected: Importance = 0 from deployment, State = 4, AutoDownload = 0, DownloadPri = 2, DownloadStatus = 100, AcceleratedInstall = 1
2016-05-31    22:07:34:201    1004    97c    AU    OSUpgrade has an install deadline(3) from registry 2016-05-31 22:15:53
2016-05-31    22:07:34:201    1004    97c    AU    #########
2016-05-31    22:07:34:201    1004    97c    AU    ##  END  ##  AU: Search for updates [CallId = {D4DE3B8E-1B8E-430B-9450-A6AAD076D0B7}]
2016-05-31    22:07:34:201    1004    97c    AU    #############
2016-05-31    22:07:34:201    1004    97c    AU    Successfully wrote event for AU health state:0
2016-05-31    22:07:34:201    1004    97c    AU    Featured notifications is disabled.
2016-05-31    22:07:34:201    1004    97c    AU    AU setting next detection timeout to 2016-06-01 16:57:42
2016-05-31    22:07:34:201    1004    97c    AU    Successfully wrote event for AU health state:0
2016-05-31    22:07:34:201    1004    97c    AU    Currently AUX is enabled - so not show any WU Upgrade notifications.
2016-05-31    22:07:34:201    1004    97c    AU    Evaluate OSUpgrade Notification already. Skip the regular notification
2016-05-31    22:07:34:201    1004    97c    AU    Successfully wrote event for AU health state:0
2016-05-31    22:07:34:201    1004     64    AU    Getting featured update notifications.  fIncludeDismissed = true
2016-05-31    22:07:34:201    1004     64    AU    No featured updates available.
2016-05-31    22:07:34:233    1004    1afc    Report    CWERReporter::HandleEvents - WER report upload completed with status 0x8
2016-05-31    22:07:34:233    1004    1afc    Report    WER Report sent: 7.6.7601.19161 0x80072efe(0) 67661EB-2423-451D-BF5D-13199E37DF28 Scan 1 0 SelfUpdate {9482F4B4-E343-43B6-B170-9A65BC822C77} 0
2016-05-31    22:07:34:233    1004    1afc    Report    REPORT EVENT: {11096CFD-24D0-43B2-A93B-96BE4020869B}    2016-05-31 22:06:45:327+0200    1   188    102    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Content Install    Installation Ready: The following updates are downloaded and ready for installation. This computer is currently scheduled to install these updates on ‎31. ‎mai ‎2016 at 22:16:  - Windows 7- og 8.1-oppgradering til Windows 10 Enterprise, versjon 1511, 10586 - nb-no, Volume
2016-05-31    22:07:39:209    1004    1afc    Report    REPORT EVENT: {C81DD674-3F02-485E-9F49-A09B8A6FF05B}    2016-05-31 22:07:34:201+0200    1   147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows Update Client successfully detected 1 updates.
2016-05-31    22:07:39:209    1004    1afc    Report    REPORT EVENT: {45AAAF1F-B919-4615-A496-0D107120A51A}    2016-05-31 22:07:34:201+0200    1   156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting client status.

/Regards Andreas


Viewing all 12331 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>