Quantcast
Channel: WSUS Forum
Viewing all 12331 articles
Browse latest View live

WSUS Auto-Approval of Only Needed Updates

$
0
0

Server Platform:

Windows Server 2012R6 64-bit

XenServer 6.5 VM

2 Xen e5540@2.53 Ghz w/ 8192 RAM and 240 GB of storage

WSUS Version:

Version 6.3.9600.16384


 I am looking to have all Critical and Security updates approved to a group of computers within my WSUS environment.  My issue is that as far as I can tell, when an entire classification of updates (i.e. security) is auto-approved WSUS will download those updates to my WSUS server even if I have no computers which need these updates.  I am setting up a new WSUS server for this purpose.  The amount of download required on the initial sync was something on the order of 150+ GB's.  I do have my classifications as narrowly set as I can we do have several 2008 and 2012 servers.   I have found a third party solution that seems to accomplish this, but it is older and wonder if it is commonly used or if I am missing something.

WSUS Smart Approve

So I have a few questions:

1. Is auto-approval of all security commonly used (from a cursory glance it appears a WSUS administrator manually approving updates is more common)?

2.  If it is employed, what are the ways one can reduce the downloads,?

3.  This large initial download, is it cleaned up when no longer needed?  

      If I go in after the fact and Decline all non-needed update will they be deleted and the disk space reclaimed without corrupting the WIM database?

4.  Does anyone have any experience using the above linked (or other) 3rd party solution?  That includes paid as well.

Thanks I really appreciate it!

Scott Grant

System Administrator I

Advanced Home Care


80244008 Error WSUS Client - New Install of WSUS on Win 2012 R2 Server

$
0
0
Hi Folks - Been through all of the documentation on the patch that killed WSUS and subsequent patch for the patch and associated manual steps.  Tried pulling WSUS related registry keys from client machine.  All to no avail.  

Does anyone have an actual fix for this absolute clustervomit of a situation?

Windows Update Client failed to detect with error 0x8024400a

$
0
0

Hello. Thread name is the question. I have read, that's is the problem of Windows 2k3/IIS6, but I'm using 2012 server and IIS 8. I have this error only on part of clients, so it's not WSUS error (I think). We're also using proxy server (Ubuntu\Squid). Last lines of UpdateLog:

2016-09-0815:08:20:4251044c9cAUSuccessfully wrote event for AU health state:0
2016-09-0815:08:20:4251044c9cAUAU setting next detection timeout to 2016-09-08 17:08:20
2016-09-0815:08:20:4401044c9cAUSuccessfully wrote event for AU health state:0
2016-09-0815:08:20:4401044c9cAUSuccessfully wrote event for AU health state:0
2016-09-0815:08:25:42710441b5cReportREPORT EVENT: {5FE3236C-2E99-4AAB-B90D-452188EBEB9D}2016-09-08 15:08:20:425+03001148101{00000000-0000-0000-0000-000000000000} 08024400a AutomaticUpdatesFailureSoftware SynchronizationWindows Update Client failed to detect with error 0x8024400a.
2016-09-0815:08:25:42710441b5cReportCWERReporter::HandleEvents - WER report upload completed with status 0x8
2016-09-0815:08:25:42710441b5cReportWER Report sent: 7.6.7601.18937 0x8024400a(0) 0000000-0000-0000-0000-000000000000 Scan 0 1 AutomaticUpdates {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} 0
2016-09-0815:10:19:38510441b5cPTWARNING: GetConfig failure, error = 0x8024400A, soap client error = 10, soap error code = 0, HTTP status code = 200
2016-09-0815:10:19:38510441b5cPTWARNING: PTError: 0x8024400a
2016-09-0815:10:19:38510441b5cPTWARNING: GetConfig_WithRecovery failed: 0x8024400a
2016-09-0815:10:19:38510441b5cPTWARNING: RefreshConfig failed: 0x8024400a
2016-09-0815:10:19:38510441b5cPTWARNING: RefreshPTState failed: 0x8024400a
2016-09-0815:10:19:38510441b5cPTWARNING: PTError: 0x8024400a
2016-09-0815:10:19:38510441b5cReportWARNING: Reporter failed to upload events with hr = 8024400a.

Windows is sh*t!

WS2012 R2 versus (upcoming) WS2016 - which is better for new WSUS instance?

$
0
0

Hello,

I need to upgrade my in-house WSUS server.

Here's what I am wrestling with:

Should I roll out a WS2012R2 box and run it on that? OR should I wait for WS2016 and run it on that?

Thoughts are appreciated. Esp. if there's a new version of WSUS coming in WS2016...

RD


Cannot update Windows 10 Pro computers from 10240 to 1607 from WSUS

$
0
0

Hello, I have problem to update company computers (about 300) from Windows 10 Pro build version 10240 (installed version) to newest Windows 10 anniversary update 1607. Updates are delivered from our WSUS server (Windows Server 2012 R2) with latest updates and all computers are set (via GPO) to download and install updates from wsus (and wait for reboot). I approved updates to 1607 (KB3176936) and when I check for updates on computers I get option to download and install "Feature update to Windows 10 Pro, version 1607, en-us, Retail", but after couple minutes of download and install I get error message:

There were problems installing some updates, but we'll try again later. If you keep seeing this and want to search the web or contact support for information, this may help:

Retry

After this may help: isn't any error code or anything.

From SoftwareDistribution log:

{5DCCA5A3-22D5-4964-8A88-4B8C61F561F9}2016-09-09 09:17:38:204+02001148 [AGENT_DETECTION_FAILED]101{00000000-0000-0000-0000-000000000000}080244010UpdateOrchestratorFailureSoftware SynchronizationWindows Update Client failed to detect with error 0x80244010.
{F87996D4-B2C2-4D67-B4AC-A9A579BB4BF5}2016-09-09 09:17:38:992+02001147 [AGENT_DETECTION_FINISHED]101{00000000-0000-0000-0000-000000000000}00 TrustedInstaller FODSuccessSoftware SynchronizationWindows Update Client successfully detected 0 updates.

No client computers have ever contacted the server.

$
0
0

hi<o:p></o:p>

installed new server 2012 r2 and wsus.it running and getting updates(200gb) but I don't see my clients connected.keep getting 13051 id error in event viwer.check the policy and configure my server as "http://servername" in the policy.when trying to connect via explorer from the station or the server  to "http://servername" keep getting "authentication required" and username and pass instead getting the iis.looked in the iis bindings and permisions and even tryied :8530 or 8531 port in the explorer but no good

<o:p>when running windows update directly on the srver get"80244017" error</o:p>


ronnie

Automatic Update does not install automatically

$
0
0

Hi all,

I am having issues with one of our  WSUS Clients updates. The client (windows server 2012 r2) get updates, but it is not automatically installing. I am using group policy settings for client's side. here are the settings. 

Always automatically restart at the scheduled time

Configure Automatic Updates

Specify intranet Microsoft update service location

Enable client-side targeting

This group policy works on correctly on all our clients except one. 

i have tried followin to troubleshoot.

> On client's computer in IE. I had ran wsusserver/iuident.cab and it does prompt me to download a file.

 > i tried "wsusserver and it brings iis welcome screen.

> Restart the Windows Update service (sc stop wuauservsc start wuauserv)

Any help?


Windows Server 2012 attempting to access windowsupdate.com although configured to not connect to any Windows Update Internet locations

$
0
0

Computer with Windows Server 2012 configured to get updates from local WSUS server and it restricted to access to Windows Update Internet locations. But this computer periodically attempting to access http://ds.download.windowsupdate.com/v11/2/windowsupdate/redir/v6-wuredir.cab and http://fe2.update.microsoft.com/v11/2/windowsupdate/redir/v6-wuredir.cab.

Windows Update group policy settings:

Configure Automatic Updates: Enabled, 3 - Auto download and notify install, 0 - Every day, 3:00

Specify intranet Microsoft update service location: Enabled, both intranet update service and intranet statistics server  - http://wsus.domain.name

Do not connect to any Windows Update Internet locations: Enabled

Turn on recommended updates via Automatic Updates: Enabled

No auto-restart with logged on users for scheduled automatic updates installations: Enabled

Allow signed updates from an intranet Microsoft update service location:Enabled


WindowsUpdate.log:

2016-09-20    16:59:17:313     792    efc    EP    Got WSUS Client/Server URL: "http://wsus.domain.name/ClientWebService/client.asmx"
2016-09-20    16:59:17:313     792    efc    PT    WARNING: Cached cookie has expired or new PID is available
2016-09-20    16:59:17:313     792    efc    EP    Got WSUS SimpleTargeting URL: "http://wsus.domain.name"
2016-09-20    16:59:17:313     792    efc    PT    Initializing simple targeting cookie, clientId = caaf9f2e-21e5-4e5d-9b74-6e5bee994055, target group = Server, DNS name = server1.domain.name
2016-09-20    16:59:17:313     792    efc    PT      Server URL = http://wsus.domain.name/SimpleAuthWebService/SimpleAuth.asmx
2016-09-20    16:59:17:360     792    efc    EP    Got WSUS Reporting URL: "http://wsus.domain.name/ReportingWebService/ReportingWebService.asmx"
2016-09-20    16:59:17:360     792    efc    Report    Uploading 2 events using cached cookie, reporting URL = http://wsus.domain.name/ReportingWebService/ReportingWebService.asmx
2016-09-20    16:59:17:363     792    efc    Report    Reporter successfully uploaded 2 events.
2016-09-20    17:01:30:188     792    221c    Misc    WARNING:     IsSessionRemote: WinStationQueryInformationW(WTSIsRemoteSession) failed for session 2, GetLastError=2250
2016-09-20    17:01:51:794     792    221c    Misc    WARNING:     IsSessionRemote: WinStationQueryInformationW(WTSIsRemoteSession) failed for session 2, GetLastError=2250
2016-09-20    17:02:53:647     792    221c    AU    ###########  AU: Uninitializing Automatic Updates  ###########
2016-09-20    17:02:53:648     792    221c    WuTask    Uninit WU Task Manager
2016-09-20    17:02:53:715     792    221c    Service    *********
2016-09-20    17:02:53:715     792    221c    Service    **  END  **  Service: Service exit [Exit code = 0x240001]
2016-09-20    17:02:53:715     792    221c    Service    *************
2016-09-20    17:02:54:961     792    a50    Misc    ===========  Logging initialized (build: 7.8.9200.17185, tz: +0500)  ===========
2016-09-20    17:02:54:961     792    a50    Misc      = Process: C:\Windows\system32\svchost.exe
2016-09-20    17:02:54:961     792    a50    Misc      = Module: c:\windows\system32\wuaueng.dll
2016-09-20    17:02:54:961     792    a50    Service    *************
2016-09-20    17:02:54:961     792    a50    Service    ** START **  Service: Service startup
2016-09-20    17:02:54:961     792    a50    Service    *********
2016-09-20    17:02:54:971     792    a50    Agent      * WU client version 7.8.9200.17185
2016-09-20    17:02:54:971     792    a50    Agent      * Base directory: C:\Windows\SoftwareDistribution
2016-09-20    17:02:54:971     792    a50    Agent      * Access type: No proxy
2016-09-20    17:02:54:971     792    a50    Service    UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
2016-09-20    17:02:54:971     792    a50    Service    UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2016-09-20    17:02:54:971     792    a50    Agent      * Network state: Connected
2016-09-20    17:02:54:973     792    a50    Service    UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
2016-09-20    17:02:54:973     792    a50    Service    UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2016-09-20    17:02:54:986     792    a50    Agent    ***********  Agent: Initializing global settings cache  ***********
2016-09-20    17:02:54:986     792    a50    Agent      * Endpoint Provider: 00000000-0000-0000-0000-000000000000
2016-09-20    17:02:54:986     792    a50    Agent      * WSUS server: http://wsus.domain.name
2016-09-20    17:02:54:986     792    a50    Agent      * WSUS status server: http://wsus.domain.name
2016-09-20    17:02:54:986     792    a50    Agent      * Target group: Server
2016-09-20    17:02:54:986     792    a50    Agent      * Windows Update access disabled: No
2016-09-20    17:02:54:986     792    a50    Misc    WARNING: Network Cost is assumed to be not supported as something failed with trying to get handles to wcmapi.dll
2016-09-20    17:02:54:994     792    a50    WuTask    WuTaskManager delay initialize completed successfully..
2016-09-20    17:02:55:001     792    a50    Report    WARNING: CSerializationHelper:: InitSerialize failed : 0x80070002
2016-09-20    17:02:55:002     792    a50    Report    CWERReporter::Init succeeded
2016-09-20    17:02:55:002     792    a50    Agent    ***********  Agent: Initializing Windows Update Agent  ***********
2016-09-20    17:02:55:002     792    a50    DnldMgr    Download manager restoring 0 downloads
2016-09-20    17:02:55:003     792    a50    AU    ###########  AU: Initializing Automatic Updates  ###########
2016-09-20    17:02:55:003     792    a50    AU    AIR Mode is disabled
2016-09-20    17:02:55:003     792    a50    AU      # Policy Driven Provider: http://wsus.domain.name
2016-09-20    17:02:55:003     792    a50    AU      # Detection frequency: 22
2016-09-20    17:02:55:003     792    a50    AU      # Target group: Server
2016-09-20    17:02:55:003     792    a50    AU      # Approval type: Pre-install notify (Policy)
2016-09-20    17:02:55:004     792    a50    AU      # Auto-install minor updates: No (Policy)
2016-09-20    17:02:55:004     792    a50    AU      # Will interact with non-admins (Non-admins are elevated (Policy))
2016-09-20    17:02:55:006     792    a50    Misc    WARNING:     IsSessionRemote: WinStationQueryInformationW(WTSIsRemoteSession) failed for session 2, GetLastError=2250
2016-09-20    17:02:55:012     792    a50    AU    WARNING: Failed to get Wu Exemption info from NLM, assuming not exempt, error = 0x80240037
2016-09-20    17:02:55:018     792    a50    AU    AU finished delayed initialization
2016-09-20    17:02:55:018     792    a50    AU    Obtained Post reboot hr from Agent:8024000c
2016-09-20    17:02:55:029     792    a50    AU    Triggering Offline detection (non-interactive)
2016-09-20    17:02:55:042     792    a50    AU    #############
2016-09-20    17:02:55:042     792    a50    AU    ## START ##  AU: Search for updates
2016-09-20    17:02:55:042     792    a50    AU    #########
2016-09-20    17:02:55:107     792    a50    Report    ***********  Report: Initializing static reporting data  ***********
2016-09-20    17:02:55:107     792    a50    Report      * OS Version = 6.2.9200.0.0.196880
2016-09-20    17:02:55:107     792    a50    Report      * OS Product Type = 0x00000007
2016-09-20    17:02:55:117     792    a50    Report      * Computer Brand = Xen
2016-09-20    17:02:55:117     792    a50    Report      * Computer Model = HVM domU
2016-09-20    17:02:55:117     792    a50    Report      * Platform Role = 1
2016-09-20    17:02:55:118     792    a50    Report      * AlwaysOn/AlwaysConnected (AOAC) = 0
2016-09-20    17:02:55:121     792    a50    Report      * Bios Revision = 4.6.0
2016-09-20    17:02:55:121     792    a50    Report      * Bios Name = Default System BIOS
2016-09-20    17:02:55:121     792    a50    Report      * Bios Release Date = 2016-06-14T00:00:00
2016-09-20    17:02:55:121     792    a50    Report      * Bios Sku Number unavailable.
2016-09-20    17:02:55:121     792    a50    Report      * Bios Vendor = Xen
2016-09-20    17:02:55:121     792    a50    Report      * Bios Family unavailable.
2016-09-20    17:02:55:121     792    a50    Report      * Bios Major Release = 4
2016-09-20    17:02:55:121     792    a50    Report      * Bios Minor Release = 6
2016-09-20    17:02:55:121     792    a50    Report      * Locale ID = 1049
2016-09-20    17:02:55:122     792    a50    AU    <<## SUBMITTED ## AU: Search for updates  [CallId = {DA5E62A6-9AC5-427C-8161-DEE4DE477D3B} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-09-20    17:02:55:122     792    217c    Agent    *************
2016-09-20    17:02:55:122     792    217c    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-09-20    17:02:55:122     792    217c    Agent    *********
2016-09-20    17:02:55:122     792    217c    Agent      * Online = No; Ignore download priority = No
2016-09-20    17:02:55:122     792    217c    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-09-20    17:02:55:122     792    217c    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-09-20    17:02:55:122     792    217c    Agent      * Search Scope = {Machine & All Users}
2016-09-20    17:02:55:122     792    217c    Agent      * Caller SID for Applicability: S-1-5-18
2016-09-20    17:02:59:377     792    1c90    AU    Triggering AU detection through DetectNow API
2016-09-20    17:02:59:377     792    1c90    AU    Will do the detection after current detection completes
2016-09-20    17:03:03:200     792    217c    Agent      * Added update {4FDB9EE1-391C-411C-85D9-EDA28EAEB00A}.101 to search result
2016-09-20    17:03:03:200     792    217c    Agent      * Added update {627F21DF-2BF5-49B5-A439-0665BD1CD13F}.101 to search result
2016-09-20    17:03:03:200     792    217c    Agent      * Added update {E76B737C-E60C-4714-BCBA-0506E3054695}.101 to search result
2016-09-20    17:03:03:200     792    217c    Agent      * Found 3 updates and 83 categories in search; evaluated appl. rules of 383 out of 1879 deployed entities
2016-09-20    17:03:03:202     792    217c    Agent    *********
2016-09-20    17:03:03:202     792    217c    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-09-20    17:03:03:202     792    217c    Agent    *************
2016-09-20    17:03:03:202     792    14bc    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {DA5E62A6-9AC5-427C-8161-DEE4DE477D3B} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-09-20    17:03:03:203     792    14bc    AU      # 3 updates detected
2016-09-20    17:03:03:203     792    14bc    AU    #########
2016-09-20    17:03:03:203     792    14bc    AU    ##  END  ##  AU: Search for updates  [CallId = {DA5E62A6-9AC5-427C-8161-DEE4DE477D3B} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-09-20    17:03:03:203     792    14bc    AU    #############
2016-09-20    17:03:03:203     792    14bc    AU    All AU searches complete.
2016-09-20    17:03:03:212     792    a50    AU    #############
2016-09-20    17:03:03:212     792    a50    AU    ## START ##  AU: Search for updates
2016-09-20    17:03:03:212     792    a50    AU    #########
2016-09-20    17:03:03:314     792    a50    AU    <<## SUBMITTED ## AU: Search for updates  [CallId = {7A7A7932-5659-4C90-9E42-9553C033F93F} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-09-20    17:03:03:314     792    217c    Agent    *************
2016-09-20    17:03:03:314     792    217c    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-09-20    17:03:03:314     792    217c    Agent    *********
2016-09-20    17:03:03:314     792    217c    Agent      * Online = Yes; Ignore download priority = No
2016-09-20    17:03:03:314     792    217c    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-09-20    17:03:03:314     792    217c    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-09-20    17:03:03:314     792    217c    Agent      * Search Scope = {Machine & All Users}
2016-09-20    17:03:03:314     792    217c    Agent      * Caller SID for Applicability: S-1-5-18
2016-09-20    17:03:03:553     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:553     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:565     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:565     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:578     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:578     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:588     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:588     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:588     792    217c    Misc    WARNING: DownloadFileInternal failed for http://ds.download.windowsupdate.com/v11/2/windowsupdate/redir/v6-wuredir.cab: error 0x80190193
2016-09-20    17:03:03:733     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:733     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:747     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:747     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:758     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:758     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:768     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:768     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:768     792    217c    Misc    WARNING: DownloadFileInternal failed for http://fe2.update.microsoft.com/v11/2/windowsupdate/redir/v6-wuredir.cab: error 0x80190193
2016-09-20    17:03:03:779     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:779     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:789     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:789     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:799     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:799     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:811     792    217c    Misc    WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190193
2016-09-20    17:03:03:811     792    217c    Misc    WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190193
2016-09-20    17:03:03:811     792    217c    Misc    WARNING: DownloadFileInternal failed for http://ds.download.windowsupdate.com/v11/2/windowsupdate/redir/v6-wuredir.cab: error 0x80190193
2016-09-20    17:03:03:812     792    217c    EP    FATAL: SLS: Failed to download and verify redir., error = 0x80244018
2016-09-20    17:03:03:812     792    217c    EP    Got WSUS Client/Server URL: "http://wsus.domain.name/ClientWebService/client.asmx"
2016-09-20    17:03:03:812     792    217c    Setup    Checking for agent SelfUpdate
2016-09-20    17:03:03:813     792    217c    Setup    Client version: Core: 7.8.9200.17185  Aux: 7.8.9200.17185
2016-09-20    17:03:03:813     792    217c    EP    Got WSUS SelfUpdate URL: "http://wsus.domain.name/selfupdate"
2016-09-20    17:03:03:819     792    217c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2016-09-20    17:03:03:827     792    217c    Misc     Microsoft signed: NA
2016-09-20    17:03:03:827     792    217c    Misc     Infrastructure signed: Yes
2016-09-20    17:03:03:828     792    217c    Misc    WARNING: Cab does not contain correct inner CAB file.
2016-09-20    17:03:03:828     792    217c    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2016-09-20    17:03:03:832     792    217c    Misc     Microsoft signed: NA
2016-09-20    17:03:03:832     792    217c    Misc     Infrastructure signed: Yes
2016-09-20    17:03:03:832     792    217c    Setup    Skipping SelfUpdate check based on the /SKIP directive in wuident
2016-09-20    17:03:03:832     792    217c    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
2016-09-20    17:03:06:410     792    217c    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2016-09-20    17:03:06:410     792    217c    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsus.domain.name/ClientWebService/client.asmx
2016-09-20    17:03:06:410     792    217c    EP    Got WSUS SimpleTargeting URL: "http://wsus.domain.name"
2016-09-20    17:03:06:410     792    217c    PT    Initializing simple targeting cookie, clientId = caaf9f2e-21e5-4e5d-9b74-6e5bee994055, target group = Server, DNS name = server1.domain.name
2016-09-20    17:03:06:410     792    217c    PT      Server URL = http://wsus.domain.name/SimpleAuthWebService/SimpleAuth.asmx
2016-09-20    17:03:06:440     792    217c    Agent    Reading cached app categories using lifetime 604800 seconds
2016-09-20    17:03:06:440     792    217c    Agent    Read 0 cached app categories
2016-09-20    17:03:22:092     792    217c    Agent      * Added update {4FDB9EE1-391C-411C-85D9-EDA28EAEB00A}.101 to search result
2016-09-20    17:03:22:092     792    217c    Agent      * Added update {627F21DF-2BF5-49B5-A439-0665BD1CD13F}.101 to search result
2016-09-20    17:03:22:092     792    217c    Agent      * Added update {E76B737C-E60C-4714-BCBA-0506E3054695}.101 to search result
2016-09-20    17:03:22:092     792    217c    Agent      * Found 3 updates and 83 categories in search; evaluated appl. rules of 1069 out of 1879 deployed entities
2016-09-20    17:03:22:094     792    217c    DnldMgr    Adding revision ID 101 for update 5C253FC5-CE68-4C06-A928-947C1B0E5237 to the lock revision cache.
2016-09-20    17:03:22:094     792    217c    DnldMgr    Adding revision ID 101 for update E747768E-D6C0-4D6F-9759-DFF688402B60 to the lock revision cache.
2016-09-20    17:03:22:094     792    217c    DnldMgr    Adding revision ID 101 for update 04366D21-244A-47AD-BC05-79FC450B6D91 to the lock revision cache.
2016-09-20    17:03:22:094     792    217c    Agent    Reporting status event with 337 installable, 39 installed,  0 installed pending, 0 failed and 3 downloaded updates
2016-09-20    17:03:22:094     792    217c    Agent    *********
2016-09-20    17:03:22:094     792    217c    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-09-20    17:03:22:094     792    217c    Agent    *************
2016-09-20    17:03:22:095     792    14bc    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {7A7A7932-5659-4C90-9E42-9553C033F93F} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-09-20    17:03:22:095     792    14bc    AU      # 3 updates detected
2016-09-20    17:03:22:096     792    14bc    AU    #########
2016-09-20    17:03:22:096     792    14bc    AU    ##  END  ##  AU: Search for updates  [CallId = {7A7A7932-5659-4C90-9E42-9553C033F93F} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-09-20    17:03:22:096     792    14bc    AU    #############
2016-09-20    17:03:22:096     792    14bc    AU    All AU searches complete.
2016-09-20    17:03:22:096     792    14bc    AU    AU setting next detection timeout to 2016-09-21 06:58:51
2016-09-20    17:03:27:093     792    1018    Report    REPORT EVENT: {4A13226B-0577-4EDB-A83E-949B8F467709}    2016-09-20 17:03:22:093+0500    1   147 [AGENT_DETECTION_FINISHED]    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization   Windows Update Client successfully detected 3 updates.
2016-09-20    17:03:27:093     792    1018    Report    REPORT EVENT: {6AEAC53F-73DA-4593-8FD6-461DBE3BFE3E}    2016-09-20 17:03:22:094+0500    1   156 [AGENT_STATUS_30]    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check   Reporting client status.
2016-09-20    17:03:27:095     792    1018    Report    CWERReporter finishing event handling. (00000000)
2016-09-20    17:11:22:154     792    1018    EP    Got WSUS Client/Server URL: "http://wsus.domain.name/ClientWebService/client.asmx"
2016-09-20    17:11:22:154     792    1018    PT    WARNING: Cached cookie has expired or new PID is available
2016-09-20    17:11:22:154     792    1018    EP    Got WSUS SimpleTargeting URL: "http://wsus.domain.name"
2016-09-20    17:11:22:154     792    1018    PT    Initializing simple targeting cookie, clientId = caaf9f2e-21e5-4e5d-9b74-6e5bee994055, target group = Server, DNS name = server1.domain.name
2016-09-20    17:11:22:154     792    1018    PT      Server URL = http://wsus.domain.name/SimpleAuthWebService/SimpleAuth.asmx
2016-09-20    17:11:22:205     792    1018    EP    Got WSUS Reporting URL: "http://wsus.domain.name/ReportingWebService/ReportingWebService.asmx"
2016-09-20    17:11:22:205     792    1018    Report    Uploading 2 events using cached cookie, reporting URL = http://wsus.domain.name/ReportingWebService/ReportingWebService.asmx
2016-09-20    17:11:22:209     792    1018    Report    Reporter successfully uploaded 2 events.
2016-09-20    17:18:14:094     792    a50    Report    WARNING: CSerializationHelper:: InitSerialize failed : 0x80070002
2016-09-20    17:20:03:764     792    1018    Report    WARNING: CSerializationHelper:: InitSerialize failed : 0x80070002
2016-09-20    17:22:04:829     792    a50    AU    ###########  AU: Uninitializing Automatic Updates  ###########
2016-09-20    17:22:04:846     792    a50    WuTask    Uninit WU Task Manager
2016-09-20    17:22:04:900     792    a50    Service    *********
2016-09-20    17:22:04:900     792    a50    Service    **  END  **  Service: Service exit [Exit code = 0x240001]
2016-09-20    17:22:04:900     792    a50    Service    *************



Error 0x8024401f occurred while downloading update; notifying dependent calls.

$
0
0

2016/09/20 01:30:05.8627157 1368  1184  DownloadManager Error 0x8024401f occurred while downloading update; notifying dependent calls.
2016/09/20 01:30:05.8989863 1368  1184  DownloadManager BITS job {CE36E62E-E16D-4AEF-B68E-B49C8F3BAA03} hit a transient error, updateId = {2E589938-D607-4F20-8F40-E15522754021}.202, error = 0x801901F4
2016/09/20 01:30:05.8992314 1368  1184  DownloadManager File: http://pwsu01.sof.intra:8530/Content/98/B257BE7565C17D613E0187FB8424B8FC89D55C98.cab
2016/09/20 01:30:05.8999236 1368  1184  DownloadManager Error 0x8024401f occurred while downloading update; notifying dependent calls.
2016/09/20 01:30:05.9876425 1368  7564  DownloadManager BITS job {454650D4-F1D5-4D73-8F64-58788E9B4E29} hit a transient error, updateId = {9C1A3EAA-9371-4749-92D1-9F3D03B4FFA9}.203, error = 0x801901F4
2016/09/20 01:30:05.9878758 1368  7564  DownloadManager File: http://pwsu01.sof.intra:8530/Content/97/A110D0C44697860F50758118FE114E7BCF662697.exe
2016/09/20 01:30:05.9885746 1368  7564  DownloadManager Error 0x8024401f occurred while downloading update; notifying dependent calls.
2016/09/20 01:30:06.6183019 1368  8764  DownloadManager BITS job {EB48A56F-4BD9-4C33-983D-820ED84DB152} hit a transient error, updateId = {9D7013A2-FB03-4545-B55C-244558AFBE88}.201, error = 0x801901F4
2016/09/20 01:30:06.6185437 1368  8764  DownloadManager File: http://pwsu01.sof.intra:8530/Content/14/DCCACEBE898E27309DA9154872DCD113B2B2E014.exe
2016/09/20 01:30:06.6192325 1368  8764  DownloadManager Error 0x8024401f occurred while downloading update; notifying dependent calls.
2016/09/20 01:30:06.6882780 1368  7564  DownloadManager BITS job {9A291B2D-3DF1-4559-A7A0-E241F022177A} hit a transient error, updateId = {11DA6276-970C-430F-A540-D835348900E9}.201, error = 0x801901F4
2016/09/20 01:30:06.6885186 1368  7564  DownloadManager File: http://pwsu01.sof.intra:8530/Content/BB/D667A736A23F44526382308C7A86E1ABA54568BB.cab
2016/09/20 01:30:06.6892029 1368  7564  DownloadManager Error 0x8024401f occurred while downloading update; notifying dependent calls.
2016/09/20 01:30:06.7681862 1368  8764  DownloadManager BITS job {0F6AE7FD-9EF1-4622-A7C2-B16FA6309479} hit a transient error, updateId = {2582E81A-82F6-49D0-8C06-9859826C0821}.200, error = 0x801901F4
2016/09/20 01:30:06.7684799 1368  8764  DownloadManager File: http://pwsu01.sof.intra:8530/Content/55/699BF47D2326FDD390F2F1770E1A982FA1538055.exe
2016/09/20 01:30:06.7692458 1368  8764  DownloadManager Error 0x8024401f occurred while downloading update; notifying dependent calls.
2016/09/20 01:30:06.8048469 1368  8984  DownloadManager BITS job {4791CF0F-6252-487E-9F47-12919F155850} hit a transient error, updateId = {C278DDEB-C7A5-4816-8FA4-8C8C8C84D2E2}.200, error = 0x801901F4
2016/09/20 01:30:06.8050787 1368  8984  DownloadManager File: http://pwsu01.sof.intra:8530/Content/BE/D8F24D14D7921D9144F8AF71D947302B3E7AD5BE.cab
2016/09/20 01:30:06.8057679 1368  8984  DownloadManager Error 0x8024401f occurred while downloading update; notifying dependent calls.

HELP-me. Please!

SQL Server 2014, old update appearing, why?

$
0
0

We are running Microsoft SQL Server 2014 build 12.0.5000 which is Service Pack 2

In our WSUS server, Microsoft SQL Server 2014 RTM Cumulative Update (CU) 14 KB3158271 is showing up

This website shows the various builds of SQL Server 2014

http://blogs.sqlsentry.com/team-posts/latest-builds-sql-server-2014/

The update showing up in WSUS is build 12.0.2569 which was released in June. Why is an older update for SQL even showing up in WSUS?

Few Clients failed to download new updates from WSUS Server

$
0
0

Please find the logs taken from windowsupdate.log

2016-09-2109:51:00:573584f70AU#############
2016-09-2109:51:00:573584f70AU## START ##  AU: Download updates
2016-09-2109:51:00:573584f70AU#########
2016-09-2109:51:00:573584f70AU # Approved updates = 3
2016-09-2109:51:00:667584f70AUAU initiated download, updateId = {3CEF7892-1F03-4290-99FB-0692B057646A}.201, callId = {B94B3777-DA02-43ED-B20D-57F8024C4BCF}
2016-09-2109:51:00:714584f70AUAU initiated download, updateId = {BE0CB19A-4A6D-4743-A137-096259875CA1}.201, callId = {19E713D3-7DF1-412B-B153-5FA17164EFF0}
2016-09-2109:51:00:714584f70AUAU initiated download, updateId = {37CE1CA6-6D94-46B7-999F-9CC5007944DB}.201, callId = {D901B309-9BE8-41A8-ACD3-65F1780F0C0D}
2016-09-2109:51:00:714584f70AUCancelled download for invalidated/hidden/unapplicable update(s)
2016-09-2109:51:00:714584f70AUCurrently showing Progress UX client - so not launching any other client
2016-09-2109:51:00:714584f70AU # Pending download calls = 4
2016-09-2109:51:00:714584f70AU<<## SUBMITTED ## AU: Download updates
2016-09-2109:51:00:729584cc8AUGetting featured update notifications.  fIncludeDismissed = true
2016-09-2109:51:00:729584cc8AUNo featured updates available.
2016-09-2109:51:34:981584cc8AUInteractive Download was cancelled
2016-09-2109:51:36:606584f70AUCancelled download for invalidated/hidden/unapplicable update(s)
2016-09-2109:51:36:606584f70AUCancelled download for invalidated/hidden/unapplicable update(s)
2016-09-2109:51:36:606584f70AUUpdateDownloadProperties: 2 download(s) are still in progress.
2016-09-2109:51:36:606584f70AUUpdateDownloadProperties: download priority has changed from 3 to 2.
2016-09-2109:51:36:606584f70AUWARNING: Failed to change download properties of call, error = 0x80070057
2016-09-2109:51:36:606584f70AUUpdateDownloadProperties: download priority has changed from 3 to 2.
2016-09-2109:51:36:606584f70AUWARNING: Failed to change download properties of call, error = 0x80070057
2016-09-2109:51:36:606584f70AUPiggybacking on an AU detection already in progress
2016-09-2109:51:36:606584f70AUAU setting pending client directive to 'Install Complete Ux'
2016-09-2109:51:36:606584f70AUChanging existing AU client directive from 'Progress Ux' to 'Install Complete Ux', session id = 0x1
2016-09-2109:51:36:606584f70AUCancelled download for invalidated/hidden/unapplicable update(s)
2016-09-2109:51:36:606584f70AUAU setting pending client directive to 'Install Approval'
2016-09-2109:51:36:606584f70AUChanging existing AU client directive from 'Install Complete Ux' to 'Install Approval', session id = 0x1
2016-09-2109:51:36:6063664c20CltUIAU client got new directive = 'Install Approval', serviceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, return = 0
2016-09-2109:51:37:590584f70AUWARNING: Returning due to error from GetDownloadProgressUx, error = 0x8024000C
2016-09-2109:51:37:590584f70AUWARNING: GetInteractiveInstallProgress failed, error = 0x8024000C
2016-09-2109:51:37:5902824c98WUAppWARNING: Call to GetInteractiveInstallProgress failed, hr=8024000C
2016-09-2109:51:44:763584f70AUGetting featured update notifications.  fIncludeDismissed = true
2016-09-2109:51:44:763584f70AUNo featured updates available.
2016-09-2109:51:51:638584f70AUWARNING: Returning due to error from GetDownloadProgressUx, error = 0x8024000C
2016-09-2109:51:51:638584f70AUWARNING: GetInteractiveInstallProgress failed, error = 0x8024000C
2016-09-2109:51:51:6382824c98WUAppWARNING: Call to GetInteractiveInstallProgress failed, hr=8024000C
2016-09-2109:52:11:514584e3cAUAU received handle event
2016-09-2109:52:11:514584e3cAUAU setting pending client directive to 'Install Approval'
2016-09-2109:52:26:514584e3cAUWARNING: AU found no suitable session to launch client in
2016-09-2109:53:09:423584e3cAULaunched new AU client for directive 'Install Approval', session id = 0x2
2016-09-2109:53:09:8762868fcMisc===========  Logging initialized (build: 7.6.7600.256, tz: +0900)  ===========
2016-09-2109:53:09:8762868fcMisc = Process: C:\Windows\system32\wuauclt.exe
2016-09-2109:53:09:8602868fcAUClntLaunched Client UI process
2016-09-2109:53:11:2822868fcMisc===========  Logging initialized (build: 7.6.7600.256, tz: +0900)  ===========
2016-09-2109:53:11:2822868fcMisc = Process: C:\Windows\system32\wuauclt.exe
2016-09-2109:53:11:2822868fcMisc = Module: C:\Windows\system32\wucltux.dll
2016-09-2109:53:11:2822868fcCltUIAU client got new directive = 'Install Approval', serviceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, return = 0
2016-09-2109:56:10:524584e3cAUAU received handle event
2016-09-2109:56:10:524584e3cAUAU setting pending client directive to 'Install Approval'
2016-09-2109:56:25:525584e3cAUWARNING: AU found no suitable session to launch client in
2016-09-2110:52:09:810584e3cAULaunched new AU client for directive 'Install Approval', session id = 0x1
2016-09-2110:52:09:951440410c8Misc===========  Logging initialized (build: 7.6.7600.256, tz: +0900)  ===========
2016-09-2110:52:09:951440410c8Misc = Process: C:\Windows\system32\wuauclt.exe
2016-09-2110:52:09:935440410c8AUClntLaunched Client UI process
2016-09-2110:52:11:326440410c8Misc===========  Logging initialized (build: 7.6.7600.256, tz: +0900)  ===========
2016-09-2110:52:11:326440410c8Misc = Process: C:\Windows\system32\wuauclt.exe
2016-09-2110:52:11:326440410c8Misc = Module: C:\Windows\system32\wucltux.dll
2016-09-2110:52:11:326440410c8CltUIAU client got new directive = 'Install Approval', serviceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, return = 0
2016-09-2110:53:05:109584dc0AUGetting featured update notifications.  fIncludeDismissed = true
2016-09-2110:53:05:109584dc0AUNo featured updates available.
2016-09-2110:55:59:6471468444Misc===========  Logging initialized (build: 7.6.7600.256, tz: +0900)  ===========
2016-09-2110:55:59:6471468444Misc = Process: C:\Windows\Explorer.EXE
2016-09-2110:55:59:6471468444Misc = Module: C:\Windows\system32\wucltux.dll
2016-09-2110:55:59:6471468444WUAppNo EULA acceptance needed
2016-09-2110:55:59:6475841100AUAU received approval from Ux for 12 updates
2016-09-2110:55:59:6475841100AUAU setting pending client directive to 'Progress Ux'
2016-09-2110:55:59:647440410c8CltUIAU client got new directive = 'Interactive Progress', serviceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, return = 0
2016-09-2110:55:59:66358412d8AUBeginInteractiveInstall invoked for Download
2016-09-2110:55:59:66358412d8AUAuto-approving update for download, updateId = {FD703607-19F5-4172-8BD4-706BBA56B1DA}.200, ForUx=1, IsOwnerUx=1, HasDeadline=0, IsMinor=0
2016-09-2110:55:59:66358412d8AUAuto-approving update for download, updateId = {C8763216-F956-4F44-926D-A91E561D92E0}.201, ForUx=1, IsOwnerUx=1, HasDeadline=0, IsMinor=0
2016-09-2110:55:59:66358412d8AUAuto-approving update for download, updateId = {E8665464-EFF0-435E-9546-8043B7587E4C}.203, ForUx=1, IsOwnerUx=1, HasDeadline=0, IsMinor=0
2016-09-2110:55:59:66358412d8AUAuto-approving update for download, updateId = {5616FF75-C863-474E-904D-826B11827FC2}.201, ForUx=1, IsOwnerUx=1, HasDeadline=0, IsMinor=0
2016-09-2110:55:59:66358412d8AUAuto-approving update for download, updateId = {3CEF7892-1F03-4290-99FB-0692B057646A}.201, ForUx=1, IsOwnerUx=1, HasDeadline=0, IsMinor=0
2016-09-2110:55:59:66358412d8AUAuto-approving update for download, updateId = {D99097A3-AAA6-47F8-93E8-200E514376B7}.201, ForUx=1, IsOwnerUx=1, HasDeadline=0, IsMinor=0
2016-09-2110:55:59:66358412d8AUAuto-approving update for download, updateId = {37CE1CA6-6D94-46B7-999F-9CC5007944DB}.201, ForUx=1, IsOwnerUx=1, HasDeadline=0, IsMinor=0
2016-09-2110:55:59:66358412d8AUAuto-approving update for download, updateId = {FA374EDD-CD21-47A7-B22B-276C3CE9B068}.202, ForUx=1, IsOwnerUx=1, HasDeadline=0, IsMinor=0
2016-09-2110:55:59:66358412d8AUAuto-approving update for download, updateId = {95E6F3F4-0600-4C9A-9C2D-A3700E5CBAA6}.202, ForUx=1, IsOwnerUx=1, HasDeadline=0, IsMinor=0
2016-09-2110:55:59:66358412d8AUAuto-approved 9 update(s) for download (for Ux)
2016-09-2110:55:59:66358412d8AUUpdateDownloadProperties: 1 download(s) are still in progress.
2016-09-2110:55:59:66358412d8AgentSetting download properties on call 19E713D3-7DF1-412B-B153-5FA17164EFF0: priority=3, interactive=1, owner is system=0, proxy settings=1, proxy session id=1
2016-09-2110:55:59:67858412d8AU#############
2016-09-2110:55:59:67858412d8AU## START ##  AU: Download updates
2016-09-2110:55:59:67858412d8AU#########
2016-09-2110:55:59:67858412d8AU # Approved updates = 9
2016-09-2110:55:59:67858412d8AUAU initiated download, updateId = {FD703607-19F5-4172-8BD4-706BBA56B1DA}.200, callId = {E8B9752A-14F2-4C07-9FE0-520A19C900E5}
2016-09-2110:55:59:75658412d8AUAU initiated download, updateId = {C8763216-F956-4F44-926D-A91E561D92E0}.201, callId = {2C4AD4A0-E70F-4C2E-AD20-966A1BAE25FE}
2016-09-2110:55:59:75658412d8AUAU initiated download, updateId = {E8665464-EFF0-435E-9546-8043B7587E4C}.203, callId = {C5AAD3B5-A90E-462D-93D8-93728C0BB6B1}
2016-09-2110:55:59:75658412d8AUAU initiated download, updateId = {5616FF75-C863-474E-904D-826B11827FC2}.201, callId = {C6BD5653-6A7B-44D0-A469-8AEB0058CAD2}
2016-09-2110:55:59:77258412d8AUAU initiated download, updateId = {3CEF7892-1F03-4290-99FB-0692B057646A}.201, callId = {5D013374-1CFE-474B-BCB1-657ADFBEDAAC}
2016-09-2110:55:59:77258412d8AUAU initiated download, updateId = {D99097A3-AAA6-47F8-93E8-200E514376B7}.201, callId = {C8141B86-A8C8-4325-AEA8-B75C1B5E0244}
2016-09-2110:55:59:80358412d8AUAU initiated download, updateId = {37CE1CA6-6D94-46B7-999F-9CC5007944DB}.201, callId = {5630D35D-7BC2-4F87-A9FC-D65E2C75E165}
2016-09-2110:55:59:81958412d8AUAU initiated download, updateId = {FA374EDD-CD21-47A7-B22B-276C3CE9B068}.202, callId = {165F917F-05D5-43E6-AFEB-62EF24CB0A96}
2016-09-2110:55:59:81958412d8AUAU initiated download, updateId = {95E6F3F4-0600-4C9A-9C2D-A3700E5CBAA6}.202, callId = {1AF7D95B-C040-401A-A2F1-B7960D0F97CD}
2016-09-2110:55:59:81958412d8AUCurrently showing Progress UX client - so not launching any other client
2016-09-2110:55:59:81958412d8AU # Pending download calls = 10
2016-09-2110:55:59:81958412d8AU<<## SUBMITTED ## AU: Download updates
2016-09-2110:55:59:85058412d8AUGetting featured update notifications.  fIncludeDismissed = true
2016-09-2110:55:59:85058412d8AUNo featured updates avail


User computers won't receive all the updates from WSUS

$
0
0

Last week i setup a new WSUS server, with the same configurations as the old one. The old one was deleted when i feelt that the new one worked fine.

After a while the new WSUS server stopped giving all of the updates to the user's computers. It's only around 7 updates that is missing on every computer but that is still to much.

Help with this would be greatly appreciated.

The event id 364



New WSUS Environment Suggestions

$
0
0

I am looking at setting up a new WSUS Environment to replace out existing WSUS server this running 2008. I would like to get some suggestions on best practice, as I have two options for the new environment.

Option 1. Setup a master WSUS server and 3 down stream servers, one server for Desktop to test updates, one server for production updates and one server for Server updates.

Option 2. Setup one WSUS server and control updates by groups, one for desktop to test updates, one for prod updates, and one for Server updates.

The only problem I see with option 2 is that I would have to search through approved updates after I send them to Desktop testing and then try and find them to approve for Prod. Also we are sitting at 99801 updates for all the systems/products we are using.

So any suggestions would be great, Thanks.

Client stalls on Windows Update with svchost host taking up CPU 25% (4 cores).

$
0
0

WSUS server running, GPo directs clients to update from and report to WSUS.

After working correctly for some time, I now discover that clients are failing updates from our WSUS server. Ever freshly installed clients Win 7 Pro UK with Service Pack 1 with no 3rd party software installed

First time WU is run, users are promted to install an updated version of WU. After this, nothing happens.

WSUS tells me "This computer has not reported status yet"

Errors in windows update logs looks like this:

First it tells me: WU client version 7.5.7601.17514

2016-09-1115:29:04:015812ab0AgentWARNING: Failed to read the service id for re-registration 0x80070002
2016-09-1115:29:04:015812ab0AgentWARNING: Missing service entry in the backup data store; cleaning up

2016-09-1117:36:36:558920a00SetupDownload of SelfUpdate binaries succeeded
2016-09-1117:36:36:558920a00SetupStarting agent SelfUpdate

2016-09-1117:36:43:7713300ce8SetupInstalling setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-09-1117:36:45:9573300ce8SetupWARNING: CBS installation failed, error = 0x800F0806
2016-09-1117:36:45:9573300ce8SetupWARNING: Install of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" failed, error = 0x8024D00E
2016-09-1117:36:45:9573300ce8SetupFATAL: Failed to install package, error = 0x8024D00E
2016-09-1117:36:45:9573300ce8SetupWARNING: Installing applicable setup packages failed, error = 0x8024D00E
2016-09-1117:36:45:9733300ce8SetupReboot is required.  Diagnostic: <0|0|3:X|5:X>

Rebooting...

And it gets updated to 7.6.7600.320

2016-09-1117:36:53:873920da8SetupSetup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is applicable but is already staged; it will not be downloaded.
2016-09-1117:36:53:873920da8SetupSelfUpdate check completed.  SelfUpdate is required.

2016-09-1118:07:45:378900164SetupService restarting after SelfUpdate
2016-09-1118:07:45:378900164SetupClient version: Core: 7.6.7600.320  Aux: 7.6.7600.320

(after what seems to be a couple of failed selfupdates)

From here every WU fails (with svchost stalling af 25%):

2016-09-1118:09:09:7859006c4AgentWARNING: Failed to evaluate Installed rule, updateId = {189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB}.101, hr = 80242013

(which seems to be an Irish language pack that I can't find on the WSUS server)

Lots of these:

2016-09-1118:09:30:8959006c4AgentUpdate {9F3DD20A-1004-470E-BA65-3DC62D982958}.100 has no local extended metadata. Not returning it.
2016-09-1118:09:30:8959006c4AgentUpdate {28BC880E-0592-4CBF-8F95-C79B17911D5F}.100 has no local extended metadata. Not returning it.
2016-09-1118:09:30:8959006c4AgentUpdate {68623613-134C-4B18-BCEC-7497AC1BFCB0}.101 has no local extended metadata. Not returning it

Then:

2016-09-1118:09:30:8999006c4Agent * Found 0 updates and 0 categories in search; evaluated appl. rules of 1193 out of 2157 deployed entities
2016-09-1118:09:30:9019006c4Agent*********
2016-09-1118:09:30:9019006c4Agent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-09-1118:09:30:9019006c4Agent*************
2016-09-1118:09:30:951900d58AU>>##  RESUMED  ## AU: Search for updates [CallId = {AD1027AE-A2E5-4A05-B670-688F728597D8}]
2016-09-1118:09:30:951900d58AU # 0 updates detected

With the last WU I did, the last logs ends with:

2016-09-1121:26:44:146916df4SetupSelfUpdate handler update NOT required: Current version: 7.6.7600.320, required version: 7.6.7600.320
2016-09-1121:26:44:146916df4SetupEvaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-09-1121:26:44:149916df4SetupSetup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-09-1121:26:44:149916df4SetupEvaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-09-1121:26:44:176916df4SetupSetup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-09-1121:26:44:176916df4SetupEvaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-09-1121:26:44:219916df4SetupSetup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-09-1121:26:44:219916df4SetupSelfUpdate check completed.  SelfUpdate is NOT required.
2016-09-1121:26:46:680916df4PT+++++++++++  PT: Synchronizing server updates  +++++++++++
2016-09-1121:26:46:680916df4PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://192.168.206.14:8530/ClientWebService/client.asmx
2016-09-1121:27:18:773916df4AgentWARNING: Failed to evaluate Installed rule, updateId = {189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB}.101, hr = 80242013
2016-09-1121:27:24:618916df4PT+++++++++++  PT: Synchronizing extended update info  +++++++++++
2016-09-1121:27:24:618916df4PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://192.168.206.14:8530/ClientWebService/client.asmx

And nothing happens for 10 min. (Except for svchost taking 25% cpu).

What I have done:

Declining some of the language packs

I ran WSUSutil reset

I ran WSUS troubleshooter on the client. It told me things like "wsus server registration is missing or corrupt" 

Other things to try - reinstalling WSUS server?

Regards, Lars.



Window Update is not worked on Window 2008 Server

$
0
0
We have a window 2008 that cannot scan update with error below:
2016-09-09 11:21:36:515 7472 1fd4 COMAPI WARNING: ISusInternal::GetUpdateMetadata2 failed, hr=8007000E
2016-09-09 11:21:36:523 7472 1fd4 COMAPI IUpdateService removing volatile scan package service, serviceID = {5E17FA8F-1F16-4449-8537-19C4D4101B72}
2016-09-09 11:21:37:901 1164 394 Agent WARNING: WU client fails CClientCallRecorder::RemoveService with error 0xc800042d
2016-09-09 11:21:37:902 7472 1fd4 COMAPI WARNING: ISusInternal::RemoveService failed, hr=C800042D
I've tried restart the server, deleted softwareDistribution folder, also tried to fixed the system by sfc /scannow but none of those method work.
Any one have idea?

WUServer and WUStatusServer keep disappearing

$
0
0

We are experiencing an issue where the two Registry Keys are being constantly removed from: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate.

We have created a WSUS GPO which enforces Windows Update configuration as per our requirement (nothing special), however these two keys keep disappearing. If I run GPRESULT /R it will show that the GPO has applied, and if I run GPUPDATE /FORCE the two keys will reappear, however, after a few hours they will disappear. There are no local policies that are configured to be overwriting this GPO.

To further troubleshoot, I created a TEST OU at the top of the domain and moved one server into it (to have a clean policy on the server I removed it and rejoined it to the domain). I blocked inheritance to TEST OU and assigned only WSUS GPO. Now this server only has this single GPO assigned to it. The issue remains. I am running out of ideas. if anyone could help that would be great.

Thanks

ZB




Prompting for more updates when user logs on after installing scheduled updates windows 2007

$
0
0

I have set WSUS updates to install automatically using group policy at 03:00. The updates kick off and install automatically fine and then performs the reboot. User then logs in next morning and it detects that it needs another 7-10 updates and prompts user to install. Is there any way of getting the updates to trigger again after the first updates to automatically install after the reboot rather than sitting there in the morning waiting for user intervention?

Thanks

WSUS downstream servers not Synchronizing

$
0
0
We have 5 of 10 downstream WSUS update servers unable to successfully synch updates. The whole environment (currently managed through SolarWinds Patch Manager) was part of an SCCM 2012 environment (recently moved to Corporate data Center).  The logs are essentially useless on the main update point as well as the downstream servers.  If we remove the Software Update point from the old SCCM 2012 environment (still up for training purposes), will this create more problems with the main update point and the ones still functional?

Many errors after installing WSUS 12012,12032, 12022,12052

$
0
0

Hello Everybody,

after installing two time a WSUS at a Windows Server 2012 R2 and hours of research, I would like to ask for help.

So what I have done:

  • Installing Windows Server 2012 R2 this server is in our DMZ, so I opened http und Https for syncing with Windows Update and Port 8530 and 8531 for the clients
  • Installing all Updates
  • Installing the WSUS Features here I added at the Point .Net framework HTTP Activation for the manual post installation steps after installing KB3159706. I also added .Net Framework Features für Report Viewer 2008.
  • I use the WID Database
  • Install all updates for WSUS and do the post installation steps for KB3159706
  • Than I bought a certificate and secure the server with ssl using http://www.wsus.de/de/HowTo/Kommunikation-zwischen-WSUS-und-Clients-mit-SSL-verschluesseln without ca (I bought one).
  • Yes after that I restarted IIS and the server
After that I got many errors
  • The Client Web Service is not working.
  • The API Remoting Web Service is not working.
  • The DSS Authentication Web Service is not working.
  • The SimpleAuth Web Service is not working.

and last but not least:

  • Content file download failed.
    Reason: CRC verification failure.
    Source File: /c/upgr/2016/05/10586.0.160426-1409.th2_refresh_clienteducation_vol_x64fre_en-gb_c4f7837e4028339a2c8be01dbf03c34a0886359f.esd
    Destination File: d:\wsusdb\WsusContent\9F\C4F7837E4028339A2C8BE01DBF03C34A0886359F.esd

Did somebody have suggestions how to fix it?

Many Thanks

Bob

New WSUS installation not working

$
0
0

I'm installing on WSUS on our current web server(VM), it installed correctly but caused all of our other websites on the server to have a HTTP Error 500.19, I was able to fix the sites by completing the steps from a website, I can't post links but I will include the steps I completed:

To resolve this situation, review the ApplicationHost.config (locate it in under C:\windows\inetsrv\config). In the ApplicationHost.config find these lines :<scheme name=”xpress” doStaticCompression=”false” doDynamicCompression=”true”
dll=”C:\Windows\system32\inetsrv\suscomp.dll” staticCompressionLevel=”10″
dynamicCompressionLevel=”0″ />

Found it ? okay, it’s time to deal the situation. run this executable with the following parameters: %windir%\system32\inetsrv\appcmd.exe set config -section:system.webServer/httpCompression /-[name=’xpress’]

This command will disable the suscomp.dll which is being installed by the WSUS. the compression schemes are defined globally and loaded in every application Pool. when WSUS x64 register this dll it will result this error when x64 version of suscomp.dll attempts to load in an application pool which is running in x32 mode.

After completing those steps all of my websites are working correctly now, but by removing that compression method does that stop WSUS from working correctly?

I'm still getting this error on synchronization:

The WSUS administration console was unable to connect to the WSUS Server via the remote API.

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

System.Net.WebException -- The operation has timed out

Source
System.Web.Services

Stack Trace:
   at System.Web.Services.Protocols.WebClientProtocol.GetWebResponse(WebRequest request)
   at System.Web.Services.Protocols.HttpWebClientProtocol.GetWebResponse(WebRequest request)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.ApiRemotingCompressionProxy.GetWebResponse(WebRequest webRequest)
   at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
   at Microsoft.UpdateServices.Internal.ApiRemoting.ExecuteSPGetUpdateServerStatus(Int32 updateSources, Boolean includeDownstreamComputers, String updateScopeXml, String computerTargetScopeXml, String preferredCulture, Int32 publicationState, Int32 propertiesToGet)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.ExecuteSPGetUpdateServerStatus(UpdateSources updateSources, Boolean includeDownstreamComputers, String updateScopeXml, String computerTargetScopeXml, String preferredCulture, ExtendedPublicationState publicationState, UpdateServerStatusPropertiesToGet propertiesToGet)
   at Microsoft.UpdateServices.Internal.BaseApi.UpdateServer.GetStatus(UpdateSources updateSources, Boolean includeDownstreamComputers, UpdateScope updatesToInclude, ComputerTargetScope computersToInclude, UpdateServerStatusPropertiesToGet propertiesToGet)
   at Microsoft.UpdateServices.Internal.BaseApi.UpdateServer.GetReplicaStatus(UpdateSources updateSources)
   at Microsoft.UpdateServices.UI.SnapIn.Common.CachedUpdateServerStatus.GetFreshObjectForCache()
   at Microsoft.UpdateServices.UI.AdminApiAccess.CachedObject.RefreshCache()
   at Microsoft.UpdateServices.UI.AdminApiAccess.CachedObject.GetFromCache()
   at Microsoft.UpdateServices.UI.SnapIn.Pages.ServerSummaryPage.backgroundWorker_DoWork(Object sender, DoWorkEventArgs e)

I'm also getting EventID's 7032 and 7053 in the Event Viewer.

Viewing all 12331 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>