Quantcast
Channel: WSUS Forum
Viewing all 12331 articles
Browse latest View live

Downstream replica WSUS server

$
0
0

Hi,

We have always used just one WSUS server in our environment. We have a site-to-site VPN connecting home office and colo. A recent firewall change prompted us to consider setting up a replica downstream server as VPN users can no longer hit the WSUS server which resides at our local office and we do not want to open port 8530 on the firewall.

Moving the WSUS server to our colo will resolve the issue for offsite VPN users, however are there benefits to creating a replica downstream server at the local office? 

Thanks


Hank Vare


WARNING: DownloadFileInternal failed for http://fe2.update.microsoft.com/v11/2/windowsupdate/redir/v6-win7sp1-wuredir.cab

$
0
0

Windowsupdate.log shows the message:

WARNING: DownloadFileInternal failed for http://fe2.update.microsoft.com/v11/2/windowsupdate/redir/v6-win7sp1-wuredir.cab

And the SCEP is not getting updated. Please help!

WSUS Clients are failing to report

$
0
0

I'm trying to rebuild one of our WSUS servers (replica server) due to we ran out of space on the drive that held WSUSContent. My goal was to add an external drive (4TB) to the system and re-download the updates from the upstream server.  I used the wizard to completely remove WSUS from the server and than used the wizard to add the service back to the server but pointed it to the new drive.  The computers that report to this server are showing in the computers bucket but show they have not reported yet.

Server 2008 R2

Update Services Version 3.2.7600.226

Client Windows 7 x64

Verified GPO is being applied to local machine.

Able to access http://servername:8530

I have tried wuauclt /reportnow and wuauclt /detectnow.

Below are the logs from the client windowsupdatelog. 

2016-12-20 09:19:00:583  124 3018 Misc   = Process: C:\Windows\system32\svchost.exe
2016-12-20 09:19:00:584  124 3018 Misc   = Module: c:\windows\system32\wuaueng.dll
2016-12-20 09:19:00:583  124 3018 Service *************
2016-12-20 09:19:00:584  124 3018 Service ** START **  Service: Service startup
2016-12-20 09:19:00:584  124 3018 Service *********
2016-12-20 09:19:00:622  124 3018 Agent   * WU client version 7.6.7601.19161
2016-12-20 09:19:00:622  124 3018 Agent   * Base directory: C:\Windows\SoftwareDistribution
2016-12-20 09:19:00:622  124 3018 Agent   * Access type: No proxy
2016-12-20 09:19:00:637  124 3018 Agent   * Network state: Connected
2016-12-20 09:19:00:997  124 3018 DtaStor Default service for AU is {00000000-0000-0000-0000-000000000000}
2016-12-20 09:19:01:017  124 3018 DtaStor Default service for AU is {9482F4B4-E343-43B6-B170-9A65BC822C77}
2016-12-20 09:19:01:036  124 3018 Agent WARNING: failed to access the auth cab, fatal error 0x80070003
2016-12-20 09:19:01:051  124 3018 Agent WARNING: Invalid service in the backup data store; cleaning up
2016-12-20 09:19:01:072  124 3018 Agent WARNING: Failed to add and register service 7971f918-a847-4430-9279-4a52d1efe18d to the data store 0x80240031
2016-12-20 09:19:01:072  124 3018 Agent WARNING: Default Service Recovery: Attempting to add pending registration for service 7971f918-a847-4430-9279-4a52d1efe18d to the data store
2016-12-20 09:19:08:338  124 2b38 Report CWERReporter::Init succeeded
2016-12-20 09:19:08:338  124 2b38 Agent ***********  Agent: Initializing Windows Update Agent  ***********
2016-12-20 09:19:08:358  124 2b38 Agent   * Prerequisite roots succeeded.
2016-12-20 09:19:08:358  124 2b38 Agent ***********  Agent: Initializing global settings cache  ***********
2016-12-20 09:19:08:358  124 2b38 Agent   * WSUS server:http://cr1site01:8530
2016-12-20 09:19:08:358  124 2b38 Agent   * WSUS status server:http://cr1site01:8530
2016-12-20 09:19:08:358  124 2b38 Agent   * Target group: (Unassigned Computers)
2016-12-20 09:19:08:358  124 2b38 Agent   * Windows Update access disabled: No
2016-12-20 09:19:08:358  124 2b38 DnldMgr Download manager restoring 0 downloads
2016-12-20 09:19:08:359  124 2b38 AU ###########  AU: Initializing Automatic Updates  ###########
2016-12-20 09:19:08:359  124 2b38 AU   # WSUS server:http://cr1site01:8530
2016-12-20 09:19:08:359  124 2b38 AU   # Detection frequency: 22
2016-12-20 09:19:08:359  124 2b38 AU   # Approval type: Scheduled (Policy)
2016-12-20 09:19:08:359  124 2b38 AU   # Scheduled install day/time: Thursday at 4:00
2016-12-20 09:19:08:359  124 2b38 AU   # Auto-install minor updates: Yes (Policy)
2016-12-20 09:19:08:359  124 2b38 AU   # Will interact with non-admins (Non-admins are elevated (User preference))
2016-12-20 09:19:08:369  124 2b38 AU Setting AU scheduled install time to 2016-12-22 10:00:00
2016-12-20 09:19:08:919  124 3018 Report ***********  Report: Initializing static reporting data  ***********
2016-12-20 09:19:08:919  124 3018 Report   * OS Version = 6.1.7601.1.0.65792
2016-12-20 09:19:08:919  124 3018 Report   * OS Product Type = 0x00000030
2016-12-20 09:19:08:941  124 3018 Report   * Computer Brand = Dell Inc.
2016-12-20 09:19:08:941  124 3018 Report   * Computer Model = OptiPlex 3020
2016-12-20 09:19:08:942  124 3018 Report   * Bios Revision = A06
2016-12-20 09:19:08:942  124 3018 Report   * Bios Name = BIOS Date: 11/17/14 22:35:21 Ver: A06.00
2016-12-20 09:19:08:942  124 3018 Report   * Bios Release Date = 2014-11-17T00:00:00
2016-12-20 09:19:08:942  124 3018 Report   * Locale ID = 1033
2016-12-20 09:19:09:777  124 2b38 AU Successfully wrote event for AU health state:0
2016-12-20 09:19:09:778  124 2b38 AU Initializing featured updates
2016-12-20 09:19:09:778  124 2b38 AU Found 0 cached featured updates
2016-12-20 09:19:09:778  124 2b38 AU Successfully wrote event for AU health state:0
2016-12-20 09:19:09:778  124 2b38 AU Successfully wrote event for AU health state:0
2016-12-20 09:19:09:778  124 2b38 AU AU finished delayed initialization
2016-12-20 09:19:09:778  124 2b38 AU Triggering AU detection through DetectNow API
2016-12-20 09:19:09:779  124 2b38 AU Triggering Online detection (non-interactive)
2016-12-20 09:19:09:779  124 3018 AU #############
2016-12-20 09:19:09:779  124 3018 AU ## START ##  AU: Search for updates
2016-12-20 09:19:09:779  124 3018 AU #########
2016-12-20 09:19:09:786  124 3018 AU <<## SUBMITTED ## AU: Search for updates [CallId = {693BA60D-9130-48F3-9587-65BB4488D451}]
2016-12-20 09:19:09:786  124 1fa0 Agent *************
2016-12-20 09:19:09:786  124 1fa0 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-12-20 09:19:09:786  124 1fa0 Agent *********
2016-12-20 09:19:09:786  124 1fa0 Agent   * Online = Yes; Ignore download priority = No
2016-12-20 09:19:09:786  124 1fa0 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-12-20 09:19:09:786  124 1fa0 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-12-20 09:19:09:786  124 1fa0 Agent   * Search Scope = {Machine}
2016-12-20 09:19:09:787  124 1fa0 Setup Checking for agent SelfUpdate
2016-12-20 09:19:09:787  124 1fa0 Setup Client version: Core: 7.6.7601.19161  Aux: 7.6.7601.19161
2016-12-20 09:19:09:805  124 1fa0 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2016-12-20 09:19:09:818  124 1fa0 Misc  Microsoft signed: NA
2016-12-20 09:19:09:818  124 1fa0 Misc FATAL: SubCA Chain Policy failed.
2016-12-20 09:19:09:818  124 1fa0 Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab are not trusted: Error 0x800b0001
2016-12-20 09:19:09:818  124 1fa0 Setup FATAL: Ident cab verification failed with error 0X800B0001
2016-12-20 09:19:09:818  124 1fa0 Setup WARNING: SelfUpdate check failed to download package information, error = 0x800B0001
2016-12-20 09:19:09:818  124 1fa0 Setup FATAL: SelfUpdate check failed, err = 0x800B0001
2016-12-20 09:19:09:818  124 1fa0 Agent   * WARNING: Skipping scan, self-update check returned 0x800B0001
2016-12-20 09:19:09:818  124 1fa0 Agent   * WARNING: Exit code = 0x800B0001
2016-12-20 09:19:09:818  124 1fa0 Agent *********
2016-12-20 09:19:09:818  124 1fa0 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-12-20 09:19:09:818  124 1fa0 Agent *************
2016-12-20 09:19:09:818  124 1fa0 Agent WARNING: WU client failed Searching for update with error 0x800b0001
2016-12-20 09:19:09:818  124 2c74 AU >>##  RESUMED  ## AU: Search for updates [CallId = {693BA60D-9130-48F3-9587-65BB4488D451}]
2016-12-20 09:19:09:818  124 2c74 AU   # WARNING: Search callback failed, result = 0x800B0001
2016-12-20 09:19:09:818  124 2c74 AU   # WARNING: Failed to find updates with error code 800B0001
2016-12-20 09:19:09:818  124 2c74 AU #########
2016-12-20 09:19:09:818  124 2c74 AU ##  END  ##  AU: Search for updates [CallId = {693BA60D-9130-48F3-9587-65BB4488D451}]
2016-12-20 09:19:09:818  124 2c74 AU #############
2016-12-20 09:19:09:819  124 2c74 AU Successfully wrote event for AU health state:0
2016-12-20 09:19:09:820  124 2c74 AU AU setting next detection timeout to 2016-12-20 20:19:09
2016-12-20 09:19:09:820  124 2c74 AU Setting AU scheduled install time to 2016-12-22 10:00:00
2016-12-20 09:19:09:820  124 2c74 AU Successfully wrote event for AU health state:0
2016-12-20 09:19:09:820  124 2c74 AU Successfully wrote event for AU health state:0
2016-12-20 09:19:14:777  124 1fa0 Report REPORT EVENT: {558499E3-13DB-4FF9-936E-62C2AC75ACEF} 2016-12-20 09:19:09:778-0600 1 202 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Content Install Reboot completed.
2016-12-20 09:19:14:777  124 1fa0 Report REPORT EVENT: {461FB835-B7B2-4377-8514-0C5B2E5D0F60} 2016-12-20 09:19:09:818-0600 1 148 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 1 800b0001 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x800b0001.
2016-12-20 09:19:14:871  124 1fa0 Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
2016-12-20 09:19:14:872  124 1fa0 Report WER Report sent: 7.6.7601.19161 0x800b0001(0) 67661EB-2423-451D-BF5D-13199E37DF28 Scan 1 0 SelfUpdate {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} 0

Feature update to Windows 10 1607 failed with WSUS Server 2016

$
0
0

I'm trying to update our win 10 pc's to the latest version 1607. I tried all steps provided by Microsoft to get the decrypted esd files to work.kb3159706

At last I upgraded my 2012 R2 to 2016 but unfortunally still no luck.

Still get the error: File is encrypted, but no key was provided.

Desperately need some help to fix this!

2016-12-21 10:50:16, Error                 MOUPG  RecoverCrypto: File is encrypted, but no key was provided.
2016-12-21 10:50:16, Error                 MOUPG  CDlpActionRecoverCrypto::DoCrypto(1713): Result = 0xC1800118
2016-12-21 10:50:16, Error                 MOUPG  CDlpActionRecoverCrypto::ExecuteRoutine(2465): Result = 0xC1800118
2016-12-21 10:50:16, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2101]
2016-12-21 10:50:16, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2100]
2016-12-21 10:50:16, Error                 MOUPG  CDlpActionImpl<class CDlpErrorImpl<class CDlpObjectInternalImpl<class CUnknownImpl<class IDlpAction> > >>::Execute(441): Result = 0xC1800118
2016-12-21 10:50:16, Info                  MOUPG  RecoverCrypto: Leaving Execute Method
2016-12-21 10:50:16, Error                 MOUPG  CDlpTask::ExecuteAction(3243): Result = 0xC1800118
2016-12-21 10:50:16, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2004]
2016-12-21 10:50:16, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2003]
2016-12-21 10:50:17, Error                 MOUPG  CDlpTask::ExecuteActions(3397): Result = 0xC1800118
2016-12-21 10:50:17, Info                  MOUPG  Waiting for actions thread to exit.
2016-12-21 10:50:17, Info                  MOUPG  Actions thread has exited.
2016-12-21 10:50:17, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2004]
2016-12-21 10:50:17, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2000]
2016-12-21 10:50:17, Error                 MOUPG  CDlpTask::Execute(1631): Result = 0xC1800118

New WSUS install on Windows 2012 R2. Confused with KB3095113 & KB3159706

$
0
0

Hi,

I am installing a new WSUS server on Windows 2012 R2.  Do i require to install both KB3095113 & KB3159706?  Most of my PC's are Windows 10.

Can someone please clarify if i require to install both the KB and the order in which it is to be installed.

Does the conflict of KB3148812 & KB3159706 still exist.

TIA

Liby

WSUS Reports KB3061064 for All Computers

$
0
0
Sometime this summer, my WSUS server started reporting that KB3061064 (Update Rollup for Skype for Business Server 2015, SmartSetup) was needed for every computer in my organization, which is about 20 including servers and workstations. We do not have a Skype server in our organization, so I thought it was also an update for clients and went ahead and approved it for clients. None of them needed the update. I hesitated to approve it for our servers, but eventually did to see what would happen. Even though WSUS reported it as needed, None of our servers listed it when it checked for updates when I ran Windows Update manually. It looks like WSUS is mistakenly reporting this update. Is anyone else seeing this?

Cannot connect to WSUS -- error 0x8024402f

$
0
0

We have Windows 10 fresh images that will not install updates from WSUS.  They usually fail with error0x8024402f, but occasionally I see 0x80244010.

We are running WSUS version 3.0 SP2 (3.2.7600.226) -- fully patched on Windows Server 2008.  It will be upgraded next year, but I really don't like the idea of all new machines having zero access to updates.  We are a school in a very rural area with limited bandwidth (2 Mbps shared among around 100 staff/students).  Because of this, going straight to Microsoft for updates is not an option!

The problem occurs with both Windows 10 Pro (1511) images and Windows 10 Edu (1607) images.  I have also seen a few Windows 7 machines with signs of the problem.

The log file from PowerShell --> Get-WindowsUpdateLog is HUGE for a text file (~2 MB and over 100,000 characters, which seems odd to me for a fresh install).  Because of this, I can't paste it into this message.

Here is a Dropbox link to it: https://www.dropbox.com/s/kskhf52ofatvwoc/WindowsUpdate.log?dl=0     (I would have linked it, but the system is saying something about no links until you verify your account...)

Anything you experts can share that could help us would be greatly appreciated!  We are on an extremely tight budget and can't really afford a $500 support ticket to Microsoft.


Error 8024401F

$
0
0

Windows Server 2012 R2 Server is unable to download and install updates and below error is generating while trying to download updates from local WSUS server.


WSUS not working

$
0
0

WSUS is not fully working

I find the below alerts in Operation manager

Application Pool worker process is unresponsive

The description for Event ID ( 2147488659 ) in Source ( Microsoft-Windows-WAS ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. You may be able to use the /AUXSOURCE= flag to retrieve this description; see Help and Support for details. The following information is part of the event:
WsusPool, 12148, -.

Application Pool worker process terminated unexpectedly

The description for Event ID ( 2147488657 ) in Source ( Microsoft-Windows-WAS ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote computer. You may be able to use the /AUXSOURCE= flag to retrieve this description; see Help and Support for details. The following information is part of the event:
WsusPool, 11248, e0434f4d.

In the System log I find the warning

The Pool is running and I have already tried recycling the pools.

The description for Event ID 5013 from source Microsoft-Windows-WAS cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.

If the event originated on another computer, the display information had to be saved with the event.

The following information was included with the event:

WsusPool

11756

In the Application log I find

Warning

Event code: 3001

Event message: The request has been aborted.

Event time: 1/7/2015 4:32:58 PM

Event time (UTC): 1/7/2015 10:32:58 PM

Event ID: 2dc2f9ad3b3a46c8937aad1700efddae

Event sequence: 328

Event occurrence: 1

Event detail code: 0

 

Application information:

    Application domain: /LM/W3SVC/1205299030/ROOT/ClientWebService-2-130651434398492491

    Trust level: Full

    Application Virtual Path: /ClientWebService

    Application Path: C:\Program Files\Update Services\WebServices\ClientWebService\

    Machine name: server

 

Process information:

    Process ID: 11620

    Process name: w3wp.exe

    Account name: NT AUTHORITY\NETWORK SERVICE

 

Exception information:

    Exception type: HttpException

    Exception message: Request timed out.

 

Request information:

    Request URL: http://serverad.domain.edu:8530/ClientWebService/client.asmx

    Request path: /ClientWebService/client.asmx

    User host address: x.x.x.x

    User: 

    Is authenticated: False

    Authentication Type: 

    Thread account name: NT AUTHORITY\NETWORK SERVICE

 

Thread information:

    Thread ID: 11

    Thread account name: NT AUTHORITY\NETWORK SERVICE

    Is impersonating: False

    Stack trace:

 Custom event details:

And error

An unhandled exception occurred and the process was terminated.

Application ID: /LM/W3SVC/1205299030/ROOT/ClientWebService

Process ID: 11620

Exception: System.InvalidOperationException

Message: Timeout expired.  The timeout period elapsed prior to obtaining a connection from the pool. This may have occurred because all pooled connections were in use and max pool size was reached.

StackTrace:    at System.Data.ProviderBase.DbConnectionFactory.GetConnection(DbConnection owningConnection)

   at System.Data.ProviderBase.DbConnectionClosed.OpenConnection(DbConnection outerConnection, DbConnectionFactory connectionFactory)

   at System.Data.SqlClient.SqlConnection.Open()

   at Microsoft.UpdateServices.DatabaseAccess.DBConnection.Connect(String connectionString)

   at Microsoft.UpdateServices.DatabaseAccess.DBConnection.Connect()

   at Microsoft.UpdateServices.Internal.GenericDataAccess.ExecuteSP(String spName, DBParameterCollection args, IExecuteSPHandler handler, Int32 queryTimeoutInSeconds)

   at Microsoft.UpdateServices.Internal.GenericDataAccess.ExecuteSP(String spName, DBParameterCollection args, IExecuteSPHandler handler)

   at Microsoft.UpdateServices.Internal.DatabaseAccess.CommonDataAccess.ExecuteSPMultipleResultSets(String spName, DBParameterCollection args, Type[] resultTypes)

   at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccess.ExecuteSPGetConfiguration()

   at Microsoft.UpdateServices.Internal.BaseApi.UpdateServerConfiguration.Load()

   at Microsoft.UpdateServices.Internal.ClassFactory.CreateWellKnownType(Type type, Object[] args)

   at Microsoft.UpdateServices.Internal.ClassFactory.CreateInstance(Type type, Object[] args)

   at Microsoft.UpdateServices.Internal.DataAccessCache.DeploymentChange(Object byTimer)

   at System.Threading.ExecutionContext.runTryCode(Object userData)

   at System.Runtime.CompilerServices.RuntimeHelpers.ExecuteCodeWithGuaranteedCleanup(TryCode code, CleanupCode backoutCode, Object userData)

   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)

   at System.Threading._TimerCallback.PerformTimerCallback(Object state)

Any idea as to what is going on?

Clinets don't get update from Windows 2016 WSUS

$
0
0

Hello,

We used WSUS in Win 2012R2 before, recently I reinstalled the server to Windows 2016 and configed WSUS, same server, name and IP.

I found in WSUS server console, I can see the client (Win7,Win8,Win2008,Win2012,Win2016) and the number of patches required, the client had reported its status to WSUS server; but in clinet side, it appeared "Windows is up to date", all clients have the issue, include new system.

I tried to clean folder "SoftwareDistribution" content in client, I tried to install the latest update to WSUS server, I checked service "BITS, WsusService" is running in WSUS server, but in clinet side still haven't any updates to be pushed.


WIndows Server 2008 R2 Patch Revert Error

$
0
0

Hi All

I have not able to install below patch

Package KB3146706 failed to be changed to the Installed state. Status: 0x800700ea.

I have done

1. Readiness tool no error found

2.done below step as well

net stop bits
net stop wuauserv
net stop appidsvc
net stop cryptsvc
Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat"
Ren %systemroot%\SoftwareDistribution SoftwareDistribution.bak
Ren %systemroot%\system32\catroot2 catroot2.bak

sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)

sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)

cd /d %windir%\system32

regsvr32.exe atl.dll
regsvr32.exe urlmon.dll
regsvr32.exe mshtml.dll
regsvr32.exe shdocvw.dll
regsvr32.exe browseui.dll
regsvr32.exe jscript.dll
regsvr32.exe vbscript.dll
regsvr32.exe scrrun.dll
regsvr32.exe msxml.dll
regsvr32.exe msxml3.dll
regsvr32.exe msxml6.dll
regsvr32.exe actxprxy.dll
regsvr32.exe softpub.dll
regsvr32.exe wintrust.dll
regsvr32.exe dssenh.dll
regsvr32.exe rsaenh.dll
regsvr32.exe gpkcsp.dll
regsvr32.exe sccbase.dll
regsvr32.exe slbcsp.dll
regsvr32.exe cryptdlg.dll
regsvr32.exe oleaut32.dll
regsvr32.exe ole32.dll
regsvr32.exe shell32.dll
regsvr32.exe initpki.dll
regsvr32.exe wuapi.dll
regsvr32.exe wuaueng.dll
regsvr32.exe wuaueng1.dll
regsvr32.exe wucltui.dll
regsvr32.exe wups.dll
regsvr32.exe wups2.dll
regsvr32.exe wuweb.dll
regsvr32.exe qmgr.dll
regsvr32.exe qmgrprxy.dll
regsvr32.exe wucltux.dll
regsvr32.exe muweb.dll
regsvr32.exe wuwebv.dll



netsh winhttp reset proxy




net start bits
net start wuauserv
net start appidsvc
net start cryptsvc

Logs:-

2016-12-14    18:27:25:321     920    7b0    Report    CWERReporter::Init succeeded
2016-12-14    18:27:25:321     920    7b0    Agent    ***********  Agent: Initializing Windows Update Agent  ***********
2016-12-14    18:27:25:321     920    7b0    Agent    ***********  Agent: Initializing global settings cache  ***********
2016-12-14    18:27:25:321     920    7b0    Agent      * WSUS server: <NULL>
2016-12-14    18:27:25:321     920    7b0    Agent      * WSUS status server: <NULL>
2016-12-14    18:27:25:321     920    7b0    Agent      * Target group: (Unassigned Computers)
2016-12-14    18:27:25:321     920    7b0    Agent      * Windows Update access disabled: No
2016-12-14    18:27:25:321     920    7b0    DnldMgr    Download manager restoring 0 downloads
2016-12-14    18:27:25:337     920    7b0    Agent    Attempt 0 to obtain post-reboot results.
2016-12-14    18:27:25:430     920    7b0    Handler    Post-reboot status for package Package_for_KB3146706~31bf3856ad364e35~amd64~~6.1.1.2: 0x800700ea.
2016-12-14    18:27:25:430     920    7b0    Handler    WARNING: Got extended error: "Installer    Events    ErrorCode    800700ea   Phase    38    Mode    Install (upgrade)    Component    Microsoft-Windows-LSA, Culture=neutral, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=wow64, versionScope=NonSxS"
2016-12-14    18:27:26:008     920    7b0    Report    ***********  Report: Initializing static reporting data  ***********
2016-12-14    18:27:26:008     920    7b0    Report      * OS Version = 6.1.7601.1.0.196882
2016-12-14    18:27:26:008     920    7b0    Report      * OS Product Type = 0x0000000A
2016-12-14    18:27:26:008     920    7b0    Report      * Computer Brand = VMware, Inc.
2016-12-14    18:27:26:008     920    7b0    Report      * Computer Model = VMware Virtual Platform
2016-12-14    18:27:26:008     920    7b0    Report      * Bios Revision = 6.00
2016-12-14    18:27:26:008     920    7b0    Report      * Bios Name = PhoenixBIOS 4.0 Release 6.0     
2016-12-14    18:27:26:008     920    7b0    Report      * Bios Release Date = 2012-06-22T00:00:00
2016-12-14    18:27:26:008     920    7b0    Report      * Locale ID = 1033
2016-12-14    18:27:26:164     920    7b0    AU    ###########  AU: Initializing Automatic Updates  ###########
2016-12-14    18:27:26:179     920    7b0    AU      # Approval type: Pre-install notify (Policy)
2016-12-14    18:27:26:179     920    7b0    AU      # Auto-install minor updates: No (User preference)
2016-12-14    18:27:26:179     920    7b0    AU      # Will interact with non-admins (Non-admins are elevated (User preference))
2016-12-14    18:27:26:195     920    7b0    AU    Successfully wrote event for AU health state:1
2016-12-14    18:27:26:195     920    7b0    AU    Initializing featured updates
2016-12-14    18:27:26:195     920    7b0    AU    Found 0 cached featured updates
2016-12-14    18:27:26:195     920    7b0    AU    Successfully wrote event for AU health state:1
2016-12-14    18:27:26:195     920    7b0    AU    Successfully wrote event for AU health state:1
2016-12-14    18:27:26:195     920    7b0    AU    AU finished delayed initialization
2016-12-14    18:27:31:171     920    e1c    Report    REPORT EVENT: {8CD9ACD8-044F-46E7-BA98-BF52591340CF}    2016-12-14 18:27:26:164+0200    1   182    101    {F4B13A1E-A148-4448-9761-CC9BB25CEE75}    501    800700ea    wusa    Failure    Content Install    Installation Failure: Windows failed to install the following update with error 0x800700ea: Security Update for Windows (KB3146706).
2016-12-14    18:27:31:171     920    e1c    Misc    WARNING: Assert config failed, error = 800700EA
2016-12-14    18:27:31:171     920    e1c    Report    WARNING: Unable to assert evt log config: 0x800700EA
2016-12-14    18:27:31:218     920    e1c    Report    CWERReporter::HandleEvents - WER report upload completed with status 0x8
2016-12-14    18:27:31:218     920    e1c    Report    WER Report sent: 7.6.7600.256 0x800700ea F4B13A1E-A148-4448-9761-CC9BB25CEE75 Install 101 Unmanaged
2016-12-14    18:27:31:218     920    e1c    Report    CWERReporter finishing event handling. (00000000)

Patch get installed but after reboot it revert, Only issue with this patch only. Need help to install this patch

WSUS on Windows 2016 and Windows 10 clients (1511 - not seeing upgrades, 1607 - updates hungs on being downloaded in 100%)

$
0
0

Hi All,

I am reinstalling our old WSUS server (installed on W2012 R2) as it is having some troubles with communication with W10 clients.

I associated my first test PC (W10, 1511 version) with that new WSUS, and it sees it correctly as Windows 10 (on old it is shown as vista o_O). The thing is that on WSUS side I see that I have one upgrade - to 1607 version, but my 1511 client is not seeing it. When I check for updates on the client I got info that my device is up to date.

On my other PC that I have upgraded to 1607 manually using MS website, I got similar situation: updates are staging with "100%" of being downloaded but no further action is available:

I heard that WSUS has some troubles with talking to W10 but it was on Windows 2012, I thought on W2016 it would be over, tried to install patch found on that website:

https://support.microsoft.com/en-us/kb/3095113

But it says it cannot be installed on 2016.

So question here is how to make WSUS installed on W2016 working with W10 clients when I cannot apply KB3095113 on it.

Thank you all for any advise!

Cheers,


IE11 Update Error 9C48

$
0
0

I have recently installed IE11 on a Windows Server 2008 R2 machine using Windows update. Since installing this, Windows update is still prompting me to install this. If I attempt to go ahead with the installation, I am getting error 9C48. The version installed is 11.0.9600.16428.

I've seen various threads online with similar problems, but nothing has fixed this yet.

I have not been able to uninstall it as it is not showing on the installed programs list, nor is it showing as an installed update.

If I try and install it using the offline installer, an error tells me it can't proceed because of a newer version installed.

I also found a copy here: support.microsoft.com/en-gb/help/17621/internet-explorer-downloads This appears to install fine, but when checking with Windows update, it was still prompting me to update and the same error occurred.

I've included a copy of the IE11_main log from C:\Windows below:

00:00.016: Started: 2016/12/21 (Y/M/D) 14:40:23.621 (local)
00:00.016: Time Format in this log: MM:ss.mmm (minutes:seconds.milliseconds)
00:00.016: Command line: "C:\Windows\SoftwareDistribution\Download\Install\IE11-Windows6.1-x64-en-us.exe" /WSUS
00:00.031: INFO:    Setup installer for Internet Explorer: 11.0.9600.16428
00:00.125: INFO:    Previous version of Internet Explorer: 11.0.9600.16428
00:00.141: INFO:    Checking if iexplore.exe's current version is between 11.0.9600.0...
00:00.141: INFO:    ...and 11.1.0.0...
00:00.141: INFO:    Maximum version on which to run IEAK branding is: 11.1.0.0...
00:00.141: ERROR:   A newer version of Internet Explorer is already installed on the system.
00:00.156: ERROR:   Internet Explorer version check failed.
00:00.156: INFO:    Setup exit code: 0x00009C48 (40008) - A more recent version of Internet Explorer is installed.
00:00.484: INFO:    Cleaning up temporary files in: C:\Windows\TEMP\IE1FE89.tmp
00:00.499: INFO:    Unable to remove directory C:\Windows\TEMP\IE1FE89.tmp, marking for deletion on reboot.
00:00.515: INFO:    Released Internet Explorer Installer Mutex

This is distributed via WSUS. The most recent install attempt from the WindowsUpdate.log shows the following:

2016-12-22 12:00:13:964  832 e68 Report Uploading 3 events using cached cookie, reporting URL = <WSUS Server>
2016-12-22 12:00:14:027  832 e68 Report Reporter successfully uploaded 3 events.
2016-12-22 12:00:19:940  832 23c AU Triggering AU detection through DetectNow API
2016-12-22 12:00:19:940  832 23c AU Triggering Online detection (interactive)
2016-12-22 12:00:19:940  832 598 AU #############
2016-12-22 12:00:19:940  832 598 AU ## START ##  AU: Search for updates
2016-12-22 12:00:19:940  832 598 AU #########
2016-12-22 12:00:19:955  832 598 AU <<## SUBMITTED ## AU: Search for updates [CallId = {91B2189A-D714-4C7E-8966-77E0B0E510EB}]
2016-12-22 12:00:19:955  832 e68 Agent *************
2016-12-22 12:00:19:955  832 e68 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-12-22 12:00:19:955  832 e68 Agent *********
2016-12-22 12:00:19:955  832 e68 Agent   * Online = Yes; Ignore download priority = No
2016-12-22 12:00:19:955  832 e68 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-12-22 12:00:19:955  832 e68 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-12-22 12:00:19:971  832 e68 Agent   * Search Scope = {Machine}
2016-12-22 12:00:19:971  832 e68 Setup Checking for agent SelfUpdate
2016-12-22 12:00:19:971  832 e68 Setup Client version: Core: 7.6.7601.19161  Aux: 7.6.7601.19161
2016-12-22 12:00:20:033  832 e68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2016-12-22 12:01:00:065  832 e68 Misc  Microsoft signed: NA
2016-12-22 12:01:00:065  832 e68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP7907.tmp with dwProvFlags 0x00000080:
2016-12-22 12:01:30:081  832 e68 Misc  Microsoft signed: NA
2016-12-22 12:01:30:081  832 e68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2016-12-22 12:01:30:096  832 e68 Misc  Microsoft signed: NA
2016-12-22 12:01:30:143  832 e68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2016-12-22 12:01:30:159  832 e68 Misc  Microsoft signed: NA
2016-12-22 12:01:30:190  832 e68 Setup Determining whether a new setup handler needs to be downloaded
2016-12-22 12:01:30:190  832 e68 Setup SelfUpdate handler is not found.  It will be downloaded
2016-12-22 12:01:30:190  832 e68 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-12-22 12:01:30:190  832 e68 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-12-22 12:01:30:190  832 e68 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-12-22 12:01:30:221  832 e68 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-12-22 12:01:30:221  832 e68 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-12-22 12:01:30:284  832 e68 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-12-22 12:01:30:284  832 e68 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
2016-12-22 12:01:30:752  832 e68 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
2016-12-22 12:01:30:752  832 e68 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = <WSUS Server>
2016-12-22 12:02:07:584  832 e68 PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
2016-12-22 12:02:07:584  832 e68 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = <WSUS Server>
2016-12-22 12:02:07:787  832 e68 Agent Update {4DD4C034-E8DD-4091-97D4-4883FE3A6CC6}.101 is pruned out due to potential supersedence
2016-12-22 12:02:07:787  832 e68 Agent   * Added update {A445F9B8-19D1-471E-A7EA-B4B60C102056}.203 to search result
2016-12-22 12:02:07:787  832 e68 Agent Update {076F5C31-EA9C-41DB-8640-081A79C79602}.203 is pruned out due to potential supersedence
2016-12-22 12:02:07:787  832 e68 Agent   * Added update {F1B99598-A22D-4FBE-9B63-09724833ACC3}.205 to search result
2016-12-22 12:02:07:787  832 e68 Agent   * Found 2 updates and 82 categories in search; evaluated appl. rules of 1152 out of 2333 deployed entities
2016-12-22 12:02:07:787  832 e68 Agent *********
2016-12-22 12:02:07:787  832 e68 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-12-22 12:02:07:787  832 e68 Agent *************
2016-12-22 12:02:07:787  832 ed4 AU >>##  RESUMED  ## AU: Search for updates [CallId = {91B2189A-D714-4C7E-8966-77E0B0E510EB}]
2016-12-22 12:02:07:787  832 ed4 AU   # 2 updates detected
2016-12-22 12:02:07:787  832 ed4 AU #########
2016-12-22 12:02:07:787  832 ed4 AU ##  END  ##  AU: Search for updates [CallId = {91B2189A-D714-4C7E-8966-77E0B0E510EB}]
2016-12-22 12:02:07:787  832 ed4 AU #############
2016-12-22 12:02:07:787  832 ed4 AU Successfully wrote event for AU health state:0
2016-12-22 12:02:07:787  832 ed4 AU Featured notifications is disabled.
2016-12-22 12:02:07:787  832 ed4 AU AU setting next detection timeout to 2016-12-23 07:24:04
2016-12-22 12:02:07:787  832 ed4 AU Successfully wrote event for AU health state:0
2016-12-22 12:02:07:803  832 ed4 AU Successfully wrote event for AU health state:0
2016-12-22 12:02:07:803  832 e44 AU Getting featured update notifications.  fIncludeDismissed = true
2016-12-22 12:02:07:803  832 e44 AU No featured updates available.
2016-12-22 12:02:12:795  832 e68 Report REPORT EVENT: {A996360C-E6BF-4686-AEF3-49A10826F977} 2016-12-22 12:02:07:787-0000 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 2 updates.
2016-12-22 12:02:12:795  832 e68 Report REPORT EVENT: {07D8ED6D-37CD-44CE-8A04-F69B3D469D22} 2016-12-22 12:02:07:787-0000 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
2016-12-22 12:02:45:962  832 e44 AU AU received approval from Ux for 1 updates
2016-12-22 12:02:45:962  832 e44 AU AU setting pending client directive to 'Progress Ux'
2016-12-22 12:02:45:977  832 388 AU BeginInteractiveInstall invoked for Download with sessionId 2
2016-12-22 12:02:45:977  832 388 AU Auto-approving update for download, updateId = {A445F9B8-19D1-471E-A7EA-B4B60C102056}.203, ForUx=1, IsOwnerUx=1, Deadline=0, IsMinor=0, UpdateFlags=41
2016-12-22 12:02:45:977  832 388 AU Auto-approved 1 update(s) for download (for Ux)
2016-12-22 12:02:45:977  832 388 AU UpdateDownloadProperties: 0 download(s) are still in progress.
2016-12-22 12:02:45:977  832 388 AU #############
2016-12-22 12:02:45:977  832 388 AU ## START ##  AU: Download updates
2016-12-22 12:02:45:977  832 388 AU #########
2016-12-22 12:02:45:977  832 388 AU   # Approved updates = 1
2016-12-22 12:02:45:977  832 388 AU AU initiated download, updateId = {A445F9B8-19D1-471E-A7EA-B4B60C102056}.203, callId = {FB21828D-8199-4CE7-A95E-383CA7D722F2}
2016-12-22 12:02:45:977  832 388 AU Successfully wrote event for AU health state:0
2016-12-22 12:02:45:993  832 388 AU Currently showing Progress UX client - so not launching any other client
2016-12-22 12:02:45:993  832 e68 DnldMgr *************
2016-12-22 12:02:45:993  832 e68 DnldMgr ** START **  DnldMgr: Downloading updates [CallerId = AutomaticUpdatesWuApp]
2016-12-22 12:02:45:993  832 e68 DnldMgr *********
2016-12-22 12:02:45:993  832 e68 DnldMgr   * Call ID = {FB21828D-8199-4CE7-A95E-383CA7D722F2}
2016-12-22 12:02:45:993  832 e68 DnldMgr   * Priority = 3, Interactive = 1, Owner is system = 1, Explicit proxy = 0, Proxy session id = 2, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2016-12-22 12:02:45:993  832 e68 DnldMgr   * Updates to download = 1
2016-12-22 12:02:45:993  832 e68 Agent   *   Title = Internet Explorer 11 for Windows Server 2008 R2 for x64-based Systems
2016-12-22 12:02:45:993  832 e68 Agent   *   UpdateId = {A445F9B8-19D1-471E-A7EA-B4B60C102056}.203
2016-12-22 12:02:45:993  832 e68 Agent   *     Bundles 4 updates:
2016-12-22 12:02:45:993  832 e68 Agent   *       {BAA86953-4996-4718-B4E4-4627B151D99D}.202
2016-12-22 12:02:45:993  832 e68 Agent   *       {EED7086B-BF98-42E8-9955-FC542F2C7AC5}.203
2016-12-22 12:02:45:993  832 e68 Agent   *       {896D4E6A-4E2B-4E3D-86BB-A0C9BB45906B}.203
2016-12-22 12:02:45:993  832 e68 Agent   *       {7125014F-73BB-4044-9733-933846C6513E}.203
2016-12-22 12:02:45:993  832 e68 DnldMgr ***********  DnldMgr: New download job [UpdateId = {BAA86953-4996-4718-B4E4-4627B151D99D}.202]  ***********
2016-12-22 12:02:46:024  832 e68 DnldMgr   * All files for update were already downloaded and are valid.
2016-12-22 12:02:46:024  832 e68 DnldMgr ***********  DnldMgr: New download job [UpdateId = {EED7086B-BF98-42E8-9955-FC542F2C7AC5}.203]  ***********
2016-12-22 12:02:46:024  832 e68 DnldMgr   * All files for update were already downloaded and are valid.
2016-12-22 12:02:46:024  832 e68 DnldMgr ***********  DnldMgr: New download job [UpdateId = {896D4E6A-4E2B-4E3D-86BB-A0C9BB45906B}.203]  ***********
2016-12-22 12:02:46:040  832 e68 DnldMgr   * All files for update were already downloaded and are valid.
2016-12-22 12:02:46:040  832 e68 DnldMgr ***********  DnldMgr: New download job [UpdateId = {7125014F-73BB-4044-9733-933846C6513E}.203]  ***********
2016-12-22 12:02:47:725  832 e68 DnldMgr   * All files for update were already downloaded and are valid.
2016-12-22 12:02:47:740  832 e68 Agent *********
2016-12-22 12:02:47:740  832 e68 Agent **  END  **  Agent: Downloading updates [CallerId = AutomaticUpdatesWuApp]
2016-12-22 12:02:47:740  832 e68 Agent *************
2016-12-22 12:02:47:740  832 388 AU Successfully wrote event for AU health state:0
2016-12-22 12:02:47:740  832 388 AU   # Pending download calls = 1
2016-12-22 12:02:47:740  832 388 AU <<## SUBMITTED ## AU: Download updates
2016-12-22 12:02:47:740  832 ed4 AU >>##  RESUMED  ## AU: Download update [UpdateId = {A445F9B8-19D1-471E-A7EA-B4B60C102056}, succeeded]
2016-12-22 12:02:47:740  832 ed4 AU #########
2016-12-22 12:02:47:740  832 ed4 AU ##  END  ##  AU: Download updates
2016-12-22 12:02:47:740  832 ed4 AU #############
2016-12-22 12:02:47:740  832 ed4 AU Successfully wrote event for AU health state:0
2016-12-22 12:02:47:740  832 ed4 AU Currently showing Progress UX client - so not launching any other client
2016-12-22 12:02:47:740  832 ed4 AU Successfully wrote event for AU health state:0
2016-12-22 12:02:47:740  832 e44 AU BeginInteractiveInstall invoked for Install with sessionId 2
2016-12-22 12:02:47:740  832 e44 AU Auto-approving update for install, updateId = {A445F9B8-19D1-471E-A7EA-B4B60C102056}.203, ForUx=1, IsOwnerUx=1, Deadline=0, IsMinor=0, UpdateFlags=41
2016-12-22 12:02:47:740  832 e44 AU Auto-approved 1 update(s) for install (for Ux), installType=1
2016-12-22 12:02:47:740  832 e44 AU #############
2016-12-22 12:02:47:740  832 e44 AU ## START ##  AU: Install updates
2016-12-22 12:02:47:740  832 e44 AU #########
2016-12-22 12:02:47:740  832 e44 AU   # Initiating manual install
2016-12-22 12:02:47:740  832 e44 AU   # Approved updates = 1
2016-12-22 12:02:47:756  832 e44 AU <<## SUBMITTED ## AU: Install updates / installing updates [CallId = {166932A0-9D3F-4852-99BB-8758136D97C4}]
2016-12-22 12:02:47:756  832 618 Agent *************
2016-12-22 12:02:47:756  832 618 Agent ** START **  Agent: Installing updates [CallerId = AutomaticUpdates]
2016-12-22 12:02:47:756  832 618 Agent *********
2016-12-22 12:02:47:756  832 618 Agent   * Updates to install = 1
2016-12-22 12:02:47:756  832 618 Agent   *   Title = Internet Explorer 11 for Windows Server 2008 R2 for x64-based Systems
2016-12-22 12:02:47:756  832 618 Agent   *   UpdateId = {A445F9B8-19D1-471E-A7EA-B4B60C102056}.203
2016-12-22 12:02:47:756  832 618 Agent   *     Bundles 4 updates:
2016-12-22 12:02:47:756  832 618 Agent   *       {BAA86953-4996-4718-B4E4-4627B151D99D}.202
2016-12-22 12:02:47:756  832 618 Agent   *       {EED7086B-BF98-42E8-9955-FC542F2C7AC5}.203
2016-12-22 12:02:47:756  832 618 Agent   *       {896D4E6A-4E2B-4E3D-86BB-A0C9BB45906B}.203
2016-12-22 12:02:47:756  832 618 Agent   *       {7125014F-73BB-4044-9733-933846C6513E}.203
2016-12-22 12:02:47:787  832 23c AU Getting featured update notifications.  fIncludeDismissed = true
2016-12-22 12:02:47:787  832 23c AU No featured updates available.
2016-12-22 12:02:47:803  832 23c AU Getting featured update notifications.  fIncludeDismissed = true
2016-12-22 12:02:47:803  832 23c AU No featured updates available.
2016-12-22 12:02:47:818  832 23c AU Getting featured update notifications.  fIncludeDismissed = true
2016-12-22 12:02:47:818  832 23c AU No featured updates available.
2016-12-22 12:02:48:598  832 618 Agent WARNING: failed to calculate prior restore point time with error 0x80070002; setting restore point
2016-12-22 12:02:48:598  832 618 Agent WARNING: LoadLibrary failed for srclient.dll with hr:8007007e
2016-12-22 12:02:48:598  832 e68 Report REPORT EVENT: {28CDD47D-AC51-4B8B-8831-9DE7CF829963} 2016-12-22 12:02:47:740-0000 1 189 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Content Install Installation Ready: The following updates are downloaded and ready for installation. To install the updates, an administrator should log on to this computer and Windows will prompt with further instructions:  - Internet Explorer 11 for Windows Server 2008 R2 for x64-based Systems
2016-12-22 12:02:48:598  832 e68 Report REPORT EVENT: {74777696-413C-46FB-8902-54EFA978D9A7} 2016-12-22 12:02:48:598-0000 1 181 101 {A445F9B8-19D1-471E-A7EA-B4B60C102056} 203 0 AutomaticUpdates Success Content Install Installation Started: Windows successfully started the following update: Internet Explorer 11 for Windows Server 2008 R2 for x64-based Systems
2016-12-22 12:02:48:661  832 618 DnldMgr Preparing update for install, updateId = {BAA86953-4996-4718-B4E4-4627B151D99D}.202.
2016-12-22 12:02:48:692  832 618 DnldMgr ExtractUpdateFiles: 0x00000000
2016-12-22 12:02:48:692 3792 a94 Misc ===========  Logging initialized (build: 7.6.7601.19161, tz: -0000)  ===========
2016-12-22 12:02:48:692 3792 a94 Misc   = Process: C:\Windows\system32\wuauclt.exe
2016-12-22 12:02:48:692 3792 a94 Misc   = Module: C:\Windows\system32\wuaueng.dll
2016-12-22 12:02:48:692 3792 a94 Handler :::::::::::::
2016-12-22 12:02:48:692 3792 a94 Handler :: START ::  Handler: Command Line Install
2016-12-22 12:02:48:692 3792 a94 Handler :::::::::
2016-12-22 12:02:48:692 3792 a94 Handler   : Updates to install = 1
2016-12-22 12:02:48:879 3792 a94 Handler   : Command line install completed. Return code = 0x00000000, Result = Succeeded, Reboot required = false
2016-12-22 12:02:48:879 3792 a94 Handler :::::::::
2016-12-22 12:02:48:879 3792 a94 Handler ::  END  ::  Handler: Command Line Install
2016-12-22 12:02:48:879 3792 a94 Handler :::::::::::::
2016-12-22 12:02:48:879  832 618 DnldMgr Preparing update for install, updateId = {EED7086B-BF98-42E8-9955-FC542F2C7AC5}.203.
2016-12-22 12:02:48:895  832 618 DnldMgr ExtractUpdateFiles: 0x00000000
2016-12-22 12:02:48:895 3792 a94 Handler :::::::::::::
2016-12-22 12:02:48:895 3792 a94 Handler :: START ::  Handler: Command Line Install
2016-12-22 12:02:48:895 3792 a94 Handler :::::::::
2016-12-22 12:02:48:895 3792 a94 Handler   : Updates to install = 1
2016-12-22 12:02:48:988 3792 a94 Handler   : Command line install completed. Return code = 0x00000000, Result = Succeeded, Reboot required = false
2016-12-22 12:02:48:988 3792 a94 Handler :::::::::
2016-12-22 12:02:48:988 3792 a94 Handler ::  END  ::  Handler: Command Line Install
2016-12-22 12:02:48:988 3792 a94 Handler :::::::::::::
2016-12-22 12:02:48:988  832 618 DnldMgr Preparing update for install, updateId = {896D4E6A-4E2B-4E3D-86BB-A0C9BB45906B}.203.
2016-12-22 12:02:49:004  832 618 DnldMgr ExtractUpdateFiles: 0x00000000
2016-12-22 12:02:49:004 3792 a94 Handler :::::::::::::
2016-12-22 12:02:49:004 3792 a94 Handler :: START ::  Handler: Command Line Install
2016-12-22 12:02:49:004 3792 a94 Handler :::::::::
2016-12-22 12:02:49:004 3792 a94 Handler   : Updates to install = 1
2016-12-22 12:02:49:082 3792 a94 Handler   : Command line install completed. Return code = 0x00000000, Result = Succeeded, Reboot required = false
2016-12-22 12:02:49:082 3792 a94 Handler :::::::::
2016-12-22 12:02:49:082 3792 a94 Handler ::  END  ::  Handler: Command Line Install
2016-12-22 12:02:49:082 3792 a94 Handler :::::::::::::
2016-12-22 12:02:49:082  832 618 DnldMgr Preparing update for install, updateId = {7125014F-73BB-4044-9733-933846C6513E}.203.
2016-12-22 12:02:49:690  832 618 DnldMgr ExtractUpdateFiles: 0x00000000
2016-12-22 12:02:49:706 3792 a94 Handler :::::::::::::
2016-12-22 12:02:49:706 3792 a94 Handler :: START ::  Handler: Command Line Install
2016-12-22 12:02:49:706 3792 a94 Handler :::::::::
2016-12-22 12:02:49:706 3792 a94 Handler   : Updates to install = 1
2016-12-22 12:02:50:314 3792 a94 Handler   : WARNING: Command line install completed. Return code = 0x00009c48, Result = Failed, Reboot required = false
2016-12-22 12:02:50:314 3792 a94 Handler   : WARNING: Exit code = 0x8024200B
2016-12-22 12:02:50:314 3792 a94 Handler :::::::::
2016-12-22 12:02:50:314  832 ed4 AU >>##  RESUMED  ## AU: Installing update [UpdateId = {A445F9B8-19D1-471E-A7EA-B4B60C102056}]
2016-12-22 12:02:50:314 3792 a94 Handler ::  END  ::  Handler: Command Line Install
2016-12-22 12:02:50:314  832 ed4 AU   # WARNING: Install failed, error = 0x80070643 / 0x00009C48
2016-12-22 12:02:50:314 3792 a94 Handler :::::::::::::
2016-12-22 12:02:50:314  832 618 Agent LogHistory called. idUpdate={A445F9B8-19D1-471E-A7EA-B4B60C102056}.203, resultMapped=80070643, resultUnMapped=9C48
2016-12-22 12:02:50:330  832 618 Agent *********
2016-12-22 12:02:50:330  832 618 Agent **  END  **  Agent: Installing updates [CallerId = AutomaticUpdates]
2016-12-22 12:02:50:330  832 ed4 AU Install call completed.
2016-12-22 12:02:50:330  832 618 Agent *************
2016-12-22 12:02:50:330  832 ed4 AU   # WARNING: Install call completed, reboot required = No, error = 0x00000000
2016-12-22 12:02:50:330  832 ed4 AU #########
2016-12-22 12:02:50:330  832 ed4 AU ##  END  ##  AU: Installing updates [CallId = {166932A0-9D3F-4852-99BB-8758136D97C4}]
2016-12-22 12:02:50:330  832 ed4 AU #############
2016-12-22 12:02:50:330  832 ed4 AU Install complete for all calls, reboot NOT needed
2016-12-22 12:02:50:330  832 ed4 AU Successfully wrote event for AU health state:0
2016-12-22 12:02:50:330  832 23c AU Getting featured update notifications.  fIncludeDismissed = true
2016-12-22 12:02:50:330  832 23c AU No featured updates available.
2016-12-22 12:02:52:108  832 23c AU UpdateDownloadProperties: 0 download(s) are still in progress.
2016-12-22 12:02:52:108  832 23c AU Triggering Offline detection (non-interactive)
2016-12-22 12:02:52:108  832 23c AU AU setting pending client directive to 'Install Complete Ux'
2016-12-22 12:02:52:108  832 23c AU Changing existing AU client directive from 'Progress Ux' to 'Install Complete Ux', session id = 0x2
2016-12-22 12:02:52:108  832 23c AU AU setting pending client directive to 'Download Approval'
2016-12-22 12:02:52:108  832 23c AU Changing existing AU client directive from 'Install Complete Ux' to 'Download Approval', session id = 0x2
2016-12-22 12:02:52:108  832 23c AU Successfully wrote event for AU health state:0
2016-12-22 12:02:52:108  832 598 AU #############
2016-12-22 12:02:52:108  832 598 AU ## START ##  AU: Search for updates
2016-12-22 12:02:52:108  832 598 AU #########
2016-12-22 12:02:52:108  832 598 AU <<## SUBMITTED ## AU: Search for updates [CallId = {87A9244B-99D8-4BD4-8931-23E873AE2A61}]
2016-12-22 12:02:52:108  832 e68 Agent *************
2016-12-22 12:02:52:108  832 e68 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-12-22 12:02:52:108  832 e68 Agent *********
2016-12-22 12:02:52:108  832 e68 Agent   * Online = No; Ignore download priority = No
2016-12-22 12:02:52:108  832 e68 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-12-22 12:02:52:108  832 e68 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-12-22 12:02:52:108  832 e68 Agent   * Search Scope = {Machine}
2016-12-22 12:03:23:934  832 e68 Agent Update {4DD4C034-E8DD-4091-97D4-4883FE3A6CC6}.101 is pruned out due to potential supersedence
2016-12-22 12:03:23:934  832 e68 Agent   * Added update {A445F9B8-19D1-471E-A7EA-B4B60C102056}.203 to search result
2016-12-22 12:03:23:934  832 e68 Agent Update {076F5C31-EA9C-41DB-8640-081A79C79602}.203 is pruned out due to potential supersedence
2016-12-22 12:03:23:934  832 e68 Agent   * Added update {F1B99598-A22D-4FBE-9B63-09724833ACC3}.205 to search result
2016-12-22 12:03:23:934  832 e68 Agent   * Found 2 updates and 82 categories in search; evaluated appl. rules of 734 out of 2333 deployed entities
2016-12-22 12:03:23:934  832 e68 Agent *********
2016-12-22 12:03:23:934  832 e68 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-12-22 12:03:23:934  832 e68 Agent *************
2016-12-22 12:03:23:934  832 e68 Report REPORT EVENT: {015F8557-72C9-4113-941C-E709952F7E43} 2016-12-22 12:02:50:314-0000 1 182 101 {A445F9B8-19D1-471E-A7EA-B4B60C102056} 203 80070643 AutomaticUpdates Failure Content Install Installation Failure: Windows failed to install the following update with error 0x80070643: Internet Explorer 11 for Windows Server 2008 R2 for x64-based Systems.
2016-12-22 12:03:23:934  832 ed4 AU >>##  RESUMED  ## AU: Search for updates [CallId = {87A9244B-99D8-4BD4-8931-23E873AE2A61}]
2016-12-22 12:03:23:934  832 ed4 AU   # 2 updates detected
2016-12-22 12:03:23:949  832 ed4 AU #########
2016-12-22 12:03:23:949  832 ed4 AU ##  END  ##  AU: Search for updates [CallId = {87A9244B-99D8-4BD4-8931-23E873AE2A61}]
2016-12-22 12:03:23:949  832 ed4 AU #############
2016-12-22 12:03:23:949  832 ed4 AU Featured notifications is disabled.
2016-12-22 12:03:23:949  832 ed4 AU Successfully wrote event for AU health state:0
2016-12-22 12:03:23:949  832 ed4 AU Successfully wrote event for AU health state:0
2016-12-22 12:03:23:949  832 23c AU Getting featured update notifications.  fIncludeDismissed = true
2016-12-22 12:03:23:949  832 23c AU No featured updates available.
2016-12-22 12:03:23:949  832 e68 Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
2016-12-22 12:03:23:949  832 e68 Report WER Report sent: 7.6.7601.19161 0x80070643(0x9c48) 445F9B8-19D1-471E-A7EA-B4B60C102056 Install 203 0 AutomaticUpdates {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} 0
2016-12-22 12:03:48:833  832 e68 Report Uploading 5 events using cached cookie, reporting URL = <WSUS Server>
2016-12-22 12:03:49:020  832 e68 Report Reporter successfully uploaded 5 events.

Any thoughts or suggestions would be appreciated!

Does driver deployment with WSUS (still) work?

$
0
0

Hi.

I'd like to hear from WSUS administrators if they are able to deploy drivers with WSUS.

I did that years ago and it worked but on our new WSUS server 2012 R2, it does not work. Drivers are not detected by the clients while other updates are detected. WSUS reporting shows, those drivers are needed nowhere.

If I retrieve such an update file (.cab) from wsuscontent and put it to the test and extract it, I can install the driver within and it suits and is newer than the former driver.

Error Upgrading to 1607

$
0
0

Hello,

I am having an issue upgrading my PCs from 1511 to 1607 using WSUS. I have installed all required updates and followed all appropriate steps found here: https://support.microsoft.com/en-us/kb/3159706.  I have put the .esd file type in IIS. The clients are all failing with error code: (Unable to Find Resource:) ReportingEvent.Client.167; Parameters: Feature update to Windows 10 Pro, version 1607, en-us, Retail being reported on the WSUS server. I am running 2012 R2. Any help would be appreciated.


Bug: halt when deleting unneeded update files

$
0
0

If WSUS installed on a heavy IO loaded harddrive (LUN) of a VM, when deleting unneeded update files by Server Cleanup Wizard, MMC node may halt.

Server OS: Windows Server 2012 Standard

Errors can be located in Event Log:
An unhandled exception occurred and the process was terminated.
Application ID: /LM/W3SVC/1881423753/ROOT/ServerSyncWebService
Process ID: 3288
Exception: System.NullReferenceException
Message: Object reference not set to an instance of an object.
StackTrace:    at Microsoft.UpdateServices.Internal.DataAccess.GetRevisionIdListForCache(Int64 deploymentChangeNumber, Int64& highestChangeNumber, CategoryIdCacheEntry[]& newCategoryDeployments, CategoryIdCacheEntry[]& deletedCategoryDeployments, RevisionIdCacheEntry[]& newRevisionDeployments, RevisionIdCacheEntry[]& deletedRevisionDeployments)
at Microsoft.UpdateServices.Internal.RevisionIdCache.UpdateCategoryAndRevisionIdCache(Int64 deploymentChangeNumberAtRefresh)
at Microsoft.UpdateServices.Internal.ServerImplementation.UpdateCache()
at Microsoft.UpdateServices.Internal.ServerImplementation.DatabaseChangeHandler(Object byTimer)
at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)
at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)
at System.Threading.TimerQueueTimer.CallCallback()
at System.Threading.TimerQueueTimer.Fire()
at System.Threading.TimerQueue.FireNextTimers()

Application: w3wp.exe
Framework Version: v4.0.30319
Description: The process was terminated due to an unhandled exception.
Exception Info: System.NullReferenceException
Stack:
at Microsoft.UpdateServices.Internal.DataAccess.GetRevisionIdListForCache(Int64, Int64 ByRef, Microsoft.UpdateServices.Internal.CategoryIdCacheEntry[] ByRef, Microsoft.UpdateServices.Internal.CategoryIdCacheEntry[] ByRef, Microsoft.UpdateServices.Internal.RevisionIdCacheEntry[] ByRef, Microsoft.UpdateServices.Internal.RevisionIdCacheEntry[] ByRef)
at Microsoft.UpdateServices.Internal.RevisionIdCache.UpdateCategoryAndRevisionIdCache(Int64)
at Microsoft.UpdateServices.Internal.ServerImplementation.UpdateCache()
at Microsoft.UpdateServices.Internal.ServerImplementation.DatabaseChangeHandler(System.Object)
at System.Threading.ExecutionContext.RunInternal(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
at System.Threading.ExecutionContext.Run(System.Threading.ExecutionContext, System.Threading.ContextCallback, System.Object, Boolean)
at System.Threading.TimerQueueTimer.CallCallback()
at System.Threading.TimerQueueTimer.Fire()
at System.Threading.TimerQueue.FireNextTimers()

Faulting application name: w3wp.exe, version: 8.0.9200.16384, time stamp: 0x50108835
Faulting module name: KERNELBASE.dll, version: 6.2.9200.16384, time stamp: 0x5010ab2d
Exception code: 0xe0434352
Fault offset: 0x00000000000189cc
Faulting process id: 0xcd8
Faulting application start time: 0x01cdcff0fa98da3e
Faulting application path: c:\windows\system32\inetsrv\w3wp.exe
Faulting module path: C:\Windows\system32\KERNELBASE.dll
Report Id: 332ed25c-3c39-11e2-93f1-005056b26389
Faulting package full name: 
Faulting package-relative application ID:

Step to repo:

1 Open Update Services MMC.
2 Click Options from the left panel.
3 Select Server Cleanup Wizard from the right.
4 Press Next.
MMC node MAY(only when lots of files need to be deleted) be prompted to be reset when deleting unneeded files if it's running longer than usual. Re-open Update Services MMC will fix it. But it will be appeared again another day when many unneeded files exist.


Eternal Snow

WSUS hangs on Cleanup wizard for Unused Updates, then disconnects from console.

$
0
0
I am running WSUS 3.0 SP1 on Windows 2003 and recently have found that running the Cleanup Wizard works with all of the selectable options except the "Unused Updates" option. It hangs about 1\2 way through and then disconnects from the console. Up until now it has worked.
I am using the Windows Internal Database and the size of the MDF is 3193024kb.
Everything other than this wizard is working fine. Please help.

Solved, Cured, Fixed - Windows Update Error 0x80244019

$
0
0

In the past several months I have upgraded WSUS on a Server 2012 Standard installation, and did a clean install of WSUS on the same. For both, the final WSUS version was 6.2.9200.17646  The issue on both was the same. Windows 7 computers were seen by WSUS, but the status never changed from "not yet reported". After days of trying to figure it out and following numerous and countless so-called solutions I found on the Internet – and not just on Microsoft support sites, it became apparent that even Microsoft was clueless as to the true *root cause* of the problem, and while many of the so-called solutions offered were just patches, not fixes. I realized I was just another guinea pig in their fruitless and unsuccessful attempts to find that root cause. It got to the point where I just gave up and using group policy set up all Windows 7 computers to get their updates directly from Microsoft.

When dealing with a large number of Windows 7 machines, getting updates directly from Microsoft would really tie up bandwidth every Monday during the day, since many of the machines are turned off over the weekend and holidays. The slowdowns weren’t only noticeable; they made the network overall excruciatingly slow for the entire day. When users would reboot their computers thinking that would solve their problem, the entire update process for that computer would just start over, adding to the time the available bandwidth was maxed out. The buffer bloat on the Internet modem contributed even more to the bandwidth issue.  So with the onset of the new year and the fact that business was slowing down for me, I decided to tackle this issue and actually "solve" it….not "patch" it. I succeeded.

First, I found a client with a perfectly working WSUS version 6.2 on Server 2012 Standard and began looking for differences. Of course, I found lots of them. It took me over two weeks to find the difference that solved the problem once and for all.  It seems that on the working WSUS, it had three file directories with files, that neither of the non-working WSUS setups had. To test this, I temporarily removed these three directory paths and their contents from the working WSUS, and found that I was getting the same exact error as on the non-working setups.

On the non-working setups, reviewing the windowsupdate.log file on the windows 7 computers, they all had the same error.

WARNING: WU client failed Searching for update with error 0x80244019
>>##  RESUMED  ## AU: Search for updates [CallId = {C70DBC7D-66FD-40B0-AB20-0A9E9EF92081}]
# WARNING: Search callback failed, result = 0x80244019
# WARNING: Failed to find updates with error code 80244019

While the Callid GUID may be different, the error 0x80244019 was consistent. Understand that this is but one of hundreds of issues that can generate this same exact error. If it were up to me, the description for error 0x80244019 would be "We haven’t got a clue!"  Yet upon adding the missing directories and their subsequent files, everything cleared up and has worked perfectly since.  So here’s what you need to to.

First, stop the WSUS Service. From an elevated command prompt enter

Net stop WSUSService

Now ensure the three following paths exist, assuming you installed WSUS to it’s default location.

C:\Program Files\Update Services\SelfUpdate\WSUS3\ia64\win7sp1

C:\Program Files\Update Services\SelfUpdate\WSUS3\x64\win7sp1

C:\Program Files\Update Services\SelfUpdate\WSUS3\x86\win7sp1

If necessary, create the win7sp1 directory in each of the three directory paths, if it doesn’t already exist. Then copy the following files from the exact source directory indicated, to the exact destination directory indicated.

For 64-bit Windows 7

Copy the contents of C:\Windows\WinSxS\amd64_updateservices-selfupdate-x64-win7sp1_31bf3856ad364e35_6.2.9200.17025_none_ae5ccf24bda5b809 to C:\Program Files\Update Services\SelfUpdate\WSUS3\x64\win7sp1

Note that it may be necessary to create the win7sp1 subdirectory.

For 32-bit Windows 7

Copy the contents of C:\Windows\WinSxS\amd64_updateservices-selfupdate-x86-win7sp1_31bf3856ad364e35_6.2.9200.17025_none_1043c229991acc59 to C:\Program Files\Update Services\SelfUpdate\WSUS3\x86\win7sp1

Note that it may be necessary to create the win7sp1 subdirectory.

For Itanium based (IA64) Windows 7

Copy the contents of C:\Windows\WinSxS\amd64_updateservices-selfupdate-ia64-win7sp1_31bf3856ad364e35_6.2.9200.17025_none_84d35a4d6a8284f3 to C:\Program Files\Update Services\SelfUpdate\WSUS3\ia64\win7sp1

Note that it may be necessary to create the win7sp1 subdirectory.

When done, from an elevated command prompt restart the WSUS service.

Net start wsusservice

Then restart all the Windows 7 computers and in about a hour they will have all "checked in" with WSUS and will be getting updates.

I still can’t comprehend why the many versions of the windows update diagnosis program that many have downloaded, don’t check for accessibility to that win7sp1 directory along with the other directories for other versions of windows, and simply report that it’s inaccessible or non-existent on the WSUS server. For a so-called diagnosis program, it appears to not be a very good one, since it doesn’t diagnose something as elementary as the existence of a required path and file, and report that to the user in plain English if it’s the problem.  Even further, it would appear that the routines which install the WSUS role on the server is not all inclusive of what needs to be installed and present for a fully functional WSUS. So it is of my unprofessional and uneducated opinion that Microsoft needs to fix the problem at the role installation source. Maybe then, they can do away with wasting time on a program to diagnose it, since it would appear to not diagnose this specific issue anyway. I'm done ranting. Thanks for reading. I feel better now. :)

Issue updating New Windows 2012 R2 Server Build

$
0
0

Hi,

We are experiencing issues updating a fresh Windows 2012 R2 install from WSUS.

After installing 2012 R2 a small number of updates get offered and installed from the WSUS server but then no further updates are offered.

I have to then manually install KB2919442 on the server before KB2919355 is offered which once installed a further 195 updates get offered.

KB2919442 is approved on the WSUS server so I don't know why I have to manually install this update. This update is superseded by a number of other updates however these are not offered.

Any idea's ?

Thanks

WSUS Connection error MMC console disconnect continuously

Viewing all 12331 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>