Quantcast
Channel: WSUS Forum
Viewing all 12331 articles
Browse latest View live

windows updates failed with error code 9c48

$
0
0

i have a WSUS sevrer and servers that have windows server 2008 r2 , many of them failed with the attached error , the update that caused this is  Internet Explorer 11 for Windows Server 2008 R2 for x64-based Systems , and after i checked the internet explorer its already have IE11 , i tried to do the following troubleshooting with no luck :

1- sfc /scannow : no errors found

2- wuauclt /detectnow

wuauclt /reportnow

3- stopped the windows update service and cleared the windows updates files and started it again with the same problem

any advice for this please 


WUServer and WUStatusServer keep disappearing

$
0
0

We are experiencing an issue where the two Registry Keys are being constantly removed from: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate.

We have created a WSUS GPO which enforces Windows Update configuration as per our requirement (nothing special), however these two keys keep disappearing. If I run GPRESULT /R it will show that the GPO has applied, and if I run GPUPDATE /FORCE the two keys will reappear, however, after a few hours they will disappear. There are no local policies that are configured to be overwriting this GPO.

To further troubleshoot, I created a TEST OU at the top of the domain and moved one server into it (to have a clean policy on the server I removed it and rejoined it to the domain). I blocked inheritance to TEST OU and assigned only WSUS GPO. Now this server only has this single GPO assigned to it. The issue remains. I am running out of ideas. if anyone could help that would be great.

Thanks

ZB




Copy back WSUS Content Folder

$
0
0

Hi,

I have RAID 1 in my WSUS Content disk, but im out of disk space. I want to change this RAID to RAID 0, so it will double my disk space.

I don't have any free slot in my WSUS Server, so I cant simply add a new hard disk and move content using wsusutil.

The only thing I can think now is to copy my WsusContent folder to a different server, stop WSUS services, change my RAID to 0, copy the data back and start the services again. It will work? Anyone have a better idea?

Thank you!

Deploy SNMP feature via WSUS

$
0
0

Greetings

first of all, sorry, english is not my mother tongue.

I'm facing an issue with SNMP feature used for monitoring purpose for Windows 10 1809.

Before 1809 everything worked fine but now i'm deploying 1809 version that does not include SNMP feature anymore.

It's now very hard for me to install snmp feature thanks to powershell command (see link below) because i do not have access to microsoft servers in my company. For me, the only way to install updates is from WSUS.

Does anyone know a way to deploy SNMP feature by WSUS ?

I do not find any kb related to snmp when i sync wsus.

thanks

regards

Here's the link containing the powershell way to install snmp feature on 1809 : https://social.technet.microsoft.com/Forums/ie/en-US/bf4ee74e-8f78-4ee1-8f61-b7339a5f3bf0/windows-10-1809-snmp-adding-from-the-command-line?forum=win10itprogeneral ).

Windows 10 Feature Updates: 0xc1800118 error with WSUS on Server 2016

$
0
0

Hi all,

We have a 2012 R2 WSUS server, and I couldn't push any Feature Updates to Windows 10 clients due to the following error:

https://support.microsoft.com/en-us/help/3194588/0xc1800118-error-when-you-push-windows-10-version-1607-by-using-wsus

I tried many times applying the workaround in the above link, but without success.

So, I built a new WSUS server on 2016, on the understanding that decryption of Feature Updates is built-in (installed latest 2016 cumulative update just in case!).  Unfortunately, after all that work, I'm getting the same 0xc1800118 error when pushing Feature Updates via the 2016 server (in WindowsUpdate.log on client, getting "Requested file <featureupdatefile>.esd has no decrypt information".  There's already a .esd MIME Type entry in IIS with type 'application/vnd.ms-cab-compressed' (different from the required 'application/octet-stream' entry in Server 2012 R2, but it's there out-of-the-box in Server 2016).

Running the initial query on the SUSDB WID database (see above link) shows that the database is still in a bad state - returning 52 entries that are encrypted, but without a decryption key.

Does anyone know how to fix this issue of pushing Windows 10 Feature Updates via WSUS on Windows 2016?

Many thanks,

TT1999

Disabling Windows 10 Dual Scan via GPO: Inconsistent results

$
0
0

Hi all,

The Windows Update Group Policy we've applied to our Windows 10 machines is summarised below (there's a variety of versions from 1511 through to 1803, with some LTSB 2016 v1607 in the mix).  We want WSUS to handle updates, so to ensure Dual Scan is not enabled, the 'Defer Upgrades and Updates' policy is set to 'Not Configured', and both 'Turn off access to all Windows Update features' and 'Do not connect to any Windows Update Internet locations' are set to 'Enabled'.

However, some Windows 10 machines still seem to be going over the Internet to Windows Update, rather than getting their updates from our WSUS server.

We've checked the default update service being used on these problematic machines as follows:

$MUSM = New-Object -ComObject "Microsoft.Update.ServiceManager"

$MUSM.Services | select Name, IsDefaultAUService

... and the default service is showing as either 'Windows Update' or 'Microsoft Update'.  On the majority of Windows 10 machines (which have the same Group Policy applied), the default service shows as 'Windows Server Update Service'.

There is no consistency re: Windows 10 version of machines that have their default service showing as either 'Windows Update' or 'Microsoft Update'.

Does anyone know whether this is a problem with a Group Policy setting, or otherwise is there something on the Windows 10 machines that would be causing this issue?

Many thanks in advance,

TT1999

###############################################

COMPUTER CONFIGURATION/ADMINISTRATIVE TEMPLATES/SYSTEM/INTERNET COMMUNICATION MANAGEMENT/INTERNET COMMUNICATION SETTINGS

Turn off access to all Windows Update features

Enabled

COMPUTER CONFIGURATION/ADMINISTRATIVE TEMPLATES/WINDOWS COMPONENTS/WINDOWS UPDATE

Allow Automatic Updates immediate installation

Enabled

Allow non-administrators to receive update notifications

Enabled

Automatic Updates detection frequency

Enabled

- Check for updates at the following interval (hours): 22

Configure Automatic Updates

Enabled

- Configure automatic updating: 4 - Auto download and schedule the install

- Install during automatic maintenance  

- Scheduled install day: 0 - Every day

- Scheduled install time: 16:00

Do not connect to any Windows Update Internet locations

Enabled

Enable client-side targeting

Enabled

 

- Target group name for this computer: <targetgroupname>

 

No auto-restart with logged on users for scheduled automatic updates installations

Enabled

 

Reschedule Automatic Updates scheduled installations

Enabled

 

- Wait after system startup (minutes): 60

 

Specify intranet Microsoft update service location

Enabled

- Set the intranet update service for detecting updates: http://<wsusserver>:8530

- Set the intranet statistics server: http:// <wsusserver>:8530

###############################################

Some servers not in the correct group

$
0
0

Hello.

I have a 3-node Hyper-V cluster. The 3 nodes are all identical servers, in the same OU in AD, and getting the same Group Policies. RSOP shows the correct WSUS settings on each one, however, in WSUS Server 1 is correctly listed in the Servers Group. Server 2 and Server 3 are only listed in the All Computers Group. Server 1 is 99% compliant, Server 2 is 100% compliant and Server 3 is 0%, having 'not reported'. These servers have been running for months (with the exception of Server 3 which was purchased at the same time, but only recently added to the Hyper-V cluster).

Adding Server 3 to the cluster seems to have also interfered with CAU, as that now fails as well. Troubleshooting that led me to the WSUS server, which in turn led me to the inconsistent state.

How do I get all 3 of them in the Servers OU and communicating when GPO seems to be assigning the correct settings already? Could this be a local firewall issue on the new server? is the a way to 'unregister' the new server from WSUS and 're-register' it?

Thank you.

Windows update issues on Server 2012 (Wsus) win 8.1 (OS)

$
0
0

Hey everyone.. I have been having some issues on windows 8.1 under a specific hardware platform ..  We are using a WSUS server. I know the reg keys are working, as other win 8.1 OS's under a diff HW platform are reporting in just fine. 

I have tried --

Renaming/deleting the sw dist folder, reimporting all reg keys including SUSID's.  Also have just completed a reimage of the entire computer.  The same error of 80244007 within the actual WSUS server Gui.  Deleting the PC from the Server and resetauthorizations.

When checking the windowsupdate.log file I saw this before I reimaged the computer.. Serialization Failure.  Character value 28 is invalid. 

I have checked the HLKM/hardware/system/bios reg key and there aren't any different characters than a pc that is working correctly. 

2018-10-31 11:25:25:096  968 a9c Misc ===========  Logging initialized (build: 7.9.9600.17930, tz: -0400)  ===========
2018-10-31 11:25:25:096  968 a9c Misc   = Process: C:\windows\system32\svchost.exe
2018-10-31 11:25:25:096  968 a9c Misc   = Module: c:\windows\system32\wuaueng.dll
2018-10-31 11:25:25:096  968 a9c Service *************
2018-10-31 11:25:25:096  968 a9c Service ** START **  Service: Service startup
2018-10-31 11:25:25:096  968 a9c Service *********
2018-10-31 11:25:25:112  968 a9c IdleTmr Non-AoAc machine.  Aoac operations will be ignored.
2018-10-31 11:25:25:112  968 a9c Agent   * WU client version 7.9.9600.17930
2018-10-31 11:25:25:112  968 a9c Agent WARNING: SleepStudyTracker: Machine is non-AOAC. Sleep study tracker disabled.
2018-10-31 11:25:25:112  968 a9c Agent   * Base directory: C:\windows\SoftwareDistribution
2018-10-31 11:25:25:112  968 a9c Agent   * Access type: No proxy
2018-10-31 11:25:25:112  968 a9c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
2018-10-31 11:25:25:112  968 a9c Service UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2018-10-31 11:25:25:112  968 a9c Agent   * Network state: Connected
2018-10-31 11:25:25:112  968 a9c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
2018-10-31 11:25:25:112  968 a9c Service UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2018-10-31 11:25:25:143  968 a9c Agent ***********  Agent: Initializing global settings cache  ***********
2018-10-31 11:25:25:143  968 a9c Agent   * Endpoint Provider: 00000000-0000-0000-0000-000000000000
2018-10-31 11:25:25:143  968 a9c Agent   * WSUS server: http://vmmscswusp01.XX.XX:8530/
2018-10-31 11:25:25:143  968 a9c Agent   * WSUS status server: http://vmmscswusp01.XX.XX:8530/
2018-10-31 11:25:25:143  968 a9c Agent   * Target group: PM Prod Workstations
2018-10-31 11:25:25:143  968 a9c Agent   * Windows Update access disabled: No
2018-10-31 11:25:25:143  968 a9c WuTask WuTaskManager delay initialize completed successfully..
2018-10-31 11:25:25:143  968 a9c AU     Timer: 31DA7559-FE27-4810-8FF6-987195B1FD98, Expires 2018-10-31 16:20:27, not idle-only, not network-only
2018-10-31 11:25:25:143  968 a9c AU     Timer: 143FB093-8AA1-4DBC-A582-8806F8F4C1F7, Expires 2018-11-02 15:24:36, not idle-only, not network-only
2018-10-31 11:25:25:143  968 a9c AU     Timer: CF1ABEC6-7887-4964-BB93-B2E21B31CEC1, Expires 2018-11-01 15:24:23, not idle-only, not network-only
2018-10-31 11:25:25:143  968 a9c AU     Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-11-01 15:24:23, not idle-only, not network-only
2018-10-31 11:25:25:159  968 a9c Report CWERReporter::Init succeeded
2018-10-31 11:25:25:159  968 a9c Agent ***********  Agent: Initializing Windows Update Agent  ***********
2018-10-31 11:25:25:174  968 a9c DnldMgr Download manager restoring 0 downloads
2018-10-31 11:25:25:205  968 a9c Agent   * WARNING: Failed to mark wuauserv as triggered by group policy change, hr = 0x80070005
2018-10-31 11:25:25:205  968 a9c AU ###########  AU: Initializing Automatic Updates  ###########
2018-10-31 11:25:25:205  968 a9c AU AIR Mode is disabled
2018-10-31 11:25:25:205  968 a9c AU   # Policy Driven Provider:  http://vmmscswusp01.XX.XX:8530/
2018-10-31 11:25:25:205  968 a9c AU   # Detection frequency: 1
2018-10-31 11:25:25:205  968 a9c AU   # Target group: PM Prod Workstations
2018-10-31 11:25:25:205  968 a9c AU   # Approval type: Scheduled (Policy)
2018-10-31 11:25:25:205  968 a9c AU   # Auto-install minor updates: No (Policy)
2018-10-31 11:25:25:205  968 a9c AU   # Will interact with non-admins (Non-admins are elevated (Policy))
2018-10-31 11:25:28:143  968 a9c AU WARNING: Failed to get Wu Exemption info from NLM, assuming not exempt, error = 0x800704C6
2018-10-31 11:25:28:190  968 a9c AU AU finished delayed initialization
2018-10-31 11:25:28:190  968 a9c AU Currently AUX is enabled - so not show any WU Upgrade notifications.
2018-10-31 11:25:28:268  968 a9c AU Adding timer:
2018-10-31 11:25:28:268  968 a9c AU     Timer: 31DA7559-FE27-4810-8FF6-987195B1FD98, Expires 2018-10-31 16:20:27, not idle-only, not network-only
2018-10-31 11:25:28:268  968 a9c AU Currently AUX is enabled - so not show any WU Upgrade notifications.
2018-10-31 11:25:28:706  968 1034 DnldMgr Asking handlers to reconcile their sandboxes
2018-10-31 11:33:31:051  968 1034 EP Got WSUS Client/Server URL: "http://vmmscswusp01.XX.XX:8530/ClientWebService/client.asmx"
2018-10-31 11:33:31:066  968 1034 IdleTmr WU operation (CAgentProtocolTalker::RegisterComputer_WithRecovery) started; operation # 10; does use network; is at background priority
2018-10-31 11:33:31:066  968 1034 WS WARNING: Nws Failure: errorCode=0x803d0000
2018-10-31 11:33:31:066  968 1034 WS WARNING: Serialization failure occurred when writing an element with WS_WRITE_OPTION '1', name 'RegisterComputer' and namespace 'http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService'.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Serialization failure occurred when writing a field with WS_TYPE '26 (0x1A)', WS_FIELD_MAPPING '2', name 'computerInfo' and namespace 'http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService'.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Serialization failure occurred when writing a field with WS_TYPE '17 (0x11)', WS_FIELD_MAPPING '2', name 'ComputerModel' and namespace 'http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService'.
2018-10-31 11:33:31:066  968 1034 WS WARNING: The character value 28 (0x1C) is not valid.
2018-10-31 11:33:31:066  968 1034 WS WARNING: MapToSusHResult mapped Nws error 0x803d0000 to 0x80240439
2018-10-31 11:33:31:066  968 1034 WS WARNING: Web service call failed with hr = 80240439.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Current service auth scheme='None'.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Proxy List used: '(null)', Bypass List used: '(null)', Last Proxy used: '(null)', Last auth Schemes used: 'None'.
2018-10-31 11:33:31:066  968 1034 WS FATAL: OnCallFailure failed with hr=0X80240439
2018-10-31 11:33:31:066  968 1034 IdleTmr WU operation (CAgentProtocolTalker::RegisterComputer_WithRecovery, operation # 10) stopped; does use network; is at background priority
2018-10-31 11:33:31:066  968 1034 EP Got WSUS Client/Server URL: "http://vmmscswusp01.XX.XX:8530/ClientWebService/client.asmx"
2018-10-31 11:33:31:066  968 1034 PT WARNING: PTError: 0x80240439
2018-10-31 11:33:31:066  968 1034 PT WARNING: ClientWebService->RegisterComputer failed, hr=0x80240439, Not Fatal
2018-10-31 11:33:31:066  968 1034 EP Got WSUS Reporting URL: "http://vmmscswusp01.XX.XX:8530/ReportingWebService/ReportingWebService.asmx"
2018-10-31 11:33:31:066  968 1034 Report OpenReportingWebServiceConnection, reporting URL = http://vmmscswusp01.XX.XX:8530/ReportingWebService/ReportingWebService.asmx
2018-10-31 11:33:31:066  968 1034 IdleTmr WU operation (CLegacyEventUploader::HandleEvents) started; operation # 11; does use network; is at background priority
2018-10-31 11:33:31:066  968 1034 Report Uploading 2 events using cached cookie.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Nws Failure: errorCode=0x803d0000
2018-10-31 11:33:31:066  968 1034 WS WARNING: Serialization failure occurred when writing an element with WS_WRITE_OPTION '1', name 'ReportEventBatch' and namespace 'http://www.microsoft.com/SoftwareDistribution'.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Serialization failure occurred when writing a field with WS_TYPE '26 (0x1A)', WS_FIELD_MAPPING '3', name 'eventBatch' and namespace 'http://www.microsoft.com/SoftwareDistribution'.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Serialization failure occurred when writing a field with WS_TYPE '26 (0x1A)', WS_FIELD_MAPPING '2', name 'ExtendedData' and namespace 'http://www.microsoft.com/SoftwareDistribution'.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Serialization failure occurred when writing a field with WS_TYPE '17 (0x11)', WS_FIELD_MAPPING '2', name 'ComputerModel' and namespace 'http://www.microsoft.com/SoftwareDistribution'.
2018-10-31 11:33:31:066  968 1034 WS WARNING: The character value 28 (0x1C) is not valid.
2018-10-31 11:33:31:066  968 1034 WS WARNING: MapToSusHResult mapped Nws error 0x803d0000 to 0x80240439
2018-10-31 11:33:31:066  968 1034 WS WARNING: Web service call failed with hr = 80240439.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Current service auth scheme='None'.
2018-10-31 11:33:31:066  968 1034 WS WARNING: Proxy List used: '(null)', Bypass List used: '(null)', Last Proxy used: '(null)', Last auth Schemes used: 'None'.
2018-10-31 11:33:31:066  968 1034 WS FATAL: OnCallFailure failed with hr=0X80240439
2018-10-31 11:33:31:066  968 1034 Report WARNING: Failed to upload events to the server with hr = 80240439.
2018-10-31 11:33:31:066  968 1034 Report WARNING: Reporter failed to upload events with hr = 80240439.
2018-10-31 11:33:31:066  968 1034 IdleTmr WU operation (CLegacyEventUploader::HandleEvents, operation # 11) stopped; does use network; is at background priority

Edited to remove the domain name.

I have even deleted the PC out of the wsus server.. the PC will connect to the server and display the dns name, but no other info comes across.... and I cant obtain any updates from the server, to the PC. 

The reimage included swapping the hard drive, so DISM/SFC etc has also been completed.

Wsus can't download 1809 patch

$
0
0

Hi Everyone, 

I have a problem on my Wsus server (2012 R2).

I can not download the latest version of windows 1809 it fails automatically after a few minutes of downloading (screen below).

I already add the .esd format on IIS.

Did you know were I can found some logs informations ? 

Thank you.

Kind regards,

Clément

Feature update Windows 10 1803 failed to install when deployed via WSUS

$
0
0

Hello All,

Server OS : Windows Server 2012 R2

WSUS Version : 6.3.9600.18694

Client : Windows 10 1511 build ( Tried in multiple Windows 10 OS 15*)

Feature upgrade : 1803

Client could download the feature update (1803) from WSUS server. But installation fails with  error " Feature update to Windows 10 (business editions), version 1803, en-us x64 - Error 0x8000ffff".

Note :- All other security updated are successfully deployed from WSUS server.



Event ID 7032 - The WSUS administration console was unable to connect to the WSUS Server via the remote API

$
0
0
I keep getting this error with WSUS:

Log Name:      Application
Source:        Windows Server Update Services
Date:          2009-06-16 13:23:56
Event ID:      7032
Task Category: None
Level:         Warning
Keywords:      Classic
User:          N/A
Computer:      ORENORESERVER.orenore.local
Description:
The WSUS administration console was unable to connect to the WSUS Server via the remote API. 

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists, 

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


System.IO.IOException -- The handshake failed due to an unexpected packet format.

Source
System

Stack Trace:
   at System.Net.Security.SslState.StartReadFrame(Byte[] buffer, Int32 readBytes, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.StartReceiveBlob(Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ForceAuthentication(Boolean receiveFirst, Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ProcessAuthentication(LazyAsyncResult lazyResult)
   at System.Threading.ExecutionContext.runTryCode(Object userData)
   at System.Runtime.CompilerServices.RuntimeHelpers.ExecuteCodeWithGuaranteedCleanup(TryCode code, CleanupCode backoutCode, Object userData)
   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
   at System.Net.TlsStream.ProcessAuthentication(LazyAsyncResult result)
   at System.Net.TlsStream.Write(Byte[] buffer, Int32 offset, Int32 size)
   at System.Net.PooledStream.Write(Byte[] buffer, Int32 offset, Int32 size)
   at System.Net.ConnectStream.WriteHeaders(Boolean async)
** this exception was nested inside of the following exception **


System.Net.WebException -- The underlying connection was closed: An unexpected error occurred on a send.

Source
Microsoft.UpdateServices.Administration

Stack Trace:
   at Microsoft.UpdateServices.Administration.AdminProxy.CreateUpdateServer(Object[] args)
   at Microsoft.UpdateServices.Administration.AdminProxy.GetUpdateServer(String serverName, Boolean useSecureConnection, Int32 portNumber)
   at Microsoft.UpdateServices.UI.AdminApiAccess.AdminApiTools.GetUpdateServer(String serverName, Boolean useSecureConnection, Int32 portNumber)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.GetUpdateServer(PersistedServerSettings settings)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.ConnectToServer()
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.ConnectToServerAndPopulateNode(Boolean connectingServerToConsole)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.OnExpandFromLoad(SyncStatus status)
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
  <System>
    <Provider Name="Windows Server Update Services" />
    <EventID Qualifiers="0">7032</EventID>
    <Level>3</Level>
    <Task>0</Task>
    <Keywords>0x80000000000000</Keywords>
    <TimeCreated SystemTime="2009-06-16T11:23:56.000Z" />
    <EventRecordID>30419</EventRecordID>
    <Channel>Application</Channel>
    <Computer>ORENORESERVER.orenore.local</Computer>
    <Security />
  </System>
  <EventData>
    <Data>The WSUS administration console was unable to connect to the WSUS Server via the remote API. 

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists, 

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


System.IO.IOException -- The handshake failed due to an unexpected packet format.

Source
System

Stack Trace:
   at System.Net.Security.SslState.StartReadFrame(Byte[] buffer, Int32 readBytes, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.StartReceiveBlob(Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ForceAuthentication(Boolean receiveFirst, Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ProcessAuthentication(LazyAsyncResult lazyResult)
   at System.Threading.ExecutionContext.runTryCode(Object userData)
   at System.Runtime.CompilerServices.RuntimeHelpers.ExecuteCodeWithGuaranteedCleanup(TryCode code, CleanupCode backoutCode, Object userData)
   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
   at System.Net.TlsStream.ProcessAuthentication(LazyAsyncResult result)
   at System.Net.TlsStream.Write(Byte[] buffer, Int32 offset, Int32 size)
   at System.Net.PooledStream.Write(Byte[] buffer, Int32 offset, Int32 size)
   at System.Net.ConnectStream.WriteHeaders(Boolean async)
** this exception was nested inside of the following exception **


System.Net.WebException -- The underlying connection was closed: An unexpected error occurred on a send.

Source
Microsoft.UpdateServices.Administration

Stack Trace:
   at Microsoft.UpdateServices.Administration.AdminProxy.CreateUpdateServer(Object[] args)
   at Microsoft.UpdateServices.Administration.AdminProxy.GetUpdateServer(String serverName, Boolean useSecureConnection, Int32 portNumber)
   at Microsoft.UpdateServices.UI.AdminApiAccess.AdminApiTools.GetUpdateServer(String serverName, Boolean useSecureConnection, Int32 portNumber)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.GetUpdateServer(PersistedServerSettings settings)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.ConnectToServer()
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.ConnectToServerAndPopulateNode(Boolean connectingServerToConsole)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.OnExpandFromLoad(SyncStatus status)</Data>
  </EventData>
</Event>

Windows 10 update detection frequency not following Group Policy

$
0
0

Ever since Windows 10 v1803, most of my clients check in with the WSUS server and install updates fine, but I've noticed that some of my clients randomly do not always adhere to my Group Policy "Automatic Updates detection frequency" setting.  I do understand the actual check-in time can be the interval +0-4 hours, but I can have some machines that are continuously on the network, and may not check in for up to a week.  If I force update detection via the GUI or through Powershell, they check in just fine.  That same client might check in fine for the next few weeks, and then all of the sudden not check in for a few days.  

We do still have a few Windows 7 devices, and they function exactly as I would expect.  They're in the same OU as the Windows 10 machines, and are running the same WSUS Group Policy.  This isn't a major issue, but I'm just trying to nail this down to see if maybe there is a newer policy setting for Windows 10 that I do not have applied.  Any help would be greatly appreciated.  Thanks!

Windows 10 1809 LTSC Updates Not Showing in WSUS

$
0
0

WSUS Server 2016

Clients are 1607 LTSB and now a handful of 1809 LTSC

In WSUS I have CU updates from 1507 to 1803.  However I have no 1809 CU updates.  The only 1809 updates I'm getting are .NET Framework.

The only Windows 10 option I have selected in WSUS is "Windows 10 LTSB".  Do I now have to check off something else to get 1809 updates?

Many thanks for any help!

WSUS - 2019 All Computers Server Node Crash

$
0
0

I wanted to try out a test 2019 WSUS server. Everything seemed to go smoothly, however when I go look at All Computers, I get a system node crash.

I looked at the possibility of it being the same as the bad BIOS name, but I do not seem to see any errors.

The error is as follows:

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists, 

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


System.InvalidCastException -- Unable to cast object of type 'System.Guid' to type 'System.String'.

Source
Microsoft.UpdateServices.BaseApi

Stack Trace:
   at Microsoft.UpdateServices.Internal.BaseApi.SoapExceptionProcessor.DeserializeAndThrow(SoapException soapException)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.ExecuteSPSearchComputers(String computerTargetScopeXml)
   at Microsoft.UpdateServices.Internal.BaseApi.ComputerTarget.SearchComputerTargets(ComputerTargetScope searchScope, UpdateServer updateServer)
   at Microsoft.UpdateServices.UI.AdminApiAccess.ComputerTargetManager.GetComputerTargets(ComputerTargetScope searchScope)
   at Microsoft.UpdateServices.UI.AdminApiAccess.BulkComputerPropertiesCache.GetAndCacheComputers(ExtendedUpdateScope updateScope, ComputerTargetScope computerTargetScope)
   at Microsoft.UpdateServices.UI.SnapIn.Pages.ComputersListPage.GetListRows()

Has anyone come across this error before?

Thanks.

Windows 2016 WSUS log file contains mainly of: (No Format Information found)

$
0
0

After setting up new Windows 2016 server, i got 0x8024401c error. So i wanted to look at the logfile. But when running Get-WindowsUpdateLog on Windows 2016 server, the log file contains 100% of "No Format Information found" entries.

Is this ther any fix for this? Known issue?

1601.01.01 01.00.00.0000000 912   1416                  Unknown( 123): GUID=44e91a30-0234-37f0-d2f9-777240b02428 (No Format Information found).
1601.01.01 01.00.00.0000000 1464  2676                  Unknown( 12): GUID=eb73583d-5481-33b4-202d-9bb270eddffa (No Format Information found).
1601.01.01 01.00.00.0000000 912   1696                  Unknown( 122): GUID=44e91a30-0234-37f0-d2f9-777240b02428 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 25): GUID=6ec578f9-9c46-351d-5238-568542450649 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 207): GUID=0defb9f2-be29-3d72-4390-6806b45a584c (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 12): GUID=6ec578f9-9c46-351d-5238-568542450649 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 13): GUID=6ec578f9-9c46-351d-5238-568542450649 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 14): GUID=6ec578f9-9c46-351d-5238-568542450649 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 15): GUID=6ec578f9-9c46-351d-5238-568542450649 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 16): GUID=6ec578f9-9c46-351d-5238-568542450649 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 20): GUID=6ec578f9-9c46-351d-5238-568542450649 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 38): GUID=adf11b8c-baac-3d44-1059-4f8c843b025a (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 26): GUID=adf11b8c-baac-3d44-1059-4f8c843b025a (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 11): GUID=36385f84-a58a-32a7-0b79-6a28500f3073 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 18): GUID=cba37bd3-9a86-3c72-ec07-f2535dabed36 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 30): GUID=ce331769-0999-3076-1158-3c91cf80ea33 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 18): GUID=cba37bd3-9a86-3c72-ec07-f2535dabed36 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 11): GUID=ce331769-0999-3076-1158-3c91cf80ea33 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 18): GUID=cba37bd3-9a86-3c72-ec07-f2535dabed36 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 30): GUID=ce331769-0999-3076-1158-3c91cf80ea33 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 18): GUID=cba37bd3-9a86-3c72-ec07-f2535dabed36 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 11): GUID=ce331769-0999-3076-1158-3c91cf80ea33 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 18): GUID=cba37bd3-9a86-3c72-ec07-f2535dabed36 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 30): GUID=ce331769-0999-3076-1158-3c91cf80ea33 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 18): GUID=cba37bd3-9a86-3c72-ec07-f2535dabed36 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 11): GUID=ce331769-0999-3076-1158-3c91cf80ea33 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 18): GUID=cba37bd3-9a86-3c72-ec07-f2535dabed36 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 30): GUID=ce331769-0999-3076-1158-3c91cf80ea33 (No Format Information found).
1601.01.01 01.00.00.0000000 912   2560                  Unknown( 18): GUID=cba37bd3-9a86-3c72-ec07-f2535dabed36 (No Format Information found).



Problems with the application "cleaning the WSUS server"

$
0
0

Hello,

I come to you after cleaning the network information, and I admit that I am a little blocked. I work in a clinic that has configured its update server. As for the days to come, everything works niquel, and the information is well transcribed, on the other hand, when I go in: Options => Server Cleanup.

The administration console has been connected to the server. Verify that the Update Services service, Internet Information Services (IIS), and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services service. System.Net.Sockets.SocketException - An existing connection must be closed by the remote host Source System.Windows.Forms Trace of the pile: at System.Windows.Forms.Control.MarshaledInvoke (Control Caller, Delegate Method, Arguments Object [], Synchronous Boolean) at System.Windows.Forms.Control.Invoke (Delegate Method, Object [] args) to Microsoft.UpdateServices.UI.SnapIn.Wizards.ServerCleanup.ServerCleanupWizard.OnCleanupComplete (Object Sender, PerformCleanupCompletedEventArgs e)

The event ID is 5011 .

I tried what is indicated by the error message but nothing. I specify that I am on a server Windows 2012 Here it is, if someone has a solution, I am a taker. If it lacks information, I remain available.

Regards,

Approve wsus update on group

$
0
0

I've got an environment where users are moving to new wsus

currently they have 2 wsus gpo (old wsus and new wsus) tie to 1 OU.

The workstation are still getting updates from the old wsus.

The policy in the new gpo is only set-intranet enabled (no automatic install policy yet), this is to try to have the workstation report back to the new wsus so then later arrange the workstation to a specific grouping.

If approving the update from new wsus to the group will the workstation get updates from the old wsus or the new wsus?

Or do have to remove the old gpo link from the OU first then create the automatic install policy on the new gpo then approve update from new wsus?


WSUS: Client Computers Not Yet Reported Status

$
0
0

Hello Friends,

 I have WSUS server (Windows server 2016). We have multiple sites. Our Client computers reporting to single wsus server

 Some of the client windows 7 and windows 10 machines are showing not yet reported status.

 I have tried lots of troubleshooting like renaming software distribution folder, susid deletion, various time ran wuauclt /detectnow and wuauclt /reportnow , Telenet wsus server 8530, etc, but still not resolved my issue.

However the Update is detecting/Installing from Microsoft Update website perfectly. The issue is only when I update through WSUS server.

The Reporting event log (C:\Windows\software distribution) says-

SelfUpdate    Failure    Software Synchronization    Windows Update Client failed to detect with error 0x80072efe.

Please someone help me to resolve this issue.

Thanks


Amit Kumar

Connect to upstream server fail - "Could not establish trust relationship for the SSL/TLS secure channel"

$
0
0
Hi

I'm trying to set up a local WSUS  as downstream to our working one at a different site (which is working fine).
Both are on Server 2012 R2 machines.
Both up to date with updates.

The downstream wizard stops at 'Start connecting' with an http error of:
WebException: The underlying connection was closed: Could not establish trust relationship for the secure channel. 
System.Security.Authentication.AuthenticationException: The remote certificate is invalid according to the validation procedure.


Upstream server IP & port are good, use ssl is ticked, as is 'This is a replica of the upstream server'.
Each server has a personal cert provided by local CA server.
Have imported each other's certs to trusted devices store.

I found a similar question on this forum where someone replying asked whether KB3159706 was installed ("...as further steps will be required"). In the OP's case it wasn't so that point was not expanded upon, but on ours it is.
That KB seems to be required if serving Win 10 clients, which our WSUS is.

Can anyone help here please?

Many thanks

WSUS 2019 Downstreamserver bug - Downstream Computers not available on Upstream

$
0
0

Hello,

I think there might be an issue with downstream servers in server wsus 2019.

First I did update my main WSUS to 2019. All Downstream were 2016. After that I was not able to view the complete computer list on the main server. As soon as you choose the “All Computers” or a computer group that is from a downstream server the console crashes. When you delete the downstream server from the “Downstream Servers” section I am able to browse the list again.

After that I decided to reinstall all WSUS Servers with server 2019 even including the main one. And I did again get the error.

Tried it via Powershell gives me the following error.

$wsusserver = "localhost"
[reflection.assembly]::LoadWithPartialName("Microsoft.UpdateServices.Administration")
$wsus = [Microsoft.UpdateServices.Administration.AdminProxy]::getUpdateServer($wsusserver,$False)
$computerScope = New-object Microsoft.UpdateServices.Administration.ComputerTargetScope
$computerScope.IncludeDownstreamComputerTargets = $true
$wsus.GetComputerTargets($computerScope)

Exception calling "GetComputerTargets" with "1" argument(s):"Unable to cast object of type 'System.Guid' to type 'System.String'."

At line:1 char:1

If I choose to not include Downstream Computer Targets it works.

Viewing all 12331 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>