Quantcast
Channel: WSUS Forum
Viewing all 12331 articles
Browse latest View live

Client systems are not checking for updates after setting the GPO from Windows Server 2016

$
0
0

Hi,

I'm struggling to figure out why my wsus clients aren't reporting in on a regular basis. They seem to only report in if I execute a manual check for updates on the device itself. I have the following GPO set, I'm not sure what else I'm missing.

Computer Configuration/Policies/Administrative Templates/Windows Components/Windows updates/Policy

- Automatic Updates detection frequency --> 22hours

- Configure Automatic Updates --> 3 - Auto download and notify for install

- Specify intranet Microsoft update service location

   - Set the intranet update service for detecting updates (http://[internalwsus]:8530)

   - Set the intranet statistics server (http://[internalwsus]:8530)

I know my intranet settings are valid since the servers to register initially but for whatever reason none of them check within the 22 hour interval. I've left some devices go for several days with no update so I don't think it's a matter of me not letting WSUS do it's thing....

Client: Windows 2016

WSUS Server: Windows 2016

Any advice would be appreciated!



Problems installing KB3159706 on Windows Server 2012 R2

$
0
0
Dear All,

I am having problem with windows 10 client (1607) not getting updates from our WSUS . They having no problem getting them from Microsoft but updates keep failing when I try to get them from WSUS. Windows 7 clients have no issue get them  they are perfectly fine .Its just windows 10 clients that are having problem

I'm having a problem when I try to install the KB3159706 on my WSUS Server (Windows Server 2012 R2 Standard Version ).

Version WSUS: 6.3.9600.18694

Whenever I try I get this error message "The updates is not applicable to your computer."

Since this update is necessary to provide the Windows 10 upgrades 1607, I have been having problems to accomplish this.

These are the updates already installed on WSUS:

Hotfix(s):                 150 Hotfix(s) Installed.
                           [01]: KB2959936
                           [02]: KB2894852
                           [03]: KB2894856
                           [04]: KB2896496
                           [05]: KB2919355
                           [06]: KB2920189
                           [07]: KB2928120
                           [08]: KB2933826
                           [09]: KB2934520
                           [10]: KB2938772
                           [11]: KB2949621
                           [12]: KB2954879
                           [13]: KB2965500
                           [14]: KB2966407
                           [15]: KB2966826
                           [16]: KB2966828
                           [17]: KB2967917
                           [18]: KB2968296
                           [19]: KB2971203
                           [20]: KB2971850
                           [21]: KB2972103
                           [22]: KB2972213
                           [23]: KB2973114
                           [24]: KB2973351
                           [25]: KB2973448
                           [26]: KB2975061
                           [27]: KB2976627
                           [28]: KB2977629
                           [29]: KB2977765
                           [30]: KB2978122
                           [31]: KB2978126
                           [32]: KB2987107
                           [33]: KB2989647
                           [34]: KB3000483
                           [35]: KB3000850
                           [36]: KB3003057
                           [37]: KB3004361
                           [38]: KB3004365
                           [39]: KB3008242
                           [40]: KB3014442

                          [41]: KB3019978
                           [42]: KB3021674
                           [43]: KB3021910
                           [44]: KB3022777
                           [45]: KB3023219
                           [46]: KB3023222
                           [47]: KB3023266
                           [48]: KB3030377
                           [49]: KB3031044
                           [50]: KB3032359
                           [51]: KB3033889
                           [52]: KB3034348
                           [53]: KB3035126
                           [54]: KB3037576
                           [55]: KB3037579
                           [56]: KB3042058
                           [57]: KB3042085
                           [58]: KB3042553
                           [59]: KB3044374
                           [60]: KB3045685
                           [61]: KB3045755
                           [62]: KB3045999
                           [63]: KB3046017
                           [64]: KB3046359
                           [65]: KB3055642
                           [66]: KB3058515
                           [67]: KB3059317
                           [68]: KB3061468
                           [69]: KB3061512
                           [70]: KB3067505
                           [71]: KB3068457
                           [72]: KB3071756
                           [73]: KB3072307
                           [74]: KB3072630
                           [75]: KB3074228
                           [76]: KB3074545
                           [77]: KB3074548
                           [78]: KB3075220
                           [79]: KB3076895
                           [80]: KB3077715
                           [81]: KB3080446
                           [82]: KB3082089
                           [83]: KB3083992
                           [84]: KB3084135
                           [85]: KB3086255
                           [86]: KB3088195
                           [87]: KB3092601
                           [88]: KB3097966
                           [89]: KB3097992
                           [90]: KB3097997

                           [91]: KB3098779
                           [92]: KB3100773
                           [93]: KB3102812
                           [94]: KB3102939
                           [95]: KB3108347
                           [96]: KB3108381
                           [97]: KB3109094
                           [98]: KB3109103
                           [99]: KB3109853
                           [100]: KB3110329
                           [101]: KB3112336
                           [102]: KB3121918
                           [103]: KB3122651
                           [104]: KB3122654
                           [105]: KB3123479
                           [106]: KB3124275
                           [107]: KB3126041
                           [108]: KB3126434
                           [109]: KB3126446
                           [110]: KB3126593
                           [111]: KB3127222
                           [112]: KB3127226
                           [113]: KB3133043
                           [114]: KB3134222
                           [115]: KB3135456
                           [116]: KB3135985
                           [117]: KB3135994
                           [118]: KB3137513
                           [119]: KB3138615
                           [120]: KB3139398
                           [121]: KB3139914
                           [122]: KB3139929
                           [123]: KB3139940
                           [124]: KB3140735
                           [125]: KB3142026
                           [126]: KB3142030
                           [127]: KB3142045
                           [128]: KB3146706
                           [129]: KB3146723
                           [130]: KB3146963
                           [131]: KB3149090
                           [132]: KB3153171
                           [133]: KB3153199
                           [134]: KB3153704
                           [135]: KB3154070
                           [136]: KB3155784
                           [137]: KB3156013
                           [138]: KB3156016
                           [139]: KB3156017
                           [140]: KB3156019
                           [141]: KB3156059
                           [142]: KB3162835
                           [143]: KB4040958
                           [144]: KB4040967
                           [145]: KB4041687
                           [146]: KB4052978
                           [147]: KB4054993
                           [148]: KB4054999
                           [149]: KB4056898
                           [150]: KB4056895
Best Regards

Yassine BOUNIF


Wsus server Error:Connection Error

$
0
0

please find the error code which have been coming frequently...if any one have resolution please help me out.

The WSUS administration console was unable to connect to the WSUS Server via the remote API. 

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

System.Net.WebException -- The operation has timed out

Source
System.Web.Services

Stack Trace:
   at System.Web.Services.Protocols.WebClientProtocol.GetWebResponse(WebRequest request)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.ApiRemotingCompressionProxy.GetWebResponse(WebRequest webRequest)
   at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
   at Microsoft.UpdateServices.Internal.ApiRemoting.ExecuteSPSearchUpdates(String updateScopeXml, String preferredCulture, Int32 publicationState)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.ExecuteSPSearchUpdates(String updateScopeXml, String preferredCulture, ExtendedPublicationState publicationState)
   at Microsoft.UpdateServices.Internal.BaseApi.Update.SearchUpdates(UpdateScope searchScope, ExtendedPublicationState publicationState, UpdateServer updateServer)
   at Microsoft.UpdateServices.UI.AdminApiAccess.UpdateManager.GetUpdates(ExtendedUpdateScope filter)
   at Microsoft.UpdateServices.UI.AdminApiAccess.WsusSynchronizationInfo.InitializeDerivedProperties()
   at Microsoft.UpdateServices.UI.SnapIn.Pages.SyncResultsListPage.GetSyncInfoRow(WsusSynchronizationInfo syncInfo)
   at Microsoft.UpdateServices.UI.SnapIn.Pages.SyncResultsListPage.GetListRows()

 

Error KB4489878 2008 R1 SP1

$
0
0

Hello,

When you install the update from Windows update KB4489878 fails and installs it. (Windows server 2008 R2)

The error is:

2019-04-02 10:20:05:242  860 1a10 DnldMgr Asking handler to generate non-range requests.
2019-04-02 10:20:05:242  860 1a10 Handler Generating request for CBS update 1F0F864B-6410-41CB-BC6D-A06BEF6AFE7E in sandbox C:\Windows\SoftwareDistribution\Download\98fb16fa475dbcd684e862b511a27970_ctc
2019-04-02 10:20:05:242  860 1a10 Handler Selecting self-contained because update does not have express payload.
2019-04-02 10:20:05:242  860 1a10 Handler Selected payload type is ptSelfContained
2019-04-02 10:20:05:242  860 1a10 Handler Detected download state is dsStart
2019-04-02 10:20:05:242  860 1a10 Handler Adding Windows6.1-KB4489878-x64.cab (entire file) to request list.
2019-04-02 10:20:05:242  860 1a10 Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
2019-04-02 10:20:06:272  860 1a10 Misc Validating signature for C:\Windows\SoftwareDistribution\Download\98fb16fa475dbcd684e862b511a27970_ctc\Windows6.1-KB4489878-x64.cab with dwProvFlags 0x00000080:
2019-04-02 10:20:07:723  860 1a10 Misc  Microsoft signed: Yes
2019-04-02 10:20:07:723  860 1a10 DnldMgr Asking handler to generate non-range requests.
2019-04-02 10:20:07:723  860 1a10 Handler Generating request for CBS update 1F0F864B-6410-41CB-BC6D-A06BEF6AFE7E in sandbox C:\Windows\SoftwareDistribution\Download\98fb16fa475dbcd684e862b511a27970_ctc
2019-04-02 10:20:07:723  860 1a10 Handler Selecting self-contained because update does not have express payload.
2019-04-02 10:20:07:723  860 1a10 Handler Selected payload type is ptSelfContained
2019-04-02 10:20:07:723  860 1a10 Handler Detected download state is dsHavePackage
2019-04-02 10:20:07:723  860 1a10 Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
2019-04-02 10:20:07:723  860 265c AU Launched new AU client for directive 'Download Approval', session id = 0x2
2019-04-02 10:20:07:738 5040 3014 Misc ===========  Logging initialized (build: 7.6.7601.24085, tz: +0100)  ===========
2019-04-02 10:20:07:738 5040 3014 Misc   = Process: C:\Windows\system32\wuauclt.exe
2019-04-02 10:20:07:738 5040 3014 AUClnt Launched Client UI process
2019-04-02 10:20:07:754 5040 3014 Misc ===========  Logging initialized (build: 7.6.7601.24085, tz: +0100)  ===========
2019-04-02 10:20:07:754 5040 3014 Misc   = Process: C:\Windows\system32\wuauclt.exe
2019-04-02 10:20:07:754 5040 3014 Misc   = Module: C:\Windows\system32\wucltux.dll
2019-04-02 10:20:07:754 5040 3014 CltUI AU client got new directive = 'Download Approval', serviceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, return = 0
2019-04-02 10:20:07:816 11848 27a0 COMAPI -------------
2019-04-02 10:20:07:816 11848 27a0 COMAPI -- START --  COMAPI: Install [ClientId = wusa]
2019-04-02 10:20:07:816 11848 27a0 COMAPI ---------
2019-04-02 10:20:07:816 11848 27a0 COMAPI   - Allow source prompts: Yes; Forced: No; Force quiet: No
2019-04-02 10:20:07:816 11848 27a0 COMAPI   - Updates in request: 1
2019-04-02 10:20:07:816 11848 27a0 COMAPI   - ServiceID = {6A498F13-AD63-44DA-A31F-39ADA0DDC6AF} Third party service
2019-04-02 10:20:07:816  860 1da4 Agent *************
2019-04-02 10:20:07:816  860 1da4 Agent ** START **  Agent: Installing updates [CallerId = wusa]
2019-04-02 10:20:07:816  860 1da4 Agent *********
2019-04-02 10:20:07:816  860 1da4 Agent   * Updates to install = 1
2019-04-02 10:20:07:816 11848 27a0 COMAPI   - Updates to install = 1
2019-04-02 10:20:07:816 11848 27a0 COMAPI <<-- SUBMITTED -- COMAPI: Install [ClientId = wusa]
2019-04-02 10:20:07:816  860 1da4 Agent   *   Title = Security Update for Windows (KB4489878)
2019-04-02 10:20:07:816  860 1da4 Agent   *   UpdateId = {00B91A79-94CE-4E82-BA5F-5E8CE88C0F64}.501
2019-04-02 10:20:07:816  860 1da4 Agent   *     Bundles 1 updates:
2019-04-02 10:20:07:816  860 1da4 Agent   *       {1F0F864B-6410-41CB-BC6D-A06BEF6AFE7E}.501
2019-04-02 10:20:08:362  860 1da4 Agent WARNING: failed to calculate prior restore point time with error 0x80070002; setting restore point
2019-04-02 10:20:08:362  860 1da4 Agent WARNING: LoadLibrary failed for srclient.dll with hr:8007007e
2019-04-02 10:20:08:362  860 1da4 Handler Attempting to create remote handler process as MADAP8017\Administrator in session 3
2019-04-02 10:20:08:378  860 1da4 DnldMgr Preparing update for install, updateId = {1F0F864B-6410-41CB-BC6D-A06BEF6AFE7E}.501.
2019-04-02 10:20:08:393 10192 2618 Misc ===========  Logging initialized (build: 7.6.7601.24085, tz: +0100)  ===========
2019-04-02 10:20:08:393 10192 2618 Misc   = Process: C:\Windows\system32\wuauclt.exe
2019-04-02 10:20:08:393 10192 2618 Misc   = Module: C:\Windows\system32\wuaueng.dll
2019-04-02 10:20:08:393 10192 2618 Handler :::::::::::::
2019-04-02 10:20:08:393 10192 2618 Handler :: START ::  Handler: CBS Install
2019-04-02 10:20:08:393 10192 2618 Handler :::::::::
2019-04-02 10:20:08:409 10192 2618 Handler Starting install of CBS update 1F0F864B-6410-41CB-BC6D-A06BEF6AFE7E
2019-04-02 10:20:08:799 10192 2618 Handler CBS package identity: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24385.1.9
2019-04-02 10:20:08:815 10192 2618 Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\98fb16fa475dbcd684e862b511a27970\Windows6.1-KB4489878-x64.cab, workingdir=C:\Windows\SoftwareDistribution\Download\98fb16fa475dbcd684e862b511a27970\inst
2019-04-02 10:20:13:370  860 195c Report REPORT EVENT: {66649B29-CBDF-4DAA-B3EE-6F969812A173} 2019-04-02 10:20:08:362+0100 1 181 101 {00B91A79-94CE-4E82-BA5F-5E8CE88C0F64} 501 0 wusa Success Content Install Installation Started: Windows successfully started the following update: Security Update for Windows (KB4489878)
2019-04-02 10:20:33:619  860 2bbc AU Getting featured update notifications.  fIncludeDismissed = true
2019-04-02 10:20:33:619  860 2bbc AU No featured updates available.
2019-04-02 10:23:17:309 10192 2790 Handler FATAL: CBS called Error with 0x80070002,
2019-04-02 10:23:21:365 10192 2618 Handler FATAL: Completed install of CBS update with type=0, requiresReboot=0, installerError=1, hr=0x80070002

WSUS - 2019 All Computers Server Node Crash

$
0
0

I wanted to try out a test 2019 WSUS server. Everything seemed to go smoothly, however when I go look at All Computers, I get a system node crash.

I looked at the possibility of it being the same as the bad BIOS name, but I do not seem to see any errors.

The error is as follows:

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists, 

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


System.InvalidCastException -- Unable to cast object of type 'System.Guid' to type 'System.String'.

Source
Microsoft.UpdateServices.BaseApi

Stack Trace:
   at Microsoft.UpdateServices.Internal.BaseApi.SoapExceptionProcessor.DeserializeAndThrow(SoapException soapException)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.ExecuteSPSearchComputers(String computerTargetScopeXml)
   at Microsoft.UpdateServices.Internal.BaseApi.ComputerTarget.SearchComputerTargets(ComputerTargetScope searchScope, UpdateServer updateServer)
   at Microsoft.UpdateServices.UI.AdminApiAccess.ComputerTargetManager.GetComputerTargets(ComputerTargetScope searchScope)
   at Microsoft.UpdateServices.UI.AdminApiAccess.BulkComputerPropertiesCache.GetAndCacheComputers(ExtendedUpdateScope updateScope, ComputerTargetScope computerTargetScope)
   at Microsoft.UpdateServices.UI.SnapIn.Pages.ComputersListPage.GetListRows()

Has anyone come across this error before?

Thanks.

Windows server update checking for update forever ! 2012

$
0
0

Hi All, 

I am having issue to get windows server update on my DC (windows server 2012 standard), it's checking for update for ever!

so I ran the following commands 

sfc /scannow

DISM /Online /Cleanup-Image /RestoreHealth

chkdsk /f /r /x

no change then I ran script below

https://gallery.technet.microsoft.com/scriptcenter/Reset-WindowsUpdateps1-e0c5eb78

and reboot the server no change , I took advise to get the last cumulative update from Microsoft update catalog website, but when I am running this standalone installer again also checking forever ! I totally remove AV I have restart the server again no luck 

it's a virtual machine running in Hyperv


KB890830 doesn't install via WSUS but can be installed manually

$
0
0

Hi,

 Windows Malicious Software Removal Tool x64 - April 2019 (KB890830) doesn't install via WSUS but can be installed manually on some of our servers. This has increased our workload by having to install this tool manually and running it on affected servers to get a 100% completion report. I have looked at the logs and have not found anything unusual. The client simply reports back to WSUS as it requires this update but doesn't install it even if I have set a deadline against it on WSUS. I would appreciate if anyone can help.

Thanks

WSUS with SSL || Error: 0x8024401f - 0x8024401c

$
0
0

Followed this: https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/deploy/2-configure-wsus

and this http://jackstromberg.com/2013/11/enabling-ssl-on-windows-server-update-services-wsus/ for setup SSL on WSUS.

Assigned/Bind a cert in IIS which was issued by our in house Microsoft Enterprise Root CA.  Currently only one server to which I am trying to deploy updates/patches Server 2016.  Our RootCA certificate is present in the Local Computer Trusted Root CA Store on the test server 2016 and also in the same location on WSUS server.

Client server 2016 is visible/reporting in the WSUS Unassigned Computers Group under Status "Not yet reported"  but not moving to the WSUS Group I created for WSUS_TestServers.  The GPO is setup correctly for client side targeting.

This is what I see in the windowslog file on the client/server 2016:

https://fqdn.local:8531/ClientWebService/client.asmx'.
2019/04/05 09:21:08.3073227 1364  1836  WebServices     WS error: The server returned HTTP status code '500 (0x1F4)' with text 'System.ServiceModel.ServiceActivationException'.
2019/04/05 09:21:08.3073232 1364  1836  WebServices     WS error: The server was unable to process the request.
2019/04/05 09:21:08.3073335 1364  1836  WebServices     Web service call failed with hr = 8024401f.
2019/04/05 09:21:08.3073338 1364  1836  WebServices     Current service auth scheme=0.
2019/04/05 09:21:08.3073341 1364  1836  WebServices     Current Proxy auth scheme=0.
2019/04/05 09:21:08.3073422 1364  1836  ProtocolTalker  PTError: 0x8024401f
2019/04/05 09:21:08.3073425 1364  1836  ProtocolTalker  SyncUpdates_WithRecovery failed. 0x8024401f
2019/04/05 09:21:08.3073467 1364  1836  ProtocolTalker  SyncUpdates round trips: 1
2019/04/05 09:21:08.3073471 1364  1836  ProtocolTalker  Sync of Updates 0x8024401f
2019/04/05 09:21:08.3073530 1364  1836  ProtocolTalker  SyncServerUpdatesInternal failed 0x8024401f
2019/04/05 09:21:08.3106381 1364  1836  Agent           Failed to synchronize, error = 0x8024401F
2019/04/05 09:21:08.3244305 1364  1836  Agent           Exit code = 0x8024401F
2019/04/05 09:21:08.3244314 1364  1836  Agent           * END * Finding updates CallerId = UpdateOrchestrator  Id = 1
2019/04/05 09:21:08.3327902 1364  1584  ComApi          *RESUMED* Search ClientId = UpdateOrchestrator
2019/04/05 09:21:08.3334744 1364  1584  ComApi          Updates found = 0
2019/04/05 09:21:08.3334751 1364  1584  ComApi          Exit code = 0x00000000, Result code = 0x8024401F
2019/04/05 09:21:08.3334755 1364  1584  ComApi          * END *   Search ClientId = UpdateOrchestrator
2019/04/05 09:21:08.3340164 1364  7288  ComApi          ISusInternal:: DisconnectCall failed, hr=8024000C
2019/04/05 09:28:39.2998832 1364  8100  Agent           Refreshing global settings cache
2019/04/05 09:28:39.2998843 1364  8100  Agent           WSUS server: https://fqdn.local:8531 (Unchanged)
2019/04/05 09:28:39.2998849 1364  8100  Agent           WSUS status server: https://fqdn.local:8531 (Unchanged)
2019/04/05 09:28:39.2998852 1364  8100  Agent           Alternate Download Server: NULL (Changed)
2019/04/05 09:28:39.2998855 1364  8100  Agent           Fill Empty Content Urls: No (Unchanged)
2019/04/05 09:28:39.2998858 1364  8100  Agent           Target group: WSUS_TestServers(Unchanged)
2019/04/05 09:28:39.2998861 1364  8100  Agent           Windows Update access disabled: No (Unchanged)
2019/04/05 09:29:08.3558987 1364  8128  Misc            Got WSUS Client/Server URL: https://fqdn.local:8531/ClientWebService/client.asmx""
2019/04/05 09:29:08.3559563 1364  8128  ProtocolTalker  OK to reuse existing configuration

------

Thank you



The clients are not getting updated from WSUS server.

$
0
0

Hi,

We have Windows 2016 WSUS server and windows 10 64 bit clients.

I made a group policy on an ou to update all the pc's in that ou. Even after approving the updates in WSUS, none of the updates are getting installed. Please let me know how to resolve this issue.

[Windows Server 2016]: Error when I trying logon with accout domain controller

$
0
0

Hi Everyone!

My Company run OS Windows Server 2016. Today, when I Login with accout join domain, receive error:

""the truth relationship between this workstation and the primary domain failed"

Can you help me? Fix error

Thanks!

Windows Server 2016 - WSUS Clients - WindowsUpdateFailure3, 1001, 0x8024500c

$
0
0
I've looked at everything I know to look at.

The WSUS Server itself is running Windows Server 2016 DataCenter.

The clients on our network are Windows 7 Enterprise, Windows 7 Professional, Windows 10 Professional, Windows 10 Enterprise, Windows Server 2016 Standard, Windows Server 2016 DataCenter and Windows Server 2008 R2 DataCenter.

Only my Windows Server 2016 clients are having this issue.

I've tried clearing the SoftwareDistrib folder, reregistering DLLs, re-indexing the SQL database, rebooting several times, etc.

Our AD Group Policies are as such that INTERnet-based WSUS are prohibited as we want all updates to come from the local server.

The WSUS server itself shows no signs of sync issues or issues downloading the actual updates.  I am at an absolute loss here.

****

Fault bucket 127883099475, type 5
Event Name: WindowsUpdateFailure3
Response: Not available
Cab Id: 0

Problem signature:
P1: 10.0.14393.1198
P2: 8024500c
P3: 00000000-0000-0000-0000-000000000000
P4: Scan
P5: 0
P6: 0
P7: 8024500b
P8: UpdateOrchestrator
P9: {9482F4B4-E343-43B6-B170-9A65BC822C77}
P10: 0

Attached files:

These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\NonCritical_10.0.14393.1198_802d6847332aebf619279c14e8638fd2125bcdcc_00000000_1bf75f67

Analysis symbol: 
Rechecking for solution: 0
Report Id: 2aeac304-5ab2-11e7-90f5-70106fbf9c86
Report Status: 0
Hashed bucket: d1dff83bf57fb9291a38c9f8b68fde52


****

WER File Output

Version=1
EventType=WindowsUpdateFailure3
EventTime=131416677960233426
Consent=1
UploadTime=131429845363147214
ReportIdentifier=f50bdb53-4eb8-11e7-90ef-70106fbf9c86
AppSessionGuid=00000594-0000-0010-960c-34eea1cdd201
TargetAppId=W:0000f519feec486de87ed73cb92d3cac802400000000!00000dac68816ae7c09efc24d11c27c3274dfd147dee!svchost.exe
TargetAppVer=2016//07//16:02:25:32!d1ac!svchost.exe
BootId=4294967295
Response.type=4
Sig[0].Name=ClientVersion
Sig[0].Value=10.0.14393.1066
Sig[1].Name=Win32HResult
Sig[1].Value=8024402f
Sig[2].Name=UpdateID
Sig[2].Value=00000000-0000-0000-0000-000000000000
Sig[3].Name=Scenario
Sig[3].Value=Scan
Sig[4].Name=RevisionID
Sig[4].Value=0
Sig[5].Name=IsManaged
Sig[5].Value=0
Sig[6].Name=LastError
Sig[6].Value=801901f6
Sig[7].Name=CallerAppID
Sig[7].Value=UpdateOrchestrator
Sig[8].Name=ServiceUsed
Sig[8].Value={7971F918-A847-4430-9279-4A52D1EFE18D}
Sig[9].Name=MiscField2
Sig[9].Value=0
DynamicSig[1].Name=OS Version
DynamicSig[1].Value=10.0.14393.2.0.0.272.7
DynamicSig[2].Name=Locale ID
DynamicSig[2].Value=1033
State[0].Key=Transport.DoneStage1
State[0].Value=1
FriendlyEventName=Windows Update installation problem
ConsentKey=WindowsUpdateFailure3
AppName=Host Process for Windows Services
AppPath=C:\Windows\System32\svchost.exe
ReportDescription=A Windows update did not install properly. Sending the following information to Microsoft can help improve the software.
ApplicationIdentity=00000000000000000000000000000000
MetadataHash=410089339


Windows Server 2012 cannot update

$
0
0

I am running an Exchange server (VM ware) on my SB server.  I have tried everything I could find in the forums but cannot get Windows updates on the Exchange server.  Updates on the the SBS and using WSUS are fine.  Updates on the R2 server are fine.

After renaming the update file Windows update just show updates never installed and just searches endlessly.

I have used the Windows troubleshooter.

Stephen

WSUS on win server 2016 cannot download feature updates

$
0
0

Hallo Microsoft,

i am working at company in Berlin


10 days ago i face a problem with WSUS 

WSUS is installed on windows server 2016 and updated already

i cannot install the feature update for windows 10 v1709 or 1803 ... 

and then distribute it to the PCs

in the event viewer i see always this message (Event ID: 364 Content file download failed. Reason: CRC verification failure.)

 i checked a lot of thing : 

- the internet connection with update catalog (Microsoft servers ) is okay

- no proxy server between WSUS and internet

- MIME Types in iis is (File name extension “.esd”, and MIME type is “application/octet-stream”)

- i choose  “Updates are in a specific classification”

- i tried a lot of things with no success

please help me


Server 2016 Servers not auto installing updates

$
0
0

Although I have a GPO set with Auto Updating set to 4- Auto download and schedule the install, the 2016 servers are not auto installing these update or if they do install, they are not rebooting, so I am force to logon and kick off the install.

The WSUS Server is a Windows 2012 R2 Server and all other clients seem in install and reboot per the GPO.

Please advise,

 

Machine not reporting - WSUS on Win2k12R2 Std

$
0
0

Hello fellas !

I have done some research before posting and I am looking for other POV and insights on some stuff that I might miss.

  • Server : Windows Server 2012 R2 Std
  • Issue : Some machines aren't reporting.
  • Method : Using GPO.

I have tried to remove the machine from the WSUS, forcing gpupdate on the computers and run a command that detects the WSUS. Results, they are still not reporting. I have 3 guess at this stage :

  1. Firewall, UAC or Anti-Virus is preventing the process.
  2. Machine does not apply correctly the GPO.
  3. Connection between the server and the machine is broken.

GPUpdate does work. I did a GPResult and it does show that the WSUS GPO is enabled and applied. Other machines with the same configurations are doing fine. Test-Connection from the server to the machine is ok. I do see their IP Addresses on the WSUS Panel.

Thanks,

Nevets24



WSUS - MMC.exe continues to crash

$
0
0

Hello,

My Windows Sevrer 2016 WSUS keeps crashing when I try to view large reports.

Below are the errors:

Faulting application name: mmc.exe, version: 10.0.14393.2608, time stamp: 0x5bd1383b
Faulting module name: KERNELBASE.dll, version: 10.0.14393.2848, time stamp: 0x5c7f626e
Exception code: 0xc000041d
Fault offset: 0x0000000000034078
Faulting process id: 0x1730
Faulting application start time: 0x01d4f46c3eb767c0
Faulting application path: C:\Windows\system32\mmc.exe
Faulting module path: C:\Windows\System32\KERNELBASE.dll
Report Id: 2b91e4c6-da5d-4191-9b22-aa011d664b43
Faulting package full name: 
Faulting package-relative application ID: 

Application: mmc.exe

Framework Version: v4.0.30319
Description: The process was terminated due to an unhandled exception.
Exception Info: System.NullReferenceException
   at Microsoft.UpdateServices.UI.SnapIn.Dialogs.BaseReportDialog.RenderingComplete()
   at Microsoft.UpdateServices.UI.SnapIn.Dialogs.BaseUpdateComputerReportDialog.RenderingComplete()
   at Microsoft.Reporting.WinForms.ReportViewer.OnRenderingComplete(System.Object, System.ComponentModel.AsyncCompletedEventArgs)
   at Microsoft.Reporting.WinForms.AsyncReportOperation.EndAsyncExecution(System.Exception)
   at Microsoft.Reporting.WinForms.ReportViewer+<>c__DisplayClass1.<OnBackgroundThreadCompleted>b__0()
   at Microsoft.Reporting.WinForms.ReportViewer.ProcessAsyncInvokes()
   at Microsoft.Reporting.WinForms.ReportViewer.Reset()
   at Microsoft.UpdateServices.UI.SnapIn.Dialogs.BaseReportDialog.FormClose(System.Windows.Forms.FormClosingEventArgs)
   at System.Windows.Forms.Form.OnFormClosing(System.Windows.Forms.FormClosingEventArgs)
   at System.Windows.Forms.Form.WmClose(System.Windows.Forms.Message ByRef)
   at System.Windows.Forms.NativeWindow.Callback(IntPtr, Int32, IntPtr, IntPtr)

Exception Info: System.Reflection.TargetInvocationException
   at Microsoft.ManagementConsole.Internal.SnapInMessagePumpProxy.OnThreadException(System.Object, System.Threading.ThreadExceptionEventArgs)
   at System.Windows.Forms.Application+ThreadContext.OnThreadException(System.Exception)
   at System.Windows.Forms.Control.WndProcException(System.Exception)
   at System.Windows.Forms.NativeWindow.Callback(IntPtr, Int32, IntPtr, IntPtr)

Has anyone seen this issue and aware of a solution? Thanks

WSUS - Report only - approve update for uninstall

$
0
0

Hello,

I currently have a WSUS server that is set to autodownload and approve updates.

I am considering using WSUS for reports only and letting my win10 machines go to the internet for updates.

I have a few questions hopefully I can get answered.

1) If I use WSUS for reporting only, Can I Mark updates for removal and will the machines uninstall once they report into WSUS?

2) If so, can I mark specific device's (one or two machines) as "approved for removal" or is it a one and done..

Approve update for removal and it removed it from all systems?


Please advise.


Thanks

WSUS 2019 Not Syncing

$
0
0
I Built a server 2019 WSUS Server and it synced up but then stopped with no real error codes that gave answers. Anyone have this issue with Server 2019 WSUS?

Win8.1 Pro Clients not reporting to WSUS

$
0
0

I have server 2012 R2 STDwith WSUS role and need to update windows 8.1 Pro clients.

Client was showing with not yet reported status so I have deleted same from console but after same it has not showing again in unassigned computers.

Above mentioned client was added in domain also.

Please help me...


Durgesh Palav


Wsus on server 2019

$
0
0

Hi, I'm have installed WSUS on server 2019 and everything seems to be running fine, except I'm getting a warning "Feature Unavailable" The Microsoft Report Viewer 2012 Redistributable is required for this feature.

I have installed ReportBuilder, ReportViewer and SQLSysCLrTypes as suggesting in a solution to get WSUS Working on server 2016, but on server 2019 the message keeps popping up.

Has anybody got it working on server 2019?

Viewing all 12331 articles
Browse latest View live