Quantcast
Channel: WSUS Forum
Viewing all 12331 articles
Browse latest View live

Large Environment Updates

$
0
0

Hello,

We are a big HyperV shop, running around 500 clusters with 4 nodes per cluster. Mix of Server 2016/2019 DC. We are looking for the best way to patch our environment without impact to our customers. As some updates require reboot and the sheer volume of updates requires Bitlocker key to be entered on startup, this complicates the process tremendously. What would be the best way to patch such a large environment and save ourselves from manual Bitlocker key input and reboots for Cumulative Updates 07-2019 for example that require reboot.


Auto Reboot Not Working after 1703 to 1809 Feature Upgrade

$
0
0

Hi,

I'm trying to deploy "Feature update to Windows 10 (business editions), version 1809 x64 2019-03B, en-us" to our workstations running 1703. The machines see the update, download it, and install it. However, the last event message seen by clicking the "Status" link on the WSUS report is "Installation successful and restart required for the following update...". This message reads the same for statuses of "Downloaded" or "Pending Reboot". We deploy these over a maintenance weekend to avoid client disruption in the form of a reboot that may take a long time to finish. I know that these machines were logged off after business hours. So now, I'm wondering if one of my GPO settings is conflicting with another since we're walking this fine line of preventing reboots when we don't want them, but getting them to reboot when we do.

Just to give you the full picture, here's how the update is getting to the machines:

  1. GPO (enforced) with all Windows Update settings uses WMI filter to add any machine running 1703 or earlier to my "1809 Test" WSUS group.
  2. The "2019-03B" upgrade is approved for the 1809 Test group.

We want to prevent auto reboots for machines with logged on users, but we definitely want it to reboot if there are none. So, here's a listing of my Windows Update GPO settings. Maybe you can help me identify what's preventing the reboots:

  • Allow Automatic Updates Immediate Installation - Enabled
  • Configure Automatic Updates - Enabled
  • ------Configure automatic updating: 4 - Auto download and schedule the install
  • ------Install during automatic maintenance [unchecked]
  • ------Scheduled install day: 0 - Every day
  • ------Scheduled install time: 02:00
  • ------Limit updating: "every week" was checked, but I just now unchecked it.
  • Configure auto-restart reminder notifications for updates - Enabled, Period: 30 min
  • Configure auto-restart required notification for updates - Enabled, Method: 1 - Auto
  • Enable client-side targeting - Enabled (there are a few different target groups)
  • Enable Windows Update Power Management to automatically wake up the system to install scheduled updates - Enabled
  • --------------Note- We use Verdiem Surveyor for power management. It's supposed to allow Windows Update to do its thing, but, maybe this setting is interfering with that?
  • No auto-restart with logged on users for scheduled automatic updates installations - Enabled
  • Re-prompt for restart with scheduled installations - Enabled: re-prompt, 30 min
  • Reschedule Automatic Updates scheduled installations - Enabled, Wait after system startup: 1 min
  • Specify intranet Microsoft update service location - Enabled, same url for update service and statistics server, no alternate

Thanks for reading and if I can provide more information, I'd be glad to.


Event ID 364 - HTTP status 403: The client does not have sufficient access rights to the requested server object

$
0
0

Hi all,

      My WSUS version is 6.3.9600.18694 on Server 2012 R2. Since June.2019, WSUS start to cannot download some update from Windows Update with event 364. Due to the download failure, my WSUS sync task always stop and sync cannot complete. I have to find the update from event log and deny the update to complete the WSUS sync. Then I evaluate the new updates and push them to my clients.

     I did research some doc from the Internet. I ensure it's not the WSUS SHA-2 issue or Internet access control issue. Does anyone encounter same issue like my case? I appreciate any solutions or suggestions.  

Content file download failed. Reason: HTTP status 403: The client does not have sufficient access rights to the requested server object.

 Source File: /d/msdownload/update/software/secu/2019/06/windows10.0-kb4509093-arm64-express_b7ad877ecd1e9496c67600bea28e340ed210823b.cab

Destination File: c:\wsus\WsusContent\3B\B7AD877ECD1E9496C67600BEA28E340ED210823B.cab

 Source File: /c/msdownload/update/software/secu/2019/07/windows10.0-kb4507435-x64_ae84593c0d83489c53581f8745372626fe597869.psf

Destination File: c:\wsus\WsusContent\69\AE84593C0D83489C53581F8745372626FE597869.psf

 Source File: /d/msdownload/update/software/secu/2019/07/windows8.1-kb4504418-x64-express_38e87d7e676debadae34caed8b5672c3493d9a0c.cab

Destination File: c:\wsus\WsusContent\0C\38E87D7E676DEBADAE34CAED8B5672C3493D9A0C.cab

Regards

Rick Tan

Windows Patches Issues

$
0
0

I would like to ask if are you have trouble using Window Update on Manual patching in win7 and win10?

We are using Kaseya as our patch management, but if it fails to replicate the patches, we have to manualy patch it using Window Update as the windows feature. But it fails.

BADLY NEED HELP. :( 

Fail to update 2019-06 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems (KB4503292)

$
0
0

Hi all,

Is there anyone encountered windows updates failure on KB4503292 recently. Let me tell something more about the background.

OS: Windows 2008 R2 SP1
Found error "Install failed, error = 0x8007000" from windowsupdate.log

Already tried:

rename C:\Windows\SoftwareDistribution

execute System Update Readiness Tool for Windows 7 (KB947821) and no error was found

Manual apply KB4503292 (June) and KB4507449 (July) but turn out FAILED as well.

May I ask how could I troubleshoot such issue? what else I could do?  Please let me know, many thanks.


Windows update reverting....

$
0
0

Hi All,  Iam facing as issue on my windows 2016 server. I am able to install the update KB4507459. But post reboot update is reverting.

I tried below steps:

1. Restarted BIITS& windows update.

2. Reset Windows Update components.

3. ran /sfcscannow (No issues found)

4. Ran DISM.exe /Online /Cleanup-image /Restorehealth--No issues found

5. Tried in clean boot mode.

6. Ran CHKDSK (No problems).

Tried all the above steps but did not help.


Finally i ran windows update troubleshooter and found error "potential windows update database error detcted" .Not sure how to fix it. I tried all the above steps but still showing this error.

Additionally below is the SBS log.

PLEASE HELP ME....

----------------------------------------------------------------

2019/08/03 06:03:00.9635034 1688  3260  Agent           WU client version 10.0.14393.1914
2019/08/03 06:03:00.9653066 1688  3260  Agent           SleepStudyTracker: Machine is non-AOAC. Sleep study tracker disabled.
2019/08/03 06:03:00.9658709 1688  3260  Agent           Base directory: C:\Windows\SoftwareDistribution
2019/08/03 06:03:01.0051360 1688  3260  Agent           Datastore directory: C:\Windows\SoftwareDistribution\DataStore\DataStore.edb
2019/08/03 06:03:01.6441124 1688  3260  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
2019/08/03 06:03:01.6442636 1688  3260  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2019/08/03 06:03:01.6470832 1688  3260  Shared          Network state: Connected
2019/08/03 06:03:01.8800789 1688  3260  Misc            LoadHistoryEventFromRegistry completed, hr = 8024000C
2019/08/03 06:03:01.9422219 1688  3260  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
2019/08/03 06:03:01.9422291 1688  3260  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2019/08/03 06:03:01.9422360 1688  3260  Shared          Power status changed
2019/08/03 06:03:01.9946499 1688  3260  Agent           Initializing global settings cache
2019/08/03 06:03:01.9946508 1688  3260  Agent           WSUS server: NULL
2019/08/03 06:03:01.9946513 1688  3260  Agent           WSUS status server: NULL
2019/08/03 06:03:01.9946516 1688  3260  Agent           Alternate Download Server: NULL
2019/08/03 06:03:01.9946520 1688  3260  Agent           Fill Empty Content Urls: No
2019/08/03 06:03:01.9946524 1688  3260  Agent           Target group: (Unassigned Computers)
2019/08/03 06:03:01.9946527 1688  3260  Agent           Windows Update access disabled: No
2019/08/03 06:03:02.0133764 1688  3260  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2019-08-04 03:49:40, not idle-only, not network-only
2019/08/03 06:03:02.4922418 1688  3260  Agent           Initializing Windows Update Agent
2019/08/03 06:03:02.4932473 1688  3260  DownloadManager Download manager restoring 0 downloads
2019/08/03 06:03:02.4944538 1688  3260  Agent           CPersistentTimeoutScheduler | GetTimer, returned hr = 0x00000000
2019/08/03 06:03:02.5527308 1688  3260  Agent           Attempt 1 to obtain post-reboot results for event with cookie 30755249_1020265158.
2019/08/03 06:03:20.8062948 1688  3260  Handler         Got error querying the post-reboot status for session 30755249_1020265158: 0x8007045b.
2019/08/03 06:03:20.8601618 1688  3260  Agent           Failed to mark wuauserv as triggered by group policy change, hr = 0x8007045B
2019/08/03 06:03:20.9754259 1688  3260  Agent           Earliest future timer found:
2019/08/03 06:03:20.9754338 1688  3260  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2019-08-04 03:49:40, not idle-only, not network-only
2019/08/03 06:03:21.1354050 1688  3260  Misc            WUTaskManager couldn't register scheduled start task, hr=80070003
2019/08/03 06:03:22.0322322 1688  3260  Handler         CUHCbsHandler::CancelDownloadRequest called
2019/08/03 06:03:22.0395828 1688  6584  DownloadManager PurgeExpiredFiles::Found 0 expired files to delete.
2019/08/03 06:03:22.0413360 1688  6584  DownloadManager PurgeExpiredUpdates::Found 49 non expired updates.
2019/08/03 06:03:22.0875161 1688  6584  DownloadManager PurgeExpiredUpdates::Found 0 expired updates.
2019/08/03 06:03:22.0952925 1688  6584  Shared          Effective power state: AC
2019/08/03 06:03:22.0952970 1688  6584  DownloadManager Power state change detected. Source now: AC
2019/08/03 06:03:22.1898469 1688  3260  Shared          * END * Service exit Exit code = 0x240001
2019/08/03 06:04:13.5423774 1456  3276  Shared          * START * Service startup
2019/08/03 06:04:14.5747287 1456  3276  Agent           WU client version 10.0.14393.1914
2019/08/03 06:04:14.5750892 1456  3276  Agent           SleepStudyTracker: Machine is non-AOAC. Sleep study tracker disabled.
2019/08/03 06:04:14.5767062 1456  3276  Agent           Base directory: C:\Windows\SoftwareDistribution
2019/08/03 06:04:14.6127273 1456  3276  Agent           Datastore directory: C:\Windows\SoftwareDistribution\DataStore\DataStore.edb
2019/08/03 06:04:15.5363407 1456  3276  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
2019/08/03 06:04:15.5364416 1456  3276  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2019/08/03 06:04:15.5399606 1456  3276  Shared          Network state: Connected
2019/08/03 06:04:16.0771778 1456  3276  Misc            LoadHistoryEventFromRegistry completed, hr = 8024000C
2019/08/03 06:04:16.0870535 1456  3276  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
2019/08/03 06:04:16.0870604 1456  3276  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2019/08/03 06:04:16.0870656 1456  3276  Shared          Power status changed
2019/08/03 06:04:16.1441164 1456  3276  Agent           Initializing global settings cache
2019/08/03 06:04:16.1441207 1456  3276  Agent           WSUS server: NULL
2019/08/03 06:04:16.1441242 1456  3276  Agent           WSUS status server: NULL
2019/08/03 06:04:16.1441246 1456  3276  Agent           Alternate Download Server: NULL
2019/08/03 06:04:16.1441282 1456  3276  Agent           Fill Empty Content Urls: No
2019/08/03 06:04:16.1441319 1456  3276  Agent           Target group: (Unassigned Computers)
2019/08/03 06:04:16.1441323 1456  3276  Agent           Windows Update access disabled: No
2019/08/03 06:04:16.1642754 1456  3276  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2019-08-04 03:49:40, not idle-only, not network-only
2019/08/03 06:04:16.8261446 1456  3276  Agent           Initializing Windows Update Agent
2019/08/03 06:04:16.8268347 1456  3276  DownloadManager Download manager restoring 0 downloads
2019/08/03 06:04:16.8276074 1456  3276  Agent           CPersistentTimeoutScheduler | GetTimer, returned hr = 0x00000000
2019/08/03 06:04:16.8863099 1456  3276  Agent           Attempt 2 to obtain post-reboot results for event with cookie 30755249_1020265158.
2019/08/03 06:05:42.3131772 1456  3276  Handler         Post-reboot status for session 30755249_1020265158: 0x8007000d.
2019/08/03 06:05:43.0379931 7560  3532  ComApi          * START *   SLS Discovery
2019/08/03 06:05:43.4467140 7560  3532  ComApi          *QUEUED* SLS Discovery
2019/08/03 06:05:43.5326833 7560  2532  ComApi          *RESUMED* Discovery
2019/08/03 06:05:43.5328555 7560  2532  Api             * END *   Discovery ClientId
2019/08/03 06:05:43.5353883 7560  3532  ComApi          ISusInternal:: DisconnectCall failed, hr=8024000C
2019/08/03 06:06:21.8050283 1456  4056  DownloadManager PurgeExpiredFiles::Found 0 expired files to delete.
2019/08/03 06:06:21.8054375 1456  4056  DownloadManager PurgeExpiredUpdates::Found 49 non expired updates.
2019/08/03 06:06:21.8164754 1456  4056  DownloadManager PurgeExpiredUpdates::Found 0 expired updates.
2019/08/03 06:06:21.8209971 1456  4056  Shared          Effective power state: AC
2019/08/03 06:06:21.8209978 1456  4056  DownloadManager Power state change detected. Source now: AC

Migrate WSUS

$
0
0

Hi

I am migrating WSUS W2K8 (W1) to WSUS W2K12 R2 (W2), and I have doubts. The W2 server is configured as replica and is correctly synchronized, but the data between one server and another is not the same. It is normal?

2012r2 client that will not report in to Wsus (not yet reported)

$
0
0

Hope someone can help i have a 2012r2 client that will not report in to Wsus (not yet reported)

Tried resetting the windows update components, renaming the software distribution folder, ran Bret's script (resetting components. and adams script https://www.ajtek.ca/wsus/client-machines-not-reporting-to-wsus-properly

group policys are correct and show the wsus.domain.local in the registry, and can ping and nslook up the server, firewall is off and on , no difference.

also rebooted and added and removed server from wsus. 

i will post the windows update log, see if anyone can decipher this for me

2019-07-26 07:15:34:615 924 a20 Report CWERReporter finished handling 1 events. (00000000)

2019-07-26 07:17:15:636 924 a20 EP Got WSUS Client/Server URL: "http://wsus.Domain.local:8530/ClientWebService/client.asmx" 2019-07-26 07:17:15:971 924 a20 EP Got WSUS Reporting URL: "http://wsus.Domain.local:8530/ReportingWebService/ReportingWebService.asmx" 2019-07-26 07:17:15:971 924 a20 Report OpenReportingWebServiceConnection, reporting URL = http://wsus.Domain.local:8530/ReportingWebService/ReportingWebService.asmx 2019-07-26 07:17:15:971 924 a20 IdleTmr WU operation (CLegacyEventUploader::HandleEvents) started; operation # 426; does use network; is at background priority 2019-07-26 07:17:15:971 924 a20 Report Uploading 1 events using cached cookie. 2019-07-26 07:17:15:979 924 a20 Report Reporter successfully uploaded 1 events. 2019-07-26 07:17:15:979 924 a20 IdleTmr WU operation (CLegacyEventUploader::HandleEvents, operation # 426) stopped; does use network; is at background priority 2019-07-26 07:20:23:978 924 179c AU Triggering AU detection through DetectNow API 2019-07-26 07:20:23:978 924 179c AU Triggering Online detection (non-interactive) 2019-07-26 07:20:23:978 924 179c AU Adding timer: 2019-07-26 07:20:23:978 924 179c AU Timer: 31DA7559-FE27-4810-8FF6-987195B1FD98, Expires 2019-07-26 06:20:23, not idle-only, not network-only 2019-07-26 07:20:24:005 924 2a4 AU ############# 2019-07-26 07:20:24:005 924 2a4 AU ## START ## AU: Search for updates 2019-07-26 07:20:24:005 924 2a4 AU ######### 2019-07-26 07:20:24:006 924 2a4 EP FATAL: EP: CSLSEndpointProvider::GetWUClientData - failed to get SLS data, error = 0x8024500C 2019-07-26 07:20:24:006 924 2a4 EP FATAL: EP: CSLSEndpointProvider::GetEndpointFromSLS - Failed to get client data, error = 0x8024500C 2019-07-26 07:20:24:006 924 2a4 EP FATAL: Failed to obtain 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL, error = 0x8024500C 2019-07-26 07:20:24:006 924 2a4 Agent WARNING: Failed to obtain the authorization cab URL for service 7971f918-a847-4430-9279-4a52d1efe18d, hr=0 2019-07-26 07:20:24:006 924 2a4 Agent FATAL: Caller Service Recovery failed to opt in to service 7971f918-a847-4430-9279-4a52d1efe18d, hr=0X8024500C 2019-07-26 07:20:24:007 924 2a4 IdleTmr WU operation (CSearchCall::Init ID 10) started; operation # 429; does use network; is not at background priority 2019-07-26 07:20:24:007 924 2a4 IdleTmr Incremented idle timer priority operation counter to 2 2019-07-26 07:20:24:007 924 2a4 Agent *** START *** Queueing Finding updates [CallerId = Windows Update Command Line Id = 10] 2019-07-26 07:20:24:007 924 2a4 AU <<## SUBMITTED ## AU: Search for updates [CallId = {B790B361-ECC8-4A4E-AB60-E5240DD8DF6A} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}] 2019-07-26 07:20:24:007 924 1700 Agent *** END *** Queueing Finding updates [CallerId = Windows Update Command Line Id = 10] 2019-07-26 07:20:24:007 924 1700 Agent ************* 2019-07-26 07:20:24:007 924 1700 Agent ** START ** Agent: Finding updates [CallerId = Windows Update Command Line Id = 10] 2019-07-26 07:20:24:008 924 1700 Agent ********* 2019-07-26 07:20:24:008 924 1700 Agent * Online = Yes; Ignore download priority = No 2019-07-26 07:20:24:008 924 1700 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1" 2019-07-26 07:20:24:008 924 1700 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed 2019-07-26 07:20:24:008 924 1700 Agent * Search Scope = {Machine & All Users} 2019-07-26 07:20:24:008 924 1700 Agent * Caller SID for Applicability: S-1-5-18 2019-07-26 07:20:24:008 924 1700 Agent * RegisterService is set 2019-07-26 07:20:24:008 924 1700 EP Got WSUS Client/Server URL: "http://wsus.Domain.local:8530/ClientWebService/client.asmx" 2019-07-26 07:20:28:826 924 1700 PT +++++++++++ PT: Synchronizing server updates +++++++++++ 2019-07-26 07:20:28:826 924 1700 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsus.Domain.local:8530/ClientWebService/client.asmx 2019-07-26 07:20:28:875 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:28:875 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:28:875 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:30:168 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 430; does use network; is at background priority 2019-07-26 07:20:30:575 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 430) stopped; does use network; is at background priority 2019-07-26 07:20:32:832 924 a20 Report WARNING: CSerializationHelper:: InitSerialize failed : 0x80070002 2019-07-26 07:20:35:062 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:35:062 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:35:062 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:35:100 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 431; does use network; is at background priority 2019-07-26 07:20:35:386 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 431) stopped; does use network; is at background priority 2019-07-26 07:20:37:892 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:37:892 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:37:892 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:37:930 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 432; does use network; is at background priority 2019-07-26 07:20:38:168 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 432) stopped; does use network; is at background priority 2019-07-26 07:20:40:463 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:40:464 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:40:464 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:40:500 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 433; does use network; is at background priority 2019-07-26 07:20:40:733 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 433) stopped; does use network; is at background priority 2019-07-26 07:20:42:684 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:42:684 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:42:684 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:42:725 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 434; does use network; is at background priority 2019-07-26 07:20:42:976 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 434) stopped; does use network; is at background priority 2019-07-26 07:20:45:169 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:45:169 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:45:169 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:45:206 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 435; does use network; is at background priority 2019-07-26 07:20:45:404 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 435) stopped; does use network; is at background priority 2019-07-26 07:20:47:053 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:47:053 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:47:053 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:47:089 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 436; does use network; is at background priority 2019-07-26 07:20:47:307 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 436) stopped; does use network; is at background priority 2019-07-26 07:20:49:074 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:49:075 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:49:075 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:49:111 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 437; does use network; is at background priority 2019-07-26 07:20:49:371 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 437) stopped; does use network; is at background priority 2019-07-26 07:20:51:716 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:51:716 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:51:716 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:51:754 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 438; does use network; is at background priority 2019-07-26 07:20:51:972 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 438) stopped; does use network; is at background priority 2019-07-26 07:20:53:993 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:53:993 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:53:994 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:54:030 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 439; does use network; is at background priority 2019-07-26 07:20:54:261 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 439) stopped; does use network; is at background priority 2019-07-26 07:20:55:937 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:55:938 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:55:938 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:55:978 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 440; does use network; is at background priority 2019-07-26 07:20:56:201 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 440) stopped; does use network; is at background priority 2019-07-26 07:20:58:392 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:20:58:392 924 1700 Agent Read 0 cached app categories 2019-07-26 07:20:58:392 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:20:58:430 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 441; does use network; is at background priority 2019-07-26 07:20:58:680 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 441) stopped; does use network; is at background priority 2019-07-26 07:21:01:016 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:01:017 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:01:017 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:01:059 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 442; does use network; is at background priority 2019-07-26 07:21:01:379 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 442) stopped; does use network; is at background priority 2019-07-26 07:21:03:670 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:03:670 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:03:670 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:03:716 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 443; does use network; is at background priority 2019-07-26 07:21:03:964 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 443) stopped; does use network; is at background priority 2019-07-26 07:21:06:301 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:06:301 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:06:301 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:06:342 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 444; does use network; is at background priority 2019-07-26 07:21:06:638 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 444) stopped; does use network; is at background priority 2019-07-26 07:21:09:265 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:09:266 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:09:266 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:09:312 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 445; does use network; is at background priority 2019-07-26 07:21:09:540 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 445) stopped; does use network; is at background priority 2019-07-26 07:21:13:219 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:13:219 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:13:219 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:13:256 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 446; does use network; is at background priority 2019-07-26 07:21:13:655 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 446) stopped; does use network; is at background priority 2019-07-26 07:21:37:660 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:37:660 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:37:661 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:37:697 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 447; does use network; is at background priority 2019-07-26 07:21:37:953 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 447) stopped; does use network; is at background priority 2019-07-26 07:21:41:103 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:41:103 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:41:103 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:41:136 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 448; does use network; is at background priority 2019-07-26 07:21:41:848 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 448) stopped; does use network; is at background priority 2019-07-26 07:21:49:777 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:49:777 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:49:777 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:49:815 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 449; does use network; is at background priority 2019-07-26 07:21:50:070 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 449) stopped; does use network; is at background priority 2019-07-26 07:21:51:842 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:51:842 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:51:842 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:51:881 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 450; does use network; is at background priority 2019-07-26 07:21:52:502 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 450) stopped; does use network; is at background priority 2019-07-26 07:21:55:354 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:55:354 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:55:354 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:55:393 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 451; does use network; is at background priority 2019-07-26 07:21:55:617 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 451) stopped; does use network; is at background priority 2019-07-26 07:21:57:201 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:57:201 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:57:201 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:57:237 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 452; does use network; is at background priority 2019-07-26 07:21:57:451 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 452) stopped; does use network; is at background priority 2019-07-26 07:21:59:393 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:59:393 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:59:394 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:59:429 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 453; does use network; is at background priority 2019-07-26 07:21:59:494 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 453) stopped; does use network; is at background priority 2019-07-26 07:21:59:494 924 1700 Agent Reading cached app categories using lifetime 604800 seconds 2019-07-26 07:21:59:494 924 1700 Agent Read 0 cached app categories 2019-07-26 07:21:59:494 924 1700 Agent SyncUpdates adding 0 visited app categories 2019-07-26 07:21:59:530 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 454; does use network; is at background priority 2019-07-26 07:21:59:581 924 1700 IdleTmr WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 454) stopped; does use network; is at background priority 2019-07-26 07:21:59:581 924 1700 PT + SyncUpdates round trips: 25 2019-07-26 07:23:03:174 924 1700 PT +++++++++++ PT: Synchronizing extended update info +++++++++++ 2019-07-26 07:23:03:174 924 1700 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsus.Domain.local:8530/ClientWebService/client.asmx 2019-07-26 07:23:03:211 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 455; does use network; is at background priority 2019-07-26 07:23:03:684 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 455) stopped; does use network; is at background priority 2019-07-26 07:23:03:685 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 456; does use network; is at background priority 2019-07-26 07:23:04:294 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 456) stopped; does use network; is at background priority 2019-07-26 07:23:04:294 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 457; does use network; is at background priority 2019-07-26 07:23:05:006 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 457) stopped; does use network; is at background priority 2019-07-26 07:23:05:006 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 458; does use network; is at background priority 2019-07-26 07:23:05:596 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 458) stopped; does use network; is at background priority 2019-07-26 07:23:05:596 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 459; does use network; is at background priority 2019-07-26 07:23:06:299 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 459) stopped; does use network; is at background priority 2019-07-26 07:23:06:300 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 460; does use network; is at background priority 2019-07-26 07:23:06:768 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 460) stopped; does use network; is at background priority 2019-07-26 07:23:06:768 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 461; does use network; is at background priority 2019-07-26 07:23:07:040 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 461) stopped; does use network; is at background priority 2019-07-26 07:23:07:040 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 462; does use network; is at background priority 2019-07-26 07:23:07:332 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 462) stopped; does use network; is at background priority 2019-07-26 07:23:07:332 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 463; does use network; is at background priority 2019-07-26 07:23:07:759 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 463) stopped; does use network; is at background priority 2019-07-26 07:23:07:759 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 464; does use network; is at background priority 2019-07-26 07:23:08:107 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 464) stopped; does use network; is at background priority 2019-07-26 07:23:08:107 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 465; does use network; is at background priority 2019-07-26 07:23:08:492 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 465) stopped; does use network; is at background priority 2019-07-26 07:23:08:492 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 466; does use network; is at background priority 2019-07-26 07:23:09:124 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 466) stopped; does use network; is at background priority 2019-07-26 07:23:09:124 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 467; does use network; is at background priority 2019-07-26 07:23:09:782 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 467) stopped; does use network; is at background priority 2019-07-26 07:23:09:782 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 468; does use network; is at background priority 2019-07-26 07:23:10:452 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 468) stopped; does use network; is at background priority 2019-07-26 07:23:10:452 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 469; does use network; is at background priority 2019-07-26 07:23:11:343 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 469) stopped; does use network; is at background priority 2019-07-26 07:23:11:343 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 470; does use network; is at background priority 2019-07-26 07:23:12:082 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 470) stopped; does use network; is at background priority 2019-07-26 07:23:12:082 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 471; does use network; is at background priority 2019-07-26 07:23:12:748 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 471) stopped; does use network; is at background priority 2019-07-26 07:23:12:749 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 472; does use network; is at background priority 2019-07-26 07:23:13:113 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 472) stopped; does use network; is at background priority 2019-07-26 07:23:13:113 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 473; does use network; is at background priority 2019-07-26 07:23:13:532 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 473) stopped; does use network; is at background priority 2019-07-26 07:23:13:532 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 474; does use network; is at background priority 2019-07-26 07:23:13:998 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 474) stopped; does use network; is at background priority 2019-07-26 07:23:13:998 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 475; does use network; is at background priority 2019-07-26 07:23:14:551 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 475) stopped; does use network; is at background priority 2019-07-26 07:23:14:551 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 476; does use network; is at background priority 2019-07-26 07:23:15:109 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 476) stopped; does use network; is at background priority 2019-07-26 07:23:15:109 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 477; does use network; is at background priority 2019-07-26 07:23:16:162 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 477) stopped; does use network; is at background priority 2019-07-26 07:23:16:162 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 478; does use network; is at background priority 2019-07-26 07:23:16:847 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 478) stopped; does use network; is at background priority 2019-07-26 07:23:16:847 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 479; does use network; is at background priority 2019-07-26 07:23:17:542 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 479) stopped; does use network; is at background priority 2019-07-26 07:23:17:542 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 480; does use network; is at background priority 2019-07-26 07:23:18:038 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 480) stopped; does use network; is at background priority 2019-07-26 07:23:18:038 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 481; does use network; is at background priority 2019-07-26 07:23:18:306 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 481) stopped; does use network; is at background priority 2019-07-26 07:23:18:306 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 482; does use network; is at background priority 2019-07-26 07:23:18:653 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 482) stopped; does use network; is at background priority 2019-07-26 07:23:18:653 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 483; does use network; is at background priority 2019-07-26 07:23:19:284 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 483) stopped; does use network; is at background priority 2019-07-26 07:23:19:284 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 484; does use network; is at background priority 2019-07-26 07:23:19:741 924 1700 IdleTmr WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 484) stopped; does use network; is at background priority



WSUS Synchronization Error - 0X80131500

$
0
0
Is anybody having WSUS synchronization errors after the 8/13/19 update release?  Last couple times we've seen the 0X80131500 error the issue has been at Microsoft's end and eventually cleared up on its own.

Event ID: 364 Lots of Content file download failed. Reason: File cert verification failure.

$
0
0

Hi Guys

We found lots of Event ID 364 happened on our WSUS server.

And if you look into the softwaredistribution.log ,you will see

2016-08-13 16:06:59.530 UTC Info WsusService.13 CabUtilities.CheckCertificateSignature File cert verification failed for D:\WSUS\WsusContent\E6\11AB04FDD161E6781E1E0E75CA67E55BBCBEB4E6.esd with 2148204800
2016-08-13 16:06:59.811 UTC Warning WsusService.13 ContentSyncAgent.ProcessBITSNotificationQueue Invalid file deleted: D:\WSUS\WsusContent\E6\11AB04FDD161E6781E1E0E75CA67E55BBCBEB4E6.esd

Also in Windowsupdate.log

2016-08-19 07:51:15:540  732 1aa4 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
2016-08-19 07:51:15:540  732 1aa4 PT   + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL =https://fe2.update.microsoft.com/v6/ClientWebService/client.asmx
2016-08-19 07:51:35:837  732 1aa4 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
2016-08-19 07:51:35:837  732 1aa4 Misc  Microsoft signed: NA
2016-08-19 07:51:35:837  732 1aa4 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\TMP35B5.tmp with dwProvFlags 0x00000080:
2016-08-19 07:51:35:853  732 1aa4 Misc  Microsoft signed: NA
2016-08-19 07:51:35:853  732 1aa4 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\v6-muredir.cab with dwProvFlags 0x00000080:
2016-08-19 07:51:35:853  732 1aa4 Misc  Microsoft signed: NA
2016-08-19 07:51:35:884  732 1aa4 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\v6-muredir.cab with dwProvFlags 0x00000080:
2016-08-19 07:51:35:884  732 1aa4 Misc  Microsoft signed: NA
2016-08-19 07:51:35:884  732 1aa4 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
2016-08-19 07:51:35:884  732 1aa4 Misc  Microsoft signed: NA
2016-08-19 07:51:35:899  732 1aa4 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\TMP35E4.tmp with dwProvFlags 0x00000080:
2016-08-19 07:51:35:899  732 1aa4 Misc  Microsoft signed: NA
2016-08-19 07:51:35:899  732 1aa4 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
2016-08-19 07:51:35:899  732 1aa4 Misc  Microsoft signed: NA
2016-08-19 07:51:35:899  732 1aa4 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\TMP35F5.tmp with dwProvFlags 0x00000080:
2016-08-19 07:51:35:899  732 1aa4 Misc  Microsoft signed: NA   :) Can anyone provide some suggestions ? Thanks

Uninstall WSUS SP2 3.0 from Windows Server 2012 R2

$
0
0

Hello everyone, we performed an upgrade of our Server 2008 R2 and now can not uninstall WSUS 3.0 SP2. Is there any way that we can force PCA to uninstall this from the server? I do now know that WSUS 3.0 is incompatible with Server 2012 R2. Is there anything that we can do other than reformatting this server? This is our primary DC at this location and would prefer to not format this server.

Installing KB Windows 2016 Server gets stuck

$
0
0

Hello,

I am trying to install updates ( tried also manually after downloading it) on the server and the update gets stuck.

CBS log gets stuck at :

2019-07-22 17:19:50, Info                  CBS    Appl: detect Parent, Package: Package_5732_for_KB4471321~31bf3856ad364e35~amd64~~10.0.1.5, Parent: Microsoft-Windows-KpsServer-servercommon-Package~31bf3856ad364e35~amd64~~10.0.14393.0, Disposition = Detect, VersionComp: EQ, BuildComp: EQ, RevisionComp: EQ, Exist: present
2019-07-22 17:19:50, Info                  CBS    Appl: detectParent (exact match): Parent: Microsoft-Windows-KpsServer-servercommon-Package~31bf3856ad364e35~amd64~~10.0.14393.0, parent state: Installed Invalid
2019-07-22 17:19:50, Info                  CBS    Appl: detect Parent, Package: Package_5732_for_KB4471321~31bf3856ad364e35~amd64~~10.0.1.5, Parent: Microsoft-Windows-ServerDatacenterCorEdition~31bf3856ad364e35~amd64~~10.0.14393.0, Disposition = Detect, VersionComp: EQ, BuildComp: EQ, RevisionComp: EQ, Exist: present
2019-07-22 17:19:50, Info                  CBS    Appl: detectParent (exact match): Parent: Microsoft-Windows-ServerDatacenterCorEdition~31bf3856ad364e35~amd64~~10.0.14393.0, parent state: Absent
2019-07-22 17:19:50, Info                  CBS    Appl: detect Parent, Package: Package_5732_for_KB4471321~31bf3856ad364e35~amd64~~10.0.1.5, Parent: Microsoft-Windows-ServerDatacenterEdition~31bf3856ad364e35~amd64~~10.0.14393.0, Disposition = Detect, VersionComp: EQ, BuildComp: EQ, RevisionComp: EQ, Exist: present
2019-07-22 17:19:50, Info                  CBS    Appl: detectParent (exact match): Parent: Microsoft-Windows-ServerDatacenterEdition~31bf3856ad364e35~amd64~~10.0.14393.0, parent state: Staged
2019-07-22 17:19:50, Info                  CBS    Appl: detect Parent, Package: Package_5732_for_KB4471321~31bf3856ad364e35~amd64~~10.0.1.5, Parent: Microsoft-Windows-ServerDatacenterEvalCorEdition~31bf3856ad364e35~amd64~~10.0.14393.0, Disposition = Detect, VersionComp: EQ, BuildComp: EQ, RevisionComp: EQ, Exist: present
2019-07-22 17:19:50, Info                  CBS    Appl: detectParent (exact match): Parent: Microsoft-Windows-ServerDatacenterEvalCorEdition~31bf3856ad364e35~amd64~~10.0.14393.0, parent state: Absent
2019-07-22 17:19:50, Info                  CBS    Appl: detect Parent, Package: Package_5732_for_KB4471321~31bf3856ad364e35~amd64~~10.0.1.5, Parent: Microsoft-Windows-ServerDatacenterEvalEdition~31bf3856ad364e35~amd64~~10.0.14393.0, Disposition = Detect, VersionComp: EQ, BuildComp: EQ, RevisionComp: EQ, Exist: present
2019-07-22 17:19:50, Info                  CBS    Appl: detectParent (exact match): Parent: Microsoft-Windows-ServerDatacenterEvalEdition~31bf3856ad364e35~amd64~~10.0.14393.0, parent state: Absent
2019-07-22 17:19:50, Info                  CBS    Appl: detect Parent, Package: Package_5732_for_KB4471321~31bf3856ad364e35~amd64~~10.0.1.5, Parent: Microsoft-Windows-ServerStandardCorEdition~31bf3856ad364e35~amd64~~10.0.14393.0, Disposition = Detect, VersionComp: EQ, BuildComp: EQ, RevisionComp: EQ, Exist: present
2019-07-22 17:19:50, Info                  CBS    Appl: detectParent (exact match): Parent: Microsoft-Windows-ServerStandardCorEdition~31bf3856ad364e35~amd64~~10.0.14393.0, parent state: Absent
2019-07-22 17:19:50, Info                  CBS    Appl: detect Parent, Package: Package_5732_for_KB4471321~31bf3856ad364e35~amd64~~10.0.1.5, Parent: Microsoft-Windows-ServerStandardEdition~31bf3856ad364e35~amd64~~10.0.14393.0, Disposition = Detect, VersionComp: EQ, BuildComp: EQ, RevisionComp: EQ, Exist: present
2019-07-22 17:19:50, Info                  CBS    Appl: detectParent (exact match): Parent: Microsoft-Windows-ServerStandardEdition~31bf3856ad364e35~amd64~~10.0.14393.0, parent state: Installed
2019-07-22 17:19:50, Info                  CBS    Appl: Evaluating package applicability for package Package_5732_for_KB4471321~31bf3856ad364e35~amd64~~10.0.1.5, applicable state: Installed Invalid
2019-07-22 17:19:50, Info                  CBS    Unexpected: Source State: Staged, Target State: Installed Invalid
2019-07-22 17:19:50, Info                  CBS    ASSERT: Assertion failed in onecore\base\cbs\core\cbsexecutionitem.cpp(108)
Unable to match state from StateToAction table

Do you have any hints what to search for?

Kind regards,

Use of BITS within a LAN/same subnet

$
0
0

Hello,

I setup a GPO setting to enable BITS and reduce bandwidth during working hours, as follows:

I ticked the "Ignore bandwidth limits if the source and destination are on the same subnet" option because I want the clients (workstations and windows server itself) to download updates at full speed from WSUS.

I would expect a low bandwidth usage when downloading updates from Microsoft Update CDN. Unfortunately, it does not work because when I approve an update for install in WSUS console within working day/hours it is downloaded at full speed from Internet, which is no good.

What I am wrong?

Thank you.


How to completely remove old wsus settings - trying for a clean install

$
0
0

I have a 2012R2 server running wsus.

What I would like to do is remove wsus and then start again with clean settings.

What I have done so far is uninstall from server manager, rebooted, then reinstalled.

However on reinstall, all the old settings were still there.

So I can I uninstaall wsus, and then do a clean install on the same machine without the old data being recognized?

or alternatively how can I reset the wsus database to reflect that the old data storare was deleted, i.e. so that wsus is aware that all previous updates have been deleted.

regards

roga

Windows Update not working on Server 2012

$
0
0

I have  Windows Server 2012 that went somewhat stale update-wise (the most recent installed update dates back to June 2016). I am trying to get it patched up. The problem is that for some reason Windows Update refuses to acquire new updates. When I click on "check for updates", it shows the green scrolling bar under "Checking for updates..." and it can sit there for hours doing nothing (there even seems to be no disk activity.)

In the Windows Update log, I see this (no idea if this is at all relevant)
  2017-03-01    16:14:40:211    5476    1688    CltUI    FATAL: CNetworkCostChangeHandler::RegisterForCostChangeNotifications: CoCreateInstance failed with error 80004002
  2017-03-01    16:14:40:212    5476    1688    CltUI    WARNING: RegisterNetworkCostChangeNotification: Error 80004002

and the last thing it ever writes before going idle is

  2017-03-01    16:14:44:015    1232    167c    AU    Triggering AU detection through DetectNow API
  2017-03-01    16:14:44:015    1232    167c    AU    Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
  2017-03-01    16:14:44:015    1232    167c    AU    Will do the detection after current detection completes


If I interrupt it after a while, it follows up with:

 

 2017-03-01    16:20:16:089    1232    1958    Agent      * WARNING: Failed to filter search results, error = 0x8024000B
 2017-03-01    16:20:16:089    1232    191c    AU    ###########  AU: Uninitializing Automatic Updates   ###########
 2017-03-01    16:20:16:105    1232    1958    Agent    *********
 2017-03-01    16:20:16:105    1232    1958    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
 2017-03-01    16:20:16:105    1232    1958    Agent    *************
 2017-03-01    16:20:16:105    1232    1958    Agent    *************
 2017-03-01    16:20:16:105    1232    1958    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
 2017-03-01    16:20:16:105    1232    1958    Agent    *********
 2017-03-01    16:20:16:105    1232    1958    Agent      * Online = No; Ignore download priority = No
 2017-03-01    16:20:16:105    1232    1958    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
 2017-03-01    16:20:16:105    1232    1958    Agent      * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
 2017-03-01    16:20:16:105    1232    1958    Agent      * Search Scope = {Machine & All Users}
 2017-03-01    16:20:16:105    1232    1958    Agent      * Caller SID for Applicability: S-1-5-18
 2017-03-01    16:20:16:105    1232    1958    Agent      * WARNING: Exit code = 0x8024000B
 2017-03-01    16:20:16:105    1232    1958    Agent    *********
 2017-03-01    16:20:16:105    1232    1958    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
 2017-03-01    16:20:16:105    1232    1958    Agent    *************
 2017-03-01    16:20:16:105    1232    1958    Agent    WARNING: WU client failed Searching for update with error 0x8024000b

I tried to roll back to a month-old backup and it seems to be broken already.

I tried to purge the Windows Update cache by stopping relevant services, deleting %WINDIR%/SoftwareDistribution and %WINDIR%/System32/catroot2, and restarting services. It still does not work, though this time log messages are different.

2017-03-01    16:21:33:849    1232    438    Service    ** START **  Service: Service startup
2017-03-01    16:21:33:849    1232    438    Service    *********
2017-03-01    16:21:33:849    1232    438    Agent      * WU client version 7.8.9200.17185
2017-03-01    16:21:33:849    1232    438    Agent      * Base directory: C:\windows\SoftwareDistribution
2017-03-01    16:21:33:849    1232    438    Agent      * Access type: No proxy
2017-03-01    16:21:33:849    1232    438    Service    UpdateNetworkState Ipv6, cNetworkInterfaces = 4.
2017-03-01    16:21:33:849    1232    438    Service    UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2017-03-01    16:21:33:849    1232    438    Agent      * Network state: Connected
2017-03-01    16:21:33:849    1232    438    Setup    WARNING: SelfUpdate is in an error state
2017-03-01    16:21:33:849    1232    438    Service    UpdateNetworkState Ipv6, cNetworkInterfaces = 4.
2017-03-01    16:21:33:849    1232    438    Service    UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2017-03-01    16:21:34:068    1232    438    DtaStor    Default service for AU is {00000000-0000-0000-0000-000000000000}
2017-03-01    16:21:34:068    1232    438    DtaStor    Default service for AU is {9482F4B4-E343-43B6-B170-9A65BC822C77}
2017-03-01    16:21:34:068    1232    438    DtaStor    Data store successfully created
2017-03-01    16:21:34:068    1232    438    Agent    WARNING: Failed to add and register service 117cab2d-82b1-4b5a-a08c-4d62dbee7782 to the data store 0x8007007a
2017-03-01    16:21:34:068    1232    438    Agent    WARNING: Service Recovery: Attempting to add pending registration for service 117cab2d-82b1-4b5a-a08c-4d62dbee7782 to the data store
2017-03-01    16:21:34:068    1232    438    Agent    WARNING: Failed to add and register service 7971f918-a847-4430-9279-4a52d1efe18d to the data store 0x8007007a
2017-03-01    16:21:34:068    1232    438    Agent    WARNING: Service Recovery: Attempting to add pending registration for service 7971f918-a847-4430-9279-4a52d1efe18d to the data store
2017-03-01    16:21:34:068    1232    438    Agent    WARNING: Failed to add and register service 7971f918-a847-4430-9279-4a52d1efe18d to the data store 0x8007007a
2017-03-01    16:21:34:068    1232    438    Agent    WARNING: Service Recovery: Attempting to add pending registration for service 7971f918-a847-4430-9279-4a52d1efe18d to the data store
2017-03-01    16:21:34:068    1232    438    Agent    ***********  Agent: Initializing global settings cache  ***********
2017-03-01    16:21:34:068    1232    438    Agent      * Endpoint Provider: 00000000-0000-0000-0000-000000000000
2017-03-01    16:21:34:068    1232    438    Agent      * WSUS server: <NULL>
2017-03-01    16:21:34:068    1232    438    Agent      * WSUS status server: <NULL>
2017-03-01    16:21:34:068    1232    438    Agent      * Target group: (Unassigned Computers)
2017-03-01    16:21:34:068    1232    438    Agent      * Windows Update access disabled: No
(...snip...)
2017-03-01    16:21:42:576    5476    114c    CltUI    FATAL: CNetworkCostChangeHandler::RegisterForCostChangeNotifications: CoCreateInstance failed with error 80004002
2017-03-01    16:21:42:576    5476    114c    CltUI    WARNING: RegisterNetworkCostChangeNotification: Error 80004002
2017-03-01    16:21:44:686    1232    734    AU    Triggering AU detection through DetectNow API
2017-03-01    16:21:44:686    1232    734    AU    Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
2017-03-01    16:21:44:686    1232    734    AU    Piggybacking on an AU detection already in progress
2017-03-01    16:22:15:891    1232    80c    Misc    Validating signature for C:\windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2017-03-01    16:22:15:891    1232    80c    Misc     Microsoft signed: NA
2017-03-01    16:22:15:891    1232    80c    Misc     Infrastructure signed: Yes
2017-03-01    16:22:15:953    1232    80c    Setup    Determining whether a new setup handler needs to be downloaded
2017-03-01    16:22:15:953    1232    80c    Setup    SelfUpdate handler is not found.  It will be downloaded
2017-03-01    16:22:15:953    1232    80c    Setup    Evaluating applicability of setup package "Package_for_KB2887537~31bf3856ad364e35~amd64~~6.2.1.6"
2017-03-01    16:22:15:969    1232    80c    Setup    Setup package "Package_for_KB2887537~31bf3856ad364e35~amd64~~6.2.1.6" is not applicable
2017-03-01    16:22:15:969    1232    80c    Setup    Evaluating applicability of setup package "Package_for_KB2887536~31bf3856ad364e35~amd64~~6.2.1.6"
2017-03-01    16:22:18:063    1232    80c    Setup    Setup package "Package_for_KB2887536~31bf3856ad364e35~amd64~~6.2.1.6" is not applicable
2017-03-01    16:22:18:063    1232    80c    Setup    Evaluating applicability of setup package "Package_for_KB2887535~31bf3856ad364e35~amd64~~6.2.1.10"
2017-03-01    16:22:19:422    1232    80c    Setup    Setup package "Package_for_KB2887535~31bf3856ad364e35~amd64~~6.2.1.10" is not applicable
2017-03-01    16:22:19:438    1232    80c    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
2017-03-01    16:22:19:578    1232    80c    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2017-03-01    16:22:19:578    1232    80c    PT      + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://fe2.update.microsoft.com/v6/ClientWebService/client.asmx
2017-03-01    16:22:19:656    1232    80c    PT    WARNING: Cached cookie has expired or new PID is available
2017-03-01    16:22:19:719    1232    80c    Agent    Reading cached app categories using lifetime 604800 seconds
2017-03-01    16:22:19:719    1232    80c    Agent    Read 0 cached app categories
2017-03-01    16:30:44:365    1232    80c    Misc    WARNING: WinHttp: httpRead failed. error 0x80072ee2
2017-03-01    16:30:44:365    1232    80c    Misc    WARNING: WinHttp: DoFileDownload PerformDownload failed. error 0x80072ee2
2017-03-01    16:52:59:430    1232    80c    Misc    WARNING: WinHttp: httpRead failed. error 0x80072ee2
2017-03-01    16:52:59:430    1232    80c    Misc    WARNING: WinHttp: DoFileDownload PerformDownload failed. error 0x80072ee2
2017-03-01    16:55:24:131    1232    80c    Driver    Matched driver to device PCI\VEN_8086&DEV_8D3A&SUBSYS_35C88086&REV_05
2017-03-01    16:55:24:131    1232    80c    Driver    Status: 0x4180200a, ProblemNumber: 00000000
2017-03-01    16:55:24:131    1232    80c    Driver    Matched driver to device PCI\VEN_8086&DEV_6FD1&SUBSYS_6FD18086&REV_01
2017-03-01    16:55:24:131    1232    80c    Driver    Status: 0x1802000, ProblemNumber: 00000000
2017-03-01    16:55:24:131    1232    80c    Driver    Matched driver to device PCI\VEN_8086&DEV_6FD1&SUBSYS_6FD18086&REV_01
2017-03-01    16:55:24:131    1232    80c    Driver    Status: 0x1802000, ProblemNumber: 00000000
(...snip...)
2017-03-01    16:55:24:178    1232    80c    Driver    Status: 0x180200a, ProblemNumber: 00000000
2017-03-01    16:55:24:178    1232    80c    Driver    Matched driver to device PCI\VEN_8086&DEV_8D26&SUBSYS_35C88086&REV_05
2017-03-01    16:55:24:178    1232    80c    Driver    Status: 0x180200a, ProblemNumber: 00000000
2017-03-01    16:55:54:476    1232    80c    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
2017-03-01    16:55:54:476    1232    80c    PT      + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://fe2.update.microsoft.com/v6/ClientWebService/client.asmx
2017-03-01    16:55:58:116    1232    80c    DtaStor    WARNING: Attempted to add URL http://download.windowsupdate.com/msdownload/update/common/2012/10/6077712_67539bbaa7052f0026b6e124063192bc96ea9e1d.cab for file Z1ObuqcFLwAmtuEkBjGSvJbqnh0= when file has not been previously added to the datastore
2017-03-01    16:55:58:116    1232    80c    DtaStor    WARNING: Attempted to add URL http://download.windowsupdate.com/msdownload/update/common/2012/04/4970296_ca03258c4140d420d28973ac55f091a93e1a9efd.cab for file ygMljEFA1CDSiXOsVfCRqT4anv0= when file has not been previously added to the datastore
2017-03-01    16:55:58:116    1232    80c    DtaStor    WARNING: Attempted to add URL http://download.windowsupdate.com/msdownload/update/common/2012/04/4967244_b9018351a069cc0f006a57879dcfb1c488f78621.cab for file uQGDUaBpzA8AaleHnc+xxIj3hiE= when file has not been previously added to the datastore
(...a few hundred more "DtaStor WARNING"s...)
2017-03-01    16:55:58:194    1232    80c    DtaStor    WARNING: Attempted to add URL http://download.windowsupdate.com/c/msdownload/update/others/2017/02/24214705_43024f1f23f8c8f93ea6c4b16759d1d643949e92.cab for file QwJPHyP4yPk+psSxZ1nR1kOUnpI= when file has not been previously added to the datastore
2017-03-01    16:55:58:194    1232    80c    DtaStor    WARNING: Attempted to add URL http://download.windowsupdate.com/c/msdownload/update/others/2017/02/24106723_b9df018bea94e879f8b03daf86c9e918ed3155fa.cab for file ud8Bi+qU6Hn4sD2vhsnpGO0xVfo= when file has not been previously added to the datastore
2017-03-01    20:01:47:783    5476    114c    CltUI    FATAL: CNetworkCostChangeHandler::RegisterForCostChangeNotifications: CoCreateInstance failed with error 80004002
2017-03-01    20:01:47:783    5476    114c    CltUI    WARNING: RegisterNetworkCostChangeNotification: Error 80004002

As of this writing, the last entry is 4 hours old and the service has not been doing anything all this time. Judging by timestamps, last thing it did was to download an EULA for Silverlight, at 16:56.

It is not apparent to me what exactly is going wrong and how to get it all fixed, short of a clean reinstall.

Any suggestions?


WSUS stopped working with Windows 10 machines

$
0
0

My WSUS system has been reliably updating all the Windows 10 machines in my network for two years.  Suddenly, it no longer works with them (it still works with my 2012 servers).  None of the machines show pending updates in the WSUS console, yet all of the machines report important updates are missing.  If you check for updates on one of the machines, nothing changes; if you check online for updates, it shows four of them.

Has this happened to anyone before?  Is there a way to bring them back into synch?

Download failure

$
0
0

Server 2012 R2 Std

WSUS

WSUS stopped downloading updates. It was working for years. I made no change except usual server updates:

I have tried  "retry download" but it still fails.

How do I get downloading working again?


John Lenz

KB4512508 causing problems

$
0
0

KB4512508 breaks several applications across multiple clients.  Unfortunately for now, we have no choice but to remove it.

I search for it in WSUS but it was not visible in Update Services, this was an older Windows Server 2012 R2 WSUS server.   To resolve this, I replaced it with Server 2019.

Now I can see KB4512508 as being offered to Windows 10 v1809 and v1903 machines.  Obviously not approved.

I set KB4512508 to approve for removal with a deadline of last week.

Windows 10 workstations are not removing this update.  In fact, they insist on re-installing it.

I have checked the latest WSUS v1903 group policy settings are being applied and the registry looks correct.  The systems are checking for updates against the WSUS server.

Does anyone know what might be preventing this update from removing even though it is explicitly set in WSUS?

Windows Updates are installed out of the scheduled install time defined by GPO

$
0
0

Hi all,

I am in an issue with Windows 2012R2 server which was installed Windows Updates automatically out of the defined scheduled install time pushed by GPO.

The GPO policy defines "Computer Configuration-> Administrative Templates ->Windows Components -> Windows Updates -> Configure Automatic Updates" as Enabled and option 4 (Auto download and schedule the installation), as well as the scheduled install day as "Every Saturaday", scheduled install time as "01:00".

However, the server installed the updates on 15:08 yesterday (Thu) and I could see the below weird logs in C:\Windows\windowsupdates.log

2019-08-1514:53:43:580768b0cAUChanging existing AU client directive from 'Safe to reboot detection for Active session' to 'Reboot Warning', session id = 0x1
2019-08-15       14:53:43:580 768b0c AULaunched new AU client for directive 'Reboot Warning', session id = 0x8

2019-08-1515:08:43:582768b0cAUAuto-logon after WU reboot was requested. Trying to enable...
2019-08-1515:08:43:676768b0cShutdwnWARNING: Could not enable auto-logon after next reboot (hr=0x00000000, ntstatus=0xc00704ec).
2019-08-1515:08:43:676768b0cAUFailed to enable auto-logon after WU reboot - hr = 0xD00704EC
2019-08-1515:08:43:676768b0cAUAU invoking RebootSystem (OnRebootNow)
2019-08-1515:08:43:676768b0cAUAllowing auto firmware installs at next shutdown
2019-08-1515:08:43:801768b0cMiscWARNING: SUS Client is rebooting system.

Please advise where would be the cause. Many thanks.

Wsus snap-in showing duplicated server entries

$
0
0

Hi!  We have a single Wsus Server on premises in our Company.

Recently i've come across the problem of WSUS not synchronizing properly. Following the suggestions in this thread, all is working as expected again.

http://social.technet.microsoft.com/Forums/en/winserverwsus/thread/79f76bdf-83cc-47d1-8244-5d544fe7d21

Sadly the Wsus Snap in ins showing me 2 identical entries for the same Wsus server (all settings, updates lists etc)

did i miss something? I've already deleted the redundant entries in the Console and i checked the SSL bindings on the IIS.(all seems like before)

But when i open the Console again, it still presents me with :

Update Services

+ fqdn(.local)

+ fqdn(.local)

thx in advance

Viewing all 12331 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>