I have migrated the WSUS database to another drive using the SBS Console, but a13BG SUSDB.mdf database still shows up on the C Drive in WSUS\SUSDB\UpdateServiceDbFiles with today's date and a time stamp of less than a few mins ago.
HELP!!!
I have migrated the WSUS database to another drive using the SBS Console, but a13BG SUSDB.mdf database still shows up on the C Drive in WSUS\SUSDB\UpdateServiceDbFiles with today's date and a time stamp of less than a few mins ago.
HELP!!!
Hi all,
i have another "license terms are failing to download" post.
I am setting up SCCM for a client - who refuses to give the SCCM server direct access to the internet - for whatever reason they want it to go via their proxy, with auth.
Proxy is set - majority of updates are downloading fine - but license terms are failing to download.
Initially, the BITS job queue was full of jobs without proxy details (must have kicked it off accidentially before proxy details were added) - i cleaered these using bitsadmin.exe /reset /allusers (run as system via scheduled tasks). all good - and the updates showed up in the WSUS console with the "license terms failed to download" icon....
Manually attempting to download now via the WSUS console results in a status of "This update cannot be approved for installation because its Microsoft software license terms are still downloading" - however there are no BITS jobs in queue. The
Content directory remains empty (no surprise) - and there doesnt appear to be any entries in the event log. after a few hours i would have at least expected a failure message, or a suspended BITS job - but i have neither.
Im not sure where to look next - any suggestions ?
I have a Windows 2008 R2 WSUS server and lately I've been getting EventID 364:
Content file download failed. Reason: File cert verification failure. Source File: /msdownload/update/v3-19990518/cabpool/officexp-mui-kb835727-client-jpn_c1e61f62d18adb040e68e3a260a4a96f7b24cc48.exe Destination File: d:\WSUS\WsusContent\48\C1E61F62D18ADB040E68E3A260A4A96F7B24CC48.exe.
It's always just this one file that fails to download. All the other updates download just fine. This server has been running fine for years, and I haven't made any changes to it.
I read another article that suggested this might be due to a lack of root certificates on the WSUS server. This server does have internet access, so I'm not sure why it wouldn't get root cert updates (I didn't see a root cert updates feature in the list of installable features?). Regardless, I did install kb931125 on a Win 7 box, exported the certs and imported them on the WSUS server, but it doesn't seem to have fixed the issue (unless I need to restart something after importing the new certificates?).
Hi,
the title says it all I guess.
After updating my WSUS 3.0 SP2 server with KB2720211, my clients stopped finding updates to install.
The WU client version is 7.6.7600.256 though and I don't see anything strange in the windowsupdate.log:
2012-12-1516:59:13:068860168Report*********** Report: Initializing static reporting data ***********
2012-12-1516:59:13:068860168Report * OS Version = 5.2.3790.2.0.196880
2012-12-1516:59:13:130860168Report * Computer Brand = VMware, Inc.
2012-12-1516:59:13:130860168Report * Computer Model = VMware Virtual Platform
2012-12-1516:59:13:130860168Report * Bios Revision = 6.00
2012-12-1516:59:13:130860168Report * Bios Name = PhoenixBIOS 4.0 Release 6.0
2012-12-1516:59:13:130860168Report * Bios Release Date = 2009-10-13T00:00:00
2012-12-1516:59:13:130860168Report * Locale ID = 1033
2012-12-1516:59:13:130860168AU#############
2012-12-1516:59:13:130860168AU## START ## AU: Search for updates
2012-12-1516:59:13:130860168AU#########
2012-12-1516:59:13:130860168AU<<## SUBMITTED ## AU: Search for updates [CallId = {ED12E5FB-FF34-4A14-8978-364DBD03D3CD}]
2012-12-1516:59:13:224860aacAgent*************
2012-12-1516:59:13:224860aacAgent** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2012-12-1516:59:13:224860aacAgent*********
2012-12-1516:59:13:224860aacAgent * Online = Yes; Ignore download priority = No
2012-12-1516:59:13:224860aacAgent * Criteria = "IsHidden=0 and IsInstalled=0 and DeploymentAction='Installation' and IsAssigned=1 or IsHidden=0 and IsPresent=1 and DeploymentAction='Uninstallation' and IsAssigned=1 or IsHidden=0 and IsInstalled=1
and DeploymentAction='Installation' and IsAssigned=1 and RebootRequired=1 or IsHidden=0 and IsInstalled=0 and DeploymentAction='Uninstallation' and IsAssigned=1 and RebootRequired=1"
2012-12-1516:59:13:224860aacAgent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2012-12-1516:59:13:224860aacAgent * Search Scope = {Machine}
2012-12-1516:59:13:224860aacMiscValidating signature for C:\WINDOWS\SoftwareDistribution\SelfUpdate\Default\wuident.cab:
2012-12-1516:59:13:224860aacMiscMicrosoft signed: Yes
2012-12-1516:59:17:724860aacMiscValidating signature for C:\WINDOWS\SoftwareDistribution\SelfUpdate\Default\wuident.cab:
2012-12-1516:59:17:724860aacMiscMicrosoft signed: Yes
2012-12-1516:59:17:740860aacMiscValidating signature for C:\WINDOWS\SoftwareDistribution\SelfUpdate\Default\wsus3setup.cab:
2012-12-1516:59:17:740860aacMiscMicrosoft signed: Yes
2012-12-1516:59:17:755860aacSetup*********** Setup: Checking whether self-update is required ***********
2012-12-1516:59:17:755860aacSetup * Inf file: C:\WINDOWS\SoftwareDistribution\SelfUpdate\Default\wsus3setup.inf
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\cdm.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuapi.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuapi.dll.mui: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuauclt.exe: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuaucpl.cpl: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuaucpl.cpl.mui: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuaueng.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuaueng.dll.mui: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wucltui.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wucltui.dll.mui: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wups.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wups2.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuweb.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetup * IsUpdateRequired = No
2012-12-1516:59:18:849860aacPT+++++++++++ PT: Synchronizing server updates +++++++++++
2012-12-1516:59:18:849860aacPT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://lil141nt.eu.seb.com:8530/ClientWebService/client.asmx
2012-12-1516:59:20:724860aacAgent * Found 0 updates and 64 categories in search; evaluated appl. rules of 616 out of 1050 deployed entities
2012-12-1516:59:20:724860aacAgent*********
2012-12-1516:59:20:724860aacAgent** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2012-12-1516:59:20:724860aacAgent*************
2012-12-1516:59:20:724860fc
AU>>## RESUMED ## AU: Search for updates [CallId = {ED12E5FB-FF34-4A14-8978-364DBD03D3CD}]
2012-12-1516:59:20:724860fc
AU # 0 updates detected
2012-12-1516:59:20:724860fc
AU#########
2012-12-1516:59:20:724860fc
AU## END ## AU: Search for updates [CallId = {ED12E5FB-FF34-4A14-8978-364DBD03D3CD}]
2012-12-1516:59:20:724860fc
AU#############
2012-12-1516:59:20:724860fc
AUFeatured notifications is disabled.
2012-12-1516:59:20:724860fc
AUAU setting next detection timeout to 2012-12-15 23:49:42
2012-12-1516:59:25:725860aacReportREPORT EVENT: {F29680A7-BA79-4B6F-B0F5-33C431E1A991}2012-12-15 16:59:20:724+01001147101{00000000-0000-0000-0000-000000000000}
00AutomaticUpdatesSuccessSoftware SynchronizationWindows Update Client successfully detected 0 updates.
2012-12-1516:59:25:725860aacReportREPORT EVENT: {F55F1E21-BB94-4BF0-887F-5F3553EA7920}2012-12-15 16:59:20:724+01001156101{00000000-0000-0000-0000-000000000000}
00AutomaticUpdatesSuccessPre-Deployment CheckReporting client status.
2012-12-1517:01:50:060860aacReportUploading 2 events using cached cookie, reporting URL = http://lil141nt.eu.seb.com:8530/ReportingWebService/ReportingWebService.asmx
2012-12-1517:01:50:060860aacReportReporter successfully uploaded 2 events.
Any idea please ?
Thanks.
Regards,
Eric
I just enabled and configured the WSUS role on a new Server 2012 installation and after synchronizing with Microsoft and approving some updates, I see that none of them are being downloaded. I look in the event log and get something similar to this for each update I've approved. I have looked around on the Internet and most of the entries I find say something about a proxy server being configured wrong. We do not have a proxy server for this network and the only firewall we have is between our router and the Internet. In other words, the firewall does not interfere with anything on our intranet. I've stood up many WSUS servers on Windows 2008 R2 platforms and have never had this problem. I would appreciate anyone who can help with this.
Log Name: Application
Source: Windows Server Update Services
Date: 9/18/2012 10:43:53 AM
Event ID: 364
Task Category: 2
Level: Error
Keywords: Classic
User: N/A
Computer: WSUS2012.rm.local
Description:
Content file download failed. Reason: Value does not fall within the expected range. Source File: /msdownload/update/software/crup/2012/09/windows6.1-kb2735855-x64_ac1a0af35980b5de95526da28243c152bb29cf5c.cab Destination File: e:WsusContent\5C\AC1A0AF35980B5DE95526DA28243C152BB29CF5C.cab.
This is not an issue/question, I'm just posting something which may help others in doing WSUS reporting tasks. I hope you will find this information useful and feel free to enhance it any way you can by sharing it with others.
WSUS has always lacked a few things with its built-in reporting capabilities which by the time you are patching end-points above double digits within a not-so-flat design, it can become a major time waster. One thing I've always wanted in the Computer reports in WSUS was to see a breakdown of system compliancy of all servers/desktops by having an additional column which would reflect the computer groups and containers that I've used to organize my WSUS hierarchy.
I'm specifically referring to the Computer Tabular Status report. This would eliminate the need to run a sepae report for each computer group and then grouping them all together manually afterwards. Using this code, I can now view all the computer groups and the systems contained within them in a single view.
To do this I've scoured around the net and by spending some time in SQL, I've written a basic SQL query which you can issue against your WSUS database either through SQL Management Studio or just by wrapping the code into a script and using SQLCMD.exe
In my specific case, I'm using the basic Windows Internal DB but if you just re-work some of the table paths it can be used against a full SQL DB install as well. This was done under WSUS 3.0, I'm not sure if Win 2012 WSUS has enhanced reporting or not but I know WSUS 3.0 is still very common.
SELECT DISTINCT tbTargetGroup.Name, tbComputerTarget.FullDomainName, tbComputerTarget.IPAddress, tbComputerSummaryForMicrosoftUpdates.Installed, tbComputerSummaryForMicrosoftUpdates.NotInstalled, tbComputerSummaryForMicrosoftUpdates.InstalledPendingReboot, tbComputerSummaryForMicrosoftUpdates.Downloaded, tbComputerSummaryForMicrosoftUpdates.Failed, tbComputerSummaryForMicrosoftUpdates.Unknown FROM SUSDB.dbo.tbComputerTarget tbComputerTarget, SUSDB.dbo.tbTargetGroup tbTargetGroup, SUSDB.dbo.tbTargetInTargetGroup tbTargetInTargetGroup, SUSDB.dbo.tbComputerSummaryForMicrosoftUpdates WHERE tbTargetInTargetGroup.TargetGroupID = tbTargetGroup.TargetGroupID AND tbTargetInTargetGroup.TargetID = tbComputerTarget.TargetID AND tbComputerTarget.TargetID = tbComputerSummaryForMicrosoftUpdates.TargetID AND tbTargetGroup.Name != 'Unassigned Computers' ORDER BY tbTargetGroup.Name ASC
The above block of code will basically show several essential columns of information about the systems being managed by WSUS, such as name, IP, etc. but most importantly will group them by using the first column on the left as how you've grouped them into computer containers in your WSUS console. You can of course choose to remove whatever columns you don't need or include other columns from different tables if you want, but the main thing is in the WHERE line where the reference between group names and group GUIDs are established and by creating a relationship between computers and their respective groups.
You can copy the outpt into Excel or do wherever else you want to manipulate it further. I've for example used some additional SQL queries and Excel formulas to show the percentage compliancy which is also not presented in the build-it reports but is visible in the WSUS console itself.
Enjoy,
Armin
I have a mostly working WSUS server. The server will sync with Microsoft's site and download most of the updates. The clients will connect, report, and update themselves. The only problem I have is that about 100 out of almost 600 approved updates refuses to download. The following messages are the 2 types of messages I see with Event ID 364.
Content file download failed. Reason: A connection with the server could not be established Source File: /msdownload/update/software/updt/2011/08/ndp40-kb2533523-x86_e4d68d030e6577b5183ce441dbcc62d2d3112f29.exe Destination File: c:\WSUSupdates\WsusContent\29\E4D68D030E6577B5183CE441DBCC62D2D3112F29.exe.
Content file download failed. Reason: Value does not fall within the expected range. Source File: Destination File: c:\WSUSupdates\WsusContent\F4\0581874009280C186F856F079594D1CCC7A851F4.exe.
Hello,
I hope I'll use the correct wording, because I've a german UI ;)
If I look into the report of a client, I see two oustanding updates: KB931125 Dec 2012 (not approved) and KB931125 May 2013 (approved). I think the second one will replace the first one. But the client does not install. I checked the WindowsUpdate.log and it seems to bee ok. no errors, only one warning (Cached cookie has expired or new PID is available) and that's the result:
* Found 0 updates and 77 categories in search; evaluated appl. rules of 1338 out of 2133 deployed entities
Any idea why the client found 0 updates? All other updates have been installed without any problem
Kind regards,
Dennis
Hi ,
I have installed wsus on an isolated network.WSUS server dont have internet connectivity and my client dont want to use an export server to get the updates.
Is there any other way by which i can manually download the WSUS catalog file then can import in the WSUS server for the scan.
If its possible then ,please help me with the process.
Thanks
Hi I recently installed WSUS. After setting up the GPO to receive automatic updates, I got this message on the client machine in the WindowsUpdate log.
I was hoping someone could help me out as to why the client failed to connect?
Also, there are 60 out of about 200 computers that are reporting fine.
2013-06-09 00:16:54:333 1492 eb0 Agent ** START ** Agent: Finding updates [CallerId = ]
2013-06-09 00:16:54:333 1492 eb0 Agent *********
2013-06-09 00:16:54:333 1492 eb0 Agent * Online = Yes; Ignore download priority = No
2013-06-09 00:16:54:333 1492 eb0 Agent * Criteria = "IsInstalled = 0 and IsHidden = 0"
2013-06-09 00:16:54:333 1492 eb0 Agent * ServiceID = {00000000-0000-0000-0000-000000000000} Third party service
2013-06-09 00:16:54:333 1492 eb0 Agent * Search Scope = {Machine}
2013-06-09 00:16:54:552 3908 d00 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = <NULL>]
2013-06-09 00:17:02:896 1492 eb0 PT +++++++++++ PT: Synchronizing server updates +++++++++++
2013-06-09 00:17:02:896 1492 eb0 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ELMFS1/ClientWebService/client.asmx
2013-06-09 00:17:02:989 1492 eb0 PT WARNING: Cached cookie has expired or new PID is available
2013-06-09 00:17:02:989 1492 eb0 PT Initializing simple targeting cookie, clientId = be185879-df4b-4595-8555-80a1bc59bb15, target group = , DNS name = wselmwood030.brydsongroup.com
2013-06-09 00:17:02:989 1492 eb0 PT Server URL = http://ELMFS1/SimpleAuthWebService/SimpleAuth.asmx
2013-06-09 00:17:03:036 1492 eb0 PT WARNING: GetAuthorizationCookie failure, error = 0x8024402B, soap client error = 10, soap error code = 0, HTTP status code = 499
2013-06-09 00:17:03:036 1492 eb0 PT WARNING: Failed to initialize Simple Targeting Cookie: 0x8024402b
2013-06-09 00:17:03:036 1492 eb0 PT WARNING: PopulateAuthCookies failed: 0x8024402b
2013-06-09 00:17:03:036 1492 eb0 PT WARNING: RefreshCookie failed: 0x8024402b
2013-06-09 00:17:03:036 1492 eb0 PT WARNING: RefreshPTState failed: 0x8024402b
2013-06-09 00:17:03:036 1492 eb0 PT WARNING: Sync of Updates: 0x8024402b
2013-06-09 00:17:03:036 1492 eb0 PT WARNING: SyncServerUpdatesInternal failed: 0x8024402b
2013-06-09 00:17:03:036 1492 eb0 Agent * WARNING: Failed to synchronize, error = 0x8024402B
2013-06-09 00:17:03:036 1492 eb0 Agent * WARNING: Exit code = 0x8024402B
2013-06-09 00:17:03:036 1492 eb0 Agent *********
2013-06-09 00:17:03:036 1492 eb0 Agent ** END ** Agent: Finding updates [CallerId = ]
2013-06-09 00:17:03:036 1492 eb0 Agent *************
2013-06-09 00:17:03:036 1492 eb0 Agent WARNING: WU client failed Searching for update with error 0x8024402b
2013-06-09 00:17:03:067 3908 290 COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = <NULL>]
2013-06-09 00:17:03:067 3908 290 COMAPI - Updates found = 0
2013-06-09 00:17:03:067 3908 290 COMAPI - WARNING: Exit code = 0x00000000, Result code = 0x8024402B
2013-06-09 00:17:03:067 3908 290 COMAPI ---------
2013-06-09 00:17:03:067 3908 290 COMAPI -- END -- COMAPI: Search [ClientId = <NULL>]
2013-06-09 00:17:03:067 3908 290 COMAPI -------------
2013-06-09 00:17:03:067 3908 d00 COMAPI WARNING: Operation failed due to earlier error, hr=8024402B
Any help will be more than appreciated.
Thank you,
Tom.
I just enabled and configured the WSUS role on a new Server 2012 installation and after synchronizing with Microsoft and approving some updates, I see that none of them are being downloaded. I look in the event log and get something similar to this for each update I've approved. I have looked around on the Internet and most of the entries I find say something about a proxy server being configured wrong. We do not have a proxy server for this network and the only firewall we have is between our router and the Internet. In other words, the firewall does not interfere with anything on our intranet. I've stood up many WSUS servers on Windows 2008 R2 platforms and have never had this problem. I would appreciate anyone who can help with this.
Log Name: Application
Source: Windows Server Update Services
Date: 9/18/2012 10:43:53 AM
Event ID: 364
Task Category: 2
Level: Error
Keywords: Classic
User: N/A
Computer: WSUS2012.rm.local
Description:
Content file download failed. Reason: Value does not fall within the expected range. Source File: /msdownload/update/software/crup/2012/09/windows6.1-kb2735855-x64_ac1a0af35980b5de95526da28243c152bb29cf5c.cab Destination File: e:WsusContent\5C\AC1A0AF35980B5DE95526DA28243C152BB29CF5C.cab.
I have a mostly working WSUS server. The server will sync with Microsoft's site and download most of the updates. The clients will connect, report, and update themselves. The only problem I have is that about 100 out of almost 600 approved updates refuses to download. The following messages are the 2 types of messages I see with Event ID 364.
Content file download failed. Reason: A connection with the server could not be established Source File: /msdownload/update/software/updt/2011/08/ndp40-kb2533523-x86_e4d68d030e6577b5183ce441dbcc62d2d3112f29.exe Destination File: c:\WSUSupdates\WsusContent\29\E4D68D030E6577B5183CE441DBCC62D2D3112F29.exe.
Content file download failed. Reason: Value does not fall within the expected range. Source File: Destination File: c:\WSUSupdates\WsusContent\F4\0581874009280C186F856F079594D1CCC7A851F4.exe.
Hello,
I hope I'll use the correct wording, because I've a german UI ;)
If I look into the report of a client, I see two oustanding updates: KB931125 Dec 2012 (not approved) and KB931125 May 2013 (approved). I think the second one will replace the first one. But the client does not install. I checked the WindowsUpdate.log and it seems to bee ok. no errors, only one warning (Cached cookie has expired or new PID is available) and that's the result:
* Found 0 updates and 77 categories in search; evaluated appl. rules of 1338 out of 2133 deployed entities
Any idea why the client found 0 updates? All other updates have been installed without any problem
Kind regards,
Dennis
This is not an issue/question, I'm just posting something which may help others in doing WSUS reporting tasks. I hope you will find this information useful and feel free to enhance it any way you can by sharing it with others.
WSUS has always lacked a few things with its built-in reporting capabilities which by the time you are patching end-points above double digits within a not-so-flat design, it can become a major time waster. One thing I've always wanted in the Computer reports in WSUS was to see a breakdown of system compliancy of all servers/desktops by having an additional column which would reflect the computer groups and containers that I've used to organize my WSUS hierarchy.
I'm specifically referring to the Computer Tabular Status report. This would eliminate the need to run a sepae report for each computer group and then grouping them all together manually afterwards. Using this code, I can now view all the computer groups and the systems contained within them in a single view.
To do this I've scoured around the net and by spending some time in SQL, I've written a basic SQL query which you can issue against your WSUS database either through SQL Management Studio or just by wrapping the code into a script and using SQLCMD.exe
In my specific case, I'm using the basic Windows Internal DB but if you just re-work some of the table paths it can be used against a full SQL DB install as well. This was done under WSUS 3.0, I'm not sure if Win 2012 WSUS has enhanced reporting or not but I know WSUS 3.0 is still very common.
SELECT tbTargetGroup.Name, tbComputerTarget.FullDomainName, tbComputerTarget.IPAddress, tbComputerSummaryForMicrosoftUpdates.Installed, tbComputerSummaryForMicrosoftUpdates.NotInstalled, tbComputerSummaryForMicrosoftUpdates.InstalledPendingReboot, tbComputerSummaryForMicrosoftUpdates.Downloaded, tbComputerSummaryForMicrosoftUpdates.Failed, tbComputerSummaryForMicrosoftUpdates.Unknown FROM SUSDB.dbo.tbComputerTarget tbComputerTarget, SUSDB.dbo.tbTargetGroup tbTargetGroup, SUSDB.dbo.tbTargetInTargetGroup tbTargetInTargetGroup, SUSDB.dbo.tbComputerSummaryForMicrosoftUpdates WHERE tbTargetInTargetGroup.TargetGroupID = tbTargetGroup.TargetGroupID AND tbTargetInTargetGroup.TargetID = tbComputerTarget.TargetID AND tbComputerTarget.TargetID = tbComputerSummaryForMicrosoftUpdates.TargetID AND tbTargetGroup.Name != 'Unassigned Computers' ORDER BY tbTargetGroup.Name ASC
The above block of code will basically show several essential columns of information about the systems being managed by WSUS, such as name, IP, etc. but most importantly will group them by using the first column on the left as how you've grouped them into computer containers in your WSUS console. You can of course choose to remove whatever columns you don't need or include other columns from different tables if you want, but the main thing is in the WHERE line where the reference between group names and group GUIDs are established and by creating a relationship between computers and their respective groups.
You can copy the outpt into Excel or do wherever else you want to manipulate it further. I've for example used some additional SQL queries and Excel formulas to show the percentage compliancy which is also not presented in the build-it reports but is visible in the WSUS console itself.
Enjoy,
Armin
Hi all,
i have another "license terms are failing to download" post.
I am setting up SCCM for a client - who refuses to give the SCCM server direct access to the internet - for whatever reason they want it to go via their proxy, with auth.
Proxy is set - majority of updates are downloading fine - but license terms are failing to download.
Initially, the BITS job queue was full of jobs without proxy details (must have kicked it off accidentially before proxy details were added) - i cleaered these using bitsadmin.exe /reset /allusers (run as system via scheduled tasks). all good - and the updates showed up in the WSUS console with the "license terms failed to download" icon....
Manually attempting to download now via the WSUS console results in a status of "This update cannot be approved for installation because its Microsoft software license terms are still downloading" - however there are no BITS jobs in queue. The
Content directory remains empty (no surprise) - and there doesnt appear to be any entries in the event log. after a few hours i would have at least expected a failure message, or a suspended BITS job - but i have neither.
Im not sure where to look next - any suggestions ?
I have setup a new Server 2012 WSUS 4 upstream server which is syncing fine with Microsoft.
I then setup a downstream Server 2012 WSUS 4 downstream server, but it is unable to sync with the upstream server. It returns this error:
WebException: Unable to connect to the remote server ---> System.Net.Sockets.SocketException: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host
has failed to respond xxx.xxx.xxx.xxx:8530
at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context)
at System.Net.HttpWebRequest.GetRequestStream()
at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetAuthConfig()
at Microsoft.UpdateServices.ServerSync.ServerSyncLib.InternetGetServerAuthConfig(ServerSyncProxy proxy, WebServiceCommunicationHelper webServiceHelper)
at Microsoft.UpdateServices.ServerSync.ServerSyncLib.Authenticate(AuthorizationManager authorizationManager, Boolean checkExpiration, ServerSyncProxy proxy, Cookie cookie, WebServiceCommunicationHelper webServiceHelper)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.SyncConfigUpdatesFromUSS()
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)
The relevant ports are open on the firewall of the upstream server, and I can ping between them.
I choose five computers and create a teste group to test new updates.
4 computers windows 7 - 64.
1 windows xp.
I approved this security update kb2804579 - .Net Framework 3.51 on windows 7 and windows Server 2008n R2 SP1 for X64-based System for this test group.
Updates superseding this update: none
Updates superseded by this update: none
I generate a report - Computer Detailed Satus Report for this security update in this test group:
The Result
For three win 7 - 64 bits - computers - status - Not Applicable
For 1 win 7 - 64 bits - computer - status - Installed.
I really do not understand why This happened.
This update don´t have a superseding update and it is a new update. So because of that I thougt all the computers win 7 - 64 would install this update.
Why only one installed ?
Or it is a problem or I really isn´t understand the wsus operation.
Some comments it will be welcome.
Lyra
Hi ,
I have installed wsus on an isolated network.WSUS server dont have internet connectivity and my client dont want to use an export server to get the updates.
Is there any other way by which i can manually download the WSUS catalog file then can import in the WSUS server for the scan.
If its possible then ,please help me with the process.
Thanks
I have a Windows 2008 R2 WSUS server and lately I've been getting EventID 364:
Content file download failed. Reason: File cert verification failure. Source File: /msdownload/update/v3-19990518/cabpool/officexp-mui-kb835727-client-jpn_c1e61f62d18adb040e68e3a260a4a96f7b24cc48.exe Destination File: d:\WSUS\WsusContent\48\C1E61F62D18ADB040E68E3A260A4A96F7B24CC48.exe.
It's always just this one file that fails to download. All the other updates download just fine. This server has been running fine for years, and I haven't made any changes to it.
I read another article that suggested this might be due to a lack of root certificates on the WSUS server. This server does have internet access, so I'm not sure why it wouldn't get root cert updates (I didn't see a root cert updates feature in the list of installable features?). Regardless, I did install kb931125 on a Win 7 box, exported the certs and imported them on the WSUS server, but it doesn't seem to have fixed the issue (unless I need to restart something after importing the new certificates?).