Quantcast
Channel: WSUS Forum
Viewing all 12331 articles
Browse latest View live

WSUS Blues...

$
0
0

I have migrated the WSUS database to another drive using the SBS Console, but a13BG SUSDB.mdf database still shows up on the C Drive in WSUS\SUSDB\UpdateServiceDbFiles with today's date and a time stamp of less than a few mins ago.

HELP!!!


License Terms failing to download

$
0
0

Hi all,

         i have another "license terms are failing to download" post.

I am setting up SCCM for a client - who refuses to give the SCCM server direct access to the internet - for whatever reason they want it to go via their proxy, with auth.

Proxy is set - majority of updates are downloading fine - but license terms are failing to download.

Initially, the BITS job queue was full of jobs without proxy details (must have kicked it off accidentially before proxy details were added) - i cleaered these using bitsadmin.exe /reset /allusers (run as system via scheduled tasks). all good - and the updates showed up in the WSUS console with the "license terms failed to download" icon....

Manually attempting to download now via the WSUS console results in a status of "This update cannot be approved for installation because its Microsoft software license terms are still downloading" - however there are no BITS jobs in queue. The Content directory remains empty (no surprise) - and there doesnt appear to be any entries in the event log. after a few hours i would have at least expected a failure message, or a suspended BITS job - but i have neither.

Im not sure where to look next - any suggestions ?

WSUS Auto Approval Username

$
0
0
For automatic approvals it is using my admin account and password.  If I need to change this where can I?  I do not see where that option is.

EventID 364 - Content file download failed

$
0
0

I have a Windows 2008 R2 WSUS server and lately I've been getting EventID 364:

Content file download failed. Reason: File cert verification failure. Source File: /msdownload/update/v3-19990518/cabpool/officexp-mui-kb835727-client-jpn_c1e61f62d18adb040e68e3a260a4a96f7b24cc48.exe Destination File: d:\WSUS\WsusContent\48\C1E61F62D18ADB040E68E3A260A4A96F7B24CC48.exe.

It's always just this one file that fails to download.  All the other updates download just fine.  This server has been running fine for years, and I haven't made any changes to it.

I read another article that suggested this might be due to a lack of root certificates on the WSUS server.  This server does have internet access, so I'm not sure why it wouldn't get root cert updates (I didn't see a root cert updates feature in the list of installable features?).  Regardless, I did install kb931125 on a Win 7 box, exported the certs and imported them on the WSUS server, but it doesn't seem to have fixed the issue (unless I need to restart something after importing the new certificates?).

KB2720211 on WSUS server + WU client version 7.6.7600.256 = 0 updates detected on clients now

$
0
0

Hi,

the title says it all I guess.

After updating my WSUS 3.0 SP2 server with KB2720211, my clients stopped finding updates to install.

The WU client version is 7.6.7600.256 though and I don't see anything strange in the windowsupdate.log:

2012-12-1516:59:13:068860168Report***********  Report: Initializing static reporting data  ***********
2012-12-1516:59:13:068860168Report * OS Version = 5.2.3790.2.0.196880
2012-12-1516:59:13:130860168Report * Computer Brand = VMware, Inc.
2012-12-1516:59:13:130860168Report * Computer Model = VMware Virtual Platform
2012-12-1516:59:13:130860168Report * Bios Revision = 6.00
2012-12-1516:59:13:130860168Report * Bios Name = PhoenixBIOS 4.0 Release 6.0     
2012-12-1516:59:13:130860168Report * Bios Release Date = 2009-10-13T00:00:00
2012-12-1516:59:13:130860168Report * Locale ID = 1033
2012-12-1516:59:13:130860168AU#############
2012-12-1516:59:13:130860168AU## START ##  AU: Search for updates
2012-12-1516:59:13:130860168AU#########
2012-12-1516:59:13:130860168AU<<## SUBMITTED ## AU: Search for updates [CallId = {ED12E5FB-FF34-4A14-8978-364DBD03D3CD}]
2012-12-1516:59:13:224860aacAgent*************
2012-12-1516:59:13:224860aacAgent** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2012-12-1516:59:13:224860aacAgent*********
2012-12-1516:59:13:224860aacAgent * Online = Yes; Ignore download priority = No
2012-12-1516:59:13:224860aacAgent * Criteria = "IsHidden=0 and IsInstalled=0 and DeploymentAction='Installation' and IsAssigned=1 or IsHidden=0 and IsPresent=1 and DeploymentAction='Uninstallation' and IsAssigned=1 or IsHidden=0 and IsInstalled=1 and DeploymentAction='Installation' and IsAssigned=1 and RebootRequired=1 or IsHidden=0 and IsInstalled=0 and DeploymentAction='Uninstallation' and IsAssigned=1 and RebootRequired=1"
2012-12-1516:59:13:224860aacAgent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2012-12-1516:59:13:224860aacAgent * Search Scope = {Machine}
2012-12-1516:59:13:224860aacMiscValidating signature for C:\WINDOWS\SoftwareDistribution\SelfUpdate\Default\wuident.cab:
2012-12-1516:59:13:224860aacMiscMicrosoft signed: Yes
2012-12-1516:59:17:724860aacMiscValidating signature for C:\WINDOWS\SoftwareDistribution\SelfUpdate\Default\wuident.cab:
2012-12-1516:59:17:724860aacMiscMicrosoft signed: Yes
2012-12-1516:59:17:740860aacMiscValidating signature for C:\WINDOWS\SoftwareDistribution\SelfUpdate\Default\wsus3setup.cab:
2012-12-1516:59:17:740860aacMiscMicrosoft signed: Yes
2012-12-1516:59:17:755860aacSetup***********  Setup: Checking whether self-update is required  ***********
2012-12-1516:59:17:755860aacSetup * Inf file: C:\WINDOWS\SoftwareDistribution\SelfUpdate\Default\wsus3setup.inf
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\cdm.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuapi.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuapi.dll.mui: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuauclt.exe: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuaucpl.cpl: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuaucpl.cpl.mui: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuaueng.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuaueng.dll.mui: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wucltui.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wucltui.dll.mui: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wups.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wups2.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetupUpdate NOT required for C:\WINDOWS\system32\wuweb.dll: target version = 7.6.7600.256, required version = 7.6.7600.256
2012-12-1516:59:17:755860aacSetup * IsUpdateRequired = No
2012-12-1516:59:18:849860aacPT+++++++++++  PT: Synchronizing server updates  +++++++++++
2012-12-1516:59:18:849860aacPT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://lil141nt.eu.seb.com:8530/ClientWebService/client.asmx
2012-12-1516:59:20:724860aacAgent * Found 0 updates and 64 categories in search; evaluated appl. rules of 616 out of 1050 deployed entities
2012-12-1516:59:20:724860aacAgent*********
2012-12-1516:59:20:724860aacAgent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2012-12-1516:59:20:724860aacAgent*************
2012-12-1516:59:20:724860fc AU>>##  RESUMED  ## AU: Search for updates [CallId = {ED12E5FB-FF34-4A14-8978-364DBD03D3CD}]
2012-12-1516:59:20:724860fc AU # 0 updates detected
2012-12-1516:59:20:724860fc AU#########
2012-12-1516:59:20:724860fc AU##  END  ##  AU: Search for updates [CallId = {ED12E5FB-FF34-4A14-8978-364DBD03D3CD}]
2012-12-1516:59:20:724860fc AU#############
2012-12-1516:59:20:724860fc AUFeatured notifications is disabled.
2012-12-1516:59:20:724860fc AUAU setting next detection timeout to 2012-12-15 23:49:42
2012-12-1516:59:25:725860aacReportREPORT EVENT: {F29680A7-BA79-4B6F-B0F5-33C431E1A991}2012-12-15 16:59:20:724+01001147101{00000000-0000-0000-0000-000000000000} 00AutomaticUpdatesSuccessSoftware SynchronizationWindows Update Client successfully detected 0 updates.
2012-12-1516:59:25:725860aacReportREPORT EVENT: {F55F1E21-BB94-4BF0-887F-5F3553EA7920}2012-12-15 16:59:20:724+01001156101{00000000-0000-0000-0000-000000000000} 00AutomaticUpdatesSuccessPre-Deployment CheckReporting client status.
2012-12-1517:01:50:060860aacReportUploading 2 events using cached cookie, reporting URL = http://lil141nt.eu.seb.com:8530/ReportingWebService/ReportingWebService.asmx
2012-12-1517:01:50:060860aacReportReporter successfully uploaded 2 events.

Any idea please ?

Thanks.

Regards,

Eric

Value does not fall within the expected range on new WSUS install on Server 2012

$
0
0

I just enabled and configured the WSUS role on a new Server 2012 installation and after synchronizing with Microsoft and approving some updates, I see that none of them are being downloaded. I look in the event log and get something similar to this for each update I've approved. I have looked around on the Internet and most of the entries I find say something about a proxy server being configured wrong. We do not have a proxy server for this network and the only firewall we have is between our router and the Internet. In other words, the firewall does not interfere with anything on our intranet. I've stood up many WSUS servers on Windows 2008 R2 platforms and have never had this problem. I would appreciate anyone who can help with this.

Log Name:      Application
Source:        Windows Server Update Services
Date:          9/18/2012 10:43:53 AM
Event ID:      364
Task Category: 2
Level:         Error
Keywords:      Classic
User:          N/A
Computer:      WSUS2012.rm.local
Description:
Content file download failed. Reason: Value does not fall within the expected range. Source File: /msdownload/update/software/crup/2012/09/windows6.1-kb2735855-x64_ac1a0af35980b5de95526da28243c152bb29cf5c.cab Destination File: e:WsusContent\5C\AC1A0AF35980B5DE95526DA28243C152BB29CF5C.cab.

WSUS computer reports done with grouping/containers

$
0
0

This is not an issue/question, I'm just posting something which may help others in doing WSUS reporting tasks.  I hope you will find this information useful and feel free to enhance it any way you can by sharing it with others.

WSUS has always lacked a few things with its built-in reporting capabilities which by the time you are patching end-points above double digits within a not-so-flat design, it can become a major time waster.  One thing I've always wanted in the Computer reports in WSUS was to see a breakdown of system compliancy of all servers/desktops by having an additional column which would reflect the computer groups and containers that I've used to organize my WSUS hierarchy.

I'm specifically referring to the Computer Tabular Status report.  This would eliminate the need to run a sepae report for each computer group and then grouping them all together manually afterwards.  Using this code, I can now view all the computer groups and the systems contained within them in a single view.

To do this I've scoured around the net and by spending some time in SQL, I've written a basic SQL query which you can issue against your WSUS database either through SQL Management Studio or just by wrapping the code into a script and using SQLCMD.exe

In my specific case, I'm using the basic Windows Internal DB but if you just re-work some of the table paths it can be used against a full SQL DB install as well.  This was done under WSUS 3.0, I'm not sure if Win 2012 WSUS has enhanced reporting or not but I know WSUS 3.0 is still very common.

SELECT DISTINCT tbTargetGroup.Name, tbComputerTarget.FullDomainName, tbComputerTarget.IPAddress, tbComputerSummaryForMicrosoftUpdates.Installed, tbComputerSummaryForMicrosoftUpdates.NotInstalled, tbComputerSummaryForMicrosoftUpdates.InstalledPendingReboot, tbComputerSummaryForMicrosoftUpdates.Downloaded, tbComputerSummaryForMicrosoftUpdates.Failed, tbComputerSummaryForMicrosoftUpdates.Unknown
FROM SUSDB.dbo.tbComputerTarget tbComputerTarget, SUSDB.dbo.tbTargetGroup tbTargetGroup, SUSDB.dbo.tbTargetInTargetGroup tbTargetInTargetGroup, SUSDB.dbo.tbComputerSummaryForMicrosoftUpdates
WHERE tbTargetInTargetGroup.TargetGroupID = tbTargetGroup.TargetGroupID AND tbTargetInTargetGroup.TargetID = tbComputerTarget.TargetID AND tbComputerTarget.TargetID = tbComputerSummaryForMicrosoftUpdates.TargetID AND tbTargetGroup.Name != 'Unassigned Computers'
ORDER BY tbTargetGroup.Name ASC

The above block of code will basically show several essential columns of information about the systems being managed by WSUS, such as name, IP, etc. but most importantly will group them by using the first column on the left as how you've grouped them into computer containers in your WSUS console.  You can of course choose to remove whatever columns you don't need or include other columns from different tables if you want, but the main thing is in the WHERE line where the reference between group names and group GUIDs are established and by creating a relationship between computers and their respective groups.

You can copy the outpt into Excel or do wherever else you want to manipulate it further.  I've for example used some additional SQL queries and Excel formulas to show the percentage compliancy which is also not presented in the build-it reports but is visible in the WSUS console itself.

Enjoy,

Armin


WSUS 6.2.9200.16384 will download some updates but not others

$
0
0

I have a mostly working WSUS server. The server will sync with Microsoft's site and download most of the updates. The clients will connect, report, and update themselves. The only problem I have is that about 100 out of almost 600 approved updates refuses to download. The following messages are the 2 types of messages I see with Event ID 364.

Content file download failed. Reason: A connection with the server could not be established Source File: /msdownload/update/software/updt/2011/08/ndp40-kb2533523-x86_e4d68d030e6577b5183ce441dbcc62d2d3112f29.exe Destination File: c:\WSUSupdates\WsusContent\29\E4D68D030E6577B5183CE441DBCC62D2D3112F29.exe.

Content file download failed. Reason: Value does not fall within the expected range. Source File: Destination File: c:\WSUSupdates\WsusContent\F4\0581874009280C186F856F079594D1CCC7A851F4.exe.


Client not installing the last update

$
0
0

Hello,

I hope I'll use the correct wording, because I've a german UI ;)

If I look into the report of a client, I see two oustanding updates: KB931125 Dec 2012 (not approved) and KB931125 May 2013 (approved). I think the second one will replace the first one. But the client does not install. I checked the WindowsUpdate.log and it seems to bee ok. no errors, only one warning (Cached cookie has expired or new PID is available) and that's the result:

* Found 0 updates and 77 categories in search; evaluated appl. rules of 1338 out of 2133 deployed entities

Any idea why the client found 0 updates? All other updates have been installed without any problem

Kind regards,
Dennis

WSUS configuration to get the updates on an isolated network

$
0
0

Hi ,

I have installed wsus on an isolated network.WSUS server dont have internet connectivity and my client dont want to use an export server to get the updates.

Is there any other way by which i can manually download the WSUS catalog file then can import in the WSUS server for the scan.

If its possible then ,please help me with the process.

Thanks

WSUS Clients not reporting

$
0
0

Hi I recently installed WSUS. After setting up the GPO to receive automatic updates, I got this message on the client machine in the WindowsUpdate log.

I was hoping someone could help me out as to why the client failed to connect?

Also, there are 60 out of about 200 computers that are reporting fine.

2013-06-09    00:16:54:333    1492    eb0    Agent    ** START **  Agent: Finding updates [CallerId = ]
2013-06-09    00:16:54:333    1492    eb0    Agent    *********
2013-06-09    00:16:54:333    1492    eb0    Agent      * Online = Yes; Ignore download priority = No
2013-06-09    00:16:54:333    1492    eb0    Agent      * Criteria = "IsInstalled = 0 and IsHidden = 0"
2013-06-09    00:16:54:333    1492    eb0    Agent      * ServiceID = {00000000-0000-0000-0000-000000000000} Third party service
2013-06-09    00:16:54:333    1492    eb0    Agent      * Search Scope = {Machine}
2013-06-09    00:16:54:552    3908    d00    COMAPI    <<-- SUBMITTED -- COMAPI: Search [ClientId = <NULL>]
2013-06-09    00:17:02:896    1492    eb0    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2013-06-09    00:17:02:896    1492    eb0    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ELMFS1/ClientWebService/client.asmx
2013-06-09    00:17:02:989    1492    eb0    PT    WARNING: Cached cookie has expired or new PID is available
2013-06-09    00:17:02:989    1492    eb0    PT    Initializing simple targeting cookie, clientId = be185879-df4b-4595-8555-80a1bc59bb15, target group = , DNS name = wselmwood030.brydsongroup.com
2013-06-09    00:17:02:989    1492    eb0    PT      Server URL = http://ELMFS1/SimpleAuthWebService/SimpleAuth.asmx
2013-06-09    00:17:03:036    1492    eb0    PT    WARNING: GetAuthorizationCookie failure, error = 0x8024402B, soap client error = 10, soap error code = 0, HTTP status code = 499
2013-06-09    00:17:03:036    1492    eb0    PT    WARNING: Failed to initialize Simple Targeting Cookie: 0x8024402b
2013-06-09    00:17:03:036    1492    eb0    PT    WARNING: PopulateAuthCookies failed: 0x8024402b
2013-06-09    00:17:03:036    1492    eb0    PT    WARNING: RefreshCookie failed: 0x8024402b
2013-06-09    00:17:03:036    1492    eb0    PT    WARNING: RefreshPTState failed: 0x8024402b
2013-06-09    00:17:03:036    1492    eb0    PT    WARNING: Sync of Updates: 0x8024402b
2013-06-09    00:17:03:036    1492    eb0    PT    WARNING: SyncServerUpdatesInternal failed: 0x8024402b
2013-06-09    00:17:03:036    1492    eb0    Agent      * WARNING: Failed to synchronize, error = 0x8024402B
2013-06-09    00:17:03:036    1492    eb0    Agent      * WARNING: Exit code = 0x8024402B
2013-06-09    00:17:03:036    1492    eb0    Agent    *********
2013-06-09    00:17:03:036    1492    eb0    Agent    **  END  **  Agent: Finding updates [CallerId = ]
2013-06-09    00:17:03:036    1492    eb0    Agent    *************
2013-06-09    00:17:03:036    1492    eb0    Agent    WARNING: WU client failed Searching for update with error 0x8024402b
2013-06-09    00:17:03:067    3908    290    COMAPI    >>--  RESUMED  -- COMAPI: Search [ClientId = <NULL>]
2013-06-09    00:17:03:067    3908    290    COMAPI      - Updates found = 0
2013-06-09    00:17:03:067    3908    290    COMAPI      - WARNING: Exit code = 0x00000000, Result code = 0x8024402B
2013-06-09    00:17:03:067    3908    290    COMAPI    ---------
2013-06-09    00:17:03:067    3908    290    COMAPI    --  END  --  COMAPI: Search [ClientId = <NULL>]
2013-06-09    00:17:03:067    3908    290    COMAPI    -------------
2013-06-09    00:17:03:067    3908    d00    COMAPI    WARNING: Operation failed due to earlier error, hr=8024402B

Any help will be more than appreciated.

Thank you,

Tom.

Value does not fall within the expected range on new WSUS install on Server 2012

$
0
0

I just enabled and configured the WSUS role on a new Server 2012 installation and after synchronizing with Microsoft and approving some updates, I see that none of them are being downloaded. I look in the event log and get something similar to this for each update I've approved. I have looked around on the Internet and most of the entries I find say something about a proxy server being configured wrong. We do not have a proxy server for this network and the only firewall we have is between our router and the Internet. In other words, the firewall does not interfere with anything on our intranet. I've stood up many WSUS servers on Windows 2008 R2 platforms and have never had this problem. I would appreciate anyone who can help with this.

Log Name:      Application
Source:        Windows Server Update Services
Date:          9/18/2012 10:43:53 AM
Event ID:      364
Task Category: 2
Level:         Error
Keywords:      Classic
User:          N/A
Computer:      WSUS2012.rm.local
Description:
Content file download failed. Reason: Value does not fall within the expected range. Source File: /msdownload/update/software/crup/2012/09/windows6.1-kb2735855-x64_ac1a0af35980b5de95526da28243c152bb29cf5c.cab Destination File: e:WsusContent\5C\AC1A0AF35980B5DE95526DA28243C152BB29CF5C.cab.

WSUS 6.2.9200.16384 will download some updates but not others

$
0
0

I have a mostly working WSUS server. The server will sync with Microsoft's site and download most of the updates. The clients will connect, report, and update themselves. The only problem I have is that about 100 out of almost 600 approved updates refuses to download. The following messages are the 2 types of messages I see with Event ID 364.

Content file download failed. Reason: A connection with the server could not be established Source File: /msdownload/update/software/updt/2011/08/ndp40-kb2533523-x86_e4d68d030e6577b5183ce441dbcc62d2d3112f29.exe Destination File: c:\WSUSupdates\WsusContent\29\E4D68D030E6577B5183CE441DBCC62D2D3112F29.exe.

Content file download failed. Reason: Value does not fall within the expected range. Source File: Destination File: c:\WSUSupdates\WsusContent\F4\0581874009280C186F856F079594D1CCC7A851F4.exe.

Client not installing the last update

$
0
0

Hello,

I hope I'll use the correct wording, because I've a german UI ;)

If I look into the report of a client, I see two oustanding updates: KB931125 Dec 2012 (not approved) and KB931125 May 2013 (approved). I think the second one will replace the first one. But the client does not install. I checked the WindowsUpdate.log and it seems to bee ok. no errors, only one warning (Cached cookie has expired or new PID is available) and that's the result:

* Found 0 updates and 77 categories in search; evaluated appl. rules of 1338 out of 2133 deployed entities

Any idea why the client found 0 updates? All other updates have been installed without any problem

Kind regards,
Dennis

WSUS computer reports done with grouping/containers

$
0
0

This is not an issue/question, I'm just posting something which may help others in doing WSUS reporting tasks.  I hope you will find this information useful and feel free to enhance it any way you can by sharing it with others.

WSUS has always lacked a few things with its built-in reporting capabilities which by the time you are patching end-points above double digits within a not-so-flat design, it can become a major time waster.  One thing I've always wanted in the Computer reports in WSUS was to see a breakdown of system compliancy of all servers/desktops by having an additional column which would reflect the computer groups and containers that I've used to organize my WSUS hierarchy.

I'm specifically referring to the Computer Tabular Status report.  This would eliminate the need to run a sepae report for each computer group and then grouping them all together manually afterwards.  Using this code, I can now view all the computer groups and the systems contained within them in a single view.

To do this I've scoured around the net and by spending some time in SQL, I've written a basic SQL query which you can issue against your WSUS database either through SQL Management Studio or just by wrapping the code into a script and using SQLCMD.exe

In my specific case, I'm using the basic Windows Internal DB but if you just re-work some of the table paths it can be used against a full SQL DB install as well.  This was done under WSUS 3.0, I'm not sure if Win 2012 WSUS has enhanced reporting or not but I know WSUS 3.0 is still very common.

SELECT tbTargetGroup.Name, tbComputerTarget.FullDomainName, tbComputerTarget.IPAddress, tbComputerSummaryForMicrosoftUpdates.Installed, tbComputerSummaryForMicrosoftUpdates.NotInstalled, tbComputerSummaryForMicrosoftUpdates.InstalledPendingReboot, tbComputerSummaryForMicrosoftUpdates.Downloaded, tbComputerSummaryForMicrosoftUpdates.Failed, tbComputerSummaryForMicrosoftUpdates.Unknown
FROM SUSDB.dbo.tbComputerTarget tbComputerTarget, SUSDB.dbo.tbTargetGroup tbTargetGroup, SUSDB.dbo.tbTargetInTargetGroup tbTargetInTargetGroup, SUSDB.dbo.tbComputerSummaryForMicrosoftUpdates
WHERE tbTargetInTargetGroup.TargetGroupID = tbTargetGroup.TargetGroupID AND tbTargetInTargetGroup.TargetID = tbComputerTarget.TargetID AND tbComputerTarget.TargetID = tbComputerSummaryForMicrosoftUpdates.TargetID AND tbTargetGroup.Name != 'Unassigned Computers'
ORDER BY tbTargetGroup.Name ASC

The above block of code will basically show several essential columns of information about the systems being managed by WSUS, such as name, IP, etc. but most importantly will group them by using the first column on the left as how you've grouped them into computer containers in your WSUS console.  You can of course choose to remove whatever columns you don't need or include other columns from different tables if you want, but the main thing is in the WHERE line where the reference between group names and group GUIDs are established and by creating a relationship between computers and their respective groups.

You can copy the outpt into Excel or do wherever else you want to manipulate it further.  I've for example used some additional SQL queries and Excel formulas to show the percentage compliancy which is also not presented in the build-it reports but is visible in the WSUS console itself.

Enjoy,

Armin




License Terms failing to download

$
0
0

Hi all,

         i have another "license terms are failing to download" post.

I am setting up SCCM for a client - who refuses to give the SCCM server direct access to the internet - for whatever reason they want it to go via their proxy, with auth.

Proxy is set - majority of updates are downloading fine - but license terms are failing to download.

Initially, the BITS job queue was full of jobs without proxy details (must have kicked it off accidentially before proxy details were added) - i cleaered these using bitsadmin.exe /reset /allusers (run as system via scheduled tasks). all good - and the updates showed up in the WSUS console with the "license terms failed to download" icon....

Manually attempting to download now via the WSUS console results in a status of "This update cannot be approved for installation because its Microsoft software license terms are still downloading" - however there are no BITS jobs in queue. The Content directory remains empty (no surprise) - and there doesnt appear to be any entries in the event log. after a few hours i would have at least expected a failure message, or a suspended BITS job - but i have neither.

Im not sure where to look next - any suggestions ?

WSUS 4 sync problem

$
0
0

I have setup a new Server 2012 WSUS 4 upstream server which is syncing fine with Microsoft.

I then setup a downstream Server 2012 WSUS 4 downstream server, but it is unable to sync with the upstream server. It returns this error:

WebException: Unable to connect to the remote server ---> System.Net.Sockets.SocketException: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond xxx.xxx.xxx.xxx:8530
at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context)
   at System.Net.HttpWebRequest.GetRequestStream()
   at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
   at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetAuthConfig()
   at Microsoft.UpdateServices.ServerSync.ServerSyncLib.InternetGetServerAuthConfig(ServerSyncProxy proxy, WebServiceCommunicationHelper webServiceHelper)
   at Microsoft.UpdateServices.ServerSync.ServerSyncLib.Authenticate(AuthorizationManager authorizationManager, Boolean checkExpiration, ServerSyncProxy proxy, Cookie cookie, WebServiceCommunicationHelper webServiceHelper)
   at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.SyncConfigUpdatesFromUSS()
   at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)

The relevant ports are open on the firewall of the upstream server, and I can ping between them.

Kb2804579 - Understand the need of this update

$
0
0

I choose five computers and create a teste group to test new updates.

4 computers windows 7 - 64.

1 windows xp.

I approved  this security update kb2804579 - .Net Framework 3.51 on windows 7 and windows Server 2008n R2 SP1 for X64-based System for this test group.

Updates superseding this update: none

Updates superseded by this update: none

I generate a report - Computer Detailed Satus Report for this security update in this test group:

The Result

For three win 7 - 64 bits - computers - status - Not  Applicable

For  1 win 7 - 64 bits - computer - status - Installed.

I really do not understand why This happened.

This update don´t have a superseding update and it is a new update. So because of that I thougt all the computers win 7 - 64 would install this update.

Why only one installed ?

Or it is a problem or I really isn´t understand the wsus operation.

Some comments it will be welcome.

Lyra

 

 

WSUS configuration to get the updates on an isolated network

$
0
0

Hi ,

I have installed wsus on an isolated network.WSUS server dont have internet connectivity and my client dont want to use an export server to get the updates.

Is there any other way by which i can manually download the WSUS catalog file then can import in the WSUS server for the scan.

If its possible then ,please help me with the process.

Thanks

EventID 364 - Content file download failed

$
0
0

I have a Windows 2008 R2 WSUS server and lately I've been getting EventID 364:

Content file download failed. Reason: File cert verification failure. Source File: /msdownload/update/v3-19990518/cabpool/officexp-mui-kb835727-client-jpn_c1e61f62d18adb040e68e3a260a4a96f7b24cc48.exe Destination File: d:\WSUS\WsusContent\48\C1E61F62D18ADB040E68E3A260A4A96F7B24CC48.exe.

It's always just this one file that fails to download.  All the other updates download just fine.  This server has been running fine for years, and I haven't made any changes to it.

I read another article that suggested this might be due to a lack of root certificates on the WSUS server.  This server does have internet access, so I'm not sure why it wouldn't get root cert updates (I didn't see a root cert updates feature in the list of installable features?).  Regardless, I did install kb931125 on a Win 7 box, exported the certs and imported them on the WSUS server, but it doesn't seem to have fixed the issue (unless I need to restart something after importing the new certificates?).

Viewing all 12331 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>