Quantcast
Channel: WSUS forum
Viewing all 12874 articles
Browse latest View live

Update installation from WSUS export package

$
0
0

Hi ,

      Is it possible we can start the Windows Updates directly with WSUS Export package..? , Because in our Test Environment we don't have bandwidth to distribute the package through network from Import WSUS server.so we can share the package through USB OR DVD to clients. 

if we can able to install the updates to clients through Export package(Using power shell or some other method) it will be very useful. if you have any idea please share it here .. 


Local Computer\WSUS certificate store

$
0
0

HI All,

  i have install the LUP and trying to publish third party updates via WSUS.

Error:

 The package could not be published. Invalid Operation Exception: Failed to

sign package; error was: 2148081670 .

I try to  delete this certificate from WSUS store and now its missing the private key so how do recover? 

As



New WSUS Server not downloading some updates

$
0
0

I have just installed WSUS 3.0 SP 2 on a Windows 2008 R2 Data Center vm. Our old WSUS server was on a Windows 2003 vm platform and is now retired. I have been successful in synchronizing to Windows Update Services website but when it comes to downloading Windows Malicious Software tool (March, April, and May 2015) I have no luck. This is a clean install, meaning I didn't migrate the DB from the 2003 Server.

I have exhausted all the suggestion that have been posted in regard to this issue but none have worked. The error is a http 403 error saying  Client does not have access.

Tried to Import the rollup in WSUS and although it came back as successful the update still shows and not being download.

I should add that PC's have successfully received the latest updates that I approved; which includes the Windows Malicious Software tool. Except for this tool and the PC's are showing they still need this update.

Any suggestions?

 

WSUS Server itself does not update, error: 80244019

$
0
0

Hello,

we have set up a new WSUS Server 2012 R 2 in order to replace our old w2k3 WSUS. The WindowsUpdate information is pushed to cleints/server via GPO's. There is one GPO for all Domain Servers (WSUS is one of them). Everything works fine so far, beside WSUS it self. I mean the OS Server where WSUS Services runs on.

WSUS Servicees work fine, we download patches from Widnows update and they are deployed, reso. requested and downloaded by all clients from our WSUS than. But the WSUS server itself when it checks for updates,it gets notified about e.g. 70 updates to be applied. Once I say install updates it returns error code  80244019.

I have to say that the policy sets WUServer, WUStatusServer and a TargetGroup, and some other settings like reboot yes/no, etc..... Identical settings, same GPO) works for all other servers in the network.

Also, I have set WSUS port to 80 from 8530 or 8531, whatever it was.

telnet wsus.domain.intra 80 works from the localhost (WSUS)

Any idea why WSUS itself is special?

kind regards,

Dieter Tontsch

PS:
this is what I see in the Event Log, ID 1001

Fault bucket , type 0
Event Name: WindowsUpdateFailure2
Response: Not available
Cab Id: 0

Problem signature:
P1: 7.9.9600.17031
P2: 80244019
P3: 34CBB58A-0567-4183-80A2-4659766883DC
P4: Download
P5: 101
P6: Managed {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
P7: 0
P8: 
P9: 
P10: 

Attached files:

These files may be available here:
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\NonCritical_7.9.9600.17031_7184bfc5c320c0f8948b2b3ae24749b74782586_00000000_cab_0ec23fa4

Analysis symbol: 
Rechecking for solution: 0
Report Id: e4875146-159a-11e5-80be-00505685263b
Report Status: 4
Hashed bucket: 


2012 WSUS role - Clients not reporting despite logs on clients indicating success

$
0
0

I've got a fresh WSUS role deployed on a 2012 server, (so WSUS 6) I've got a GPO pointing my clients to a target group of computers and they're even pulling updates that are approved.
However even with all of that, WSUS still shows "This computer has not reported status yet"

Even more confusing, is if my Windows 7 Enterprise laptop pulls down the updates, WSUS says "Updates Installed / Not applicable - 28" for that machine, and yet STILL says This computer has not reported status yet. (See screenshot example at https://i.imgur.com/o3Nq2Sc.jpg)

I'm stumped. As far as I can see, windowsupdate.log shows no errors. The registry keys for all the computers all show that the update point is the WSUS server I pointed it to, and of course, they're able to pull updates (but not report back on them)
I've even asked out network team to monitor exactly what's happening between a client and a server, and not a single block is in place. These have free reign.
I'm completely stumped and I have no idea where else to go. Everything looks right from the client side, but the server just isn't reflecting it.
I've tried the standard wuauclt /resetauthorization /detectnow commands to no avail.

I've also tried deleting HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\SuSClientID and restarting the Windows update service but with no luck

I'll go pull the windowsupdate.log file from my laptop now to show you what's going on, but there's no errors that I can see. Any assistance appreciated

(If you want another oddity in this mix, every client, EXCEPT the Windows 8 client is reporting to the correct URL)

I've also confirmed that the simpleauth URL is responding correctly. http://wsusserver:8530/SimpleAuthWebService/SimpleAuth.asmx

Edit: Here's an excerpt of the WindowsUpdate.log (With company sensitive names redacted) from a Server 2008 R2 machine that shows what my laptop does, i.e. updates available for install, all the right URLs, no Errors and still shows "This computer has not reported status yet"

2015-06-17  20:14:03:822    9168    19c4    Misc    ===========  Logging initialized (build: 7.6.7600.320, tz: -0500)  ===========
2015-06-17  20:14:03:822    9168    19c4    Misc      = Process: c:\Program Files\Microsoft Security      Client\MpCmdRun.exe
2015-06-17  20:14:03:822    9168    19c4    Misc      = Module: C:\Windows\system32\wuapi.dll
2015-06-17  20:14:03:822    9168    19c4    COMAPI  -------------
2015-06-17  20:14:03:822    9168    19c4    COMAPI  -- START --  COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2015-06-17  20:14:03:822    9168    19c4    COMAPI  ---------
2015-06-17  20:14:03:822    9168    19c4    COMAPI  <<-- SUBMITTED -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2015-06-17  20:14:03:822    1004    1f5c    Agent   *************
2015-06-17  20:14:03:822    1004    1f5c    Agent   ** START **  Agent: Finding updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2015-06-17  20:14:03:822    1004    1f5c    Agent   *********
2015-06-17  20:14:03:822    1004    1f5c    Agent     * Online = Yes; Ignore download priority = No
2015-06-17  20:14:03:822    1004    1f5c    Agent     * Criteria = "(IsInstalled = 0 and IsHidden = 0 and CategoryIDs contains 'a38c835c-2950-4e87-86cc-6911a52c34a3' and CategoryIDs contains 'e0789628-ce08-4437-be74-2495b842f43b')"
2015-06-17  20:14:03:822    1004    1f5c    Agent     * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2015-06-17  20:14:03:822    1004    1f5c    Agent     * Search Scope = {Machine}
2015-06-17  20:14:03:932    1004    1f5c    PT  WARNING: Cached cookie has expired or new PID is available
2015-06-17  20:14:03:932    1004    1f5c    PT  Initializing simple targeting cookie, clientId = d5cae633-78ea-4f94-8eb7-df3f5b5b39fa, target group = Test-Dev, DNS name = testserver.contoso.com
2015-06-17  20:14:03:932    1004    1f5c    PT    Server URL = http://wsusserver:8530/SimpleAuthWebService/SimpleAuth.asmx
2015-06-17  20:14:04:010    1004    1f5c    PT  +++++++++++  PT: Starting category scan  +++++++++++
2015-06-17  20:14:04:010    1004    1f5c    PT    + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsusserver:8530/ClientWebService/client.asmx
2015-06-17  20:14:04:212    1004    1f5c    PT  +++++++++++  PT: Synchronizing server updates  +++++++++++
2015-06-17  20:14:04:212    1004    1f5c    PT    + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsusserver:8530/ClientWebService/client.asmx
2015-06-17  20:14:04:228    1004    1f5c    PT  WARNING: Cached cookie has expired or new PID is available
2015-06-17  20:14:04:228    1004    1f5c    PT  Initializing simple targeting cookie, clientId = d5cae633-78ea-4f94-8eb7-df3f5b5b39fa, target group = Test-Dev, DNS name = testserver.contoso.com
2015-06-17  20:14:04:228    1004    1f5c    PT    Server URL = http://wsusserver:8530/SimpleAuthWebService/SimpleAuth.asmx
2015-06-17  20:14:04:368    1004    1f5c    Agent     * Found 0 updates and 4 categories in search; evaluated appl. rules of 34 out of 89 deployed entities
2015-06-17  20:14:04:462    1004    1f5c    Agent   *********
2015-06-17  20:14:04:462    1004    1f5c    Agent   **  END  **  Agent: Finding updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2015-06-17  20:14:04:462    1004    1f5c    Agent   *************
2015-06-17  20:14:04:462    9168    203c    COMAPI  >>--  RESUMED  -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2015-06-17  20:14:04:462    9168    203c    COMAPI    - Updates found = 0
2015-06-17  20:14:04:462    9168    203c    COMAPI  ---------
2015-06-17  20:14:04:462    9168    203c    COMAPI  --  END  --  COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2015-06-17  20:14:04:462    9168    203c    COMAPI  -------------
2015-06-17  20:14:09:472    1004    1f5c    Report  REPORT EVENT: {17BBEE6C-9FC3-420E-9073-4A8315BE8217}    2015-06-17 20:14:04:462-0500    1   147 101 {00000000-0000-0000-0000-000000000000}  0   0   System Center Endpoint Protecti Success Software Synchronization    Windows Update Client successfully detected 0 updates.
2015-06-17  20:14:09:472    1004    1f5c    Report  CWERReporter finishing event handling. (00000000)

Second Edit - Here's an earlier log file for this machine which shows the Windows Update process rather than just SCEP

2015-06-17  11:29:27:918    1004    12c4    AU  #############
2015-06-17  11:29:27:918    1004    12c4    AU  ## START ##  AU: Search for updates
2015-06-17  11:29:27:918    1004    12c4    AU  #########
2015-06-17  11:29:27:918    1004    12c4    AU  <<## SUBMITTED ## AU: Search for updates [CallId = {10F1A1F9-C6DF-4CA2-878D-FAFDCAEC6352}]
2015-06-17  11:29:27:918    1004    1c74    Agent   *************
2015-06-17  11:29:27:918    1004    1c74    Agent   ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2015-06-17  11:29:27:918    1004    1c74    Agent   *********
2015-06-17  11:29:27:918    1004    1c74    Agent     * Online = Yes; Ignore download priority = No
2015-06-17  11:29:27:918    1004    1c74    Agent     * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2015-06-17  11:29:27:918    1004    1c74    Agent     * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2015-06-17  11:29:27:918    1004    1c74    Agent     * Search Scope = {Machine}
2015-06-17  11:29:27:933    1004    1c74    Setup   Checking for agent SelfUpdate
2015-06-17  11:29:27:933    1004    1c74    Setup   Client version: Core: 7.6.7600.320  Aux: 7.6.7600.320
2015-06-17  11:29:27:964    1004    1c74    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2015-06-17  11:29:27:980    1004    1c74    Misc     Microsoft signed: NA
2015-06-17  11:29:27:980    1004    1c74    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPA20D.tmp with dwProvFlags 0x00000080:
2015-06-17  11:29:28:011    1004    1c74    Misc     Microsoft signed: NA
2015-06-17  11:29:28:011    1004    1c74    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2015-06-17  11:29:28:011    1004    1c74    Misc     Microsoft signed: NA
2015-06-17  11:29:28:074    1004    1c74    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2015-06-17  11:29:28:074    1004    1c74    Misc     Microsoft signed: NA
2015-06-17  11:29:28:152    1004    1c74    Setup   Determining whether a new setup handler needs to be downloaded
2015-06-17  11:29:28:152    1004    1c74    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe with dwProvFlags 0x00000080:
2015-06-17  11:29:28:152    1004    1c74    Misc     Microsoft signed: NA
2015-06-17  11:29:28:152    1004    1c74    Setup   SelfUpdate handler update NOT required: Current version: 7.6.7600.320, required version: 7.6.7600.320
2015-06-17  11:29:28:152    1004    1c74    Setup   Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2015-06-17  11:29:28:932    1004    1c74    Setup   Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2015-06-17  11:29:28:932    1004    1c74    Setup   Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2015-06-17  11:29:28:947    1004    1c74    Setup   Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2015-06-17  11:29:28:947    1004    1c74    Setup   Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2015-06-17  11:29:28:994    1004    1c74    Setup   Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2015-06-17  11:29:28:994    1004    1c74    Setup   SelfUpdate check completed.  SelfUpdate is NOT required.
2015-06-17  11:29:31:570    1004    1c74    PT  +++++++++++  PT: Synchronizing server updates  +++++++++++
2015-06-17  11:29:31:570    1004    1c74    PT    + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsusserver:8530/ClientWebService/client.asmx
2015-06-17  11:29:31:586    1004    1c74    PT  WARNING: Cached cookie has expired or new PID is available
2015-06-17  11:29:31:586    1004    1c74    PT  Initializing simple targeting cookie, clientId = d5cae633-78ea-4f94-8eb7-df3f5b5b39fa, target group = Test-Dev, DNS name = testserver.contoso.com
2015-06-17  11:29:31:601    1004    1c74    PT    Server URL = http://wsusserver:8530/SimpleAuthWebService/SimpleAuth.asmx
2015-06-17  11:30:47:738    1004    1c74    PT  +++++++++++  PT: Synchronizing extended update info  +++++++++++
2015-06-17  11:30:47:738    1004    1c74    PT    + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsusserver:8530/ClientWebService/client.asmx
2015-06-17  11:30:55:336    1004    1c74    Agent     * Added update {B9D30936-8E3B-4728-988E-78CC39AEC684}.202 to search result
2015-06-17  11:30:55:336    1004    1c74    Agent     * Added update {6C8C0AC4-F40B-4E4B-AA83-1694FE0DBEC2}.201 to search result
2015-06-17  11:30:55:336    1004    1c74    Agent     * Added update {9A3A9B37-D93D-4982-93FB-A9271DBDFAC9}.203 to search result
2015-06-17  11:30:55:336    1004    1c74    Agent     * Added update {726B8D92-D183-4A25-9588-D45D0DC86E5F}.202 to search result
2015-06-17  11:30:55:336    1004    1c74    Agent     * Added update {6D155681-7172-4DD7-9341-46D42EC794F5}.202 to search result
2015-06-17  11:30:55:336    1004    1c74    Agent     * Added update {84BAF93F-3645-4EF2-887A-D1E5E883ADC7}.201 to search result
2015-06-17  11:30:55:336    1004    1c74    Agent     * Added update {922DE694-C7E6-42AC-8738-95F5A8E2390E}.201 to search result
2015-06-17  11:30:55:352    1004    1c74    Agent     * Found 7 updates and 75 categories in search; evaluated appl. rules of 6102 out of 8732 deployed entities
2015-06-17  11:30:55:352    1004    1c74    Agent   *********
2015-06-17  11:30:55:352    1004    1c74    Agent   **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2015-06-17  11:30:55:352    1004    1c74    Agent   *************
2015-06-17  11:30:55:461    1004    1f98    AU  >>##  RESUMED  ## AU: Search for updates [CallId = {10F1A1F9-C6DF-4CA2-878D-FAFDCAEC6352}]
2015-06-17  11:30:55:461    1004    1f98    AU    # 7 updates detected
2015-06-17  11:30:55:461    1004    1f98    AU  #########
2015-06-17  11:30:55:461    1004    1f98    AU  ##  END  ##  AU: Search for updates [CallId = {10F1A1F9-C6DF-4CA2-878D-FAFDCAEC6352}]
2015-06-17  11:30:55:461    1004    1f98    AU  #############
2015-06-17  11:30:55:461    1004    1f98    AU  Successfully wrote event for AU health state:0
2015-06-17  11:30:55:461    1004    1f98    AU  Featured notifications is disabled.
2015-06-17  11:30:55:461    1004    1f98    AU  AU setting next detection timeout to 2015-06-18 12:36:45
2015-06-17  11:30:55:461    1004    1f98    AU  Setting AU scheduled install time to 2015-06-21 08:00:00
2015-06-17  11:30:55:461    1004    1c74    Report  REPORT EVENT: {A1CE48DA-DF3C-422D-9208-0AAD4D46E652}    2015-06-17 11:30:55:352-0500    1   147 101 {00000000-0000-0000-0000-000000000000}  0   0   AutomaticUpdates    Success Software Synchronization    Windows Update Client successfully detected 7 updates.
2015-06-17  11:30:55:461    1004    1c74    Report  REPORT EVENT: {FEA8676C-D6FD-4A5F-B349-6B4DCC2CC9DD}    2015-06-17 11:30:55:352-0500    1   156 101 {00000000-0000-0000-0000-000000000000}  0   0   AutomaticUpdates    Success Pre-Deployment Check    Reporting client status.
2015-06-17  11:30:55:461    1004    1f98    AU  Successfully wrote event for AU health state:0
2015-06-17  11:30:55:461    1004    1c74    Report  CWERReporter finishing event handling. (00000000)
2015-06-17  11:30:55:477    1004    1f98    AU  Successfully wrote event for AU health state:0
2015-06-17  11:31:00:460    1004    1c74    Report  CWERReporter finishing event handling. (00000000)

Wsus role and feature addition on 2012 R2 fails to install logging this message:

$
0
0

Fatal Error: Cannot start service MSSQL$MICROSOFT##WID on computer '.'.

The specified account has not been given login as a service right.

Now, I'm assuming they create that goofy named account to run the instance of the internal db, but they have apparently forgot to add automation to set the right to logon as a service. This is a bug, I have the same results on two different server 2012 R2 installs. Is there a manual fix for this somewhere I can try? Very irritating.

WSUS clients do not find and download updates

$
0
0

Hi,I have about 150 WSUS clients, running Windows 7 Pro x64. About half of them have 20 or so updates pending, even though the updates are regularly approved and the clients are set to download/install every night at 11:00 p.m. The GPO looks to be right, remember the other half of WSUS clients are reporting no needed updates, so it is working for them. The WindowsUpdate.log file shows zero updates detected when I am certain there are some available.

This is what happens at 11

2015-05-12    23:00:10:145     808    7f4    AU    Forced install timer expired for AUInstallType = 4
2015-05-12    23:00:10:145     808    7f4    AU    UpdateDownloadProperties: 0 download(s) are still in progress.
2015-05-12    23:00:10:145     808    7f4    AU    Setting AU scheduled install time to 2015-05-14 03:00:00
2015-05-12    23:00:10:145     808    7f4    AU    Successfully wrote event for AU health state:0

Then is starts logging again at around 1:30 a.m. There is one error at the bottom of the log.

2015-05-13    10:19:38:117     796    16dc    AUClnt    WARNING: Shell_NotifyIcon failed (dwMessage=0x0, uFlags=0x7, hr=0x800703F0)
2015-05-13    10:19:38:117     796    16dc    AUClnt    WARNING: Shell_NotifyIcon failed (dwMessage=0x0, uFlags=0x7, hr=0x800703F0)
2015-05-13    10:19:38:117     796    16dc    AUClnt    WARNING: Shell_NotifyIcon failed (dwMessage=0x0, uFlags=0x7, hr=0x800703F0)
2015-05-13    10:19:38:117     796    16dc    AUClnt    WARNING: Shell_NotifyIcon failed (dwMessage=0x0, uFlags=0x7, hr=0x800703F0)
2015-05-13    10:19:38:120     808    7f4    AU    AU received handle event
2015-05-13    10:19:38:120     808    7f4    AU    AU setting pending client directive to 'Install Approval'

Not sure what that means. Does anyone have any idea. Many thanks in advance.


Jason

WSUS Console doesn't reflect update reports Clients have forwarded

$
0
0

I have a small AD Domain with less than 100 workstations, so the WSUS server is not stressed and should be processing reports from the clients fairly quickly.  Updates are managed via a GPO, Automatic Updates, Auto download, schedule install every Wens at 6pm, check with server frequency of 22 hours.

Clients are getting updated successfully, their update logs reflect reporting back to the server... however these updates are not reflected in the console. I had examples of updates being applied two weeks ago, that were still showing in the console as 'Needed'. The PC's are always powered on, no one logged on unless working hours.

From a WindowsUpdateLog:

2015-06-12 08:22:45:265 1164 1ad8 Report Uploading 3 events using cached cookie, reporting URL = http://xx.xx.xx.xx/ReportingWebService/ReportingWebService.asmx
2015-06-12 08:22:45:421 1164 1ad8 Report Reporter successfully uploaded 3 events.

I need some direction to help me diagnose this on the server side.  How can I check on the server side that reports from the client are getting processed, or how long it takes to get around to processing, etc.

Thanks, Rich


WSUS server is full with updates

$
0
0

Hi All,

My WSUS sever is full with updates and i try to delete the old updates which are not required or more than one month old updates, but No luck. attached the screen short for reference.

Server OS :- 2008 R2

WSUS Version :-  3.2.7600.226

Can any one help me to get a solution for this problem...Thanks

WSUS No Longer Downloading Updates

$
0
0

I deployed WSUS on Windows Server 2012 R2 since April last year and everything has been working well since then until some weeks ago when I noticed that approved updates were no longer being downloaded. The update files had accumulated to several gigabytes but the download status remained at approximately 34 MB for days.

I checked everything and no event log errors, Windows update works fine; Synchronization works fine as well on the WSUS server. I  have uninstalled and installed again twice. Removed the Windows Internal Database folder and content, changed the download location, etc and yet its not working.

Now, based on my lean approvals, I have just 42 files to download which just a over 300 MB in total, yet download status remains 0.00 MB.

Any suggestions please.


BPK


WSUS 3.0 SP2 will not run after installing update 2720211

$
0
0

http://support.microsoft.com/kb/2720211

The update was installed and server rebooted.  Now the WSUS console on Server 2008 SP2 will not run.  "Error: Connection Error.  An error occurred trying to connect to WSUS server."

The update service and IIS are both running.

When checking for updates from clients, they  show a message saying their update software needs to be upgraded, but they fail updating.

I was going to uninstall the update, but there is no option to uninstall the update from the WSUS server.

What are options to fix this?


WSUS - Specify intranet Microsoft update service location options

$
0
0

Hello

I have recently set up a replica wsus server (Windows Server 2012 R2) in one of our Branch offices and it has successfully synced our approvals and computer groups from our upstream server (also Windows Server 2012 R2). I have set it up so the replica wsus server does not store update files locally and that computers in the branch site will install updates from Microsoft update. I have started creating the group policy object that will affect the branch office clients but got confused with the two options in the Specify intranet Microsoft update service location setting:

Set the intranet update service for detecting updates: 
Set the intranet statistics server:   

Ideally I would like to set the the first option (Set the intranet update service for detecting updates:) to point to the Replica server in the Branch office so that Clients will know what approved updates to download (but to download from Microsoft Updates) and then set the second option (Set the intranet statistics server:) to our upstream wsus server.

Had a little research and seems other people have asked this same question and the answer always seems to be they both have to be set to the same WSUS server as it is a legacy issue and that the WSUS team have not done anything about it. Is this still the case in 2015 as it doesn't make sense to have an option if it doesn't work properly

Thanks for the help

Charlie



New WSUS Install

$
0
0

Hi,

I have recently had a go at setting up a WSUS server for the first time. I have now got the role installed, the GP is applied and I can see Computers and it has all synced up etc. Except it seems slow and does keep crashing and I have to 'Reset Server Node'. I followed the Technet install guide and throughout the wizard generally left all settings as their defaults.

At the moment WSUS has just crashed again as I am trying to move computers into a new group (get the red no entry icon) and has now come back to life again. The server isn't doing much, just running an SQL database for a software package at low utilisation. I have moved the update store to the local machine today, to try and eliminate that.

Do I need to configure anything else?

WSUS - Update Installation Failure 0x80246007

$
0
0

I am having an issue with a lot of our systems running Server 2008 and Windows XP (yeah I know).  Updates are set to install once a week through WSUS.  WSUS updates are downloaded locally to our WSUS server and then approved for installation on our endpoints.

Some of the machines are installing updates without issues, but over half of them are all getting the exact same error during the scheduled installation.  Here is an example

Windows XP:

Installation Failure: Windows failed to install the following update with error 0x80246007: Security Update for Windows XP (KB2813345).

Windows Server 2008:

Installation Failure: Windows failed to install the following update with error 0x80246007: Security Update for Windows Server 2008 (KB3033889).

I've done as much googling and research on this issue as I can and have tried all of the steps listed in the following articles.  These cover just about all of the suggestions that I've found on Google so far:

https://support.microsoft.com/en-us/kb/916251

http://www.gvrakas.com/microsoft/40-0x80246007-or-0x80248007-windows-update-errors

The only thing I haven't tried yet is running the WSUS Client Diagnostic Tool (which I will be running on Monday).  Sometimes, but not always, if we stop the Windows Update service, delete or rename the SoftwareDistribution folder, and start the Windows Update service back up the updates will successfully install but this doesn't always work and eventually the same error returns on all machines.

Has anyone experienced this behavior or have any ideas?  For what it's worth, all of these machines are connecting back to our WSUS server via DMVPN over DSL lines.  This same issue has not occurred on servers or end user workstations that are either located in our datacenter or have a fast connection to the datacenter.

Thanks for your input.

Edit: I also want to add that once this starts happening ALL updates fail to install, not just specific ones.


KB3050265 prereqs

$
0
0
Hi all, I noticed this update says its incompatible with WSUS servers without the hardening update - KB2938066. This hardening update is for 2012 servers and for WSUS 3.0 SP2 on all applicable platforms. Our WSUS server is 2008 R2 and it has downloaded this hardening update, but its for the 2012 servers. My question is, do I just need to download the hardening update and manually install it on our WSUS server? Im just looking to approve 3050265 for all clients (Win7, Server2008/12), but want to make sure nothing breaks. Thanks.

sizing calculator for WUSU windows 2012

$
0
0
I have Processor Intel Core   -I3-3220 and hard disk is 320 gb Ram 2 gb, kindly guide me about how much Memory required
for windows server 2012 standard server

Windows Update Services Issue - The server synchronization web services is not working

$
0
0
I am running WSUS on Windows Server 2008 R2.  All clients are connecting to the WSUS service successfully.  I notes yesterday that I am repeatedly getting this error "The server synchronization web services is not working"  As far as I can tell, everything else is working satisfactorily However, I cannot seem to clear this error condition.  Pls Help.
wjryan

Windows Server 2012 R2 WSUS error 7032

$
0
0

I have a new windows essentials 2012 R2 server with the WSUS role installed.   Nothing else but core base installation that is required has been installed.  The WSUS installed, syncronized and said it has some 70000 unapproved .  I click to apprve all and it gets a connection error after several minutes.

It was installed on a 8GB ram, quad core server. 500GB drive.  Several rounds of Windows updates have been done to the r2 server and I still get his error.

What do I need to do?

Paul Marchese, paul@mcpinc.com

Create a DVD containing all the updates of the OS and the Microsoft products

$
0
0

Hi

I havethe need tocreateaDVDcontainingall the updatesof anyoperating systemandMicrosoft product soI canalso upgradethe offline computers.So,how can IcreatethisDVD?

Thanks

Bye


Balubeto

wsus clients have a problem with download from offline wsus server

$
0
0

Hello guys.

I have run an online wsus server in the network that has internet access, and try run and configure an offline wsus server in a network that has not internet access. I try to copy WSUS Content from online wsus (that has internet access) to removable disk, and stop windows update service, then run wsusutil.exe export packagename.xml.gz packagename.log in cmd with administrator authentication. Then paste WSUS Content in the wsus directory on offline wsus server, then stop windows update service and run wsusutil.exe import packeagename.xml.gz packegename.log

This process complete successfully. Then I start windows update and approve new updates that detected and listed in wsus console on my candidate group. but i recive this error on my candidate clients:

*************
2015-06-2018:09:48:909924176cAgent** START **  Agent: Finding updates [CallerId = Windows Update Command Line  Id = 11]
2015-06-2018:09:48:909924176cAgent*********
2015-06-2018:09:48:909924176cAgent * Online = Yes; Ignore download priority = No
2015-06-2018:09:48:909924176cAgent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2015-06-2018:09:48:909924176cAgent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2015-06-2018:09:48:909924176cAgent * Search Scope = {Machine & All Users}
2015-06-2018:09:48:909924176cAgent * Caller SID for Applicability: S-1-5-18
2015-06-2018:09:48:909924176cEPGot WSUS Client/Server URL: "http://SRV-118:8530/ClientWebService/client.asmx"
2015-06-2018:09:49:143924176cPT+++++++++++  PT: Synchronizing server updates  +++++++++++
2015-06-2018:09:49:143924176cPT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://SRV-118:8530/ClientWebService/client.asmx
2015-06-2018:09:49:143924176cPTWARNING: Cached cookie has expired or new PID is available
2015-06-2018:09:49:143924176cEPGot WSUS SimpleTargeting URL: "http://SRV-118:8530"
2015-06-2018:09:49:143924176cPTInitializing simple targeting cookie, clientId = 51806040-3004-45bf-a239-0ad8c95919a2, target group = ghadir, DNS name = m1-358gh.niordc.org
2015-06-2018:09:49:143924176cPT Server URL = http://SRV-118:8530/SimpleAuthWebService/SimpleAuth.asmx
2015-06-2018:09:49:143924176cWSWARNING: Nws Failure: errorCode=0x803d0000
2015-06-2018:09:49:143924176cWSWARNING: There was an error communicating with the endpoint at 'http://SRV-118:8530/SimpleAuthWebService/SimpleAuth.asmx'.
2015-06-2018:09:49:143924176cWSWARNING: The server returned HTTP status code '400 (0x190)' with text 'Bad Request'.
2015-06-2018:09:49:143924176cWSWARNING: The HTTP request was incorrectly formed.
2015-06-2018:09:49:143924176cWSWARNING: MapToSusHResult mapped Nws error 0x803d0000 to 0x80240439
2015-06-2018:09:49:143924176cWSWARNING: Web service call failed with hr = 80240439.
2015-06-2018:09:49:143924176cWSWARNING: Current service auth scheme='None'.
2015-06-2018:09:49:143924176cWSWARNING: Proxy List used: '(null)', Bypass List used: '(null)', Last Proxy used: '(null)', Last auth Schemes used: 'None'.
2015-06-2018:09:49:143924176cWSFATAL: OnCallFailure(hrCall, m_error) failed with hr=0x80240439
2015-06-2018:09:49:143924176cWSFATAL: NwsCallWithProxyRetry<Functor>( Functor(_clientId, _targetGroupName, _dnsName, &_result)) failed with hr=0x80240439
2015-06-2018:09:49:159924176cPTWARNING: Failed to initialize Simple Targeting Cookie: 0x80240439
2015-06-2018:09:49:159924176cPTWARNING: PopulateAuthCookies failed: 0x80240439
2015-06-2018:09:49:159924176cPTWARNING: RefreshCookie failed: 0x80240439
2015-06-2018:09:49:159924176cPTWARNING: RefreshPTState failed: 0x80240439
2015-06-2018:09:49:159924176cPT + SyncUpdates round trips: 0
2015-06-2018:09:49:159924176cPTWARNING: Sync of Updates: 0x80240439
2015-06-2018:09:49:159924176cPTWARNING: SyncServerUpdatesInternal failed: 0x80240439
2015-06-2018:09:49:159924176cAgent * WARNING: Failed to synchronize, error = 0x80240439
2015-06-2018:09:49:159924176cAgent * WARNING: Exit code = 0x80240439
2015-06-2018:09:49:159924176cAgent*********
2015-06-2018:09:49:159924176cAgent**  END  **  Agent: Finding updates [CallerId = Windows Update Command Line  Id = 11]
2015-06-2018:09:49:159924176cAgent*************
2015-06-2018:09:49:159924176cAgentWARNING: WU client failed Searching for update with error 0x80240439
2015-06-2018:09:49:159924176cIdleTmrWU operation (CSearchCall::Init ID 11, operation # 97) stopped; does use network; is not at background priority
2015-06-2018:09:49:159924176cIdleTmrDecremented PDC RefCount for Network to 0
2015-06-2018:09:49:159924176cIdleTmrDecremented idle timer priority operation counter to 0
2015-06-2018:09:49:15992411b4AU>>##  RESUMED  ## AU: Search for updates [CallId = {1285D867-786A-4700-BC7D-B81CE74B79F9} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2015-06-2018:09:49:15992411b4AU # WARNING: Search callback failed, result = 0x80240439
2015-06-2018:09:49:15992411b4AU#########
2015-06-2018:09:49:15992411b4AU##  END  ##  AU: Search for updates  [CallId = {1285D867-786A-4700-BC7D-B81CE74B79F9} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2015-06-2018:09:49:15992411b4AU#############
2015-06-2018:09:49:15992411b4AUAll AU searches complete.
2015-06-2018:09:49:15992411b4AU # WARNING: Failed to find updates with error code 80240439
2015-06-2018:09:49:15992411b4AUAU setting next detection timeout to 2015-06-20 16:26:45

Additionally in wsus console I see this comment for each update: the files for this update have not been yet download. But in the file information I can see and scroll the path of some files...

Could you please help me...?

Viewing all 12874 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>