Quantcast
Channel: WSUS forum
Viewing all 12874 articles
Browse latest View live

Urgent - need to delete WSUS content partition

$
0
0

Hi,

I have a situation...

I need remove WSUS content partition (complete D: in my case).

The question:

can I recreate content partition without reinstalling WSUS.

Finally, I can really remove it and reinstall WSUS. It is one of the replica servers. So no impact whatsoever...

Just want to know...

Thanks.


--- When you hit a wrong note its the next note that makes it good or bad. --- Miles Davis


WSUS Breaks after KB3159706, released 5/5/2016

$
0
0

Hey all, just installed KB3159706 on my WS 2012 R2 WSUS Server at 2PM on 5/5/2016.  This was supposed to fix/issues when KB3148812 was released a few weeks ago.  Don't install KB3159706, it breaks WSUS.

C'mon Microsoft, get your stuff together.  I'm tired of this amateur hour BS.



I cannot publish third-party updates to WSUS after I have reached the 100-category limit (KB945536)

$
0
0
I'm trying to publish updates for all the third party products that exist in our environment.  However, I'm unable to do so because of a 100 category limit.  It appears this limit has been in place since 2007, and is still in effect.  Why?  What does it take to disable this limit?  I have far more than 100 categories.

WSUS Model and Parameter Input

$
0
0

Server Platform:

Windows Server 2012R6 64-bit

XenServer 6.5 VM

2 Xen e5540@2.53 Ghz w/ 4096 RAM and 240 GB of storage

WSUS Version:

Version 6.3.9600.16384

Background and Parameters:

I work for a non-profit health care company.  We have approximately 2200 employees, the majority of which work from Wyse Windows 7 boxes that are locked down via group policy and only work through a Citrix (primarily XenDesktop 7.6 environment).  We have about 450 Windows 7 laptops that do work locally (as they chart from the field using our Home Health solution).  These two groups will be referred to as our client computers.  We do have servers (almost exclusively VM’s), however WSUS patching is implemented and working for them.  This post concerns a redesign (from the ground up) of our client side WSUS patching.

Outline:

Below is a screen shot of the future WSUS I plan on setting up for our client workstations and laptops.  I will go over and outline a few aspects.  The purpose of this is just to see if I’m fundamentally right about the structure of how and whether this WSUS system would work.  I plan on using Group Policy to implement this but specific questions about GPO etc. are not really in the scope of this post.  I would just like to make sure I am proceeding on solid footing before I proceed with installation and the establishment of this.  I forgot to mention, patching has not been done on these computers since March of 2016 (it was sporadic before that) so I will be looking at security patches only at first.

Goals/Specifics:

This design would utilize replica downstream WSUS servers for our 4 remote branches.  The advantages/goals of this would be:

  1.        Network Speed Congestion: The downstream servers would be built on the same XenServer as the branches domain controller resulting in faster downloads.  In this model, the updates would be downloaded to the main (upstream?) WSUS server then distributed to the downstream servers.  The updates would be then served to each workstation by their local WSUS server.

Question: Is this a correct understanding of how this system functions?

 

  1.        Unlike our workstations, our laptops do not connect to our internal network reliably.  Many times they are connected to home or hospital internet access.  They can connect via VPN or when in a branch but the idea of allowing them to download updates directly from M.S. over their non-network internet connections would be advantageous to our company.

Question: Am I correct in understanding that a WSUS server can be configured so that its clients are directed as to what updates to download (e.g. approval/disapproval).  However when the updates are downloaded, the clients download them directly from M.S. and not from the WSUS server.

 

Question:  Will the configuration in the diagram work?  That is, one of our downstream replica servers is configured to download updates from M.S. directly while the others are served by their internaldownstream servers.  Can a downstream server be set to direct its clients to download from M.S. directly while other downstream servers are not?

Thank you very much for any direction and assistance.  I have been researching and I feel that I have an understanding of the basic structure, but would feel more confident with the thoughts of more experienced system administrators.  Thanks again.

Scott Grant

System Administrator I

Advanced Home Care LLC

Windows 10 computers showing on WSUS Server 2012 R2 as Windows Vista

$
0
0
Will there be a windows update for WSUS to fixit Windows 10 computers showing as Windows Vista?

WSUS clients in Azure not auto install/reboot at GPO configured time

$
0
0

Hi all,

We have WSUS deployed on prem and extended via VPN to our Azure VMs.  Connectivity is perfect, updates are being downloaded by both on prem and Azure VMs, everything is checking in regularly.

The on prem servers and Azure VMs have the same GPO settings applied.

e.g.

Windows Components/Windows Update
Policy	Setting	Comment
Always automatically restart at the scheduled time	Enabled
The restart timer will give users
this much time to save their
work (minutes): 	15
Policy	Setting	Comment
Automatic Updates detection frequency	Enabled
Check for updates at the following
interval (hours): 	6
Policy	Setting	Comment
Configure Automatic Updates	Enabled
Configure automatic updating:	4 - Auto download and schedule the install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenance	Disabled
Scheduled install day: 	1 - Every Tuesday
Scheduled install time:	04:00
Policy	Setting	Comment
Do not connect to any Windows Update Internet locations	Enabled
Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box	Enabled
Enable client-side targeting	Enabled
Target group name for this computer	Dev
Policy	Setting	Comment
No auto-restart with logged on users for scheduled automatic updates installations	Disabled
Specify intranet Microsoft update service location	Enabled
Set the intranet update service for detecting updates:	http://ourWSUSserver.domain.int:8530
Set the intranet statistics server:	http://ourWSUSserver.domain.int:8530
(example: http://IntranetUpd01)
Policy	Setting	Comment
Turn off the upgrade to the latest version of Windows through Windows Update	Enabled	

The on prem servers are automatically installing and rebooting on their configured day and time when updates are approved.

The Azure VMs are not.  There's nothing in the WindowsUpdate.log regarding failures to install or reboot  nor any errors entries for the WindowsUpdateClient source in the System log. 

There are informational  logs in System before the appointing install/reboot time that show the WU client has patches downloaded and ready to install:

Log Name:      System
Source:        Microsoft-Windows-WindowsUpdateClient
Date:          7/18/2016 6:29:52 PM
Event ID:      17
Task Category: Automatic Updates
Level:         Information
Keywords:      Success,Download
User:          SYSTEM
Computer:      ServerName.domain.int
Description:
Installation Ready: The following updates are downloaded and ready for installation:
- Security Update for Microsoft .NET Framework 4.5.2 on Windows 8.1 and Windows Server 2012 R2 for x64 (KB3163291)
- Security Update for Microsoft .NET Framework 3.5 on Windows 8.1 and Windows Server 2012 R2 for x64 (KB3163247)
- Security Update for Windows Server 2012 R2 (KB3170455)
- Definition Update for Microsoft Endpoint Protection - KB2461484 (Definition 1.225.1834.0)
- Security Update for Windows Server 2012 R2 (KB3172727)
- Security Update for Windows Server 2012 R2 (KB3168965)
- Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 (KB3170106)
- Security Update for Windows Server 2012 R2 (KB3170377)
- Security Update for Windows Server 2012 R2 (KB3169704)


The only difference between our on prem devices and Azure VMs is that in WSUS we have definition updates for System Center Endpoint Protection configured to automatically approve for install.  I see these being successfully installed:

Log Name:      System
Source:        Microsoft-Windows-WindowsUpdateClient
Date:          7/18/2016 6:29:57 PM
Event ID:      43
Task Category: Windows Update Agent
Level:         Information
Keywords:      Started,Installation
User:          SYSTEM
Computer:      Servername.domain.int
Description:
Installation Started: Windows has started installing the following update: Definition Update for Microsoft Endpoint Protection - KB2461484 (Definition 1.225.1834.0)

Log Name:      System
Source:        Microsoft-Windows-WindowsUpdateClient
Date:          7/18/2016 6:31:05 PM
Event ID:      19
Task Category: Windows Update Agent
Level:         Information
Keywords:      Success,Installation
User:          SYSTEM
Computer:      Servername.domain.int
Description:
Installation Successful: Windows successfully installed the following update: Definition Update for Microsoft Endpoint Protection - KB2461484 (Definition 1.225.1834.0)

Is having these updates being automatically approved and installed "confusing" the WU client so that it doesn't install the rest of the updates at its configured install day/time?

I know there is a GPO setting for "Allow Automatic Updates immediate installation" which I currently have an undefined.  Does this need to be enabled to allow the SCEP updates to install as they're approved while the remaining updates will install/reboot at the configured day/time?

Any other ideas on what to check?

Windows Server 2012R2 CORE not reporting to wsus server , domain GPO to other servers fully working.

$
0
0

Hello,

I have a GPO set for a group of clusters and its fully working, no problems..

I have 1 Windows Server 2012R2 CORE that is not reporting so i did a wsus.bat reset:

@echo off 

cls 

REM ================================================================================== 
REM DESCRIPTION    : This script resets all of Windows Update Agent settings. 
REM AUTHOR         : Luca Fabbri 
REM VERSION HISTORY: 2.0 - Start 
REM ================================================================================== 

@echo 1. Stopping Windows Update, BITS, Application Identity, Cryptographic Services and SMS Host Agent services... 
net stop wuauserv 
net stop bits 
net stop appidsvc 
net stop cryptsvc 
net stop ccmexec 

@echo 2. Checking if services were stopped successfully... 
sc query wuauserv | findstr /I /C:"STOPPED" 
if %errorlevel% NEQ 0 goto END 

sc query bits | findstr /I /C:"STOPPED" 
if %errorlevel% NEQ 0 goto END 

sc query appidsvc | findstr /I /C:"STOPPED" 
if %errorlevel% NEQ 0 sc query appidsvc | findstr /I /C:"OpenService FAILED 1060" 
if %errorlevel% NEQ 0 goto END 

sc query cryptsvc | findstr /I /C:"STOPPED" 
if %errorlevel% NEQ 0 goto END 

sc query ccmexec | findstr /I /C:"STOPPED" 
if %errorlevel% NEQ 0 sc query ccmexec | findstr /I /C:"OpenService FAILED 1060" 
if %errorlevel% NEQ 0 goto END 

@echo 3. Deleting AU cache folder and log file...  
del /f /q "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat" 
del /f /s /q %SystemRoot%\SoftwareDistribution\*.*  
del /f /s /q %SystemRoot%\system32\catroot2\*.* 
del /f /q %SystemRoot%\WindowsUpdate.log  

REM @echo 3. Renaming AU cache folder and log file... 
REM del /f /q "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat" 
REM ren %SystemRoot%\SoftwareDistribution *.bak 
REM ren %SystemRoot%\system32\catroot2 *.bak 
REM ren %SystemRoot%\WindowsUpdate.log *.bak 

REM sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) 
REM sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) 

@echo 4. Re-registering DLL files... 
cd /d %WinDir%\system32 
regsvr32.exe /s atl.dll 
regsvr32.exe /s urlmon.dll 
regsvr32.exe /s mshtml.dll 
regsvr32.exe /s shdocvw.dll 
regsvr32.exe /s browseui.dll 
regsvr32.exe /s jscript.dll 
regsvr32.exe /s vbscript.dll 
regsvr32.exe /s scrrun.dll 
regsvr32.exe /s msxml.dll 
regsvr32.exe /s msxml3.dll 
regsvr32.exe /s msxml6.dll 
regsvr32.exe /s actxprxy.dll 
regsvr32.exe /s softpub.dll 
regsvr32.exe /s wintrust.dll 
regsvr32.exe /s dssenh.dll 
regsvr32.exe /s rsaenh.dll 
regsvr32.exe /s gpkcsp.dll 
regsvr32.exe /s sccbase.dll 
regsvr32.exe /s slbcsp.dll 
regsvr32.exe /s cryptdlg.dll 
regsvr32.exe /s oleaut32.dll 
regsvr32.exe /s ole32.dll 
regsvr32.exe /s shell32.dll 
regsvr32.exe /s initpki.dll 
regsvr32.exe /s wuapi.dll 
regsvr32.exe /s wuaueng.dll 
regsvr32.exe /s wuaueng1.dll 
regsvr32.exe /s wucltui.dll 
regsvr32.exe /s wups.dll 
regsvr32.exe /s wups2.dll 
regsvr32.exe /s wuweb.dll 
regsvr32.exe /s qmgr.dll 
regsvr32.exe /s qmgrprxy.dll 
regsvr32.exe /s wucltux.dll 
regsvr32.exe /s muweb.dll 
regsvr32.exe /s wuwebv.dll 

@echo 5. Removing WSUS Client Id... 
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v AccountDomainSid /f 
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v PingID /f 
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v SusClientId /f 

@echo 6. Resetting Winsock and WinHTTP Proxy... 
netsh winsock reset 
proxycfg.exe -d 
netsh winhttp reset proxy 

@echo 7. Starting SMS Host Agent, Cryptographic Services, Application Identity, BITS, Windows Update services... 
net start ccmexec 
net start cryptsvc 
net start appidsvc 
net start bits 
net start wuauserv 

@echo 8. Deleting all BITS jobs... 
bitsadmin.exe /reset /allusers 

@echo 9. Forcing AU discovery... 
wuauclt /resetauthorization /detectnow 

:END 

But that didn't help, now the client is not coming back into the WSUS console.

I tried my manuel windowsupdate script , but that is failing either. So something must be very wrong..

I already used the gpresult and its getting the correct GPO.

No proxy is used , its a core ..

The weird i'm having is that the windows update agent cannot be stopped manuel.. You need to stop-process pid..

no SCCM is used! Wsus server 2012r2 > server2012r2 core.

Here is the windowsupdate.log : http://pastebin.com/JxK4M2Z2


The server is not coming in Unassigned computers, neither in the right group anymore. It used to do that before..

WSUS, Windows 10 and BITS

$
0
0

Hi! I hope someone can throw me idea about my problem, so...

We have server 2012 R2 with WSUS - version 6.3.9600.17477. 

Clients windows 10 Pro. 

SCCM 2012 R2 - bits is not configured in default client policy.

GPO configured and policy applied successfully. Registry on clients says:

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\BITS]
"EnableBitsMaxBandwidth"=dword:00000001
"MaxBandwidthValidFrom"=dword:00000004
"MaxBandwidthValidTo"=dword:00000017
"MaxTransferRateOnSchedule"=dword:00000019
"MaxTransferRateOffSchedule"=dword:00000019
"EnablePeercaching"=dword:00000000

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\BITS\Throttling]
"EnableBandwidthLimits"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\BITS\Throttling\NonWorkSchedule]
"HighBandwidthLimit"=dword:00000019
"HighBandwidthType"=dword:00000001
"NormalBandwidthLimit"=dword:00000019
"NormalBandwidthType"=dword:00000001
"LowBandwidthLimit"=dword:00000019
"LowBandwidthType"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\BITS\Throttling\WorkSchedule]
"StartDay"=dword:00000001
"EndDay"=dword:00000000
"StartHour"=dword:00000004
"EndHour"=dword:00000017
"HighBandwidthLimit"=dword:00000019
"HighBandwidthType"=dword:00000001
"NormalBandwidthLimit"=dword:00000019
"NormalBandwidthType"=dword:00000001
"LowBandwidthLimit"=dword:00000019
"LowBandwidthType"=dword:00000001

Problem Updates are not throttling and go in full speed. It's not on all clients, but quite lots of them. WSUS not running in foreground mode. 

I something misconfigured? 

Thanks,

Ronald


WSUS Error (reset node)

$
0
0

I'm running WSUS 3.0 SP1. 

When I click on a particular target group or include a particular target group in any report I get an error.  This only happens on one group I have about 90 other groups that work fine.  And the workstations in the problem group seem to be getting updates ok.  When I click on the group I get the Reset Node Error text of error is below.  When I include the problem group in a report I get "Error Generating Report".  Appreciate any ideas.  I did try deleting the wsus file in %appdata%\Microsoft\MMC\.


-----
The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists,

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists,

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


System.ArgumentOutOfRangeException -- Version's parameters must be greater than or equal to zero.
Parameter name: version

Source
mscorlib

Stack Trace:
   at System.Version..ctor(String version)
   at Microsoft.UpdateServices.Internal.BaseApi.ComputerTarget..ctor(UpdateServer updateServer, GenericReadableRow row)
** this exception was nested inside of the following exception **


Microsoft.UpdateServices.Administration.WsusInvalidDataException -- Version's parameters must be greater than or equal to zero.
Parameter name: version

Source
Microsoft.UpdateServices.BaseApi

Stack Trace:
   at Microsoft.UpdateServices.Internal.BaseApi.ComputerTarget..ctor(UpdateServer updateServer, GenericReadableRow row)
   at Microsoft.UpdateServices.Internal.BaseApi.ComputerTarget.BuildComputerTargetCollection(GenericReadableRow[][] results, UpdateServer updateServer)
   at Microsoft.UpdateServices.Internal.BaseApi.ComputerTargetGroup.GetComputerTargets(Boolean includeSubgroups)
   at Microsoft.UpdateServices.UI.AdminApiAccess.WsusComputerTargetGroup.GetComputerTargets(Boolean includeSubgroups)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ComputersListScopeNode.RemoveComputerTargetGroup()

Windows 2012 servers in wsus version 3

$
0
0

Hello

We are using WSUS version 3.2.7600 on a Windows 2003 R2 Enterprise Edition server. We have been deploying Windows 2003 and Windows 2008 updates from this server for the past number of years but now want to push out Windows 2012 updates. The Windows 2012 updates are being downloaded into WSUS from the Microsoft Update server but our Windows 2012 servers are not showing up in the WSUS console.  The same AD group policy for WSUS is applying to all 2003, 2008 and 2012 servers so I don't know why the 2012 servers aren't showing up in WSUS. Any assistance greatly appreciated.

<v:shapetype coordsize="21600,21600" filled="f" id="_x0000_t75" o:preferrelative="t" o:spt="75" path="m@4@5l@4@11@9@11@9@5xe" stroked="f">
 <v:stroke joinstyle="miter">
<v:formulas>  <v:f eqn="if lineDrawn pixelLineWidth 0">
  <v:f eqn="sum @0 1 0">
  <v:f eqn="sum 0 0 @1">
  <v:f eqn="prod @2 1 2">
  <v:f eqn="prod @3 21600 pixelWidth">
  <v:f eqn="prod @3 21600 pixelHeight">
  <v:f eqn="sum @0 0 1">
  <v:f eqn="prod @6 1 2">
  <v:f eqn="prod @7 21600 pixelWidth">
  <v:f eqn="sum @8 21600 0">
  <v:f eqn="prod @7 21600 pixelHeight">
  <v:f eqn="sum @10 21600 0">
 </v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:formulas>
 <v:path gradientshapeok="t" o:connecttype="rect" o:extrusionok="f">
 <o:lock aspectratio="t" v:ext="edit">
</o:lock></v:path></v:stroke></v:shapetype><v:shape id="_x0000_i1025" style="width:468pt;height:396pt;" type="#_x0000_t75">
<v:imagedata o:title="" src="file:///C:\Users\dowens\AppData\Local\Temp\msohtmlclip1\02\clip_image001.png">
</v:imagedata></v:shape>

<v:shapetype coordsize="21600,21600" filled="f" id="_x0000_t75" o:preferrelative="t" o:spt="75" path="m@4@5l@4@11@9@11@9@5xe" stroked="f">
 <v:shapetype coordsize="21600,21600" filled="f" id="_x0000_t75" o:preferrelative="t" o:spt="75" path="m@4@5l@4@11@9@11@9@5xe" stroked="f">
 <v:stroke joinstyle="miter">
<v:formulas>  <v:f eqn="if lineDrawn pixelLineWidth 0">
  <v:f eqn="sum @0 1 0">
  <v:f eqn="sum 0 0 @1">
  <v:f eqn="prod @2 1 2">
  <v:f eqn="prod @3 21600 pixelWidth">
  <v:f eqn="prod @3 21600 pixelHeight">
  <v:f eqn="sum @0 0 1">
  <v:f eqn="prod @6 1 2">
  <v:f eqn="prod @7 21600 pixelWidth">
  <v:f eqn="sum @8 21600 0">
  <v:f eqn="prod @7 21600 pixelHeight">
  <v:f eqn="sum @10 21600 0">
 </v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:formulas>
 <v:path gradientshapeok="t" o:connecttype="rect" o:extrusionok="f">
 <o:lock aspectratio="t" v:ext="edit">
</o:lock></v:path></v:stroke></v:shapetype><v:shape id="_x0000_i1025" style="width:468pt;height:396pt;" type="#_x0000_t75">
<v:imagedata o:title="" src="file:///C:\Users\dowens\AppData\Local\Temp\msohtmlclip1\02\clip_image001.png">
</v:imagedata></v:shape>
<v:stroke joinstyle="miter">
<v:formulas>  <v:f eqn="if lineDrawn pixelLineWidth 0">
  <v:f eqn="sum @0 1 0">
  <v:f eqn="sum 0 0 @1">
  <v:f eqn="prod @2 1 2">
  <v:f eqn="prod @3 21600 pixelWidth">
  <v:f eqn="prod @3 21600 pixelHeight">
  <v:f eqn="sum @0 0 1">
  <v:f eqn="prod @6 1 2">
  <v:f eqn="prod @7 21600 pixelWidth">
  <v:f eqn="sum @8 21600 0">
  <v:f eqn="prod @7 21600 pixelHeight">
  <v:f eqn="sum @10 21600 0">
 </v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:f></v:formulas>
 <v:path gradientshapeok="t" o:connecttype="rect" o:extrusionok="f">
 <o:lock aspectratio="t" v:ext="edit">
</o:lock></v:path></v:stroke></v:shapetype><v:shape id="_x0000_i1025" style="width:468pt;height:396pt;" type="#_x0000_t75">
<v:imagedata o:title="" src="file:///C:\Users\dowens\AppData\Local\Temp\msohtmlclip1\02\clip_image001.png">
</v:imagedata></v:shape>

The WSUS administration console was unable to connect to the WSUS Server via the remote API.

$
0
0

Hi,

I've already solved this problem but I'd like to share this with the rest of the forum visitors since I haven't found a neat solution for this problem here yet. Most of the solutions were: reinstall wsus, remove this or that etc. But before you do that, first try my solution. It's only 2minutes work and reversible.

My server config:

Windows 2008 R2 64x (Virtual Machine)
WSUS 3.0 SP2
IIS 7
ASP .NET 4.0

The error that showed up (i've cut the details out so it won't be too much text):

The WSUS administration console was unable to connect to the WSUS Server via the remote API.

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

The WSUS administration console was unable to connect to the WSUS Server via the remote API.

In the EventLog (application) you'll probably also have these errors:

Source: IIS-W3SVC-WP
Event ID: 2274

General:
ISAPI Filter 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_filter.dll' could not be loaded due to a configuration problem. The current configuration only supports loading images built for a AMD64 processor architecture. The data field contains the error number. To learn more about this issue, including how to troubleshooting this kind of processor architecture mismatch error, see http://go.microsoft.com/fwlink/?LinkId=29349.

The problem here is that the used ISAPI filters are 32-bit while the Operating System is 64-bits.

To solve this:

Open your IIS 7 management console. Go to: <SERVERNAME> -> Sites -> WSUS Administration. Double click on "ISAPI Filters". Then open (double click or click edit on the right) the 3rd line that says: "ASP.NET_4.0.30319.0 C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_filter.dll"

Change this line into: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_filter.dll

After that, restart the WSUS Administration website and open the WSUS 3.0 management console again to check if the problem is solved. In my case this was the trick I had to do.

I'm very glad I didnt have to reinstall WSUS 3.0 again, since this saves me lots of time.

I hope to have helped more people with the same problem by posting this.

Kind regards,

Dennis de Vries

WUA: Get "Original error code" if Windows Update Search API "BeginSearch" fails.

$
0
0
Hi Guys,

I have one test app to scan Microsoft updates on Windows OS. Scan process at client side being done using WSUS as update service URL.
Sometime scan process is getting failed with err code like 0x8024401C [the server timed out waiting for the request], 0x80240438 etc. , these failure are due to timeout.

When I verify Win8 specific WindowsUpdate.log, there are errors like: "Result code = 0x8024401C" & "Original error code: 0x80072ee2"[also specific to timeout: INTERNET_TIMEOUT].
below is the snippet of WUA log file:
+++++++++++  PT: Synchronizing server updates  +++++++++++
14:09:26:577784e30PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = https://IP:port/ClientWebService/client.asmx
14:10:36:352784e30WSWARNING: Nws Failure: errorCode=0x803d0006
14:10:36:352784e30WSWARNING: Original error code: 0x80072ee2
14:10:36:352784e30WSWARNING: There was an error communicating with the endpoint at 'https://IP:port/ClientWebService/client.asmx'.
14:10:36:352784e30WSWARNING: There was an error receiving the HTTP reply.
14:10:36:352784e30WSWARNING: The operation did not complete within the time allotted.
14:10:36:352784e30WSWARNING: The operation timed out
14:10:36:352784e30WSWARNING: Web service call failed with hr = 8024401c.
14:10:36:352784e30WSWARNING: Current service auth scheme='None'.
14:10:36:352784e30WSWARNING: Proxy List used: '(null)', Bypass List used: '(null)', Last Proxy used: '(null)', Last auth Schemes used: 'None'.
14:10:36:352784e30WSFATAL: OnCallFailure(hrCall, m_error) failed with hr=0x8024401c
14:10:36:352784e30PTWARNING: PTError: 0x8024401c
14:10:36:352784e30PTWARNING: SyncUpdates_WithRecovery failed.: 0x8024401c
14:10:36:352784e30PTWARNING: Sync of Updates: 0x8024401c
14:10:36:352784e30PTWARNING: SyncServerUpdatesInternal failed: 0x8024401c
14:10:36:352784e30Agent * WARNING: Failed to synchronize, error = 0x8024401C
14:10:36:354784e30Agent * WARNING: Exit code = 0x8024401C
14:10:36:354784e30Agent*********
14:10:36:354784e30Agent**  END  **  Agent: Finding updates [CallerId = testAgent]
14:10:36:354784e30Agent*************
14:10:36:354784e30AgentWARNING: WU client failed Searching for update with error 0x8024401c
14:10:36:3542376eccCOMAPI>>--  RESUMED  -- COMAPI: Search [ClientId = testAgent]
14:10:36:3542376eccCOMAPI - Updates found = 0
14:10:36:3542376eccCOMAPI - WARNING: Exit code = 0x00000000, Result code = 0x8024401C
14:10:36:3542376eccCOMAPI---------
14:10:36:3542376eccCOMAPI--  END  --  COMAPI: Search [ClientId = testAgent]
14:10:36:3542376eccCOMAPI-------------

I am using WUA asynchronous API "BeginSearch" and call to "EndSearch" returns "0x8024401C" in case of Win8 & "0x80240438" in case of Win10, in both case "Original error code: 0x80072ee2".

Is there any way to handle such timeout issue and get value of "Original error code"? As I have to handle scan failure based on "Original error code".

Thanks in advance :)

Computer has not report status yet

$
0
0

Hello I running wsus with sp2 on Windows server 2008R2.

I have huge problem with updates on client computers. I have group polici for add computers to the wsus this work and after i was join computer to domain I see them in wsus. When I try to find updates on new computers they are searchnig 8+ hours and nothing. I was try on clients:

wuauclt /resetauthorization /detectnow

delete WindowsUpdate.log

Stop stop updates rename SoftwareDistribution folder

Type wsus address to IE if provide me download file

Everythings work but computers not download updates and wsus says they not report status yet. It is drving me crazy where´s could be the problem. I attach WindowsUpdate.log from one affected client.

2016-07-21	05:58:17:812	1008	13dc	AU	Will do the detection after current detection completes
2016-07-21	05:58:44:490	1008	13dc	Shutdwn	user declined update at shutdown
2016-07-21	05:58:44:490	1008	13dc	AU	Successfully wrote event for AU health state:0
2016-07-21	05:58:44:490	1008	13dc	AU	AU initiates service shutdown
2016-07-21	05:58:44:490	1008	bc4	Agent	  * WARNING: Failed to filter search results, error = 0x8024000B
2016-07-21	05:58:44:490	1008	13dc	AU	###########  AU: Uninitializing Automatic Updates  ###########
2016-07-21	05:58:44:553	1008	bc4	Agent	*********
2016-07-21	05:58:44:553	1008	bc4	Agent	**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-07-21	05:58:44:553	1008	bc4	Agent	*************
2016-07-21	05:58:44:647	1008	13dc	Report	REPORT EVENT: {EB5C12D6-B27B-49D3-99BA-C0A4E0444472}	2016-07-20 13:59:23:146+0200	1	202	102	{00000000-0000-0000-0000-000000000000}	0	0	AutomaticUpdates	Success	Content Install	Reboot completed.
2016-07-21	05:58:44:647	1008	13dc	Report	CWERReporter finishing event handling. (00000000)
2016-07-21	05:58:44:647	1008	13dc	Report	CWERReporter finishing event handling. (00000000)
2016-07-21	05:58:44:647	1008	13dc	Report	CWERReporter finishing event handling. (00000000)
2016-07-21	05:58:44:647	1008	13dc	Report	CWERReporter finishing event handling. (00000000)
2016-07-21	05:58:44:647	1008	13dc	Report	WARNING: Reporter failed to upload events with hr = 80240004.
2016-07-21	05:58:44:647	1008	13dc	Report	WARNING: Reporter failed to upload events with hr = 80240004.
2016-07-21	05:58:44:647	1008	13dc	Report	WARNING: Reporter failed to upload events with hr = 80240004.
2016-07-21	05:58:44:647	1008	13dc	Report	WARNING: Reporter failed to upload events with hr = 80240004.
2016-07-21	05:58:44:647	1008	13dc	Report	WARNING: Reporter failed to upload events with hr = 80240004.
2016-07-21	05:58:44:647	1008	13dc	Report	WARNING: Reporter failed to upload events with hr = 80240004.
2016-07-21	05:58:44:647	1008	13dc	Report	WARNING: Reporter failed to upload events with hr = 80240004.
2016-07-21	05:58:44:647	1008	13dc	Report	WARNING: Reporter failed to upload events with hr = 80240004.
2016-07-21	05:58:44:647	1008	13dc	Report	WARNING: Reporter failed to upload events with hr = 80240004.
2016-07-21	05:58:46:318	1008	13dc	Service	*********
2016-07-21	05:58:46:318	1008	13dc	Service	**  END  **  Service: Service exit [Exit code = 0x240001]
2016-07-21	05:58:46:318	1008	13dc	Service	*************
2016-07-21	06:05:15:254	1020	4bc	Misc	===========  Logging initialized (build: 7.6.7600.320, tz: +0200)  ===========
2016-07-21	06:05:15:254	1020	4bc	Misc	  = Process: C:\Windows\system32\svchost.exe
2016-07-21	06:05:15:254	1020	4bc	Misc	  = Module: c:\windows\system32\wuaueng.dll
2016-07-21	06:05:15:254	1020	4bc	Service	*************
2016-07-21	06:05:15:254	1020	4bc	Service	** START **  Service: Service startup
2016-07-21	06:05:15:254	1020	4bc	Service	*********
2016-07-21	06:05:15:442	1020	4bc	Agent	  * WU client version 7.6.7600.320
2016-07-21	06:05:15:442	1020	4bc	Agent	  * Base directory: C:\Windows\SoftwareDistribution
2016-07-21	06:05:15:442	1020	4bc	Agent	  * Access type: No proxy
2016-07-21	06:05:15:442	1020	4bc	Agent	  * Network state: Connected
2016-07-21	06:06:01:109	1020	4bc	Report	CWERReporter::Init succeeded
2016-07-21	06:06:01:109	1020	4bc	Agent	***********  Agent: Initializing Windows Update Agent  ***********
2016-07-21	06:06:01:109	1020	4bc	Agent	  * Prerequisite roots succeeded.
2016-07-21	06:06:01:109	1020	4bc	Agent	***********  Agent: Initializing global settings cache  ***********
2016-07-21	06:06:01:109	1020	4bc	Agent	  * WSUS server: http://mn-sdc01.mn.mesa.local:8530
2016-07-21	06:06:01:109	1020	4bc	Agent	  * WSUS status server: http://mn-sdc01.mn.mesa.local:8530
2016-07-21	06:06:01:109	1020	4bc	Agent	  * Target group: PC
2016-07-21	06:06:01:109	1020	4bc	Agent	  * Windows Update access disabled: No
2016-07-21	06:06:01:156	1020	4bc	DnldMgr	Download manager restoring 0 downloads
2016-07-21	06:06:01:156	1020	4bc	AU	###########  AU: Initializing Automatic Updates  ###########
2016-07-21	06:06:01:172	1020	4bc	AU	AU setting next detection timeout to 2016-07-21 04:06:01
2016-07-21	06:06:01:172	1020	4bc	AU	  # WSUS server: http://mn-sdc01.mn.mesa.local:8530
2016-07-21	06:06:01:172	1020	4bc	AU	  # Detection frequency: 22
2016-07-21	06:06:01:172	1020	4bc	AU	  # Target group: PC
2016-07-21	06:06:01:172	1020	4bc	AU	  # Approval type: Scheduled (Policy)
2016-07-21	06:06:01:172	1020	4bc	AU	  # Scheduled install day/time: Every day at 7:00
2016-07-21	06:06:01:172	1020	4bc	AU	  # Auto-install minor updates: Yes (Policy)
2016-07-21	06:06:01:172	1020	4bc	AU	  # Will interact with non-admins (Non-admins are elevated (Policy))
2016-07-21	06:06:01:172	1020	4bc	AU	  # Will display featured software notifications (Policy)
2016-07-21	06:06:01:203	1020	4bc	AU	Setting AU scheduled install time to 2016-07-21 05:00:00
2016-07-21	06:06:01:468	1020	4bc	Report	***********  Report: Initializing static reporting data  ***********
2016-07-21	06:06:01:468	1020	4bc	Report	  * OS Version = 6.1.7601.1.0.65792
2016-07-21	06:06:01:468	1020	4bc	Report	  * OS Product Type = 0x00000030
2016-07-21	06:06:01:484	1020	4bc	Report	  * Computer Brand = Dell Inc.
2016-07-21	06:06:01:484	1020	4bc	Report	  * Computer Model = Latitude E5420
2016-07-21	06:06:01:500	1020	4bc	Report	  * Bios Revision = A14
2016-07-21	06:06:01:500	1020	4bc	Report	  * Bios Name = Default System BIOS
2016-07-21	06:06:01:500	1020	4bc	Report	  * Bios Release Date = 2013-12-26T00:00:00
2016-07-21	06:06:01:500	1020	4bc	Report	  * Locale ID = 1029
2016-07-21	06:06:01:531	1020	4bc	AU	Successfully wrote event for AU health state:0
2016-07-21	06:06:01:531	1020	4bc	AU	Initializing featured updates
2016-07-21	06:06:01:531	1020	4bc	AU	Found 0 cached featured updates
2016-07-21	06:06:01:531	1020	4bc	AU	Successfully wrote event for AU health state:0
2016-07-21	06:06:01:531	1020	4bc	AU	Successfully wrote event for AU health state:0
2016-07-21	06:06:01:531	1020	4bc	AU	AU finished delayed initialization
2016-07-21	06:06:01:531	1020	4bc	AU	#############
2016-07-21	06:06:01:531	1020	4bc	AU	## START ##  AU: Search for updates
2016-07-21	06:06:01:531	1020	4bc	AU	#########
2016-07-21	06:06:01:749	1020	4bc	AU	<<## SUBMITTED ## AU: Search for updates [CallId = {28D5B5BA-EDE4-4E53-89AC-75691E0FB030}]
2016-07-21	06:06:02:046	1020	c5c	PT	WARNING: Cached cookie has expired or new PID is available
2016-07-21	06:06:02:046	1020	c5c	PT	Initializing simple targeting cookie, clientId = eec41f7e-3290-4d6b-a69f-abf3bdde9aec, target group = PC, DNS name = mn-nb008.mn.mesa.local
2016-07-21	06:06:02:046	1020	c5c	PT	  Server URL = http://mn-sdc01.mn.mesa.local:8530/SimpleAuthWebService/SimpleAuth.asmx
2016-07-21	06:06:02:139	1020	c5c	Report	Uploading 1 events using cached cookie, reporting URL = http://mn-sdc01.mn.mesa.local:8530/ReportingWebService/ReportingWebService.asmx
2016-07-21	06:06:02:139	1020	c5c	Report	Reporter successfully uploaded 1 events.
2016-07-21	06:06:02:171	1020	c5c	Report	Uploading 1 events using cached cookie, reporting URL = http://mn-sdc01.mn.mesa.local:8530/ReportingWebService/ReportingWebService.asmx
2016-07-21	06:06:02:171	1020	c5c	Report	Reporter successfully uploaded 1 events.
2016-07-21	06:06:02:171	1020	c5c	Agent	*************
2016-07-21	06:06:02:171	1020	c5c	Agent	** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-07-21	06:06:02:171	1020	c5c	Agent	*********
2016-07-21	06:06:02:171	1020	c5c	Agent	  * Online = No; Ignore download priority = No
2016-07-21	06:06:02:171	1020	c5c	Agent	  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-07-21	06:06:02:171	1020	c5c	Agent	  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-07-21	06:06:02:171	1020	c5c	Agent	  * Search Scope = {Machine}
2016-07-21	06:08:20:516	1020	c5c	Agent	WARNING: Failed to evaluate Installed rule, updateId = {189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB}.101, hr = 80242013
2016-07-21	06:14:46:379	1020	14c	AU	Triggering AU detection through DetectNow API
2016-07-21	06:14:46:379	1020	14c	AU	Will do the detection after current detection completes
2016-07-21	06:53:38:643	1020	4bc	Shutdwn	user declined update at shutdown
2016-07-21	06:53:38:643	1020	4bc	AU	Successfully wrote event for AU health state:0
2016-07-21	06:53:38:643	1020	4bc	AU	AU initiates service shutdown
2016-07-21	06:53:38:643	1020	4bc	AU	###########  AU: Uninitializing Automatic Updates  ###########
2016-07-21	06:53:38:643	1020	c5c	Agent	  * WARNING: Failed to filter search results, error = 0x8024000B
2016-07-21	06:53:38:737	1020	c5c	Agent	*********
2016-07-21	06:53:38:737	1020	c5c	Agent	**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-07-21	06:53:38:737	1020	c5c	Agent	*************
2016-07-21	06:53:38:799	1020	c5c	Report	REPORT EVENT: {80D44F93-1348-43B0-BE58-225B261474E4}	2016-07-21 06:06:01:531+0200	1	202	102	{00000000-0000-0000-0000-000000000000}	0	0	AutomaticUpdates	Success	Content Install	Reboot completed.
2016-07-21	06:53:38:799	1020	c5c	Report	CWERReporter finishing event handling. (00000000)
2016-07-21	06:53:39:704	1020	4bc	Report	CWERReporter finishing event handling. (00000000)
2016-07-21	06:53:39:985	1020	4bc	Service	*********
2016-07-21	06:53:39:985	1020	4bc	Service	**  END  **  Service: Service exit [Exit code = 0x240001]
2016-07-21	06:53:39:985	1020	4bc	Service	*************
2016-07-21	07:00:30:187	1016	f48	Misc	===========  Logging initialized (build: 7.6.7600.320, tz: +0200)  ===========
2016-07-21	07:00:30:187	1016	f48	Misc	  = Process: C:\Windows\system32\svchost.exe
2016-07-21	07:00:30:187	1016	f48	Misc	  = Module: c:\windows\system32\wuaueng.dll
2016-07-21	07:00:30:187	1016	f48	Service	*************
2016-07-21	07:00:30:187	1016	f48	Service	** START **  Service: Service startup
2016-07-21	07:00:30:187	1016	f48	Service	*********
2016-07-21	07:00:30:280	1016	f48	Agent	  * WU client version 7.6.7600.320
2016-07-21	07:00:30:280	1016	f48	Agent	  * Base directory: C:\Windows\SoftwareDistribution
2016-07-21	07:00:30:280	1016	f48	Agent	  * Access type: No proxy
2016-07-21	07:00:30:280	1016	f48	Agent	  * Network state: Connected
2016-07-21	07:01:15:919	1016	f48	Report	CWERReporter::Init succeeded
2016-07-21	07:01:15:919	1016	f48	Agent	***********  Agent: Initializing Windows Update Agent  ***********
2016-07-21	07:01:15:919	1016	f48	Agent	  * Prerequisite roots succeeded.
2016-07-21	07:01:15:919	1016	f48	Agent	***********  Agent: Initializing global settings cache  ***********
2016-07-21	07:01:15:919	1016	f48	Agent	  * WSUS server: http://mn-sdc01.mn.mesa.local:8530
2016-07-21	07:01:15:919	1016	f48	Agent	  * WSUS status server: http://mn-sdc01.mn.mesa.local:8530
2016-07-21	07:01:15:919	1016	f48	Agent	  * Target group: PC
2016-07-21	07:01:15:919	1016	f48	Agent	  * Windows Update access disabled: No
2016-07-21	07:01:15:951	1016	f48	DnldMgr	Download manager restoring 0 downloads
2016-07-21	07:01:15:982	1016	f48	AU	###########  AU: Initializing Automatic Updates  ###########
2016-07-21	07:01:15:997	1016	f48	AU	AU setting next detection timeout to 2016-07-21 05:01:15
2016-07-21	07:01:16:013	1016	f48	AU	  # WSUS server: http://mn-sdc01.mn.mesa.local:8530
2016-07-21	07:01:16:013	1016	f48	AU	  # Detection frequency: 22
2016-07-21	07:01:16:013	1016	f48	AU	  # Target group: PC
2016-07-21	07:01:16:013	1016	f48	AU	  # Approval type: Scheduled (Policy)
2016-07-21	07:01:16:013	1016	f48	AU	  # Scheduled install day/time: Every day at 7:00
2016-07-21	07:01:16:013	1016	f48	AU	  # Auto-install minor updates: Yes (Policy)
2016-07-21	07:01:16:013	1016	f48	AU	  # Will interact with non-admins (Non-admins are elevated (Policy))
2016-07-21	07:01:16:013	1016	f48	AU	  # Will display featured software notifications (Policy)
2016-07-21	07:01:16:075	1016	f48	AU	Initializing featured updates
2016-07-21	07:01:16:075	1016	f48	AU	Found 0 cached featured updates
2016-07-21	07:01:16:341	1016	f48	Report	***********  Report: Initializing static reporting data  ***********
2016-07-21	07:01:16:341	1016	f48	Report	  * OS Version = 6.1.7601.1.0.65792
2016-07-21	07:01:16:341	1016	f48	Report	  * OS Product Type = 0x00000030
2016-07-21	07:01:16:357	1016	f48	Report	  * Computer Brand = Dell Inc.
2016-07-21	07:01:16:357	1016	f48	Report	  * Computer Model = Latitude E5420
2016-07-21	07:01:16:357	1016	f48	Report	  * Bios Revision = A14
2016-07-21	07:01:16:357	1016	f48	Report	  * Bios Name = Default System BIOS
2016-07-21	07:01:16:357	1016	f48	Report	  * Bios Release Date = 2013-12-26T00:00:00
2016-07-21	07:01:16:357	1016	f48	Report	  * Locale ID = 1029
2016-07-21	07:01:16:403	1016	f48	AU	Successfully wrote event for AU health state:0
2016-07-21	07:01:16:403	1016	f48	AU	Successfully wrote event for AU health state:0
2016-07-21	07:01:16:403	1016	f48	AU	AU finished delayed initialization
2016-07-21	07:01:16:403	1016	f48	AU	#############
2016-07-21	07:01:16:403	1016	f48	AU	## START ##  AU: Search for updates
2016-07-21	07:01:16:403	1016	f48	AU	#########
2016-07-21	07:01:16:622	1016	f48	AU	<<## SUBMITTED ## AU: Search for updates [CallId = {E638E83C-D51B-409E-A65F-027D93205038}]
2016-07-21	07:01:16:935	1016	fd8	Report	Uploading 1 events using cached cookie, reporting URL = http://mn-sdc01.mn.mesa.local:8530/ReportingWebService/ReportingWebService.asmx
2016-07-21	07:01:16:981	1016	fd8	PT	WARNING: ReportEventBatch failure, error = 0x8024400D, soap client error = 7, soap error code = 300, HTTP status code = 200
2016-07-21	07:01:16:981	1016	fd8	PT	WARNING: SOAP Fault: 0x00012c
2016-07-21	07:01:16:981	1016	fd8	PT	WARNING:     faultstring:Fault occurred
2016-07-21	07:01:16:981	1016	fd8	PT	WARNING:     ErrorCode:ConfigChanged(2)
2016-07-21	07:01:16:981	1016	fd8	PT	WARNING:     Message:(null)
2016-07-21	07:01:16:981	1016	fd8	PT	WARNING:     Method:"http://www.microsoft.com/SoftwareDistribution/ReportEventBatch"
2016-07-21	07:01:16:981	1016	fd8	PT	WARNING:     ID:cb3710e6-271e-47bb-8075-7b77135e3fa6
2016-07-21	07:01:16:981	1016	fd8	Report	WARNING: Reporter failed to upload events with hr = 8024400d.
2016-07-21	07:01:16:981	1016	fd8	Report	Uploading 1 events using cached cookie, reporting URL = http://mn-sdc01.mn.mesa.local:8530/ReportingWebService/ReportingWebService.asmx
2016-07-21	07:01:16:997	1016	fd8	PT	WARNING: ReportEventBatch failure, error = 0x8024400D, soap client error = 7, soap error code = 300, HTTP status code = 200
2016-07-21	07:01:16:997	1016	fd8	PT	WARNING: SOAP Fault: 0x00012c
2016-07-21	07:01:16:997	1016	fd8	PT	WARNING:     faultstring:Fault occurred
2016-07-21	07:01:16:997	1016	fd8	PT	WARNING:     ErrorCode:ConfigChanged(2)
2016-07-21	07:01:16:997	1016	fd8	PT	WARNING:     Message:(null)
2016-07-21	07:01:16:997	1016	fd8	PT	WARNING:     Method:"http://www.microsoft.com/SoftwareDistribution/ReportEventBatch"
2016-07-21	07:01:16:997	1016	fd8	PT	WARNING:     ID:47f76994-8642-4fb0-9d3a-5661e5eb6459
2016-07-21	07:01:16:997	1016	fd8	Report	WARNING: Reporter failed to upload events with hr = 8024400d.
2016-07-21	07:01:16:997	1016	fd8	Agent	*************
2016-07-21	07:01:16:997	1016	fd8	Agent	** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-07-21	07:01:16:997	1016	fd8	Agent	*********
2016-07-21	07:01:16:997	1016	fd8	Agent	  * Online = No; Ignore download priority = No
2016-07-21	07:01:16:997	1016	fd8	Agent	  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-07-21	07:01:16:997	1016	fd8	Agent	  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-07-21	07:01:16:997	1016	fd8	Agent	  * Search Scope = {Machine}
2016-07-21	07:02:08:275	1016	fd8	Agent	WARNING: Failed to evaluate Installed rule, updateId = {189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB}.101, hr = 80242013
2016-07-21	07:10:41:923	1016	648	AU	Triggering AU detection through DetectNow API
2016-07-21	07:10:41:923	1016	648	AU	Will do the detection after current detection completes
2016-07-21	07:10:44:060	1016	f48	AU	AU setting next sqm report timeout to 2016-07-22 05:10:44

Thank you for any help.

WSUS scan for updates on Windows 2012 R2 very slow since updates July 2016 were approved for installation

$
0
0

Hello,

We have encountered an issue on our Windows 2012 R2 servers since we have approved the July 2016 on the WSUS servers. Are servers are set to mode 2 (just scan for updates at an interval - no download - no install). It was set to scan for updates every hour. Once we approved the updates we saw the CPU loads on our servers spike enormously. All servers now take +/- 30 minutes to scan for updates with 1 CPU core running at 100% CPU. We have since then raised the scan interval to every 10 hours to at least not stress the CPUs every hour. (We are running most on a VMWARE environment.) When we install the July updates on the servers, then afterwards the scanning takes about 30-60 seconds. But we are afraid this will happen again when patches are approved.

Can someone please shed some light. (We already saw that MS released an update for W7-W2K8 in June that addresses the issue we are now encountering on our W2K12 servers.

See the log in WSUS :

2016-07-13 10:13:50.474 UTC    Successfully deployed deployment(Install) of Security Update for Windows Server 2012 R2 (KB3172727) by DREDGING-001\SA_WSUS UpdateID:3325F3B8-FA4A-456A-8049-452C020758F9 Revision Number:201 TargetGroup:WSUS_Deme-Zwijndrecht_Servers

2016-07-13 10:13:50.630 UTC    Successfully deployed deployment(Install) of Security Update for Windows Server 2012 R2 (KB3170455) by DREDGING-001\SA_WSUS UpdateID:0A4D4A91-C607-42D7-86C6-F0A30F473864 Revision Number:205 TargetGroup:WSUS_Deme-Zwijndrecht_Servers

2016-07-13 10:13:50.787 UTC    Successfully deployed deployment(Install) of Security Update for Windows Server 2012 R2 (KB3170377) by DREDGING-001\SA_WSUS UpdateID:470EDCD6-5D9E-4ECD-A7CB-AD02FC63C698 Revision Number:201 TargetGroup:WSUS_Deme-Zwijndrecht_Servers

2016-07-13 10:13:50.943 UTC    Successfully deployed deployment(Install) of Security Update for Windows Server 2012 R2 (KB3169704) by DREDGING-001\SA_WSUS UpdateID:9BD26EF8-DCB1-4A3B-955F-6DB17194801A Revision Number:202 TargetGroup:WSUS_Deme-Zwijndrecht_Servers

2016-07-13 10:13:51.115 UTC    Successfully deployed deployment(Install) of Security Update for Windows Server 2012 R2 (KB3168965) by DREDGING-001\SA_WSUS UpdateID:B7B156C2-1B73-4BB4-8CA4-7ADEF4CF3F69 Revision Number:200 TargetGroup:WSUS_Deme-Zwijndrecht_Servers

I will add some screenshots of the CPU load once my account is verified (I cannot upload pictures at the moment)

Performance issues after KB3159706

$
0
0

I'm facing severe performance issues on the WSUS server after deploying KB3159706 AND following all the steps in https://support.microsoft.com/en-us/kb/3159706 except for the web.config part as we do not use HTTPS.

The Windows Internal Database and IIS Worker Process are taking up almost 100% of CPU all the time and around 70% of RAM.

This server has always been very stable with less than 70% RAM and idle CPU most of the time.

I noticed also this warning in the even log (#12 - Unable to find schema for config section 'system.xaml.hosting/httpHandlers'. This section will be ignored.)

Please advise


WINDOWS VISTA UPDATES PROBLEMS

$
0
0
 I use Windows vista Business. When I used offline updates package from wsusoffline.net and run the program. I get the message error downloading/verifying updates for w60 glb. Kindly help how to solve this problem.

WSUS Fails to complete post-installation tasks

$
0
0

When trying to complete the post-installation tasks Windows Server Update Services 4.0 (Windows Server 2012 Role) cannot seem to complete them. This is a member server with Default Roles, WDS, NAP, IIS, and (attempting) WSUS. It is intended to be a Network Management Server.

I get a variety of errors and it appears to be related to the attempt to sync with the Windows Update server on the Internet. I also see an error indicating it does not have permissions to the %Install Directory%\Update Services folder. I looked at the security permissions and the folder I designated to use for the update cache had my account and CREATOR/OWNER permissions invisible on the main tab. Going into advanced, I was able to see permissions and grant full control to that directory.

The 'Update Services' directory was owned by Trusted Installer and I observed the same condition with the permissions invisible in the main dialog and visible in the advanced dialog. I was unable to modify those since I was not the owner.

I have uninstalled the Role Service and Re-installed, with the same results. I did the same thing again but deleted all the folders I could find used by the Service, and no help there either.

When I attempt the post-installation tasks my error logs come up blank now? There are some things recorded in the event logs too if anyone wants to see them. Here is one of the error logs from an early attempt at this Role Install:

2013-02-05 15:54:59  Setting WSUSService to autostart...
2013-02-05 15:54:59  WSUSService is set to autostart.
2013-02-05 15:54:59  Starting WSUSService...
2013-02-05 15:54:59  WSUSService is now started.
2013-02-05 15:54:59  Importing default detectoids.
2013-02-05 15:54:59  Importing CriticalUpdates.xml...
2013-02-05 15:57:29  ImportDefaultDetectoids failed. Exception: System.Data.SqlClient.SqlException (0x80131904): Timeout expired.  The timeout period elapsed prior to completion of the operation or the server is not responding.
Warning: The join order has been enforced because a local join hint is used. ---> System.ComponentModel.Win32Exception (0x80004005): The wait operation timed out
   at Microsoft.UpdateServices.DatabaseAccess.DBConnection.DrainObsoleteConnections(SqlException e)
   at Microsoft.UpdateServices.DatabaseAccess.DBConnection.ExecuteCommandNoResult()
   at Microsoft.UpdateServices.Internal.DatabaseAccess.CommonDataAccess.ExecuteSPImportUpdate(Int32 upstreamServerLocalId, String xmlUpdateBlob, Byte[] xmlUpdateBlobCompressed, Int32& localRevisionId)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.CommonDataAccess.ImportUpdate(Int32 ussRevLocalId, String xmlUpdateBlob, Byte[] xmlUpdateBlobCompressed, String xmlSdpBlob, Int32& localRevisionId)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.CommonDataAccess.ImportUpdate(Int32 ussRevLocalId, String xmlUpdateBlob, Byte[] xmlUpdateBlobCompressed)
   at Microsoft.UpdateServices.Setup.StartServer.StartServer.ImportDefaultDetectoids()
ClientConnectionId:8cfc8c46-eba0-4c41-bb2a-6930f8e68ece
2013-02-05 15:57:29  StartServer encountered errors. Exception=Timeout expired.  The timeout period elapsed prior to completion of the operation or the server is not responding.
Warning: The join order has been enforced because a local join hint is used.
2013-02-05 15:57:29  Microsoft.UpdateServices.Administration.CommandException: Failed to start and configure the WSUS service
   at Microsoft.UpdateServices.Administration.PostInstall.Run()
   at Microsoft.UpdateServices.Administration.PostInstall.Execute(String[] arguments)

WSUS console & service can't start. "Reason: Failed to open the explicitly specified database 'SUSDB'"

$
0
0

Our WSUS server (Windows Server 2012 R2) hanged when it was installing updates on itself. I rebooted it in a harsh way, it started normally and finished installing the updates. However, now I can't start the WSUS management console due to a connection error. The WSUS server service itself doesn't start as well.

The Application server contains multiple events 18456, source MSSQL$MICROSOFT##WID, message "Login failed for user 'NT AUTHORITY\NETWORK SERVICE'. Reason: Failed to open the explicitly specified database 'SUSDB'. [CLIENT: <named pipe>]" If I try to connect to the server using SQL Server Management Studio, it displays the following error: 

"Cannot connect to \\.\pipe\MICROSOFT##WID\tsql\query. Login failed for user 'MY-LOGIN'. (Microsoft SQL Server, Error: 18456)"

The Application even log contains the same event mentioned above, only the message is different: "Login failed for user 'MY-LOGIN'. Reason: Token-based server access validation failed with an infrastructure error. Check for previous errors. [CLIENT:<named pipe>]".

If I restart the Windows Internal Database service, it starts normally and doesn't throw any errors in the Application log. Among other things, it successfully mounts the SUSDB database. No other errors (including DCOM errors) can be found in the log.

Seems that security setting on the WID engine are damaged. Any ideas how to fix them? Besides reinstalling the server, of course? :)


Evgeniy Lotosh // MCSE: Server infrastructure, MCSE: Messaging


Windows 7 and 8.1 upgrade to Windows 10 Pro, Version 1511, 10586 via WSUS 3.2 on Windows 2008 R2

$
0
0

Hi All,

I am getting this error on our 2008 R2 WSUS server trying to download "Windows 7 and 8.1 upgrade to Windows 10 Pro, Version 1511, 10586 - en-us, Volume" it downloads about 2.8 GB esd file but then removes it.

I could not find any info to confirm if that is even doable on WSUS 3.2 on Windows 2008 R2 or that s only possible on WSUS 4 (v 6 ) on Windows 2012 R2. Tried reinstalling WSUS to no avail. Still the same result.

Could you please advise.
====
EventId=364,Type=Error,Category=Synchronization,Message=Content file download failed. Reason: File cert verification failure. Source File: /c/upgr/2016/05/10586.0.160426-1409.th2_refresh_clientprofessionalvl_vol_x64fre_en-us_f196fdc12801eea2ec8c503ce413cbf9e8be1b90.esd 
====
According to this link - the only way is to upgrade WSUS server OS to 2012 R2

http://www.mcseboard.de/topic/205876-wsus-eventid-364-nur-bei-windows-1511-upgrades/

Kind Regards, 

Vadim

Urgent - need to delete WSUS content partition

$
0
0

Hi,

I have a situation...

I need remove WSUS content partition (complete D: in my case).

The question:

can I recreate content partition without reinstalling WSUS.

Finally, I can really remove it and reinstall WSUS. It is one of the replica servers. So no impact whatsoever...

Just want to know...

Thanks.


--- When you hit a wrong note its the next note that makes it good or bad. --- Miles Davis

Viewing all 12874 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>