Quantcast
Channel: WSUS forum
Viewing all 12874 articles
Browse latest View live

2008 R2 topmost WSUS, 2012 R2 downstream WSUS, & KB 3159706

$
0
0

I've read the WSUS blog about KB 3159706, but I'm unclear how it applies in the scenario of a 2008 R2 topmost server with some 2012 R2 subordinates. It looks like this patch is strictly for 2012/R2 - does that imply that 2008 R2 WSUS servers will never be able to decrypt future Windows 10 updates? Does that mean that if my topmost server is a 2008 R2 then all of my downstream servers are limited as well, or is there a similar patch for 2008 R2?

Thanks for any help/direction anyone can offer.


Windows 10 Anniversary Update (1607)

$
0
0

Anyone can explain why Windows 10 1607 client can't download WSUS updates ?

WSUS is install on Windows Server 2012 R2 Server.

When a Windows 10 client detect a Windows 10 (1607 only) update on WSUS, client can't download every update ( Windows or other)

If there are only Office update everything works good.

KB3159706 with manual steps followed gives System.IndexOutOfRangeException -- Index was outside the bounds of the array

$
0
0

We have SCCM 2012 R2 with WSUS enabled on Windows 2012. SUSDB was WID but I migrated this to a remote sql 2012 cluster.

After applying KB3159706 and following the manual steps WSUS cannot start. Opening the console I get the error:

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists,

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


System.IndexOutOfRangeException -- Index was outside the bounds of the array.

Source
Microsoft.UpdateServices.BaseApi

Stack Trace:
   at Microsoft.UpdateServices.Internal.BaseApi.SoapExceptionProcessor.DeserializeAndThrow(SoapException soapException)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.ExecuteSPGetConfiguration()
   at Microsoft.UpdateServices.Internal.BaseApi.UpdateServerConfiguration.Load()
   at Microsoft.UpdateServices.Internal.ClassFactory.CreateWellKnownType(Type type, Object[] args)
   at Microsoft.UpdateServices.Internal.ClassFactory.CreateInstance(Type type, Object[] args)
   at Microsoft.UpdateServices.Internal.BaseApi.UpdateServer.set_UserSelectedCulture(String value)
   at Microsoft.UpdateServices.UI.AdminApiAccess.AdminApiTools.TrySetServerCulture(String culture)
   at Microsoft.UpdateServices.UI.AdminApiAccess.AdminApiTools.SetServerCulture()
   at Microsoft.UpdateServices.UI.AdminApiAccess.AdminApiTools..ctor(CultureInfo culture, IUpdateServer updateServer)
   at Microsoft.UpdateServices.UI.SnapIn.Common.ServerTools..ctor(ServerSummaryScopeNode serverSummaryScopeNode, SnapInTools snapInTools, IUpdateServer updateServer)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.ConnectToServer()
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.get_ServerTools()

This same error comes up immediately after applying the KB and stays the same after applying the manual steps described in the KB article.

The wsusutil postinstall is immediately over and gives no errors:

2016-05-10 16:32:04  Postinstall started
2016-05-10 16:32:04  Detected role services: Api, UI, Services
2016-05-10 16:32:04  Start: LoadSettingsForServicing
2016-05-10 16:32:04  End: LoadSettingsForServicing
2016-05-10 16:32:04  Postinstall completed

WSUS service starts but stops intermittently.

same old story - WSUS upstream/downstream servers

$
0
0

after going through dozens of sites I still can't find a proper solution for the following problem:

upstream server shows all downstream servers inside the wsus console;

downstream server a has a total of 69% installed/not applicable

downstream server b has a total of 76% installed/not applicable

downstream server c & d have 0% installed/not applicable

how do i get these informations of server c & d?

everything else works fine; approving, assigning, downloading content, reporting also!

Whats difference in Windows 10 Products WSUS?

$
0
0

In our enviroment we are rolling out Windows 10 Pro and I'm configuring WSUS to update those Windows 10 clients.

In the products categorie there are a lot Windows 10 options but what is the difference?
- Windows 10 and later drivers
- Windows 10 and later upgrade & Servicing drivers
- Windows 10 Feature On Demand
- Windows 10 GDR-DU
- Windows 10 Language Interface Packs
- Windows 10 Language Packs
- Windows 10 LTSB
- Windows 10

Also in the Classifications you can choose between "Update Rollups", "Updates" and "Upgrades". What is the difference and what I need to take?

Thanks in advance.

Cannot install KB3159706

$
0
0
I want to install KB3159706 to prepare for rolling out the Windows 10 Anniversary Update with WSUS on Windows Server 2012. However, I cannot find KB3159706 on Windows Update or WSUS. Can it be downloaded and manually installed?

Daryl Sensenig Tents For Rent

Workstations randomly start installing updates today that were had an installation deadline last month

$
0
0

I have noticed that *several* users had their workstations unexpectedly restarted today for Windows Updates.

When I checked the update status in WSUS, I found that this was triggered because there were updates still pending that were deadlines from July.

For some reason the installation deadline for some updates only became enforced today.

If it was only one workstation, I would guess it was a local glitch on the workstation or maybe the user uninstalled the update and then it reinstalled automatically because it was overdue.  However, this is not a single user problem.

Not sure if this is related, but when users click on the "Check for update" button, it takes much longer for the check to complete and either display available updates or else say the system is up to date and doesn't need any updates.  We are used to this taking around 20 seconds or less and now it sometimes takes minutes.

What can cause these types of issues? 


Attempting to deploy Windows 10 build 1607 over WSUS, clients say they're up to date

$
0
0

I have a strange issue and I'll do my best to explain it. I really hope somebody has a solution.

Yesterday the Windows 10 Anniversary update build 1607 appared on WSUS. I've been testing the build and making adjustments with the domain to make sure it works correctly. After enough testing I wanted to roll out the update earlier today.

For the november 1511 update I already took the steps to allow the Windows 10 Upgrades to show up in WSUS (Windows Server 2012 R2) and installed the correct hotfix and manually setup the IIS server to allow the downloading and decrypting of esd files. This worked flawlessly even though it took some time to get working.

The Windows 10 update downloaded without a problem after approving them. It takes up about 28GB for the Dutch and English version. Professional and Enterprise. I was able to do the upgrade on a test PC that was running Windows 10 1511 Professional without any problems, but all other computers in the network say they're up-to-date and do not detect the upgrade at all.

On another PC running Windows 10 Professional and three running Windows 10 Enterprise (all running the previous November update) the update simply does not appear at all. The event logs are useless since they simply say that there are no updates available.

I never enabled any policies or settings to defer upgrades and there is no DisableUpgrade registry entry or other stuff enabled that should prevent them from happening. I'm really confused but also found out that some non-domain members don't get the update. I should be able to force this by using WSUS though!

Any ideas?


Unable to Uninstall Update KB3102429

$
0
0

Hi,

I am unable to uninstall Windows Update KB3102429 from Windows Server 2012. 

Getting Error "Update for Microsoft Windows (KB3102429) is required by  your computer and cannot be uninstalled".

We need to remove this Update to run crystal report. 

Can any one help me ?

Thanks

WSUS 3.0 SP2 & Windows 7 Monthly Rollup

$
0
0

Hi,

Can you tell me if we can still use WSUS v3.0 sp2 to deploy the Windows 7 new Monthly Rollup which replaces individual updates from October 2016 ?

If we can, do we have to enable the 'download express installation files' option ? I understand there are disk space implications when enabling this option ?

We will be upgrading WSUS to 2012 R2 or maybe 2016 later in the year when Windows 10 clients start getting rolled out, what is the best way to upgrade the infrastructure, we have a master server and 20 - 30 downstream servers. I'm thinking of building a new 2012 R2 WSUS server, syncing it as a replica with the master 2008 R2 wsus 3.0 server and then reconfiguring the new server to sync with Microsoft update servers and reconfiguring downstream servers to sync with new master. We will then build new downstream servers, sync with local wsus 3.0 server and then reconfigure to sync with upstream server and decom old server

Will this approach work ?

Thanks

WSUS error code 0x80244016 ONLY on 1607 update.

$
0
0

I am able to recieve all updates from my WSUS server without issue EXCEPT the 1607 update that has been approved. All other updates install on clients while the log shows a failure with error code 0x80244016 for 1607.

I looked up the error code and it means 

WU_E_PT_HTTP_STATUS_BAD_REQUEST Same as HTTP status 400 - the server could not process the request due to invalid syntax.

Not sure why I would be getting this error considering all other updates work without issue. 

Lastly, I was able to deploy 1511 with this WSUS server without issue as well. This is a 1607 problem only.

Windows 7 has problems to get Updates from WSUS

$
0
0

Hi

I have a big problem, the Windows 8 is installing so good the updates, but the Windows 7 is not, I've installed the KB2938066 and KB2720211, this is the log:

2016-08-14 20:31:00:006  948 d14 Misc ===========  Logging initialized (build: 7.6.7601.19161, tz: -0500)  ===========
2016-08-14 20:31:00:006  948 d14 Misc   = Process: C:\Windows\system32\svchost.exe
2016-08-14 20:31:00:006  948 d14 Misc   = Module: c:\windows\system32\wuaueng.dll
2016-08-14 20:31:00:006  948 d14 Service *************
2016-08-14 20:31:00:006  948 d14 Service ** START **  Service: Service startup
2016-08-14 20:31:00:006  948 d14 Service *********
2016-08-14 20:31:00:009  948 d14 Agent   * WU client version 7.6.7601.19161
2016-08-14 20:31:00:009  948 d14 Agent   * Base directory: C:\Windows\SoftwareDistribution
2016-08-14 20:31:00:010  948 d14 Agent   * Access type: No proxy
2016-08-14 20:31:00:010  948 d14 Agent   * Network state: Connected
2016-08-14 20:31:45:589  948 d14 Report CWERReporter::Init succeeded
2016-08-14 20:31:45:591  948 d14 Agent ***********  Agent: Initializing Windows Update Agent  ***********
2016-08-14 20:31:45:597  948 d14 Agent   * Prerequisite roots succeeded.
2016-08-14 20:31:45:600  948 d14 Agent ***********  Agent: Initializing global settings cache  ***********
2016-08-14 20:31:45:600  948 d14 Agent   * WSUS server:http://WsusSrv.domain.com
2016-08-14 20:31:45:601  948 d14 Agent   * WSUS status server:http://WsusSrv.domain.com
2016-08-14 20:31:45:601  948 d14 Agent   * Target group: Test
2016-08-14 20:31:45:601  948 d14 Agent   * Windows Update access disabled: No
2016-08-14 20:31:45:610  948 d14 DnldMgr Download manager restoring 0 downloads
2016-08-14 20:31:45:646  948 d14 AU ###########  AU: Initializing Automatic Updates  ###########
2016-08-14 20:31:45:679  948 d14 AU AU setting next detection timeout to 2016-08-15 01:31:45
2016-08-14 20:31:45:680  948 d14 AU AU setting next sqm report timeout to 2016-08-15 01:31:45
2016-08-14 20:31:45:696  948 d14 AU   # WSUS server:http://WsusSrv.domain.com
2016-08-14 20:31:45:697  948 d14 AU   # Detection frequency: 1
2016-08-14 20:31:45:697  948 d14 AU   # Target group: Test
2016-08-14 20:31:45:697  948 d14 AU   # Approval type: Scheduled (Policy)
2016-08-14 20:31:45:697  948 d14 AU   # Scheduled install day/time: Every day at 20:00
2016-08-14 20:31:45:698  948 d14 AU   # Auto-install minor updates: Yes (Policy)
2016-08-14 20:31:45:718  948 d14 AU Initializing featured updates
2016-08-14 20:31:45:719  948 d14 AU Found 0 cached featured updates
2016-08-14 20:31:45:949  948 d14 Report ***********  Report: Initializing static reporting data  ***********
2016-08-14 20:31:45:949  948 d14 Report   * OS Version = 6.1.7601.1.0.65792
2016-08-14 20:31:45:949  948 d14 Report   * OS Product Type = 0x00000030
2016-08-14 20:31:45:960  948 d14 Report   * Computer Brand = VMware, Inc.
2016-08-14 20:31:45:960  948 d14 Report   * Computer Model = VMware Virtual Platform
2016-08-14 20:31:45:963  948 d14 Report   * Bios Revision = 6.00
2016-08-14 20:31:45:963  948 d14 Report   * Bios Name = PhoenixBIOS 4.0 Release 6.0    
2016-08-14 20:31:45:963  948 d14 Report   * Bios Release Date = 2014-04-14T00:00:00
2016-08-14 20:31:45:964  948 d14 Report   * Locale ID = 2058
2016-08-14 20:31:46:023  948 d14 AU Successfully wrote event for AU health state:1
2016-08-14 20:31:46:024  948 d14 AU Successfully wrote event for AU health state:1
2016-08-14 20:31:46:024  948 d14 AU AU finished delayed initialization
2016-08-14 20:31:46:025  948 d14 AU AU setting next sqm report timeout to 2016-08-16 01:31:46
2016-08-14 20:31:46:051  948 d14 AU #############
2016-08-14 20:31:46:051  948 d14 AU ## START ##  AU: Search for updates
2016-08-14 20:31:46:051  948 d14 AU #########
2016-08-14 20:31:46:052  948 d14 AU <<## SUBMITTED ## AU: Search for updates [CallId = {2240991A-6009-4B16-9936-0B47D359A627}]
2016-08-14 20:31:46:052  948 c54 Agent *************
2016-08-14 20:31:46:052  948 c54 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-08-14 20:31:46:052  948 c54 Agent *********
2016-08-14 20:31:46:052  948 c54 Agent   * Online = Yes; Ignore download priority = No
2016-08-14 20:31:46:052  948 c54 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-08-14 20:31:46:052  948 c54 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-08-14 20:31:46:052  948 c54 Agent   * Search Scope = {Machine}
2016-08-14 20:31:46:052  948 c54 Setup Checking for agent SelfUpdate
2016-08-14 20:31:46:053  948 c54 Setup Client version: Core: 7.6.7601.19161  Aux: 7.6.7601.19161
2016-08-14 20:31:46:079  948 c54 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2016-08-14 20:31:46:329  948 c54 Misc  Microsoft signed: NA
2016-08-14 20:31:46:332  948 c54 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP30C3.tmp with dwProvFlags 0x00000080:
2016-08-14 20:31:46:355  948 c54 Misc  Microsoft signed: NA
2016-08-14 20:31:46:365  948 c54 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2016-08-14 20:31:46:379  948 c54 Misc  Microsoft signed: NA
2016-08-14 20:31:46:384  948 c54 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2016-08-14 20:31:46:400  948 c54 Misc  Microsoft signed: NA
2016-08-14 20:31:46:439  948 c54 Setup Determining whether a new setup handler needs to be downloaded
2016-08-14 20:31:46:439  948 c54 Setup SelfUpdate handler is not found.  It will be downloaded
2016-08-14 20:31:46:440  948 c54 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-08-14 20:31:46:448  948 c54 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-08-14 20:31:46:449  948 c54 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-08-14 20:31:46:480  948 c54 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-08-14 20:31:46:480  948 c54 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2016-08-14 20:31:46:516  948 c54 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2016-08-14 20:31:46:516  948 c54 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
2016-08-14 20:31:46:942  948 c54 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
2016-08-14 20:31:46:942  948 c54 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL =http://WsusSrv.domain.com/ClientWebService/client.asmx
2016-08-14 20:31:46:953  948 c54 PT WARNING: Cached cookie has expired or new PID is available
2016-08-14 20:31:46:953  948 c54 PT Initializing simple targeting cookie, clientId = 7591fd31-a02c-423b-ab3f-b6892119af3e, target group = Test, DNS name = bt.domain.com
2016-08-14 20:31:46:953  948 c54 PT   Server URL = http://WsusSrv.domain.com/SimpleAuthWebService/SimpleAuth.asmx
2016-08-14 20:32:09:948  948 d14 AU Forced install timer expired for AUInstallType = 4
2016-08-14 20:32:09:948  948 d14 AU UpdateDownloadProperties: 0 download(s) are still in progress.
2016-08-14 20:32:09:949  948 d14 AU Setting AU scheduled install time to 2016-08-16 01:00:00
2016-08-14 20:32:09:950  948 d14 AU Successfully wrote event for AU health state:1
2016-08-14 20:33:53:662  948 c54 PT WARNING: Exceeded max server round trips: 0x80244010
2016-08-14 20:33:53:663  948 c54 PT WARNING: Sync of Updates: 0x80244010
2016-08-14 20:33:53:663  948 c54 PT WARNING: SyncServerUpdatesInternal failed: 0x80244010
2016-08-14 20:33:53:663  948 c54 Agent   * WARNING: Failed to synchronize, error = 0x80244010
2016-08-14 20:33:53:664  948 c54 Agent   * WARNING: Exit code = 0x80244010
2016-08-14 20:33:53:664  948 c54 Agent *********
2016-08-14 20:33:53:664  948 c54 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-08-14 20:33:53:664  948 c54 Agent *************
2016-08-14 20:33:53:664  948 c54 Agent WARNING: WU client failed Searching for update with error 0x80244010
2016-08-14 20:33:53:671  948 c74 AU >>##  RESUMED  ## AU: Search for updates [CallId = {2240991A-6009-4B16-9936-0B47D359A627}]
2016-08-14 20:33:53:671  948 c74 AU   # WARNING: Search callback failed, result = 0x80244010
2016-08-14 20:33:53:671  948 c74 AU   # WARNING: Failed to find updates with error code 80244010
2016-08-14 20:33:53:671  948 c74 AU #########
2016-08-14 20:33:53:671  948 c74 AU ##  END  ##  AU: Search for updates [CallId = {2240991A-6009-4B16-9936-0B47D359A627}]
2016-08-14 20:33:53:671  948 c74 AU #############
2016-08-14 20:33:53:671  948 c74 AU Successfully wrote event for AU health state:1
2016-08-14 20:33:53:672  948 c74 AU AU setting next detection timeout to 2016-08-15 02:33:10
2016-08-14 20:33:53:672  948 c74 AU AU was unable to detect updates for more than 48 hours
2016-08-14 20:33:53:672  948 c74 AU Setting AU scheduled install time to 2016-08-16 01:00:00
2016-08-14 20:33:53:672  948 c74 AU Successfully wrote event for AU health state:1
2016-08-14 20:33:53:673  948 c74 AU Successfully wrote event for AU health state:1
2016-08-14 20:33:58:382  948 c54 Report REPORT EVENT: {4CC44BA7-E44D-419E-B1E8-CB8CA65FD1EF} 2016-08-14 20:33:53:663-0500 1 148 101 {00000000-0000-0000-0000-000000000000} 0 80244010 AutomaticUpdates Failure Software Synchronization Windows Update Client failed to detect with error 0x80244010.
2016-08-14 20:33:58:383  948 c54 Report REPORT EVENT: {FBE0E19A-4C63-43D1-A420-C909DD319B6F} 2016-08-14 20:33:53:672-0500 1 149 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Failure Software Synchronization Unable to Connect: Windows is unable to connect to the automatic updates service and therefore cannot download and install updates according to the set schedule. Windows will continue to try to establish a connection.
2016-08-14 20:33:58:399  948 c54 Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
2016-08-14 20:33:58:399  948 c54 Report WER Report sent: 7.6.7601.19161 0x80244010(0) 0000000-0000-0000-0000-000000000000 Scan 0 1 AutomaticUpdates {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} 0
2016-08-14 20:42:46:571  948 c54 PT WARNING: Cached cookie has expired or new PID is available
2016-08-14 20:42:46:571  948 c54 PT Initializing simple targeting cookie, clientId = 7591fd31-a02c-423b-ab3f-b6892119af3e, target group = Test, DNS name = bt.domain.com
2016-08-14 20:42:46:571  948 c54 PT   Server URL = http://WsusSrv.domain.com/SimpleAuthWebService/SimpleAuth.asmx
2016-08-14 20:42:46:880  948 c54 Report Uploading 1 events using cached cookie, reporting URL = http://WsusSrv.domain.com/ReportingWebService/ReportingWebService.asmx
2016-08-14 20:42:46:896  948 c54 Report Reporter successfully uploaded 1 events.
2016-08-14 20:58:30:723  368 d34 Misc ===========  Logging initialized (build: 7.6.7601.19161, tz: -0500)  ===========
2016-08-14 20:58:30:723  368 d34 Misc   = Process: c:\program files\windows defender\MpCmdRun.exe
2016-08-14 20:58:30:723  368 d34 Misc   = Module: C:\Windows\system32\wuapi.dll
2016-08-14 20:58:30:723  368 d34 COMAPI -------------
2016-08-14 20:58:30:723  368 d34 COMAPI -- START --  COMAPI: Search [ClientId = Windows Defender]
2016-08-14 20:58:30:723  368 d34 COMAPI ---------
2016-08-14 20:58:30:817  368 d34 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = Windows Defender]
2016-08-14 20:58:30:817  948 284 Agent *************
2016-08-14 20:58:30:817  948 284 Agent ** START **  Agent: Finding updates [CallerId = Windows Defender]
2016-08-14 20:58:30:817  948 284 Agent *********
2016-08-14 20:58:30:817  948 284 Agent   * Online = Yes; Ignore download priority = No
2016-08-14 20:58:30:817  948 284 Agent   * Criteria = "(IsInstalled = 0 and IsHidden = 0 and CategoryIDs contains '8c3fcc84-7410-4a95-8b89-a166a0190486' and CategoryIDs contains 'e0789628-ce08-4437-be74-2495b842f43b')"
2016-08-14 20:58:30:817  948 284 Agent   * ServiceID = {00000000-0000-0000-0000-000000000000} Third party service
2016-08-14 20:58:30:817  948 284 Agent   * Search Scope = {Machine}
2016-08-14 20:58:32:174  948 284 PT +++++++++++  PT: Starting category scan  +++++++++++
2016-08-14 20:58:32:174  948 284 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL =http://WsusSrv.domain.com/ClientWebService/client.asmx
2016-08-14 20:58:32:314  948 284 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
2016-08-14 20:58:32:314  948 284 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL =http://WsusSrv.domain.com/ClientWebService/client.asmx
2016-08-14 20:58:33:859  948 284 PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
2016-08-14 20:58:33:859  948 284 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL =http://WsusSrv.domain.com/ClientWebService/client.asmx
2016-08-14 20:58:34:124  948 d14 AU Triggering Offline detection (non-interactive)
2016-08-14 20:58:34:124  948 d14 AU #############
2016-08-14 20:58:34:124  948 d14 AU ## START ##  AU: Search for updates
2016-08-14 20:58:34:124  948 d14 AU #########
2016-08-14 20:58:34:124  948 d14 AU <<## SUBMITTED ## AU: Search for updates [CallId = {EE93F707-A606-496B-974C-0255EDF94E15}]
2016-08-14 20:58:34:249  948 284 Agent   * Found 0 updates and 4 categories in search; evaluated appl. rules of 15 out of 34 deployed entities
2016-08-14 20:58:34:249  948 284 Agent *********
2016-08-14 20:58:34:249  948 284 Agent **  END  **  Agent: Finding updates [CallerId = Windows Defender]
2016-08-14 20:58:34:249  948 284 Agent *************
2016-08-14 20:58:34:249  948 284 Agent *************
2016-08-14 20:58:34:249  948 284 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-08-14 20:58:34:249  948 284 Agent *********
2016-08-14 20:58:34:249  948 284 Agent   * Online = No; Ignore download priority = No
2016-08-14 20:58:34:249  948 284 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-08-14 20:58:34:249  948 284 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2016-08-14 20:58:34:249  948 284 Agent   * Search Scope = {Machine}
2016-08-14 20:58:34:249  368 4e8 COMAPI >>--  RESUMED  -- COMAPI: Search [ClientId = Windows Defender]
2016-08-14 20:58:34:280  368 4e8 COMAPI   - Updates found = 0
2016-08-14 20:58:34:280  368 4e8 COMAPI ---------
2016-08-14 20:58:34:280  368 4e8 COMAPI --  END  --  COMAPI: Search [ClientId = Windows Defender]
2016-08-14 20:58:34:280  368 4e8 COMAPI -------------
2016-08-14 21:00:36:501  948 284 Agent Bundle contains no actionable children and thus is invalid
2016-08-14 21:00:36:501  948 284 Agent Update {6D33D503-DC0F-43F7-8504-13644FF8C818}.201 is not a valid bundle. Not returning it.
2016-08-14 21:00:36:501  948 284 Agent Bundle contains no actionable children and thus is invalid
2016-08-14 21:00:36:501  948 284 Agent Update {D88EBC10-E103-4DB1-B173-A1BA0D7813B1}.201 is not a valid bundle. Not returning it.
2016-08-14 21:00:36:501  948 284 Agent Update {1E602215-B397-46CA-B1A8-7EA0059517BC}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {ED036C16-1BD6-43AB-B546-87C080DFD819}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {935C5617-D17A-37CC-DBCF-423E5BEAB8EA}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {E7BA9D21-4C88-4F88-94CB-A23488E59EBD}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {5E870422-BD8F-4FD2-96D3-9C5D9AAFDA22}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {5EF2C723-3E0B-4F87-B719-78B027E38087}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {6D992428-3B47-4957-BB1A-157BD8C73D38}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {23F5EB29-DDC6-4263-9958-CF032644DEEA}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Bundle contains no actionable children and thus is invalid
2016-08-14 21:00:36:502  948 284 Agent Update {38066530-AA73-4D34-AD2E-AA4ECA820261}.210 is not a valid bundle. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {7FFF3336-2479-4623-A697-BCEFCF1B9F92}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {2B496C37-F722-4E7B-8467-A7AD1E29E7C1}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {35C4463B-35DC-42AC-B0BA-1D9B5C505DE2}.103 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {89068F3D-2B20-52B8-7FF9-CF27AB16E84D}.200 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {523A2448-8B6C-458B-9336-307E1DF6D6A6}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {704A0A4A-518F-4D69-9E03-10BA44198BD5}.112 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {B567E54E-648B-4AC6-9171-149A19A73DA8}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {504AE250-57C5-484A-8A10-A2C35EA0689B}.102 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {8184D953-8366-4E13-8566-DF0E15ACA108}.200 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {116A3557-3847-4858-9F03-38E94B977456}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {BD282A5B-D44A-4EF0-9BBA-2B9AD8B7C99E}.200 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {01CE995B-6E10-404B-8511-08142E6B814E}.200 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {0BBD2260-7478-4553-A791-21AB88E437D2}.203 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {8FDC8B60-9E7C-4275-8668-198F89A64DF6}.202 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {57742761-615A-4E06-90BB-008394EAEA47}.201 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {6966A762-0C7C-4261-BD07-FB12B4673347}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {B3D0AF68-8A86-4BFC-B458-AF702F35930E}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {78F4E068-1609-4E7A-AC8E-174288FA70A1}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Bundle contains no actionable children and thus is invalid
2016-08-14 21:00:36:502  948 284 Agent Update {75D98D69-E397-41CB-882A-76D079002E73}.202 is not a valid bundle. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {4F93EB69-8B97-4677-8DE4-D3FCA7ED10E6}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {477B856E-65C4-4473-B621-A8B230BB70D9}.105 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {A0DD7E72-90EC-41E3-B370-C86A245CD44F}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {CA9E8C72-81C4-11DC-8284-F47156D89593}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Bundle contains no actionable children and thus is invalid
2016-08-14 21:00:36:502  948 284 Agent Update {90459D73-6B3F-488B-ADB5-13F8605ACB75}.202 is not a valid bundle. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {FE729F7E-3945-11DC-8E0C-CD1356D89593}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {2425DE84-F071-4358-AAC9-6BBD6E0BFAA7}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {48CE8C86-6850-4F68-8E9D-7DC8535CED60}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:502  948 284 Agent Update {8508AF86-B85E-450F-A518-3B6F8F204EEA}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Bundle contains no actionable children and thus is invalid
2016-08-14 21:00:36:503  948 284 Agent Update {24AEB988-B368-435B-923B-C09B8A2D3FA5}.203 is not a valid bundle. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {23B3DA8B-060E-4517-A431-3CB10F040794}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {4756F399-B049-8E6E-94E9-FF63D0E236A7}.200 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {FA5EF799-B817-439E-ABF7-C76BA0CACB75}.200 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {AFD77D9E-F05A-431C-889A-34C23C9F9AF5}.103 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {2AF51AA0-509A-4B1D-9218-7E7508F05EC3}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {A36724A5-DA1A-47B2-B8BE-95E7CD9BC909}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {41DCE4A6-71DD-4A02-BB36-76984107376D}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {22BF57A8-4FE1-425F-BDAA-32B4F655284B}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {F8C3C9A9-10DE-4F09-BC16-5EB1B861FB4C}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Bundle contains no actionable children and thus is invalid
2016-08-14 21:00:36:503  948 284 Agent Update {793637B6-84E6-4820-963A-06EF8815110B}.200 is not a valid bundle. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {3689BDC8-B205-4AF4-8D4A-A63924C5E9D5}.200 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {9F9B1ACE-A810-11DB-BAD5-F7F555D89593}.100 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {BEC76BE5-7AA9-497F-B70B-5FD1CFD1E3B1}.200 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {0F3412F2-3405-4D86-A0FF-0EDE802227A8}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {E1C753F2-9F79-4577-B75B-913F4230FEEE}.200 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:503  948 284 Agent Update {9476D3F6-A119-4D6E-9952-8AD28A55BBA6}.101 has no local extended metadata. Not returning it.
2016-08-14 21:00:36:750  948 284 Agent   * Found 0 updates and 15 categories in search; evaluated appl. rules of 3078 out of 5824 deployed entities
2016-08-14 21:00:36:750  948 284 Agent *********
2016-08-14 21:00:36:750  948 284 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2016-08-14 21:00:36:750  948 284 Agent *************
2016-08-14 21:00:36:755  948 284 Report REPORT EVENT: {9F51DE05-D30A-4DDF-A381-77E754056DA9} 2016-08-14 20:58:34:249-0500 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 Windows Defender Success Software Synchronization Windows Update Client successfully detected 0 updates.
2016-08-14 21:00:36:755  948 780 AU >>##  RESUMED  ## AU: Search for updates [CallId = {EE93F707-A606-496B-974C-0255EDF94E15}]
2016-08-14 21:00:36:755  948 780 AU   # 0 updates detected
2016-08-14 21:00:36:755  948 780 AU #########
2016-08-14 21:00:36:755  948 780 AU ##  END  ##  AU: Search for updates [CallId = {EE93F707-A606-496B-974C-0255EDF94E15}]
2016-08-14 21:00:36:755  948 780 AU #############
2016-08-14 21:00:36:755  948 780 AU Featured notifications is disabled.
2016-08-14 21:00:36:756  948 780 AU Setting AU scheduled install time to 2016-08-16 01:00:00
2016-08-14 21:00:36:756  948 780 AU Successfully wrote event for AU health state:1
2016-08-14 21:00:36:756  948 780 AU Successfully wrote event for AU health state:1

Did I misconfigure something? or what can be the root of the problem? I need to fix it

Thanks in advanced.


Héctor Ponce TechNet

WSUS and IIS Clarification (0x80244019)

$
0
0

I recently threw together a new WSUS server (2012 R2) and struggled to get clients to download the updates.  Updates were always failing with error code 0x80244019.  Typically this would indicate that the file was not in the WSUSContent folder, but in this case that wasn't true.  I could copy the URL from my windowsupdatelog file and paste it into IE (on the client) and save the file with no issues.

The only way I could ultimately get things working was to make a change in IIS.  Specifically, I had to go into Request Filtering > HTTP Verbs, and allow theHEAD verb, which was disabled by default.  Is this standard practice?  We recently had a vulnerability assessment done and they dinged us on this, but we obviously can't disable it if it's going to break WSUS functionality.

Installing WSUS - Server 2012 R2

$
0
0

Just installed WSUS role on Server 2012 R2, all is reporting well in Server Manager as far as I can tell.

When looking at the Products and Classifications screen Products tab I'm seeing only outdated versions of Windows, Office, Exchange etc. Obviously something simple I've overlooked as I'm sure this version of WSUS should display more recent versions. The Classifications tab is also missing "Upgrades".

Thanks


Hank Vare

Windows 10 Build 1607 Update

$
0
0
I am running WSUS on Windows Server 2012 and it shows the update "Feature update to Windows 10 Pro, version, en-us, Retail" as available. I approved the update but it fails to download showing the error "Content file download failed. Reason: File cert verification failure. Source File: /c/upgr/2016/08/14393.0.160715-1616.rs1_release_clientpro_ret_x86fre_en-us_8e519f5103a405e4f3b45845f48ddfd967749e68.esd Destination File: d:\wsus\WsusContent\68\8E519F5103A405E4F3B45845F48DDFD967749E68.esd."  I keep retrying the download but I get the same failure.  This is the only update on the server that fails to download.  Has anyone else seen this. Does anyone have a solution?

Slow logins due to Updates?

$
0
0

Having a tough time tracking this one down but this past week, updates were installed on our desktops through WSUS and every user had 10-20 minute logins (from the point they entered their password to getting to their desktop). I have GPO in place that pushes updates during off hours, and per the event logs, they were pushed out as expected (most around 3AM). However, when the user went to log into their machines, it was then that they had to sit waiting for updates. To clarify, they were not prompted, nor did they restart. It appears and what I would expect, their machines applied the updates and restarted for them.  However, for whatever reason, some of the updates did not apply until after they entered their passwords and continued to login to their machines.

As expected, I have management down my throat, as their staff was unable to start working as they came into the office.  I cannot find any problems related to Windows Updates in the event logs. 

Why are updates requiring users to login in order to apply and is this common? If so, how are you handling this for your organization? Thanks

Windows 10 desktops with 1511. Office 2016 (using O365 current branch). The patch is question was the cumulative update to Windows 10 version 1511 released 8/9. Windows 2012 R2 servers with WSUS 4.0 (all up-to-date with esd and SSL implemented).

WSUS Update approvals in disconnected network

$
0
0
I have a situation where we'll be using an online WSUS "export" server (Win 2008 R2) connected to the internet. Metadata will be exported. The metadata and update files (new since the last metadata export) will be burned to disk. Contents of the disk wil be imported into a second "import" WSUS server (Win 2008 R2) that is resident on a disconnected network. Question: What is the minimum requirement for update file approval? On just the export server? On just the import server? On both the export and import server?

MMC cannot initialize the snap-in.

$
0
0

MMC cannot initialize the snap-in.

Name: Update Services

CLSID: FX:{8b6499ed-0241-e032-6508-da4b1c879d7e}

 

WinSvr 2008 R2 Std x64 SP1

 

any ideas??

Windows Server 2012 R2 WSUS support with SQL Always on?

$
0
0

Hi Team,

We are in a planning stage for WSUS deployment  for patching servers and client machines.

We have plan to host WSUS DB on SQL 2014 SP1 but i am stuck if WSUS DB supports 'Always On' (Always On Availability groups)? Any pointers will be appreciated.

Regards,

MMC has detected an error in a snap-in and will unload it. ERROR WSUS 3.0 SP2

$
0
0
I I have started my WSUS and I get the error MMC has detected an error in a snap-in and will unload it. If I select the option to Unload the snap-in and continue running option, the Update Services window opens with the same error. I am unable to expand on the Update Services tree also, so I am unable to to run the cleanup wizard. I am new to this and really could use some step by step help on things to try to get my WSUS back up and running. Thanks.
Viewing all 12874 articles
Browse latest View live


Latest Images