Quantcast
Channel: WSUS forum
Viewing all 12874 articles
Browse latest View live

Getting past WSUS Cleanup Wizard time out, removing unnecessary updates.

$
0
0

Standard problem with WSUS Cleanup Wizard timing out without removing any unnecessary updates. SBS2K8. WSUS 3. 6000+ unnecessary updates awaiting approval. Huge database. Unresponsive SQL server. Lot of people have this problem:
http://social.technet.microsoft.com/Forums/en-US/9724778f-c1a0-4d24-82e4-8b2d054257d6/wsus-hangs-on-cleanup-wizard-for-unused-updates-then-disconnects-from-console?forum=winserverwsus

Drives are regularly defragged in the background. Not gonna shut down the server and have down time just to fix this.

Tried the reindexing script from
http://technet.microsoft.com/en-us/library/dd939795(WS.10).aspx
, (don't copy the command line, it has weird characters in it, just type it in manually.) and it completes but it didn't improve anything.

Found this:
http://wsus.codeplex.com/releases/view/17612
and it also times out.

Found this comment:
For anyone who is getting Timeout Expired with obsolete updates. I have a solution! Use server name : "
\\.\pipe\MSSQL$MICROSOFT##SSEE\sql\query
" to connect with SQL managment studio. Once connected manually run "
exec spGetObsoleteUpdatesToCleanup
". This will return a list of obsolete ID's. For each one run "
exec spDeleteUpdate @localUpdateID=000000
", where 000000 is the ID. For myself I found the first ID in the list took a full 37 minutes to delete and then after that I could run the cleanup through the GUI as per usual.

by jjdacl on Apr 23 at 12:55 PM 

Found that you actually need to do:
USE SUSDB
GO
exec spGetObsoleteUpdatesToCleanup

And to connect in the first place, I had to hit Options, and select named pipe from the middle pull down. 

First delete took 6 minutes and memory has spiked up to almost 15GB in use out of 16GB physical. But the WSUS console (Update Services) still shows the same number of old updates. Failure? I don't think so: I'm running the cleanup wizard again and so far it isn't timing out... It has run over night, and has made some progress; the bar has moved perhaps 5%. 

So... My take is that the SQL server causes this problem when there is to much data, because the indexes are poorly designed (not because the indexes need to be re-indexed) causing the first query to time out, which causes the cleanup to fail. Once you get past that first deletion, and have everything loaded into memory, the cleanup tool can stay connected long enough to delete each unneeded update.

Next step will be to find a command line method, such as:
http://wsus.codeplex.com/releases/view/17612
and put it into the task scheduler like Microsoft should have done at the beginning to keep this from getting out of hand.

P.S. Lawrence Garvin, please do NOT reply to this; I have no need of your arrogance.


Client not detecting needed updates from WSUS server or directly from Microsoft update

$
0
0

I am stumped on this, I have been working at it for three days and not found a solution. Background: I have a large domain and updates are working properly across most PCs and Servers. Over the past week we added six new 2012 R2 servers to the network. Each of those servers were able to detect and install updates, and reboot. After rebooting they each have failed to receive more updates since then. The initial update I did on the servers was done from my WSUS server. When I attempt to update from Microsoft directly, the update client still fails to detect the missing patches. 

Here is a log entry of an attempt to update from microsoft directly:

2016-12-2909:04:08:6867641b24IdleTmrIncremented idle timer priority operation counter to 1
2016-12-2909:04:08:686426479cMisc===========  Logging initialized (build: 7.9.9600.16441, tz: -0500)  ===========
2016-12-2909:04:08:686426479cMisc = Process: C:\Windows\Explorer.EXE
2016-12-2909:04:08:686426479cMisc = Module: C:\Windows\system32\wucltux.dll
2016-12-2909:04:08:686426479cCltUIFATAL: CNetworkCostChangeHandler::RegisterForCostChangeNotifications: CoCreateInstance failed with error 80004002
2016-12-2909:04:08:686426479cCltUIWARNING: RegisterNetworkCostChangeNotification: Error 80004002
2016-12-2909:04:11:1557641b24AUTriggering AU detection through DetectNow API
2016-12-2909:04:11:1557641b24AUTriggering Online detection (interactive) non-default
2016-12-2909:04:11:155764353cAU#############
2016-12-2909:04:11:155764353cAU## START ##  AU: Search for updates
2016-12-2909:04:11:155764353cAU#########
2016-12-2909:04:11:155764353cIdleTmrWU operation (CSearchCall::Init ID 1) started; operation # 10; does use network; is not at background priority
2016-12-2909:04:11:155764353cIdleTmrIncremented PDC RefCount for Network to 1
2016-12-2909:04:11:155764353cIdleTmrIncremented idle timer priority operation counter to 2
2016-12-2909:04:11:249764353cReport***********  Report: Initializing static reporting data  ***********
2016-12-2909:04:11:249764353cReport * OS Version = 6.3.9600.0.0.197008
2016-12-2909:04:11:249764353cReport * OS Product Type = 0x00000008
2016-12-2909:04:11:264764353cReport * Computer Brand = VMware, Inc.
2016-12-2909:04:11:264764353cReport * Computer Model = VMware Virtual Platform
2016-12-2909:04:11:264764353cReport * Platform Role = 1
2016-12-2909:04:11:264764353cReport * AlwaysOn/AlwaysConnected (AOAC) = 0
2016-12-2909:04:11:264764353cReport * Bios Revision = 6.00
2016-12-2909:04:11:264764353cReport * Bios Name = PhoenixBIOS 4.0 Release 6.0     
2016-12-2909:04:11:264764353cReport * Bios Release Date = 2014-04-14T00:00:00
2016-12-2909:04:11:264764353cReport * Bios Sku Number unavailable.
2016-12-2909:04:11:264764353cReport * Bios Vendor = Phoenix Technologies LTD
2016-12-2909:04:11:264764353cReport * Bios Family unavailable.
2016-12-2909:04:11:264764353cReport * Bios Major Release = 4
2016-12-2909:04:11:264764353cReport * Bios Minor Release = 6
2016-12-2909:04:11:264764353cReport * Locale ID = 1033
2016-12-2909:04:11:264764353cAgent*** START ***  Queueing Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 1]
2016-12-2909:04:11:264764353cAU<<## SUBMITTED ## AU: Search for updates  [CallId = {11098957-A024-4EBD-8656-041770CE9014} ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}]
2016-12-2909:04:11:264764244cAgent***  END  ***  Queueing Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 1]
2016-12-2909:04:11:264764244cAgent*************
2016-12-2909:04:11:264764244cAgent** START **  Agent: Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 1]
2016-12-2909:04:11:264764244cAgent*********
2016-12-2909:04:11:264764244cAgent * Online = Yes; Ignore download priority = No
2016-12-2909:04:11:264764244cAgent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-12-2909:04:11:264764244cAgent * ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service
2016-12-2909:04:11:264764244cAgent * Search Scope = {Machine & All Users}
2016-12-2909:04:11:264764244cAgent * Caller SID for Applicability: S-1-5-21-373770480-2062961480-879972363-13372
2016-12-2909:04:11:264764244cEPGot 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: "7971f918-a847-4430-9279-4a52d1efe18d"
2016-12-2909:04:11:280764244cSLSRetrieving SLS response from server...
2016-12-2909:04:11:280764244cSLSMaking request with URL HTTPS://sls.update.microsoft.com/SLS/{7971F918-A847-4430-9279-4A52D1EFE18D}/x64/6.3.9600.0/0?CH=41&L=en-US&P=&PT=0x8&WUA=7.9.9600.16422
2016-12-2909:04:11:968764244cMiscValidating signature for C:\Windows\SoftwareDistribution\SLS\7971F918-A847-4430-9279-4A52D1EFE18D\sls.cab:
2016-12-2909:04:11:968764244cMiscMicrosoft signed: Yes
2016-12-2909:04:11:968764244cMiscInfrastructure signed: Yes
2016-12-2909:04:11:968764244cMiscValidating signature for C:\Windows\SoftwareDistribution\SLS\7971F918-A847-4430-9279-4A52D1EFE18D\TMP1B2B.tmp:
2016-12-2909:04:11:983764244cMiscMicrosoft signed: Yes
2016-12-2909:04:11:983764244cMiscInfrastructure signed: Yes
2016-12-2909:04:11:983764244cEPGot 7971F918-A847-4430-9279-4A52D1EFE18D redir Client/Server URL: "https://fe2.update.microsoft.com/v6/ClientWebService/client.asmx"
2016-12-2909:04:11:983764244cSetupChecking for agent SelfUpdate
2016-12-2909:04:11:983764244cSetupClient version: Core: 7.9.9600.16422  Aux: 7.9.9600.16384
2016-12-2909:04:11:983764244cEPGot 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SelfUpdate URL: "https://fe2.update.microsoft.com/v10/3/windowsupdate/selfupdate"
2016-12-2909:04:12:639764244cMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2016-12-2909:04:12:639764244cMiscMicrosoft signed: Yes
2016-12-2909:04:12:639764244cMiscInfrastructure signed: Yes
2016-12-2909:04:12:639764244cMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP1DCC.tmp:
2016-12-2909:04:12:639764244cMiscMicrosoft signed: Yes
2016-12-2909:04:12:655764244cMiscInfrastructure signed: Yes
2016-12-2909:04:12:655764244cSetupSkipping SelfUpdate check based on the /SKIP directive in wuident
2016-12-2909:04:12:655764244cSetupSelfUpdate check completed.  SelfUpdate is NOT required.
2016-12-2909:04:15:343764244cPT+++++++++++  PT: Synchronizing server updates  +++++++++++
2016-12-2909:04:15:343764244cPT + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://fe2.update.microsoft.com/v6/ClientWebService/client.asmx
2016-12-2909:04:15:343764244cAgentReading cached app categories using lifetime 604800 seconds
2016-12-2909:04:15:343764244cAgentRead 1 cached app categories
2016-12-2909:04:21:484764244cPT + SyncUpdates round trips: 2
2016-12-2909:04:22:265764244cAgentWARNING: Failed to evaluate Installed rule, updateId = {{4DEB7F5F-D14D-43E2-93FA-F81B10846CF7}.200}, hr = 80070057
2016-12-2909:04:22:265764244cAgentWARNING: Failed to evaluate Installable rule, updateId = {{4DEB7F5F-D14D-43E2-93FA-F81B10846CF7}.200}, hr = 80070057
2016-12-2909:04:22:265764244cAgentWARNING: Failed to evaluate Installed rule, updateId = {{22FFD207-0EB5-4FCF-9F6A-67078327D7A3}.200}, hr = 80070057
2016-12-2909:04:22:280764244cAgentWARNING: Failed to evaluate Installed rule, updateId = {{A4ECF96E-FE76-4933-B1A9-FAA712DC2A3B}.200}, hr = 80070057
2016-12-2909:04:22:280764244cAgentWARNING: Failed to evaluate Installable rule, updateId = {{A4ECF96E-FE76-4933-B1A9-FAA712DC2A3B}.200}, hr = 80070057
2016-12-2909:04:22:280764244cAgentWARNING: Failed to evaluate Installed rule, updateId = {{9941EB5F-4953-446D-99A2-C5989C596283}.200}, hr = 80070057
2016-12-2909:04:22:280764244cAgentWARNING: Failed to evaluate Installable rule, updateId = {{9941EB5F-4953-446D-99A2-C5989C596283}.200}, hr = 80070057
2016-12-2909:04:28:015764244cPT+++++++++++  PT: Synchronizing extended update info  +++++++++++
2016-12-2909:04:28:015764244cPT + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://fe2.update.microsoft.com/v6/ClientWebService/client.asmx
2016-12-2909:04:32:156764244cAgentUpdate {FF434E78-8B6A-4860-BD0F-4AC472E29063}.101 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {566B95D4-66F6-47BA-8953-02CAEA29022C}.101 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {B932D155-4C7F-4CBC-8527-D5DF17B0A220}.101 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {B6C0F3C6-C368-4A76-A3BF-BE068C7358F0}.101 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgent * Added update {CA46FE98-F4C8-432F-9EB5-192ED4E0E5EE}.200 to search result
2016-12-2909:04:32:156764244cAgentUpdate {0C028E91-F849-476D-94CD-C5CD4CCBAD75}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {5AF4FF91-E9A7-45B3-841F-AE886BB3C658}.201 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {81E92824-528F-4583-B074-406D9ED8701B}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {95B42BE3-50BA-4AD2-908B-AF3F10304827}.201 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {547D2F41-089B-448F-9265-79579EC92F80}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {B9271F09-68F6-4AF6-A188-340D1C9AD7CC}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {29A16CC3-ADC5-45CD-99B0-50398E334137}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgent * Added update {1971370B-AA59-4AD3-8230-2364FD01E334}.200 to search result
2016-12-2909:04:32:156764244cAgent * Found 2 updates and 84 categories in search; evaluated appl. rules of 2688 out of 4336 deployed entities
2016-12-2909:04:32:156764244cAgent*********
2016-12-2909:04:32:171764244cAgent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 1]
2016-12-2909:04:32:171764244cAgent*************
2016-12-2909:04:32:171764244cIdleTmrWU operation (CSearchCall::Init ID 1, operation # 10) stopped; does use network; is not at background priority
2016-12-2909:04:32:171764244cIdleTmrDecremented PDC RefCount for Network to 0
2016-12-2909:04:32:171764244cIdleTmrDecremented idle timer priority operation counter to 1
2016-12-2909:04:32:171764f50AU>>##  RESUMED  ## AU: Search for updates [CallId = {11098957-A024-4EBD-8656-041770CE9014} ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}]
2016-12-2909:04:32:171764f50AU # 2 updates detected
2016-12-2909:04:32:171764f50AU#########
2016-12-2909:04:32:171764f50AU##  END  ##  AU: Search for updates  [CallId = {11098957-A024-4EBD-8656-041770CE9014} ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}]
2016-12-2909:04:32:171764f50AU#############
2016-12-2909:04:32:171764f50AUAll AU searches complete.

The attempt to microsoft directly returns only two optional updates. But I know based on security scanning software the server is missing over 100 security patches. Here is a second log ran using my WSUS server:

2016-12-2909:19:13:467764244cAgent * Found 0 updates and 81 categories in search; evaluated appl. rules of 1016 out of 1714 deployed entities
2016-12-2909:19:13:483764244cAgentReporting status event with 0 installable, 43 installed,  0 installed pending, 0 failed and 0 downloaded updates
2016-12-2909:19:13:483764244cAgent*********
2016-12-2909:19:13:483764244cAgent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 2]
2016-12-2909:19:13:483764244cAgent*************
2016-12-2909:19:13:483764244cIdleTmrWU operation (CSearchCall::Init ID 2, operation # 230) stopped; does use network; is not at background priority
2016-12-2909:19:13:483764244cIdleTmrDecremented PDC RefCount for Network to 0
2016-12-2909:19:13:483764244cIdleTmrDecremented idle timer priority operation counter to 1
2016-12-2909:19:13:483764f50AU>>##  RESUMED  ## AU: Search for updates [CallId = {D0C6762B-9FD5-4604-A0E2-07E347A87C06} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-12-2909:19:13:483764f50AU # 0 updates detected
2016-12-2909:19:13:483764f50AU#########
2016-12-2909:19:13:483764f50AU##  END  ##  AU: Search for updates  [CallId = {D0C6762B-9FD5-4604-A0E2-07E347A87C06} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-12-2909:19:13:483764f50AU#############
2016-12-2909:19:13:483764f50AUAll AU searches complete.
2016-12-2909:19:13:483764f50AUAU setting next detection timeout to 2016-12-29 21:15:21

I have did the normal tricks of deleting and recreating software distribution folder, reset authorization, etc. That is not working. Any advice would be appreciated.





WSUS Breaks after KB3159706, released 5/5/2016

$
0
0

Hey all, just installed KB3159706 on my WS 2012 R2 WSUS Server at 2PM on 5/5/2016.  This was supposed to fix/issues when KB3148812 was released a few weeks ago.  Don't install KB3159706, it breaks WSUS.

C'mon Microsoft, get your stuff together.  I'm tired of this amateur hour BS.



Windows 10 version 1607 not applicable

$
0
0

We have a mix of Windows 10 Pro and Enterprise clients, pointing at our WSUS server running Windows Server 2016. The clients are currently on Windows 10 version 1511, and we have set the approval to install for the following upgrades:

Feature update to Windows 10 Enterprise, version 1607, en-us

Feature update to Windows 10 Pro, Version 1607, en-us

Feature update to Windows 10 Pro, Version 1607, en-us, retail

However at least half of these systems are not detecting the update as needed. To date I have tried the following:

  • Run the SQL query described in workaround step 1 at https://support.microsoft.com/en-us/kb/3194588 - the query returns zero encrypted .esd files
  • Set the GPO Computer Configuration/Administrative Templates/Windows Components/store/Turn off the offer to update to the latest version of windows to DISABLE
  • Confirmed the MIME type for .esd is set to application/vnd.ms-cab-compressed
  • KBs 3095113 and 3159706 are not applicable as WSUS is running on Server 2016 with the latest cumulative update installed
  • Created a CNAME in the local domain so that clients can refer to the WSUS server by hostname only, and updated the GPO accordingly
  • Reset WSUS components on the target computers by stopping wuausrv and bits, deleting the Software Distribution folder, and restarting services
  • Confirmed that the target computers are up to date with cumulative updates

None of these steps have worked. How can I get these computers to view this update as applicable?

Feature update to Windows 10 1607 failed with WSUS Server 2016

$
0
0

I'm trying to update our win 10 pc's to the latest version 1607. I tried all steps provided by Microsoft to get the decrypted esd files to work.kb3159706

At last I upgraded my 2012 R2 to 2016 but unfortunally still no luck.

Still get the error: File is encrypted, but no key was provided.

Desperately need some help to fix this!

2016-12-21 10:50:16, Error                 MOUPG  RecoverCrypto: File is encrypted, but no key was provided.
2016-12-21 10:50:16, Error                 MOUPG  CDlpActionRecoverCrypto::DoCrypto(1713): Result = 0xC1800118
2016-12-21 10:50:16, Error                 MOUPG  CDlpActionRecoverCrypto::ExecuteRoutine(2465): Result = 0xC1800118
2016-12-21 10:50:16, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2101]
2016-12-21 10:50:16, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2100]
2016-12-21 10:50:16, Error                 MOUPG  CDlpActionImpl<class CDlpErrorImpl<class CDlpObjectInternalImpl<class CUnknownImpl<class IDlpAction> > >>::Execute(441): Result = 0xC1800118
2016-12-21 10:50:16, Info                  MOUPG  RecoverCrypto: Leaving Execute Method
2016-12-21 10:50:16, Error                 MOUPG  CDlpTask::ExecuteAction(3243): Result = 0xC1800118
2016-12-21 10:50:16, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2004]
2016-12-21 10:50:16, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2003]
2016-12-21 10:50:17, Error                 MOUPG  CDlpTask::ExecuteActions(3397): Result = 0xC1800118
2016-12-21 10:50:17, Info                  MOUPG  Waiting for actions thread to exit.
2016-12-21 10:50:17, Info                  MOUPG  Actions thread has exited.
2016-12-21 10:50:17, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2004]
2016-12-21 10:50:17, Warning               MOUPG  CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2000]
2016-12-21 10:50:17, Error                 MOUPG  CDlpTask::Execute(1631): Result = 0xC1800118

November KB3197868 Security patches not getting configuring, during reboot reverts

$
0
0

Hi,

I am installing  November, 2016 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems (KB3197868) on one server 2008 R2 Enterprise SP1 server . its getting install successfully but during reboot its not configuring properly, after 89 % configuring its revert...as below error. on same server other updates are getting installed.

i am looking for solution where exactly i found exact error, as i have checked the windowsupdate.log and cbs.log as below but i haven`t found any exact issue on which i can work... is any debug tool available to solve the issue of cbs.log ?

I have

already try to rename the  folder..

Error:

Windowsupdate.log

 

Installation Failure: Windows failed to install the following update with error 0x80004005: November, 2016 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems (KB3197868)

 

2016-12-24          19:29:46:454       960        b70         Handler                WARNING: Got extended error: "Generic Command                ErrorCode            80004005             Executable          bfsvc.exe             ExitCode              112         Phase    38           Mode                Install (upgrade)              Component        Microsoft-Windows-BootEnvironment-Core-MemoryDiagnostic, Culture=neutral, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=x86, versionScope=NonSxS"

 CBS.log

 

CBS    SQM: Reporting package change for package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.23615.1.3, current: Installed Invalid, pending: Default, start: Installed, applicable: Installed, target: Absent, limit: Absent, hotpatch status: DisabledBecauseNoHotpatchPackagesInitiated, status: 0x0, failure source: Not Applicable, reboot required: False, client id: DISM Package Manager Provider, initiated offline: False, execution sequence: 1456, first merged sequence: 1456

 

BFSVC: BfspCopyFile(C:\Windows\boot\PCAT\bootmgr, \\?\GLOBALROOT\Device\HarddiskVolume1\Boot\bootmgr) failed! (Attempt 60 of 60) Last Error = 0x70

 

BFSVC: Error copying boot files from C:\Windows\boot\PCAT to \\?\GLOBALROOT\Device\HarddiskVolume1\Boot! Last Error = 0x70

 

"][gle=0x80004005]

 

CheckSUR.log

=================================

Checking System Update Readiness.

Binary Version 6.1.7601.22471

Package Version 26.0

2016-12-24 18:04

Checking Windows Servicing Packages

Checking Package Manifests and Catalogs

Checking Package Watchlist

Checking Component Watchlist

Checking Packages

Checking Component Store

Summary:

Seconds executed: 1819

No errors detected

 

Events

 

Log Name:      Setup

Source:        Microsoft-Windows-Servicing

Date:          12/24/2016 7:28:56 PM

Event ID:      3

Task Category: None

Level:         Information

Keywords:     

User:          SYSTEM

Computer:      ABC

Description:

Package KB3197868 failed to be changed to the Installed state. Status: 0x80004005

 

Troubleshooting  from me

  • run the Software Update Readiness tool and checked the logs , its unable to detect any error.
  • Rebuild the Windows update datastore with rename SoftwareDistribution folder.
  • Run the commands for system file integrity check in OS sfc /scannow no error found..

Shailendra Dev

What Product (if any) will handle updates for OneDrive desktop application?

$
0
0

WSUS on Server 2012 R2:

We have multiple users who use the regular consumer version of OneDrive (NOT OneDrive for Business) and we use it as a group to share files in many cases. Shared Folders were not syncing and it turned out that was because some users had an older version of the OneDrive application that didn't updat.

I assume there is a way that we can manage OneDrive updates through WSUS, because WSUS seems to have updates for just about every Microsoft application, but I don't see anything listed in the Products list that looks like OneDrive.

Is there a Product match for OneDrive, and if so, what is it called?

Thanks,
Colin


Colin

Whats difference in Windows 10 Products WSUS?

$
0
0

In our enviroment we are rolling out Windows 10 Pro and I'm configuring WSUS to update those Windows 10 clients.

In the products categorie there are a lot Windows 10 options but what is the difference?
- Windows 10 and later drivers
- Windows 10 and later upgrade & Servicing drivers
- Windows 10 Feature On Demand
- Windows 10 GDR-DU
- Windows 10 Language Interface Packs
- Windows 10 Language Packs
- Windows 10 LTSB
- Windows 10

Also in the Classifications you can choose between "Update Rollups", "Updates" and "Upgrades". What is the difference and what I need to take?

Thanks in advance.


WSUS on Windows 2016 and Windows 10 clients (1511 - not seeing upgrades, 1607 - updates hungs on being downloaded in 100%)

$
0
0

Hi All,

I am reinstalling our old WSUS server (installed on W2012 R2) as it is having some troubles with communication with W10 clients.

I associated my first test PC (W10, 1511 version) with that new WSUS, and it sees it correctly as Windows 10 (on old it is shown as vista o_O). The thing is that on WSUS side I see that I have one upgrade - to 1607 version, but my 1511 client is not seeing it. When I check for updates on the client I got info that my device is up to date.

On my other PC that I have upgraded to 1607 manually using MS website, I got similar situation: updates are staging with "100%" of being downloaded but no further action is available:

I heard that WSUS has some troubles with talking to W10 but it was on Windows 2012, I thought on W2016 it would be over, tried to install patch found on that website:

https://support.microsoft.com/en-us/kb/3095113

But it says it cannot be installed on 2016.

So question here is how to make WSUS installed on W2016 working with W10 clients when I cannot apply KB3095113 on it.

Thank you all for any advise!

Cheers,


Windows Server 2016: WSUS console crashes when selecting All Updates

$
0
0

Hello everyone,

We’ve a domain member server running Windows Server 2016 Datacenter. The WSUS role is installed on it and configured to use SSL.

Server configurations:

Vitual machine running with 6GB RAM & 4 processors

 

Problem:

WSUS seems to be working as clients receive the updates. But when I try to list “All updates” for approval, the console crashes with the following message:

 The WSUS administration console was unable to connect to the WSUS Server via the remote API. Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.System.Net.WebException -- The operation has timed outSourceSystem.Web.ServicesStack Trace:   at System.Web.Services.Protocols.WebClientProtocol.GetWebResponse(WebRequest request)   at Microsoft.UpdateServices.Internal.DatabaseAccess.ApiRemotingCompressionProxy.GetWebResponse(WebRequest webRequest)   at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)   at Microsoft.UpdateServices.Internal.ApiRemoting.ExecuteSPSearchUpdates(String updateScopeXml, String preferredCulture, Int32 publicationState)   at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.ExecuteSPSearchUpdates(String updateScopeXml, String preferredCulture, ExtendedPublicationState publicationState)   at Microsoft.UpdateServices.Internal.BaseApi.Update.SearchUpdates(UpdateScope searchScope, ExtendedPublicationState publicationState, UpdateServer updateServer)   at Microsoft.UpdateServices.UI.AdminApiAccess.UpdateManager.GetUpdates(ExtendedUpdateScope filter)   at Microsoft.UpdateServices.UI.AdminApiAccess.WsusSynchronizationInfo.InitializeDerivedProperties()   at Microsoft.UpdateServices.UI.SnapIn.Pages.SyncResultsListPage.GetSyncInfoRow(WsusSynchronizationInfo syncInfo)   at Microsoft.UpdateServices.UI.SnapIn.Pages.SyncResultsListPage.GetListRows()


I tried to restart the services & the server even reinstalled the server from scratch no luck.

Help please!


AB

How to revert back from SSL to non-SSL on WSUS in Windows Server 2012 R2.

$
0
0

Hi,

I am testing WSUS in my home lab.

I configured a WSUS server in workgroup mode, made clients report in and check for updates and even apply them.

Then i configured a root CA ( the WSUS service is on a member server which is part of a domain, so i installed the root CA on it and got a certificate issued ).

Next I configured the IIS instance for WSUS to use SSL, and finally used the WSUSutil.exe to make WSUS listen to port 8531 rather than 8530.

All good, clients seem to communicating well with the WSUS server ( i made changes to registry keys for the clients to look for https at 8531 ).

I just wanted to know if there was any way to roll back from HTTPS to HTTP without doing a full reset of the WSUS server configuration.

Also, I tested Upstream <--> Downstream setup, and I see that the Downstream server is not allowed to narrow down to selective OS versions and sub categories as update selection but rather is forced to follow the Upstream servers selection. Is there a way around this ?

Regards,

Anshuman Misra

Client not detecting new applicable updates (client issue)

$
0
0

I have a Windows Server 2012 R2 client that has been patched up to October of 2016 with the “October, 2016 Security Monthly Quality Rollup”. This system is configured to pull updates from my WSUS server. This problem I am having is my client is showing up in WSUS as not missing any updates. The systems is properly communicating to my WSUS server as both “Last Status Report” and “Last Contact” are current. I see these update respectively when I run a “wuauclt /reportnow” and “wuauclt /detectnow”. I would expect my client via its report to WSUS to detect that it is in need of updates post October 2016 (e.g. “December, 2016 Security Monthly Quality Rollup”). 

Below are a few things I have tried. 

  1. I obviously checked to see if KB3205401 (December, 2016 Security Monthly Quality Rollup) or KB3205400 (December, 2016 Security Only Quality Update) were already installed, they are not. 
  2. I manually approved the December updates only to find my client does not download them to install (as it’s not detecting them as applicable).
  3. I’ve also tried having my client connect to the Internet for updates, but it still does not detect needing anything later than October.
  4. Ive tried stopping the wuauserv service, renaming the C:\Windows\SoftwareDistribution to something else, and starting the wuauserv service thus creating a new SoftwareDistribution folder. I then checked for updates and still nothing (even with them approved in WSUS). 


My WSUS server is configured to synchronize updates for Windows Server 2012 R2 products and Critical and Security classifications. 

I suppose this is more a client issues than a WSUS issue. A snippit of my client's windows update log from after clicking check of updates can be foundhere. I'm not too concerned about the warnings on lines 55-61 as I see those same warnings on other 2012r2 systems that are working correctly.

Any thoughts? 

Thanks! 


Windows 10 Anniversary Update (1607)

$
0
0

Anyone can explain why Windows 10 1607 client can't download WSUS updates ?

WSUS is install on Windows Server 2012 R2 Server.

When a Windows 10 client detect a Windows 10 (1607 only) update on WSUS, client can't download every update ( Windows or other)

If there are only Office update everything works good.

Cannot connect to WSUS -- error 0x8024402f

$
0
0

We have Windows 10 fresh images that will not install updates from WSUS.  They usually fail with error0x8024402f, but occasionally I see 0x80244010.

We are running WSUS version 3.0 SP2 (3.2.7600.226) -- fully patched on Windows Server 2008.  It will be upgraded next year, but I really don't like the idea of all new machines having zero access to updates.  We are a school in a very rural area with limited bandwidth (2 Mbps shared among around 100 staff/students).  Because of this, going straight to Microsoft for updates is not an option!

The problem occurs with both Windows 10 Pro (1511) images and Windows 10 Edu (1607) images.  I have also seen a few Windows 7 machines with signs of the problem.

The log file from PowerShell --> Get-WindowsUpdateLog is HUGE for a text file (~2 MB and over 100,000 characters, which seems odd to me for a fresh install).  Because of this, I can't paste it into this message.

Here is a Dropbox link to it: https://www.dropbox.com/s/kskhf52ofatvwoc/WindowsUpdate.log?dl=0     (I would have linked it, but the system is saying something about no links until you verify your account...)

Anything you experts can share that could help us would be greatly appreciated!  We are on an extremely tight budget and can't really afford a $500 support ticket to Microsoft.


WSUS Server


Some PC are update properly but some clients showing status Not yet reported

WSUS updates crashing MPLS connection

$
0
0

WSUS 4.0 running on windows server 2013.

WSUS is located at site 1, we have 10 MB MPLS connection to site 2.

this is only the second month since we upgraded many systems to windows 10, and suddenly our MPLS connection to site 2 is crashing..  where typically pings are 7-8 MS, we see 43-55 MS, and mutliple drops for pings.

ISP says we are overloading the 10 MB pipe, they ran packet trace, and found the issue is due to large amounts of traffic from single IP at site 1, to multiple IPs at site 2.

turns out the IP at site 1 was our WSUS server, it was trying to send over 100 MB to one IP at site 2, and smaller amounts to other IPS at site 2.

the moment I disable network connection on our WSUS server, the MPLS connection goes back to normal.

for WSUS settings in the GPO I have:

  • Autodownload and notifiy for install
  • Scheduled install is Saturday at 19:00
  • Check for updates every 4 hours
  • Download express installation files is checked

I also set BITS throttling on the WSUS server itself, but that seems to only affect update downloads from microsoft, I still have the problem with bandwidth as soon as I startup WSUS.

what else can I look at?

Client not detecting needed updates from WSUS server or directly from Microsoft update

$
0
0

I am stumped on this, I have been working at it for three days and not found a solution. Background: I have a large domain and updates are working properly across most PCs and Servers. Over the past week we added six new 2012 R2 servers to the network. Each of those servers were able to detect and install updates, and reboot. After rebooting they each have failed to receive more updates since then. The initial update I did on the servers was done from my WSUS server. When I attempt to update from Microsoft directly, the update client still fails to detect the missing patches. 

Here is a log entry of an attempt to update from microsoft directly:

2016-12-2909:04:08:6867641b24IdleTmrIncremented idle timer priority operation counter to 1
2016-12-2909:04:08:686426479cMisc===========  Logging initialized (build: 7.9.9600.16441, tz: -0500)  ===========
2016-12-2909:04:08:686426479cMisc = Process: C:\Windows\Explorer.EXE
2016-12-2909:04:08:686426479cMisc = Module: C:\Windows\system32\wucltux.dll
2016-12-2909:04:08:686426479cCltUIFATAL: CNetworkCostChangeHandler::RegisterForCostChangeNotifications: CoCreateInstance failed with error 80004002
2016-12-2909:04:08:686426479cCltUIWARNING: RegisterNetworkCostChangeNotification: Error 80004002
2016-12-2909:04:11:1557641b24AUTriggering AU detection through DetectNow API
2016-12-2909:04:11:1557641b24AUTriggering Online detection (interactive) non-default
2016-12-2909:04:11:155764353cAU#############
2016-12-2909:04:11:155764353cAU## START ##  AU: Search for updates
2016-12-2909:04:11:155764353cAU#########
2016-12-2909:04:11:155764353cIdleTmrWU operation (CSearchCall::Init ID 1) started; operation # 10; does use network; is not at background priority
2016-12-2909:04:11:155764353cIdleTmrIncremented PDC RefCount for Network to 1
2016-12-2909:04:11:155764353cIdleTmrIncremented idle timer priority operation counter to 2
2016-12-2909:04:11:249764353cReport***********  Report: Initializing static reporting data  ***********
2016-12-2909:04:11:249764353cReport * OS Version = 6.3.9600.0.0.197008
2016-12-2909:04:11:249764353cReport * OS Product Type = 0x00000008
2016-12-2909:04:11:264764353cReport * Computer Brand = VMware, Inc.
2016-12-2909:04:11:264764353cReport * Computer Model = VMware Virtual Platform
2016-12-2909:04:11:264764353cReport * Platform Role = 1
2016-12-2909:04:11:264764353cReport * AlwaysOn/AlwaysConnected (AOAC) = 0
2016-12-2909:04:11:264764353cReport * Bios Revision = 6.00
2016-12-2909:04:11:264764353cReport * Bios Name = PhoenixBIOS 4.0 Release 6.0     
2016-12-2909:04:11:264764353cReport * Bios Release Date = 2014-04-14T00:00:00
2016-12-2909:04:11:264764353cReport * Bios Sku Number unavailable.
2016-12-2909:04:11:264764353cReport * Bios Vendor = Phoenix Technologies LTD
2016-12-2909:04:11:264764353cReport * Bios Family unavailable.
2016-12-2909:04:11:264764353cReport * Bios Major Release = 4
2016-12-2909:04:11:264764353cReport * Bios Minor Release = 6
2016-12-2909:04:11:264764353cReport * Locale ID = 1033
2016-12-2909:04:11:264764353cAgent*** START ***  Queueing Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 1]
2016-12-2909:04:11:264764353cAU<<## SUBMITTED ## AU: Search for updates  [CallId = {11098957-A024-4EBD-8656-041770CE9014} ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}]
2016-12-2909:04:11:264764244cAgent***  END  ***  Queueing Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 1]
2016-12-2909:04:11:264764244cAgent*************
2016-12-2909:04:11:264764244cAgent** START **  Agent: Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 1]
2016-12-2909:04:11:264764244cAgent*********
2016-12-2909:04:11:264764244cAgent * Online = Yes; Ignore download priority = No
2016-12-2909:04:11:264764244cAgent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2016-12-2909:04:11:264764244cAgent * ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service
2016-12-2909:04:11:264764244cAgent * Search Scope = {Machine & All Users}
2016-12-2909:04:11:264764244cAgent * Caller SID for Applicability: S-1-5-21-373770480-2062961480-879972363-13372
2016-12-2909:04:11:264764244cEPGot 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: "7971f918-a847-4430-9279-4a52d1efe18d"
2016-12-2909:04:11:280764244cSLSRetrieving SLS response from server...
2016-12-2909:04:11:280764244cSLSMaking request with URL HTTPS://sls.update.microsoft.com/SLS/{7971F918-A847-4430-9279-4A52D1EFE18D}/x64/6.3.9600.0/0?CH=41&L=en-US&P=&PT=0x8&WUA=7.9.9600.16422
2016-12-2909:04:11:968764244cMiscValidating signature for C:\Windows\SoftwareDistribution\SLS\7971F918-A847-4430-9279-4A52D1EFE18D\sls.cab:
2016-12-2909:04:11:968764244cMiscMicrosoft signed: Yes
2016-12-2909:04:11:968764244cMiscInfrastructure signed: Yes
2016-12-2909:04:11:968764244cMiscValidating signature for C:\Windows\SoftwareDistribution\SLS\7971F918-A847-4430-9279-4A52D1EFE18D\TMP1B2B.tmp:
2016-12-2909:04:11:983764244cMiscMicrosoft signed: Yes
2016-12-2909:04:11:983764244cMiscInfrastructure signed: Yes
2016-12-2909:04:11:983764244cEPGot 7971F918-A847-4430-9279-4A52D1EFE18D redir Client/Server URL: "https://fe2.update.microsoft.com/v6/ClientWebService/client.asmx"
2016-12-2909:04:11:983764244cSetupChecking for agent SelfUpdate
2016-12-2909:04:11:983764244cSetupClient version: Core: 7.9.9600.16422  Aux: 7.9.9600.16384
2016-12-2909:04:11:983764244cEPGot 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SelfUpdate URL: "https://fe2.update.microsoft.com/v10/3/windowsupdate/selfupdate"
2016-12-2909:04:12:639764244cMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2016-12-2909:04:12:639764244cMiscMicrosoft signed: Yes
2016-12-2909:04:12:639764244cMiscInfrastructure signed: Yes
2016-12-2909:04:12:639764244cMiscValidating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP1DCC.tmp:
2016-12-2909:04:12:639764244cMiscMicrosoft signed: Yes
2016-12-2909:04:12:655764244cMiscInfrastructure signed: Yes
2016-12-2909:04:12:655764244cSetupSkipping SelfUpdate check based on the /SKIP directive in wuident
2016-12-2909:04:12:655764244cSetupSelfUpdate check completed.  SelfUpdate is NOT required.
2016-12-2909:04:15:343764244cPT+++++++++++  PT: Synchronizing server updates  +++++++++++
2016-12-2909:04:15:343764244cPT + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://fe2.update.microsoft.com/v6/ClientWebService/client.asmx
2016-12-2909:04:15:343764244cAgentReading cached app categories using lifetime 604800 seconds
2016-12-2909:04:15:343764244cAgentRead 1 cached app categories
2016-12-2909:04:21:484764244cPT + SyncUpdates round trips: 2
2016-12-2909:04:22:265764244cAgentWARNING: Failed to evaluate Installed rule, updateId = {{4DEB7F5F-D14D-43E2-93FA-F81B10846CF7}.200}, hr = 80070057
2016-12-2909:04:22:265764244cAgentWARNING: Failed to evaluate Installable rule, updateId = {{4DEB7F5F-D14D-43E2-93FA-F81B10846CF7}.200}, hr = 80070057
2016-12-2909:04:22:265764244cAgentWARNING: Failed to evaluate Installed rule, updateId = {{22FFD207-0EB5-4FCF-9F6A-67078327D7A3}.200}, hr = 80070057
2016-12-2909:04:22:280764244cAgentWARNING: Failed to evaluate Installed rule, updateId = {{A4ECF96E-FE76-4933-B1A9-FAA712DC2A3B}.200}, hr = 80070057
2016-12-2909:04:22:280764244cAgentWARNING: Failed to evaluate Installable rule, updateId = {{A4ECF96E-FE76-4933-B1A9-FAA712DC2A3B}.200}, hr = 80070057
2016-12-2909:04:22:280764244cAgentWARNING: Failed to evaluate Installed rule, updateId = {{9941EB5F-4953-446D-99A2-C5989C596283}.200}, hr = 80070057
2016-12-2909:04:22:280764244cAgentWARNING: Failed to evaluate Installable rule, updateId = {{9941EB5F-4953-446D-99A2-C5989C596283}.200}, hr = 80070057
2016-12-2909:04:28:015764244cPT+++++++++++  PT: Synchronizing extended update info  +++++++++++
2016-12-2909:04:28:015764244cPT + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://fe2.update.microsoft.com/v6/ClientWebService/client.asmx
2016-12-2909:04:32:156764244cAgentUpdate {FF434E78-8B6A-4860-BD0F-4AC472E29063}.101 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {566B95D4-66F6-47BA-8953-02CAEA29022C}.101 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {B932D155-4C7F-4CBC-8527-D5DF17B0A220}.101 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {B6C0F3C6-C368-4A76-A3BF-BE068C7358F0}.101 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgent * Added update {CA46FE98-F4C8-432F-9EB5-192ED4E0E5EE}.200 to search result
2016-12-2909:04:32:156764244cAgentUpdate {0C028E91-F849-476D-94CD-C5CD4CCBAD75}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {5AF4FF91-E9A7-45B3-841F-AE886BB3C658}.201 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {81E92824-528F-4583-B074-406D9ED8701B}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {95B42BE3-50BA-4AD2-908B-AF3F10304827}.201 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {547D2F41-089B-448F-9265-79579EC92F80}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {B9271F09-68F6-4AF6-A188-340D1C9AD7CC}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgentUpdate {29A16CC3-ADC5-45CD-99B0-50398E334137}.200 is pruned out due to potential supersedence
2016-12-2909:04:32:156764244cAgent * Added update {1971370B-AA59-4AD3-8230-2364FD01E334}.200 to search result
2016-12-2909:04:32:156764244cAgent * Found 2 updates and 84 categories in search; evaluated appl. rules of 2688 out of 4336 deployed entities
2016-12-2909:04:32:156764244cAgent*********
2016-12-2909:04:32:171764244cAgent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 1]
2016-12-2909:04:32:171764244cAgent*************
2016-12-2909:04:32:171764244cIdleTmrWU operation (CSearchCall::Init ID 1, operation # 10) stopped; does use network; is not at background priority
2016-12-2909:04:32:171764244cIdleTmrDecremented PDC RefCount for Network to 0
2016-12-2909:04:32:171764244cIdleTmrDecremented idle timer priority operation counter to 1
2016-12-2909:04:32:171764f50AU>>##  RESUMED  ## AU: Search for updates [CallId = {11098957-A024-4EBD-8656-041770CE9014} ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}]
2016-12-2909:04:32:171764f50AU # 2 updates detected
2016-12-2909:04:32:171764f50AU#########
2016-12-2909:04:32:171764f50AU##  END  ##  AU: Search for updates  [CallId = {11098957-A024-4EBD-8656-041770CE9014} ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}]
2016-12-2909:04:32:171764f50AU#############
2016-12-2909:04:32:171764f50AUAll AU searches complete.

The attempt to microsoft directly returns only two optional updates. But I know based on security scanning software the server is missing over 100 security patches. Here is a second log ran using my WSUS server:

2016-12-2909:19:13:467764244cAgent * Found 0 updates and 81 categories in search; evaluated appl. rules of 1016 out of 1714 deployed entities
2016-12-2909:19:13:483764244cAgentReporting status event with 0 installable, 43 installed,  0 installed pending, 0 failed and 0 downloaded updates
2016-12-2909:19:13:483764244cAgent*********
2016-12-2909:19:13:483764244cAgent**  END  **  Agent: Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 2]
2016-12-2909:19:13:483764244cAgent*************
2016-12-2909:19:13:483764244cIdleTmrWU operation (CSearchCall::Init ID 2, operation # 230) stopped; does use network; is not at background priority
2016-12-2909:19:13:483764244cIdleTmrDecremented PDC RefCount for Network to 0
2016-12-2909:19:13:483764244cIdleTmrDecremented idle timer priority operation counter to 1
2016-12-2909:19:13:483764f50AU>>##  RESUMED  ## AU: Search for updates [CallId = {D0C6762B-9FD5-4604-A0E2-07E347A87C06} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-12-2909:19:13:483764f50AU # 0 updates detected
2016-12-2909:19:13:483764f50AU#########
2016-12-2909:19:13:483764f50AU##  END  ##  AU: Search for updates  [CallId = {D0C6762B-9FD5-4604-A0E2-07E347A87C06} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2016-12-2909:19:13:483764f50AU#############
2016-12-2909:19:13:483764f50AUAll AU searches complete.
2016-12-2909:19:13:483764f50AUAU setting next detection timeout to 2016-12-29 21:15:21

I have did the normal tricks of deleting and recreating software distribution folder, reset authorization, etc. That is not working. Any advice would be appreciated.





windows update gets error 80072F78

Does driver deployment with WSUS (still) work?

$
0
0

Hi.

I'd like to hear from WSUS administrators if they are able to deploy drivers with WSUS.

I did that years ago and it worked but on our new WSUS server 2012 R2, it does not work. Drivers are not detected by the clients while other updates are detected. WSUS reporting shows, those drivers are needed nowhere.

If I retrieve such an update file (.cab) from wsuscontent and put it to the test and extract it, I can install the driver within and it suits and is newer than the former driver.

Viewing all 12874 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>