Quantcast
Channel: WSUS forum
Viewing all 12874 articles
Browse latest View live

Machine not in domain but still shows in WSUS console

$
0
0

Hi Team,

I removed few machines from Domain a week back but they are still showing up now in WSUS console. They should go off automatically right? How to perform the clean up or is there anyway to automate it?

Regards,

Santhosh B S


Regards, Santhosh B S


Update services Click reset server node to try to connect to the server again

$
0
0

Good day Sir

I have installed WSUS on Windows Server 2008 R2 64 successfully, the the Synchronization started now the console shows the below error message i'm not sure whether is the Server that is not powerful enough we have +- 80 Client computers.

The Server Spec is as follows: 

>>Processor Intel R Core (TM)2 Quad CPU Q8300 @ 2.50 GHz

>>RAM 6 GB

>>Server has two Discs Drive C and Drive with WIS Database

WINDOWS SERVER UPDATE SERVICES

$
0
0

Good day Sir

I have installed WSSUS role succesfull now the console does not want to open and gives the following errors:

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists,

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists,

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.

System.Xml.XmlException -- '_', hexadecimal value 0x14, is an invalid character. Line 3, position 476.

Source

System.Xml

Stack Trace:

  at System.Xml.XmlTextReaderImpl.Throw(Exception e)

  at System.Xml.XmlTextReaderImpl.ThrowInvalidChar(Int32 pos, Char invChar)

  at System.Xml.XmlTextReaderImpl.ParseNumericCharRefInline(Int32 startPos, Boolean expand, BufferBuilder internalSubsetBuilder, Int32& charCount, EntityType& entityType)

  at System.Xml.XmlTextReaderImpl.ParseNumericCharRef(Boolean expand, BufferBuilder internalSubsetBuilder, EntityType& entityType)

  at System.Xml.XmlTextReaderImpl.HandleEntityReference(Boolean isInAttributeValue, EntityExpandType expandType, Int32& charRefEndPos)

  at System.Xml.XmlTextReaderImpl.ParseAttributeValueSlow(Int32 curPos, Char quoteChar, NodeData attr)

  at System.Xml.XmlTextReaderImpl.ParseAttributes()

  at System.Xml.XmlTextReaderImpl.ParseElement()

  at System.Xml.XmlTextReaderImpl.ParseElementContent()

  at System.Xml.XmlLoader.LoadNode(Boolean skipOverWhitespace)

  at System.Xml.XmlLoader.ReadCurrentNode(XmlDocument doc, XmlReader reader)

  at System.Xml.XmlDocument.ReadNode(XmlReader reader)

  at System.Web.Services.Protocols.SoapHttpClientProtocol.ReadSoapException(XmlReader reader)

  at System.Web.Services.Protocols.SoapHttpClientProtocol.ReadResponse(SoapClientMessage message, WebResponse response, Stream responseStream, Boolean asyncCall)

  at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)

** this exception was nested inside of the following exception **

System.InvalidOperationException -- Response is not well-formed XML.

Source

Microsoft.UpdateServices.BaseApi

Stack Trace:

  at Microsoft.UpdateServices.Internal.ClassFactory.CallStaticMethod(Type type, String methodName, Object[] args)

  at Microsoft.UpdateServices.Internal.BaseApi.Subscription.GetSynchronizationHistory(DateTime fromDate, DateTime toDate)

  at Microsoft.UpdateServices.Internal.BaseApi.Subscription.GetLastSynchronizationInfo()

  at Microsoft.UpdateServices.UI.AdminApiAccess.SynchronizationManager.GetSyncStatus()

  at Microsoft.UpdateServices.UI.SnapIn.Scope.SyncResultsListScopeNode.RefreshActionsPaneActions()

  at Microsoft.UpdateServices.UI.SnapIn.Scope.SyncResultsListScopeNode..ctor(ServerTools serverTools)

  at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.AddChildNodes()

  at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.ConnectToServerAndPopulateNode(Boolean connectingServerToConsole)

  at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.OnExpand(AsyncStatus status)

<sub></sub>

WSUS clients not updated

$
0
0

Hi All,

I have a WSUS server wih 100 windows 10 client, and some of them not reported to the WSUS, and not updated in the last few weeks.

I have a wsus GPO, and it's working properly.

I tried to delete software distribution folder, susclientID from registry, run wuauclt commands and etc, but these not solved this problem. 

Some of them have to install Windows Defender Antivirus - KB2267602 (def: 1.269.239.0) and it's always 0%. 

Some of them have to install 1703 update package or 1709 package ,and the other try to update to 1809. But these never successfull, it standing on 0 percent.

I have a lot of failed messages in the windowsupdate logs:

2018. 12. 08 10:31:53.3529588 3424  15896 Metadata        [0]0D60.3E18::12/08/2018-10:31:53.352 [metadataintegrity] failed: hr = 0x80245004
2018. 12. 08 10:31:53.3529591 3424  15896 Metadata        [0]0D60.3E18::12/08/2018-10:31:53.352 [metadataintegrity]GetFragmentSigningConfig failed with 0x80245004. Using default enforcement mode: Audit.
2018. 12. 08 10:31:53.3529593 3424  15896 Metadata        [0]0D60.3E18::12/08/2018-10:31:53.352 [metadataintegrity] failed: hr = 0x80245004
2018. 12. 08 10:31:53.3529596 3424  15896 Metadata        [0]0D60.3E18::12/08/2018-10:31:53.352 [metadataintegrity]Policy-driven service enabled. Using Ignore Policy.
2018. 12. 08 10:31:53.3529616 3424  15896 ProtocolTalker  [0]0D60.3E18::12/08/2018-10:31:53.352 [agent]SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018. 12. 08 10:31:53.3616389 3424  15896 ProtocolTalker  [0]0D60.3E18::12/08/2018-10:31:53.361 [agent]SyncUpdates round trips: 1
2018. 12. 08 10:31:53.7533637 3424  15896 Agent           [0]0D60.3E18::12/08/2018-10:31:53.753 [agent]Found 0 updates and 3 categories in search; evaluated appl. rules of 282 out of 400 deployed entities
2018. 12. 08 10:31:53.7883600 3424  15896 Agent           [0]0D60.3E18::12/08/2018-10:31:53.788 [agent]* END * Finding updates CallerId = TrustedInstaller FOD  Id = 57
2018. 12. 08 10:31:53.7898735 3424  15896 IdleTimer       [0]0D60.3E18::12/08/2018-10:31:53.789 [agent]WU operation (CSearchCall::Init ID 57, operation # 604) stopped; does<NULL> use network; is not at background priority<NULL>
2018. 12. 08 10:31:53.7902162 9560  11232 ComApi          [0]2558.2BE0::12/08/2018-10:31:53.790 [comapi]*RESUMED*   Search ClientId = TrustedInstaller FOD, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = c+R/tG1kbE+OqKjS.1.0.0)
2018. 12. 08 10:31:53.7910593 9560  11232 ComApi          [0]2558.2BE0::12/08/2018-10:31:53.791 [comapi]* END *   Search ClientId = TrustedInstaller FOD, Updates found = 0, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = c+R/tG1kbE+OqKjS.1.0.0)
2018. 12. 08 10:31:53.7911856 9560  8756  ComApi          [0]2558.2234::12/08/2018-10:31:53.791 [comapi]* END *   All federated searches have completed. Jobs = 1, Succeeded = 1, ClientId = TrustedInstaller FOD (cV = c+R/tG1kbE+OqKjS.1.0)
2018. 12. 08 10:31:53.7917647 9560  11140 ComApi          [0]2558.2B84::12/08/2018-10:31:53.791 [comapi]ISusInternal:: DisconnectCall failed, hr=8024000C
2018. 12. 08 10:31:53.7925447 9560  11140 ComApi          [0]2558.2B84::12/08/2018-10:31:53.792 [comapi]ISusInternal:: DisconnectCall failed, hr=8024000C
2018. 12. 08 10:31:58.8152977 3424  10916 Reporter        [0]0D60.2AA4::12/08/2018-10:31:58.815 [reporting]REPORT EVENT: {87A55F42-8F51-4273-95FD-0E67EA347F47}2018-12-08 10:31:43:861+01001147 [AGENT_DETECTION_FINISHED]101{00000000-0000-0000-0000-000000000000} 00TrustedInstaller FODSuccessSoftware SynchronizationWindows Update Client successfully detected 0 updates.
2018. 12. 08 10:31:58.8187136 3424  10916 Reporter        [0]0D60.2AA4::12/08/2018-10:31:58.818 [util]CSerializationHelper:: InitSerialize failed : 0x80070002
2018. 12. 08 10:31:58.8213046 3424  10916 Reporter        [0]0D60.2AA4::12/08/2018-10:31:58.821 [util]CSerializationHelper:: InitSerialize failed : 0x80070002

Could you please help me? Have you got any idea?

Thank you in advance.

WSUS change interface language after updates

$
0
0

WSUS detect  Arabic OS  computers in our system , and I had select Arabic language for updates.

the display language for windows 10 on these computers is English but each time when clients gets updates from WSUS  the display language turn to Arabic and I could not change it to  English.

and I have to disconnect the PC from the domain to get the English language package 

is there any way to keep the display language as English while the WSUS install the Arabic updates ?

Regards, 

WSUS can't download updates

$
0
0

Hi all

Help needed here.

Yesterday I've installed WSUS on my Server 2016. It found all the needed updates, and just for testing I added 1 machine to perform updates to. The problem is that WSUS can't download these updates at all.

I aprooved first one just for testing, but nothing changed.

Does anyone has any ideas ?

WS 2016 is running on latest updates.

1809 Machines Will Not Check With WSUS after Update

$
0
0

Greetings,

Doing some testing on our test environment with the 1809 update. After the update the systems will not check the WSUS server for updates but instead will try to reach the internet. This system is not internet connected so it fails. Here is the log from the last run. Can anyone tell me where to start looking? 

I have tried to stop the services and rename the SoftwareDistribution folder but that didn't help either.

Any ideas?

2018/11/27 08:22:00.8405505 6132  8772  Shared          InitializeSus
2018/11/27 08:22:00.8410335 6132  8772  IdleTimer       Non-AoAc machine.  Aoac operations will be ignored.
2018/11/27 08:22:00.8411397 6132  8772  Agent           WU client version 10.0.17763.107
2018/11/27 08:22:00.8414541 6132  8772  Agent           SleepStudyTracker: Machine is non-AOAC. Sleep study tracker 

disabled.
2018/11/27 08:22:00.8415346 6132  8772  Agent           Base directory: C:\WINDOWS\SoftwareDistribution
2018/11/27 08:22:00.8451521 6132  8772  Agent           Datastore directory: C:\WINDOWS\SoftwareDistribution\DataStore

\DataStore.edb
2018/11/27 08:22:00.8461652 6132  8772  DataStore       JetEnableMultiInstance succeeded - applicable param count: 5, 

applied param count: 5
2018/11/27 08:22:01.3599102 6132  8772  DataStore       Service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 added
2018/11/27 08:22:01.4069797 6132  8772  DataStore       Service 9482F4B4-E343-43B6-B170-9A65BC822C77 added
2018/11/27 08:22:01.4292586 6132  8772  DataStore       Data store successfully created
2018/11/27 08:22:01.4344485 6132  8772  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
2018/11/27 08:22:01.4350496 6132  8772  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2018/11/27 08:22:01.4396549 6132  8772  Shared          Network state: Connected
2018/11/27 08:22:01.8532419 6132  8772  Misc            *FAILED* [8024000C] LoadHistoryEventFromRegistry completed
2018/11/27 08:22:01.8534011 6132  8772  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
2018/11/27 08:22:01.8534088 6132  8772  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2018/11/27 08:22:01.8534180 6132  8772  Shared          Power status changed
2018/11/27 08:22:01.8580060 6132  8772  Agent           WU client refresh cache for DisableWUAccess policy: 1
2018/11/27 08:22:01.8580098 6132  8772  Agent           Initializing global settings cache
2018/11/27 08:22:01.8580112 6132  8772  Agent           WSUS server: http://WSUSSERVER:8530
2018/11/27 08:22:01.8580127 6132  8772  Agent           WSUS status server: http://WSUSSERVER:8530
2018/11/27 08:22:01.8580140 6132  8772  Agent           Alternate Download Server: http://WSUSSERVER:8530
2018/11/27 08:22:01.8580152 6132  8772  Agent           Fill Empty Content Urls: No
2018/11/27 08:22:01.8580163 6132  8772  Agent           Target group: Update Testing
2018/11/27 08:22:01.8580174 6132  8772  Agent           Windows Update access disabled: Yes
2018/11/27 08:22:01.8580187 6132  8772  Agent           Do not connect to Windows Update Internet locations: No
2018/11/27 08:22:01.8802420 6132  8772  Agent           Initializing Windows Update Agent
2018/11/27 08:22:01.8804247 6132  8772  Agent           CPersistentTimeoutScheduler | GetTimer, returned hr = 0x80248007
2018/11/27 08:22:01.8804356 6132  8772  Agent           CPersistentTimeoutEvent | Resubscribe, no existing/cached timer 

for Id=29A863E7-8609-4D1E-B7CD-5668F857F1DB.
2018/11/27 08:22:01.8804472 6132  8772  Agent           Adding timer: 
2018/11/27 08:22:01.8804538 6132  8772  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-11-

28 13:22:01, not idle-only, not network-only
2018/11/27 08:22:01.8821476 6132  8772  IdleTimer       IdleTimer::NetworkStateChanged. Network connected? Yes
2018/11/27 08:22:01.9130973 6132  3044  DownloadManager Received power state change notification: Old: <unknown>; New: AC.
2018/11/27 08:22:01.9130995 6132  3044  DownloadManager Power state changed from <unknown> to AC.
2018/11/27 08:22:32.1551466 6068  644   ComApi          IUpdateServiceManager::AddService2
2018/11/27 08:22:32.1551509 6068  644   ComApi          Service ID = {7971f918-a847-4430-9279-4a52d1efe18d}
2018/11/27 08:22:32.1551547 6068  644   ComApi          Allow pending registration = Yes; Allow online registration = Yes; 

Register service with AU = Yes
2018/11/27 08:22:32.1695762 6132  5316  Agent           *FAILED* [80248014] GetServiceObject couldn't find service 

'117CAB2D-82B1-4B5A-A08C-4D62DBEE7782'.
2018/11/27 08:22:32.1695836 6132  5316  Agent           *FAILED* [80248014] Method failed 

[CAgentServiceManager::GetServiceObject:1902]
2018/11/27 08:22:32.1695913 6132  5316  Agent           *FAILED* [80248014] GetServiceObject couldn't find service 

'855E8A7C-ECB4-4CA3-B045-1DFA50104289'.
2018/11/27 08:22:32.1695958 6132  5316  Agent           *FAILED* [80248014] Method failed 

[CAgentServiceManager::GetServiceObject:1902]
2018/11/27 08:22:32.1696030 6132  5316  Agent           *FAILED* [80248014] GetServiceObject couldn't find service 

'7971F918-A847-4430-9279-4A52D1EFE18D'.
2018/11/27 08:22:32.1696072 6132  5316  Agent           *FAILED* [80248014] Method failed 

[CAgentServiceManager::GetServiceObject:1902]
2018/11/27 08:22:32.2112812 6132  5316  SLS             Get response for service 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 - 

forceExpire[False] asyncRefreshOnExpiry[False]
2018/11/27 08:22:32.2113895 6132  5316  SLS             Retrieving SLS response from server...
2018/11/27 08:22:32.2122669 6132  5316  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/

{117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}/x64/10.0.17763.107/0?CH=765&L=en-US&P=&PT=0x30&WUA=10.0.17763.107&MK=Dell+Inc.&MD=Latitude+E5540 and send SLS events.
2018/11/27 08:22:43.2776497 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:22:43.2778084 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:22:54.3387187 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:22:54.3388610 6132  5316  Misc            *FAILED* [8024402C] Library download error. Will retry. Retry 

Counter:0
2018/11/27 08:23:05.4082514 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:23:05.4082755 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:23:16.4895818 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:23:16.4896129 6132  5316  Misc            *FAILED* [8024402C] Library download error. Will retry. Retry 

Counter:1
2018/11/27 08:23:27.5883974 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:23:27.5884365 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:23:38.6812111 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:23:38.6812414 6132  5316  Misc            *FAILED* [8024402C] Library download error. Will retry. Retry 

Counter:2
2018/11/27 08:23:49.7840964 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:23:49.7841295 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:24:00.8383570 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:24:00.8383975 6132  5316  SLS             Complete the request URL HTTPS://sls.update.microsoft.com/SLS/

{117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}/x64/10.0.17763.107/0?CH=765&L=en-US&P=&PT=0x30&WUA=10.0.17763.107&MK=Dell+Inc.&MD=Latitude+E5540 with [8024402C] and http status code[0] and send SLS events.
2018/11/27 08:24:00.8384340 6132  5316  SLS             *FAILED* [8024402C] GetDownloadedOnWeakSSLCert
2018/11/27 08:24:00.8385510 6132  5316  SLS             *FAILED* [8024402C] Method failed [CSLSClient::GetResponse:622]
2018/11/27 08:24:00.8385767 6132  5316  Agent           Failed to retrieve SLS response data for service 117cab2d-82b1-

4b5a-a08c-4d62dbee7782, error = 0x8024402c
2018/11/27 08:24:00.8386132 6132  5316  Agent           *FAILED* [8024402C] Caller Service Recovery failed to opt in to 

service 117cab2d-82b1-4b5a-a08c-4d62dbee7782 (cV: 06PYBxxVUUCkfiBT.1)
2018/11/27 08:24:00.9255258 6132  5316  SLS             Get response for service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 - 

forceExpire[False] asyncRefreshOnExpiry[False]
2018/11/27 08:24:00.9256829 6132  5316  SLS             Retrieving SLS response from server...
2018/11/27 08:24:00.9263204 6132  5316  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/

{855E8A7C-ECB4-4CA3-B045-1DFA50104289}/x64/10.0.17763.107/0?CH=765&L=en-US&P=&PT=0x30&WUA=10.0.17763.107&MK=Dell+Inc.&MD=Latitude+E5540 and send SLS events.
2018/11/27 08:24:12.0005654 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:24:12.0005943 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:24:23.0594036 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:24:23.0594343 6132  5316  Misc            *FAILED* [8024402C] Library download error. Will retry. Retry 

Counter:0
2018/11/27 08:24:34.1679051 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:24:34.1679337 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:24:45.2300423 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:24:45.2300919 6132  5316  Misc            *FAILED* [8024402C] Library download error. Will retry. Retry 

Counter:1
2018/11/27 08:24:56.2883156 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:24:56.2883299 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:25:07.3589530 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:25:07.3589838 6132  5316  Misc            *FAILED* [8024402C] Library download error. Will retry. Retry 

Counter:2
2018/11/27 08:25:18.4192188 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:25:18.4193169 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:25:29.4799506 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:25:29.4799969 6132  5316  SLS             Complete the request URL HTTPS://sls.update.microsoft.com/SLS/

{855E8A7C-ECB4-4CA3-B045-1DFA50104289}/x64/10.0.17763.107/0?CH=765&L=en-US&P=&PT=0x30&WUA=10.0.17763.107&MK=Dell+Inc.&MD=Latitude+E5540 with [8024402C] and http status code[0] and send SLS events.
2018/11/27 08:25:29.4800215 6132  5316  SLS             *FAILED* [8024402C] GetDownloadedOnWeakSSLCert
2018/11/27 08:25:29.4801658 6132  5316  SLS             *FAILED* [8024402C] Method failed [CSLSClient::GetResponse:622]
2018/11/27 08:25:29.4801887 6132  5316  Agent           Failed to retrieve SLS response data for service 855e8a7c-ecb4-

4ca3-b045-1dfa50104289, error = 0x8024402c
2018/11/27 08:25:29.4802182 6132  5316  Agent           *FAILED* [8024402C] Caller Service Recovery failed to opt in to 

service 855e8a7c-ecb4-4ca3-b045-1dfa50104289 (cV: 06PYBxxVUUCkfiBT.2)
2018/11/27 08:25:29.5743735 6132  5316  SLS             Get response for service 7971F918-A847-4430-9279-4A52D1EFE18D - 

forceExpire[False] asyncRefreshOnExpiry[True]
2018/11/27 08:25:29.5745969 6132  5316  SLS             Retrieving SLS response from server...
2018/11/27 08:25:29.5758309 6132  5316  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/

{7971F918-A847-4430-9279-4A52D1EFE18D}/x64/10.0.17763.107/0?CH=765&L=en-US&P=&PT=0x30&WUA=10.0.17763.107&MK=Dell+Inc.&MD=Latitude+E5540 and send SLS events.
2018/11/27 08:25:40.6231711 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:25:40.6231954 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:25:51.6776217 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:25:51.6777224 6132  5316  Misc            *FAILED* [8024402C] Library download error. Will retry. Retry 

Counter:0
2018/11/27 08:26:00.1852773 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:26:00.1853026 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:26:11.2338180 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:26:11.2338557 6132  5316  Misc            *FAILED* [8024402C] Library download error. Will retry. Retry 

Counter:1
2018/11/27 08:26:22.3356747 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:26:22.3356988 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:26:33.4030335 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:26:33.4030651 6132  5316  Misc            *FAILED* [8024402C] Library download error. Will retry. Retry 

Counter:2
2018/11/27 08:26:44.5042011 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:26:44.5043573 6132  5316  Misc            *FAILED* [8024402C] WinHttp: SendRequestToServerForFileInformation 

(retrying with default proxy)
2018/11/27 08:26:55.5571490 6132  5316  Misc            *FAILED* [80072EE7] Send request
2018/11/27 08:26:55.5571883 6132  5316  SLS             Complete the request URL HTTPS://sls.update.microsoft.com/SLS/

{7971F918-A847-4430-9279-4A52D1EFE18D}/x64/10.0.17763.107/0?CH=765&L=en-US&P=&PT=0x30&WUA=10.0.17763.107&MK=Dell+Inc.&MD=Latitude+E5540 with [8024402C] and http status code[0] and send SLS events.
2018/11/27 08:26:55.5572060 6132  5316  SLS             *FAILED* [8024402C] GetDownloadedOnWeakSSLCert


WSUS Console is not showing up to date counts of patches installed in several clients

$
0
0

Hi Experts,

We are looking for help in troubleshooting the WSUS setup, for past few weeks, its observed that WSUS patches are getting installed on the respective WSUS clients with the help of WSUS server only, however the WSUS Server console is showing the counts of installed and pending which are not increasing nor decreasing.

We have performed troubleshooting in which we checked the telnet to & fro on port # 8530 (between WSUS Server and WSUS Client) , telnet was found to be working.

All of the the WSUS clients are installed with latest patches of current month

We have re-booted  WSUS server to see if it affects, but no luck.

Environment Details : WSUS Server  Ver 6.3.9600.18694 | Windows Sever 2012 R2 | VMWare based virtual environment for both WSUS Server as well WSUS Clients

Thanks & Regards

Hemant Vaswani


The world is fading...how to control.


PowerShell cmdlet "Get-WindowsCapability -Online" fails if WSUS is used on 1709

$
0
0

Hi folks,

I found that there is an access violation in Windows 10 1709 when I wan't to run "Get-WindowsCapability -Online":
Get-WindowsCapability : Get-WindowsCapability failed. Error code = 0x800f0954

If I set the registry key to (bypass WSUS)

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Windowsupdate\AU
UseWUServer=0

and restart the WindowsUpdateService (wuauserv) then the command works as expected.

How do I get the cmdlet to work with WSUS or is this a bug?

WSUS 2019 Downstreamserver bug - Downstream Computers not available on Upstream

$
0
0

Hello,

I think there might be an issue with downstream servers in server wsus 2019.

First I did update my main WSUS to 2019. All Downstream were 2016. After that I was not able to view the complete computer list on the main server. As soon as you choose the “All Computers” or a computer group that is from a downstream server the console crashes. When you delete the downstream server from the “Downstream Servers” section I am able to browse the list again.

After that I decided to reinstall all WSUS Servers with server 2019 even including the main one. And I did again get the error.

Tried it via Powershell gives me the following error.

$wsusserver = "localhost"
[reflection.assembly]::LoadWithPartialName("Microsoft.UpdateServices.Administration")
$wsus = [Microsoft.UpdateServices.Administration.AdminProxy]::getUpdateServer($wsusserver,$False)
$computerScope = New-object Microsoft.UpdateServices.Administration.ComputerTargetScope
$computerScope.IncludeDownstreamComputerTargets = $true
$wsus.GetComputerTargets($computerScope)

Exception calling "GetComputerTargets" with "1" argument(s):"Unable to cast object of type 'System.Guid' to type 'System.String'."

At line:1 char:1

If I choose to not include Downstream Computer Targets it works.

Windows 10 clients stop reporting to WSUS

$
0
0
We have found that in our WSUS environment (Server 2012 R2/WSUS 6.3.9600.18324), some (but not all) Win10 clients randomly stop reporting to the WSUS server. Is there a technet article that speaks to this issue directly?

Hank Vare

Allow Non Administrators To Receive Update Notifications Confusion

$
0
0

I've read the threads and the explanations by Lawrence but I'm still a little confused. It was stated the setting "Allow Non Administrators To Receive Update Notifications" has no effect in Windows 7, meaning whether you are an admin or non-admin you will still see update notification in the system tray, be able to click on it and go to the Windows Update in control panel, and install updates without entering any admin credentials even if UAC is on (in Windows 7). That is how I interpreted it and how it is working for non-admins in this environment which is getting updates from WSUS.

However, we have that setting -Allow Non Administrators To Receive Update Notifications- is set to Disabled. I have verified that machines are getting the policy as the registry setting "ElevateNonAdmins" is set to 0. Also, on a machine if you go to the "Who can install updates" you see that the "Allow all users to install updates on this computer" is greyed out which I'd expect because the GPO is disabled.

I read the threads on this setting and interpreted it as the "Allow Non Administrators To Receive Update Notifications" has no effect UNLESS you set it to Disabled. If set to disabled, than non admins would in fact NOT get notifications and NOT be able to install updates since it is explicitly disabled in group policy.

We are also able to go directly to Windows Update in the Start Menu, click Check For Updates, and install any that are needed as non-admins. There is no prompt for credentials or UAC.

Is this the expected behavior even with that setting disabled in Windows 7? It is quite possible that this setting has no effect on anything in Windows 7 whether Enabled or Disabled.

When i Click synchronous ,the WSUS Will Stopped

$
0
0

Win Server 2016:

When I Click synchronous,  WSUS Will Stop at Loading Synchronization history 80% Complete fewminutes then will show   Error: Connection Error,  

WSUS

My IIS Setting IIS

The WSUS administration console was unable to connect to the WSUS Server via the remote API. 

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

System.Net.WebException -- The operation has timed out

Source
System.Web.Services

Stack Trace:
   at System.Web.Services.Protocols.WebClientProtocol.GetWebResponse(WebRequest request)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.ApiRemotingCompressionProxy.GetWebResponse(WebRequest webRequest)
   at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
   at Microsoft.UpdateServices.Internal.ApiRemoting.ExecuteSPSearchUpdates(String updateScopeXml, String preferredCulture, Int32 publicationState)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.ExecuteSPSearchUpdates(String updateScopeXml, String preferredCulture, ExtendedPublicationState publicationState)
   at Microsoft.UpdateServices.Internal.BaseApi.Update.SearchUpdates(UpdateScope searchScope, ExtendedPublicationState publicationState, UpdateServer updateServer)
   at Microsoft.UpdateServices.UI.AdminApiAccess.UpdateManager.GetUpdates(ExtendedUpdateScope filter)
   at Microsoft.UpdateServices.UI.AdminApiAccess.WsusSynchronizationInfo.InitializeDerivedProperties()
   at Microsoft.UpdateServices.UI.SnapIn.Pages.SyncResultsListPage.GetSyncInfoRow(WsusSynchronizationInfo syncInfo)
   at Microsoft.UpdateServices.UI.SnapIn.Pages.SyncResultsListPage.GetListRows()



 

Unable to download updates using usoclient scaninstallwait when auto updates configured to check for updates and let user download and install option

$
0
0

HI TEam,

We are deploying WSUS in our environment where we need to schedule the download time of the updates on specific time.

We have created a GPO and configured automatic update option to check for updates and let the user decide to download and install

And also created a scheduled task with usoclient scaninstallwait and the same has been getting triggered perfectly. but we could see the updates are not getting downloaded once checking for new updates happens and it stops there. kindly help me out of this.





WSUS server keeps showing Error:Connection Error

$
0
0

I keep getting this Error:Connection Error message and even if I restart IIS and the WSUS service the reset node button doesn't work. I have to do a full reboot.

Here is the error I get

The WSUS administration console was unable to connect to the WSUS Server via the remote API. 

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists, 

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


System.IO.IOException -- The handshake failed due to an unexpected packet format.

Source
System

Stack Trace:
   at System.Net.Security.SslState.StartReadFrame(Byte[] buffer, Int32 readBytes, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.StartReceiveBlob(Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.CheckCompletionBeforeNextReceive(ProtocolToken message, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ForceAuthentication(Boolean receiveFirst, Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ProcessAuthentication(LazyAsyncResult lazyResult)
   at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)
   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)
   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
   at System.Net.TlsStream.ProcessAuthentication(LazyAsyncResult result)
   at System.Net.TlsStream.Write(Byte[] buffer, Int32 offset, Int32 size)
   at System.Net.ConnectStream.WriteHeaders(Boolean async)
** this exception was nested inside of the following exception **


System.Net.WebException -- The underlying connection was closed: An unexpected error occurred on a send.

Source
Microsoft.UpdateServices.Administration

Stack Trace:
   at Microsoft.UpdateServices.Administration.AdminProxy.CreateUpdateServer(Object[] args)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.GetUpdateServer(PersistedServerSettings settings)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.ConnectToServer()
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.get_ServerTools()

What do I need to do to fix this? I've looked around online and haven't found a solution that seems to work.

Thank you


Server 2016 not downloading the updates from WSUS

$
0
0

Hi all,

I have installed WSUS (Version: 6.3.9600.18694) on 2012 R2 OS. I have a WSUS GPO applied 2016 operating systems machines. GPO is applied properly and registry is pointing to my WSUS server. 

But,

The approved patches are not getting downloaded. stuck at 0%.

Please help

Regards,

Santhosh B S 


Regards, Santhosh B S

Windows Update Reverting on 2008 R2 - Error Code 80070422

$
0
0

Hello,

I am facing issues with October and November Security Monthly Updates.

The updates are reverting at 94% or sometimes 96%. 

The error code I am getting is 80070422. Error details from Windows Update Log:

2018-11-1203:31:21:9755481f44HandlerPost-reboot status for package Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24263.1.4: 0x80070422.
2018-11-1203:31:21:9755481f44HandlerWARNING: Got extended error: "InstallerMofErrorCode80070422Phase32ModeInstall (upgrade)ComponentMicrosoft-Windows-Application-Experience-Program-Data, Culture=neutral, PublicKeyToken=31bf3856ad364e35, ProcessorArchitecture=amd64, versionScope=NonSxS"

I have already installed KB3177467. Still doesn't work. Tried all other troubleshooting steps with no success.

Please find the Windowsupdates.log and CBS logs here:

https://1drv.ms/f/s!AsGLe0aBawYWaisLxWvlLk9697w

Any help will be appreciated.

Regards,

MMK

WSUS(WS 2016) - Clients reports are stuck at 97%

$
0
0

Hello,

I recently installed a WSUS server on a Windows Server 2016(Virtual Machine). I configured the clients to use this WSUS but all clients are either stuck at 0% or 97% for reporting. 

I tried already on every client the commands:

wuacult /resetauthorization /detectnow
wuauclt /reportnow
wuauclt /updatenow

Still they get stuck at either 0 or 97%.

Here is the log file(WindowUpdateLog) of one of the clients which is stuck at 97%:

2018/12/13 08:12:25.1880461 4160  13632 Agent           Found 0 updates and 96 categories in search; evaluated appl. rules of 2791 out of 4006 deployed entities
2018/12/13 08:12:25.2369590 4160  13632 Agent           * END * Finding updates CallerId = UpdateOrchestrator, Id = 2, Exit code = 0x00000000 (cV = JT7jeJh9oU2arG1H.1.1.0.0.2)
2018/12/13 08:12:25.2401829 4160  13632 IdleTimer       WU operation (CSearchCall::Init ID 2, operation # 6) stopped; does use network; is not at background priority
2018/12/13 08:12:25.2466905 4160  12864 ComApi          *RESUMED*   Search ClientId = UpdateOrchestrator, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = JT7jeJh9oU2arG1H.1.1.0.0)
2018/12/13 08:12:25.2470452 4160  12864 ComApi          * END *   Search ClientId = UpdateOrchestrator, Updates found = 0, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = JT7jeJh9oU2arG1H.1.1.0.0)
2018/12/13 08:12:25.2473387 4160  8720  ComApi          * END *   All federated searches have completed. Jobs = 1, Succeeded = 1, ClientId = UpdateOrchestrator (cV = JT7jeJh9oU2arG1H.1.1.1)
2018/12/13 08:13:09.8533614 4160  5040  ComApi          * START *   Federated Search ClientId = UpdateOrchestrator (cV: FHBCxuWFNESfxYdi.1.1.0)
2018/12/13 08:13:09.8535280 4160  5040  IdleTimer       WU operation (SR.UpdateOrchestrator ID 3) started; operation # 17; does use network; is not at background priority
2018/12/13 08:13:09.8536746 4160  3808  Agent           *FAILED* [80240007] Method failed [CAgentServiceManager::GetTargetedServiceMapping:3010]
2018/12/13 08:13:09.8580101 4160  3808  IdleTimer       WU operation (SR.UpdateOrchestrator ID 3, operation # 17) stopped; does use network; is not at background priority
2018/12/13 08:13:09.8716829 4160  13092 ComApi          Federated Search: Starting search against 1 service(s) (cV = FHBCxuWFNESfxYdi.1.1.0)
2018/12/13 08:13:09.8718051 4160  13092 ComApi          * START *   Search ClientId = UpdateOrchestrator, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7, Flags: 0X40010010 (cV = FHBCxuWFNESfxYdi.1.1.0.0)
2018/12/13 08:13:09.8724141 4160  13092 IdleTimer       WU operation (CSearchCall::Init ID 4) started; operation # 20; does use network; is not at background priority
2018/12/13 08:13:09.8823714 4160  13092 Agent           * START * Queueing Finding updates [CallerId = UpdateOrchestrator  Id = 4]
2018/12/13 08:13:09.8920098 4160  13092 Agent           Removing service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 from sequential scan list
2018/12/13 08:13:09.8920202 4160  13092 Agent           Service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 is not in sequential scan list
2018/12/13 08:13:09.8920262 4160  13092 Agent           Added service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 to sequential scan list
2018/12/13 08:13:09.8921260 4160  12092 Agent           Service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 is in sequential scan list
2018/12/13 08:13:09.8968739 4160  6452  Agent           * END * Queueing Finding updates [CallerId = UpdateOrchestrator  Id = 4]
2018/12/13 08:13:09.9011403 4160  6452  Agent           * START * Finding updates CallerId = UpdateOrchestrator  Id = 4 (cV = FHBCxuWFNESfxYdi.1.1.0.0.2)
2018/12/13 08:13:09.9011433 4160  6452  Agent           Online = Yes; Interactive = Yes; AllowCachedResults = No; Ignore download priority = No
2018/12/13 08:13:09.9011477 4160  6452  Agent           Criteria = IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1""
2018/12/13 08:13:09.9011510 4160  6452  Agent           ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2018/12/13 08:13:09.9011520 4160  6452  Agent           Search Scope = {Machine}
2018/12/13 08:13:09.9011557 4160  6452  Agent           Caller SID for Applicability: S-1-5-21-3952155661-3151596475-1242975335-500
2018/12/13 08:13:09.9011574 4160  6452  Agent           ProcessDriverDeferrals is set
2018/12/13 08:13:09.9509151 4160  6452  Misc            Got WSUS Client/Server URL: http://wsus.local:8530/ClientWebService/client.asmx""
2018/12/13 08:13:09.9805832 4160  6452  Driver          Skipping printer driver 3 due to incomplete info or mismatched environment - HWID[(null)] Provider[Microsoft] MfgName[Microsoft] Name[Remote Desktop Easy Print] pEnvironment[Windows x64] LocalPrintServerEnv[Windows x64]
2018/12/13 08:13:09.9805903 4160  6452  Driver          Skipping printer driver 7 due to incomplete info or mismatched environment - HWID[microsoftmicrosoft_musd] Provider[Microsoft] MfgName[Microsoft] Name[Microsoft enhanced Point and Print compatibility driver] pEnvironment[Windows NT x86] LocalPrintServerEnv[Windows x64]
2018/12/13 08:13:10.3506794 4160  6452  ProtocolTalker  ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsus.local:8530/ClientWebService/client.asmx
2018/12/13 08:13:10.3509666 4160  6452  ProtocolTalker  OK to reuse existing configuration
2018/12/13 08:13:10.3509786 4160  6452  ProtocolTalker  Cached cookie has expired or new PID is available
2018/12/13 08:13:10.3509996 4160  6452  Misc            Got WSUS SimpleTargeting URL: http://wsus.local:8530""
2018/12/13 08:13:10.3530178 4160  6452  IdleTimer       WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie) started; operation # 21; does use network; is at background priority
2018/12/13 08:13:10.3530231 4160  6452  ProtocolTalker  Initializing simple targeting cookie, clientId = a5ed5d71-0349-435c-bd8b-dda6f9b93086, target group = , DNS name = pcadminacw.walfer.local
2018/12/13 08:13:10.3530248 4160  6452  ProtocolTalker    Server URL = http://wsus.local:8530/SimpleAuthWebService/SimpleAuth.asmx
2018/12/13 08:13:10.3530408 4160  6452  WebServices     Auto proxy settings for this web service call.
2018/12/13 08:13:10.3938033 4160  6452  IdleTimer       WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie, operation # 21) stopped; does use network; is at background priority
2018/12/13 08:13:10.3939615 4160  6452  IdleTimer       WU operation (CAgentProtocolTalker::GetCookie_WithRecovery) started; operation # 22; does use network; is at background priority
2018/12/13 08:13:10.3939923 4160  6452  WebServices     Auto proxy settings for this web service call.
2018/12/13 08:13:10.4445029 4160  6452  IdleTimer       WU operation (CAgentProtocolTalker::GetCookie_WithRecovery, operation # 22) stopped; does use network; is at background priority
2018/12/13 08:13:10.4445233 4160  6452  ProtocolTalker  PTInfo: Server requested registration
2018/12/13 08:13:12.5021791 4160  6452  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 23; does use network; is at background priority
2018/12/13 08:13:12.5717665 4160  6452  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 23) stopped; does use network; is at background priority
2018/12/13 08:13:12.7386940 4160  6452  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 24; does use network; is at background priority
2018/12/13 08:13:12.8037029 4160  6452  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 24) stopped; does use network; is at background priority
2018/12/13 08:13:12.8037182 4160  6452  ProtocolTalker  SyncUpdates round trips: 2
2018/12/13 08:13:23.8714354 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:23.8765744 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{88D714A1-5FC7-48E5-B47E-BED72D5E9DCB}.200}
2018/12/13 08:13:27.2739816 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:27.2791863 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{88D714A1-5FC7-48E5-B47E-BED72D5E9DCB}.200}
2018/12/13 08:13:30.4156969 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:34.9404152 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:34.9457388 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{70E1ECB7-159E-4B7E-ABEF-16A4AC6368AD}.200}
2018/12/13 08:13:39.0810109 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:39.0860296 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{70E1ECB7-159E-4B7E-ABEF-16A4AC6368AD}.200}
2018/12/13 08:13:42.5819619 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:46.4551384 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:46.4600433 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{80C1ADF8-4F65-440F-AA23-A4BB009DB98A}.201}
2018/12/13 08:13:49.7392683 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:49.7443124 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{80C1ADF8-4F65-440F-AA23-A4BB009DB98A}.201}
2018/12/13 08:13:52.8445875 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:55.6567668 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:55.6616346 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{B145B6F7-DE2B-417F-AE3A-C9571C44CCFB}.200}
2018/12/13 08:13:58.5143519 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:13:58.5194915 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{B145B6F7-DE2B-417F-AE3A-C9571C44CCFB}.200}
2018/12/13 08:14:01.3680532 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:04.2634329 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:04.2682480 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{33B4025F-1F8B-40DC-B090-6D51E48A6D02}.200}
2018/12/13 08:14:07.0638525 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:07.0685730 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{33B4025F-1F8B-40DC-B090-6D51E48A6D02}.200}
2018/12/13 08:14:11.6653343 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:14.8999837 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:14.9047693 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{8FCF2B5B-4DA1-4B82-90EB-C542837E8532}.200}
2018/12/13 08:14:17.7619737 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:17.7669534 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{8FCF2B5B-4DA1-4B82-90EB-C542837E8532}.200}
2018/12/13 08:14:20.6314468 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:23.2557486 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:23.2601623 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{CFA6AF0D-B386-41AA-9BA6-3E72EBA90D71}.200}
2018/12/13 08:14:26.0111283 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:26.0154411 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{CFA6AF0D-B386-41AA-9BA6-3E72EBA90D71}.200}
2018/12/13 08:14:28.7406300 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:30.2466208 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:30.2468642 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{732994D3-6070-45C4-83FB-42D9B4DD2347}.200}
2018/12/13 08:14:30.8890774 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:30.8893038 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{732994D3-6070-45C4-83FB-42D9B4DD2347}.200}
2018/12/13 08:14:31.5564112 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:32.1708352 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:32.1710663 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{2399F10C-4F7C-4F69-841A-A4670777A9CC}.201}
2018/12/13 08:14:32.7759129 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:32.7762615 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{2399F10C-4F7C-4F69-841A-A4670777A9CC}.201}
2018/12/13 08:14:33.4507137 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:34.8264754 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:34.8266857 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{8A2130DB-826F-412E-ACD4-67D68D7B157C}.200}
2018/12/13 08:14:35.5695954 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:35.5698319 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{8A2130DB-826F-412E-ACD4-67D68D7B157C}.200}
2018/12/13 08:14:37.0708002 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:46.6683238 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:46.6685269 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{1D4DF492-549F-4397-AF0A-0CD6F5234BD7}.202}
2018/12/13 08:14:47.3568161 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:47.3570231 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{1D4DF492-549F-4397-AF0A-0CD6F5234BD7}.202}
2018/12/13 08:14:48.3039349 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:49.5565478 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:49.5567508 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{B4FF6C45-8C25-4FEC-8112-A193D6F7CAEB}.200}
2018/12/13 08:14:50.6359243 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:50.6362208 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{B4FF6C45-8C25-4FEC-8112-A193D6F7CAEB}.200}
2018/12/13 08:14:51.3041610 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:52.0819299 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:52.0821329 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{6BC2F851-C598-4979-91A1-BB9F81172027}.200}
2018/12/13 08:14:52.6793797 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:52.6795837 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{6BC2F851-C598-4979-91A1-BB9F81172027}.200}
2018/12/13 08:14:53.5294220 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:54.4233873 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:54.4236220 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{1590079C-4050-4C69-87C0-D788819B3AD8}.201}
2018/12/13 08:14:56.1759631 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:56.1761932 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{1590079C-4050-4C69-87C0-D788819B3AD8}.201}
2018/12/13 08:14:56.8368557 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:57.7694494 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:57.7696901 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{4B566339-301C-498F-BE25-90C279C96A5F}.200}
2018/12/13 08:14:58.3829655 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:58.3831989 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{4B566339-301C-498F-BE25-90C279C96A5F}.200}
2018/12/13 08:14:59.0520503 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:59.6357129 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:14:59.6359420 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{23E7CF46-EEBF-4BB0-96C2-2C8E894CF1AB}.200}
2018/12/13 08:15:00.3385747 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:00.3387774 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{23E7CF46-EEBF-4BB0-96C2-2C8E894CF1AB}.200}
2018/12/13 08:15:01.1901450 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:02.4211334 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:02.4213407 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{A16BCD4B-35B9-4553-A18E-5217E3DBA5E8}.200}
2018/12/13 08:15:03.2104436 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:03.2106777 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{A16BCD4B-35B9-4553-A18E-5217E3DBA5E8}.200}
2018/12/13 08:15:03.8684513 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:04.6894098 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:04.6896605 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{C85FCC92-C750-41D7-BEB2-93093AC07B71}.200}
2018/12/13 08:15:05.3336492 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:05.3338522 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{C85FCC92-C750-41D7-BEB2-93093AC07B71}.200}
2018/12/13 08:15:06.0180306 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:07.3291293 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:07.3293347 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{DBCADCA4-3108-4D22-8CDD-9280A8203825}.201}
2018/12/13 08:15:08.8553899 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:08.8556216 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{DBCADCA4-3108-4D22-8CDD-9280A8203825}.201}
2018/12/13 08:15:09.4422918 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:11.1614115 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:11.1616529 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{7E0B1F76-AEC3-4146-AE28-3B25E2A97A24}.200}
2018/12/13 08:15:13.7568582 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:13.7571136 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{7E0B1F76-AEC3-4146-AE28-3B25E2A97A24}.200}
2018/12/13 08:15:15.3489992 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:15.9763285 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:15.9765566 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{C0F7ACD7-CCA0-4268-935D-4636C6FDDCFC}.201}
2018/12/13 08:15:16.6982391 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:16.6984715 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{C0F7ACD7-CCA0-4268-935D-4636C6FDDCFC}.201}
2018/12/13 08:15:17.2993236 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:18.2521821 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:18.2524148 4160  6452  Agent           *FAILED* [80070002] Evaluate Installed rule, updateId = {{DF72C532-6259-4C38-9DBA-0D952760B50C}.200}
2018/12/13 08:15:18.8615022 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:18.8617323 4160  6452  Agent           *FAILED* [80070002] Evaluate Installable rule, updateId = {{DF72C532-6259-4C38-9DBA-0D952760B50C}.200}
2018/12/13 08:15:19.6148079 4160  6452  Handler         *FAILED* [80070002] EvaluateApplicability
2018/12/13 08:15:20.0057473 4160  6452  Agent           Found 0 updates and 96 categories in search; evaluated appl. rules of 2791 out of 4006 deployed entities
2018/12/13 08:15:20.0209133 4160  6452  Agent           * END * Finding updates CallerId = UpdateOrchestrator, Id = 4, Exit code = 0x00000000 (cV = FHBCxuWFNESfxYdi.1.1.0.0.2)
2018/12/13 08:15:20.0232874 4160  6452  IdleTimer       WU operation (CSearchCall::Init ID 4, operation # 20) stopped; does use network; is not at background priority
2018/12/13 08:15:20.0275618 4160  10080 ComApi          *RESUMED*   Search ClientId = UpdateOrchestrator, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = FHBCxuWFNESfxYdi.1.1.0.0)
2018/12/13 08:15:20.0279274 4160  10080 ComApi          * END *   Search ClientId = UpdateOrchestrator, Updates found = 0, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = FHBCxuWFNESfxYdi.1.1.0.0)
2018/12/13 08:15:20.0283054 4160  13092 ComApi          * END *   All federated searches have completed. Jobs = 1, Succeeded = 1, ClientId = UpdateOrchestrator (cV = FHBCxuWFNESfxYdi.1.1.1)
2018/12/13 08:17:36.0609708 4160  8340  Misc            Got WSUS Client/Server URL: http://wsus.local:8530/ClientWebService/client.asmx""
2018/12/13 08:17:36.0903722 4160  8340  ProtocolTalker  OK to reuse existing configuration
2018/12/13 08:17:36.0903745 4160  8340  ProtocolTalker  OK to reuse existing configuration
2018/12/13 08:17:36.0903945 4160  8340  Misc            Got WSUS SimpleTargeting URL: http://wsus.local:8530""
2018/12/13 08:17:36.0920915 4160  8340  IdleTimer       WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie) started; operation # 33; does use network; is at background priority
2018/12/13 08:17:36.0921002 4160  8340  ProtocolTalker  Initializing simple targeting cookie, clientId = a5ed5d71-0349-435c-bd8b-dda6f9b93086, target group = , DNS name = pcadminacw.walfer.local
2018/12/13 08:17:36.0921018 4160  8340  ProtocolTalker    Server URL = http://wsus.local:8530/SimpleAuthWebService/SimpleAuth.asmx
2018/12/13 08:17:36.0921205 4160  8340  WebServices     Auto proxy settings for this web service call.
2018/12/13 08:17:36.1302010 4160  8340  IdleTimer       WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie, operation # 33) stopped; does use network; is at background priority
2018/12/13 08:17:36.1304758 4160  8340  IdleTimer       WU operation (CAgentProtocolTalker::GetCookie_WithRecovery) started; operation # 34; does use network; is at background priority
2018/12/13 08:17:36.1305155 4160  8340  WebServices     Auto proxy settings for this web service call.
2018/12/13 08:17:36.1671788 4160  8340  IdleTimer       WU operation (CAgentProtocolTalker::GetCookie_WithRecovery, operation # 34) stopped; does use network; is at background priority
2018/12/13 08:17:36.1672059 4160  8340  ProtocolTalker  PTInfo: Server requested registration
2018/12/13 08:17:36.2306073 4160  8340  Misc            Got WSUS Reporting URL: http://wsus.local:8530/ReportingWebService/ReportingWebService.asmx""
2018/12/13 08:17:36.2323440 4160  8340  IdleTimer       WU operation (CLegacyEventUploader::HandleEvents) started; operation # 35; does use network; is at background priority
2018/12/13 08:17:36.2331938 4160  8340  WebServices     Auto proxy settings for this web service call.
2018/12/13 08:17:36.2703970 4160  8340  IdleTimer       WU operation (CLegacyEventUploader::HandleEvents, operation # 35) stopped; does use network; is at background priority
2018/12/13 08:27:36.2915230 4160  13640 Agent           Earliest future timer found: 
2018/12/13 08:27:36.2915327 4160  13640 Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-12-13 09:35:43, not idle-only, not network-only
2018/12/13 08:27:37.3075285 4160  14244 Misc            CSusClientGlobal::DoServicePreShutdown
2018/12/13 08:27:37.3075963 4160  14244 IdleTimer       Idle timer disabled in preparation for service shutdown
2018/12/13 08:27:37.3076026 4160  14244 Misc            WUTaskManager uninit
2018/12/13 08:27:37.3076053 4160  14244 Agent           Earliest future timer found: 
2018/12/13 08:27:37.3076133 4160  14244 Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-12-13 09:35:43, not idle-only, not network-only
2018/12/13 08:27:37.3246943 4160  14244 Misc            CreateSessionStateChangeTrigger, TYPE:2, Enable:No
2018/12/13 08:27:37.3247010 4160  14244 Misc            CreateSessionStateChangeTrigger, TYPE:4, Enable:No
2018/12/13 08:27:37.3283306 4160  14244 Misc            Agent uninit
2018/12/13 08:27:37.3330795 4160  14244 Misc            Reporter uninit
2018/12/13 08:27:37.3333553 4160  14244 Misc            network cost manager uninit
2018/12/13 08:27:37.3333760 4160  14244 Misc            Eventer uninit
2018/12/13 08:27:38.3382211 4160  14244 Misc            ServiceManager uninit
2018/12/13 08:27:38.3382421 4160  14244 Misc            PersistentTimeoutScheduler uninit
2018/12/13 08:27:38.3382438 4160  14244 Misc            datastore uninit
2018/12/13 08:27:38.3736620 4160  14244 Misc            setting cache uninit
2018/12/13 08:27:38.3736643 4160  14244 Misc            security checker uninit
2018/12/13 08:27:38.3736693 4160  14244 Misc            Test Hook uninit
2018/12/13 08:27:38.3736703 4160  14244 Misc            IdleTimer uninit
2018/12/13 08:27:38.3746443 4160  14244 Shared          * END * Service exit Exit code = 0x240001

Can anyone help me out to figure out why they are stuck?

Thanks in advance.

A Warning and Multiple Error when launching WSUS Console

$
0
0

Once in a while when I launch the WSUS console and it error out. When checking the Event logs, I see a warning and multiple errors. I'm not sure where to begging my search as how to resolve the issue.

Warning:
Log Name: Application
Source: Windows Server Update Services
Event ID: 7032
General:
The WSUS administration console was unable to connect to the WSUS Server via the remote API. 

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists, 

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


System.IO.IOException -- The handshake failed due to an unexpected packet format.

Source
System

Stack Trace:
   at System.Net.Security.SslState.StartReadFrame(Byte[] buffer, Int32 readBytes, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.StartReceiveBlob(Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.CheckCompletionBeforeNextReceive(ProtocolToken message, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ForceAuthentication(Boolean receiveFirst, Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ProcessAuthentication(LazyAsyncResult lazyResult)
   at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)
   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean preserveSyncCtx)
   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
   at System.Net.TlsStream.ProcessAuthentication(LazyAsyncResult result)
   at System.Net.TlsStream.Write(Byte[] buffer, Int32 offset, Int32 size)
   at System.Net.ConnectStream.WriteHeaders(Boolean async)
** this exception was nested inside of the following exception **


System.Net.WebException -- The underlying connection was closed: An unexpected error occurred on a send.

Source
Microsoft.UpdateServices.Administration

Stack Trace:
   at Microsoft.UpdateServices.Administration.AdminProxy.CreateUpdateServer(Object[] args)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.GetUpdateServer(PersistedServerSettings settings)
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.ConnectToServer()
   at Microsoft.UpdateServices.UI.SnapIn.Scope.ServerSummaryScopeNode.get_ServerTools()

*****************************************************************************************
Error
Log Name: Application
SOurce: Windows Server Update Services
Event ID: 12072
General:
The WSUS content directory is not accessible.
System.Net.WebException: The remote server returned an error: (503) Server Unavailable.
   at System.Net.HttpWebRequest.GetResponse()
   at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType type, HealthEventLogger logger)

*****************************************************************************************
Error
Log Name: Application
Source: Windows Server Update Services
Event ID: 12052
General:
The DSS Authentication Web Service is not working.

*****************************************************************************************
Error
Log Name: Application
Source: Windows Server Update Services
Event ID: 12042
General:
The SimpleAuth Web Service is not working.

*****************************************************************************************
Error
Log Name: Application
Source: Windows Server Update Services
Event ID: 12022
General:
The Client Web Service is not working.

*****************************************************************************************
Error
Log Name: Application
Source: Windows Server Update Services
Event ID: 12032
General:
The Server Synchronization Web Service is not working.

*****************************************************************************************
Error
Log Name: Application
Source: Windows Server Update Services
Event ID: 12012
General:
The API Remoting Web Service is not working.

*****************************************************************************************
Error
Log Name: Application
Source: Windows Server Update Services
Event ID: 12002
General:
The Reporting Web Service is not working.

*****************************************************************************************
Error
Log Name: Application
Source: Windows Server Update Services
Event ID: 13042
General: Self-update is not working.

But, a simple reboot seem to fix the issue. Any one seen or experience this issue?

WSUS GPO settings for Win 10 workstations - real world example

$
0
0

Just wondering if anyone can share their GPO setting for Windows Updates for workstations. I understand different companies will have different requirements. There are currently more than 31 GPO Windows Updates settings. Some of the GPO settings are not applicable for Win 10. Some GPO settings won't work if a certain GPO is enabled and so on.


This is what i have:

WSUS Server 2012

1500 laptops - Win 10 Enterprise 1709

Very mobile users, no fixed desk and no one leaves laptops on their desks overnight.

In summary, this is what i want to achieve.

1. Updates to automatically download any time during the day.

2. Updates scheduled to install at 1 pm.

3. Laptops should not restart when users are logged in.

4. Users get notified that updates have finished installing and laptop requires a reboot


Viewing all 12874 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>