Quantcast
Viewing all 12874 articles
Browse latest View live

W2016 WSUS Server no updates error 0x80244019

Hi All,
I'm running W2016 standard running WSUS v10.0.14393.3085 with on proxy on a dell poweredge r510, which is on an enterprise domain (my managed WSUS GPOs for clients and server in my OU).  
Within WSUS, all clients within the computer and server groups (two separate GPOs w/ intranet, statistics, and alternative address as http://myservername.server.enterprise.com:8530) have been reporting and getting updates for some time (Synched from Microsoft Update), EXCEPT for the W2016 WSUS server itself (reports and tries to download only).  When approved updates are pushed to all clients from this WSUS server, this server as a client, always results a download error 0x80244019 for its scheduled updates.

I have tried the wupdate troubleshooter, stop services to delete the Software Distribution folder, run sfc and dism tools successfully, extending the IIS limits as often recommended, ran a script to update the synch point,.and other troubleshooting steps.

Generally, the wupdate logs on this W2016 WSUS server show "Failed to connect to the DO service", GetDOManager() failed, DO download failed with error 80246008[Extended: 80040154], falling back to BITS, DownloadManager Downloading from http://myservername.server.enterprise.com:8530/c/msdownload/update/software/secu/2019/09/windows10.0-kb4512574-x64-express_b177e2c2174b489ceff667d52df7f4c8ce03a9f3.cab to C:\Windows\SoftwareDistribution\Download\2d9e284ea8b5dc47a58881030534a0ae\Windows10.0-KB4512574-x64-express.cab (full file).  DownloadManager Error 0x80244019 occurred while downloading update; notifying dependent calls., DownloadManager The update's sandbox is in use.

In regard to the Wsus server as client logs, I don't understand the "Unknown( 10): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found)".  Also, what and from where is the Wsus server trying to download and install that is different from the others?
Thanks

Differences in Wsus,  PC and Server WU logs are:

Wsus Server as client:
2019/09/12 10:56:26.6109407 1036  7912  Agent           Initializing Windows Update Agent
2019/09/12 10:56:26.6110934 1036  7912  DownloadManager Download manager restoring 0 downloads
2019/09/12 10:56:26.6112237 1036  7912  Agent           CPersistentTimeoutScheduler | GetTimer, returned hr = 0x00000000
2019/09/12 10:56:26.6338555 1036  7656  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
2019/09/12 10:56:26.6338680 1036  7656  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2019/09/12 10:56:26.6340696 1036  7656  Shared          Power status changed
2019/09/12 10:56:26.6401693 1036  11224 Shared          Effective power state: AC
2019/09/12 10:56:26.6401712 1036  11224 DownloadManager Power state change detected. Source now: AC
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 10): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 11): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 12): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 13): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 14): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
2019/09/12 10:56:48.6583863 1036  11224 Agent           Obtained a network PDC reference for callID {F4A4BC25-72E3-4138-91AA-0BBE8787A39F} with No-Progress-Timeout set to 4294967295; ActivationID: 11.
2019/09/12 10:56:48.6653620 1036  11224 DownloadManager * START * Begin Downloading Updates [CallerId = UpdateOrchestrator] [Call ID = F4A4BC25-72E3-4138-91AA-0BBE8787A39F]
2019/09/12 10:56:48.6653695 1036  11224 DownloadManager Priority = 3, NetworkCostPolicy = 0, Interactive = 1, Download on Battery = 1, Bypass Regulation = 1, Owner is system = 1, Proxy session id = 2, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
2019/09/12 10:56:48.6653704 1036  11224 DownloadManager Updates to download = 1
2019/09/12 10:56:48.6653718 1036  11224 Agent             Title = 2019-09 Servicing Stack Update for Windows Server 2016 for x64-based Systems (KB4512574)
2019/09/12 10:56:48.6653779 1036  11224 Agent             UpdateId = DF51B003-58D6-42D6-AD9E-D81ADAA1437E.200
2019/09/12 10:56:48.6653788 1036  11224 Agent               Bundles 1 updates:
2019/09/12 10:56:48.6653844 1036  11224 Agent                 0276DFC7-ACCD-45B2-B0D8-33F8A88250C1.200
2019/09/12 10:56:48.6654551 1036  11224 DownloadManager No locked revisions found for update DF51B003-58D6-42D6-AD9E-D81ADAA1437E; locking the user-specified revision.
2019/09/12 10:56:48.6917724 1036  11224 DownloadManager No locked revisions found for update 0276DFC7-ACCD-45B2-B0D8-33F8A88250C1; locking the user-specified revision.
2019/09/12 10:56:48.7121951 1036  11224 DownloadManager Regulation: {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} - Loaded sequence number 65535 for regulation category PerUpdate.
2019/09/12 10:56:48.7121970 1036  11224 DownloadManager Regulation: {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} - Loaded sequence number 65535 for regulation category Low.
2019/09/12 10:56:48.7121984 1036  11224 DownloadManager Regulation: {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} - Loaded sequence number 65535 for regulation category Normal.
2019/09/12 10:56:48.7121988 1036  11224 DownloadManager Regulation: {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} - Loaded sequence number 65535 for regulation category High.
2019/09/12 10:56:48.7593079 1036  11224 Handler         Loaded state: cCompleteIterations: 0, pt: Unknown, nNextRequestID: 0.
2019/09/12 10:56:48.9161840 1036  11224 DownloadManager Queueing update {0276DFC7-ACCD-45B2-B0D8-33F8A88250C1}.200 for download handler request generation.
2019/09/12 10:56:48.9250379 1036  11224 Handler         Loaded state: cCompleteIterations: 0, pt: Unknown, nNextRequestID: 0.
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 10): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 11): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 12): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 13): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
2019/09/12 10:56:49.0097850 1036  11224 Shared          Effective power state: AC
2019/09/12 10:56:49.0097915 1036  11224 Agent           Released network PDC reference for callId {F4A4BC25-72E3-4138-91AA-0BBE8787A39F}; ActivationID: 11
2019/09/12 10:56:49.0097989 1036  11224 Agent           Obtained a network PDC reference for callID {F4A4BC25-72E3-4138-91AA-0BBE8787A39F} with No-Progress-Timeout set to 4294967295; ActivationID: 16.
1600/12/31 19:00:00.0000000 1036  7912                  Unknown( 14): GUID=aa07f95d-91be-3f47-51b3-717e4c7ddc98 (No Format Information found).
2019/09/12 10:56:49.0169418 1036  10580 Agent           WU client calls back to download call {F4A4BC25-72E3-4138-91AA-0BBE8787A39F} with code Call progress and error 0
2019/09/12 10:56:49.0225203 1036  11224 DownloadManager * END * Begin Downloading Updates CallerId = UpdateOrchestrator
2019/09/12 10:56:49.0225268 1036  11224 Shared          Effective power state: AC
2019/09/12 10:56:49.0225347 1036  11224 Agent           Obtained a network PDC reference for callID {6B4A26A7-EC8A-4366-804A-5005A33AC493} with No-Progress-Timeout set to 4294967295; ActivationID: 17.
2019/09/12 10:56:49.0259758 1036  11224 DownloadManager * START * Begin Downloading Updates [CallerId = UpdateOrchestrator] [Call ID = 6B4A26A7-EC8A-4366-804A-5005A33AC493]
2019/09/12 10:56:49.0259828 1036  11224 DownloadManager Priority = 3, NetworkCostPolicy = 0, Interactive = 1, Download on Battery = 1, Bypass Regulation = 1, Owner is system = 1, Proxy session id = 2, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
2019/09/12 10:56:49.0259842 1036  11224 DownloadManager Updates to download = 1
2019/09/12 10:56:49.0259851 1036  11224 Agent             Title = 2019-09 Cumulative Update for Windows Server 2016 for x64-based Systems (KB4516044)
2019/09/12 10:56:49.0259916 1036  11224 Agent             UpdateId = 5BD21FF7-DD92-4CB4-A08A-E15994C99CAD.200
2019/09/12 10:56:49.0259921 1036  11224 Agent               Bundles 1 updates:
2019/09/12 10:56:49.0259977 1036  11224 Agent                 B8FB5A48-445F-43FE-87E6-30AF9B0482D8.200
2019/09/12 10:56:49.0260582 1036  11224 DownloadManager No locked revisions found for update 5BD21FF7-DD92-4CB4-A08A-E15994C99CAD; locking the user-specified revision.
2019/09/12 10:56:49.0305503 1036  11104 Handler         Loaded state: cCompleteIterations: 0, pt: Unknown, nNextRequestID: 0.
2019/09/12 10:56:49.0334440 1036  11224 DownloadManager No locked revisions found for update B8FB5A48-445F-43FE-87E6-30AF9B0482D8; locking the user-specified revision.
2019/09/12 10:56:49.0583900 1036  11104 DownloadManager Generating download request for update {0276DFC7-ACCD-45B2-B0D8-33F8A88250C1}.200
2019/09/12 10:56:49.0596416 1036  11104 DownloadManager Calling into handler 0x8 to generate download request for update 0276DFC7-ACCD-45B2-B0D8-33F8A88250C1.200
2019/09/12 10:56:49.0596840 1036  11104 Handler         Generating request for CBS update 0276DFC7-ACCD-45B2-B0D8-33F8A88250C1 in sandbox C:\Windows\SoftwareDistribution\Download\2d9e284ea8b5dc47a58881030534a0ae
2019/09/12 10:56:49.0714944 1036  11104 Handler         Loaded state: cCompleteIterations: 0, pt: Unknown, nNextRequestID: 0.
2019/09/12 10:56:49.0715079 1036  11104 Handler         Selected payload type is Express
2019/09/12 10:56:49.0715610 1036  11104 Handler         Detected download state is dsStart
2019/09/12 10:56:49.0715805 1036  11104 Handler         Adding Windows10.0-KB4512574-x64-express.cab (entire file) to request list.
2019/09/12 10:56:49.2843768 1036  11104 Handler         Saved state: cCompleteIterations: 0, pt: Express, nNextRequestID: 1.
2019/09/12 10:56:49.2843838 1036  11104 Handler         Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
2019/09/12 10:56:49.6963948 1036  11224 Handler         Loaded state: cCompleteIterations: 0, pt: Unknown, nNextRequestID: 0.
2019/09/12 10:56:49.7157637 1036  11224 DownloadManager Failed to connect to the DO service; (hr = 80040154)
2019/09/12 10:56:49.7157651 1036  11224 DownloadManager GetDOManager() failed, hr=80246008, hrExtended=80040154
2019/09/12 10:56:49.7157670 1036  11224 DownloadManager Failed creating DO job with hr 80246008
2019/09/12 10:56:49.7236690 1036  11224 DownloadManager DO download failed with error 80246008[Extended: 80040154], falling back to BITS and retrying with new Download Job.
2019/09/12 10:56:49.7339323 1036  11224 Handler         Loaded state: cCompleteIterations: 0, pt: Unknown, nNextRequestID: 0.
2019/09/12 10:56:50.0735368 1036  11224 DownloadManager BITS job initialized: JobId = {39FA21EE-DCB0-4C9A-AEE3-6F83D5A485AD}
2019/09/12 10:56:50.1283929 1036  11224 DownloadManager Downloading from http://myservername.server.enterprise.com:8530/c/msdownload/update/software/secu/2019/09/windows10.0-kb4512574-x64-express_b177e2c2174b489ceff667d52df7f4c8ce03a9f3.cab to C:\Windows\SoftwareDistribution\Download\2d9e284ea8b5dc47a58881030534a0ae\Windows10.0-KB4512574-x64-express.cab (full file).
2019/09/12 10:56:50.1369493 1036  11224 Handler         Loaded state: cCompleteIterations: 0, pt: Express, nNextRequestID: 1.
2019/09/12 10:56:50.1501319 1036  11224 DownloadManager New download job {39FA21EE-DCB0-4C9A-AEE3-6F83D5A485AD} for UpdateId 0276DFC7-ACCD-45B2-B0D8-33F8A88250C1.200
2019/09/12 10:56:50.1900991 1036  11224 DownloadManager Download job 39FA21EE-DCB0-4C9A-AEE3-6F83D5A485AD resumed.
2019/09/12 10:56:50.1979517 1036  11224 Handler         Loaded state: cCompleteIterations: 0, pt: Unknown, nNextRequestID: 0.
2019/09/12 10:56:50.2421252 1036  11224 DownloadManager UpdateId = {0276DFC7-ACCD-45B2-B0D8-33F8A88250C1}.200, Job ID = 39FA21EE-DCB0-4C9A-AEE3-6F83D5A485AD, xszResponseHeaders = HTTP/1.1 404 Not Found  Date: Thu, 12 Sep 2019 14:56:50 GMT  Content-Length: 0  Server: Microsoft-IIS/10.0  X-Powered-By: ASP.NET    .
2019/09/12 10:56:50.2528209 1036  11224 Shared          Effective power state: AC
2019/09/12 10:56:50.2528292 1036  11224 Agent           Released network PDC reference for callId {F4A4BC25-72E3-4138-91AA-0BBE8787A39F}; ActivationID: 16
2019/09/12 10:56:50.2528418 1036  11224 Agent           Obtained a network PDC reference for callID {F4A4BC25-72E3-4138-91AA-0BBE8787A39F} with No-Progress-Timeout set to 4294967295; ActivationID: 18.
2019/09/12 10:56:50.2532267 1036  10580 Agent           WU client calls back to download call {F4A4BC25-72E3-4138-91AA-0BBE8787A39F} with code Call progress and error 0
2019/09/12 10:56:50.2939647 1036  11224 DownloadManager Queueing update {B8FB5A48-445F-43FE-87E6-30AF9B0482D8}.200 for download handler request generation.
2019/09/12 10:56:50.8185462 1036  11224 Handler         Loaded state: cCompleteIterations: 0, pt: Unknown, nNextRequestID: 0.
2019/09/12 10:56:50.9221381 1036  11224 Shared          Effective power state: AC
2019/09/12 10:56:50.9221451 1036  11224 Agent           Released network PDC reference for callId {6B4A26A7-EC8A-4366-804A-5005A33AC493}; ActivationID: 17
2019/09/12 10:56:50.9221539 1036  11224 Agent           Obtained a network PDC reference for callID {6B4A26A7-EC8A-4366-804A-5005A33AC493} with No-Progress-Timeout set to 4294967295; ActivationID: 19.
2019/09/12 10:56:50.9225836 1036  10580 Agent           WU client calls back to download call {6B4A26A7-EC8A-4366-804A-5005A33AC493} with code Call progress and error 0
2019/09/12 10:56:50.9761559 1036  11224 DownloadManager * END * Begin Downloading Updates CallerId = UpdateOrchestrator

PC Clients:
019/09/13 09:38:12.5750696 4168  2724  Agent           Initializing Windows Update Agent
2019/09/13 09:38:12.5753639 4168  2724  DownloadManager Retrieved 1 persisted download jobs
2019/09/13 09:38:12.5753666 4168  2724  DownloadManager Restoring download no. 0
2019/09/13 09:38:12.5754460 4168  2724  DownloadManager JobId = {0E018B54-02A6-496A-A6BA-12CEF4FF7DA5}, ServiceId = {9482F4B4-E343-43B6-B170-9A65BC822C77}
2019/09/13 09:38:12.5762955 4168  2724  DownloadManager UpdateId = B4584583-B243-4D7B-8BBA-BD07BF83BEA1.200
2019/09/13 09:38:12.5763717 4168  2724  Reporter        OS Product Type = 0x00000079
2019/09/13 09:38:12.6064019 4168  2724  DownloadManager Restored download job.
2019/09/13 09:38:12.6073285 4168  2724  DownloadManager Job 0E018B54-02A6-496A-A6BA-12CEF4FF7DA5 is not expired (calculated)
2019/09/13 09:38:12.6077997 4168  2724  Agent           CPersistentTimeoutScheduler | GetTimer, returned hr = 0x00000000
2019/09/13 09:38:12.7647717 4168  5600  DownloadManager PurgeExpiredFiles::Found 0 expired files to delete.
2019/09/13 09:38:12.7709409 4168  5600  DownloadManager PurgeExpiredUpdates::Found 463 non expired updates.
2019/09/13 09:38:13.6763133 4168  5600  DownloadManager PurgeExpiredUpdates::Found 8 expired updates.
2019/09/13 09:38:13.6771823 4168  5600  DownloadManager PurgeContentForPatchUpdate::Deleting update content at C:\windows\SoftwareDistribution\Download\a4bd801f0e536884769eb693a915067d.
2019/09/13 09:38:13.6951493 4168  5600  DownloadManager PurgeContentForPatchUpdate::Deleting update content at C:\windows\SoftwareDistribution\Download\48753d529f3eb2734adb21e35d7eb758.
2019/09/13 09:38:13.9987529 4168  5600  DownloadManager PurgeContentForPatchUpdate::Deleting update content at C:\windows\SoftwareDistribution\Download\86b10c9d5dc07d0f644277e691551232.
2019/09/13 09:38:14.0156075 4168  5600  DownloadManager PurgeContentForPatchUpdate::Deleting update content at C:\windows\SoftwareDistribution\Download\3b8eab9088db939137cfd5ed911a5049.
2019/09/13 09:38:14.0178087 4168  5600  DownloadManager PurgeContentForPatchUpdate::Deleting update content at C:\windows\SoftwareDistribution\Download\e73235a3433b5263a73b3eff91dc918c.
2019/09/13 09:38:14.0343858 4168  5600  DownloadManager PurgeContentForPatchUpdate::Deleting update content at C:\windows\SoftwareDistribution\Download\f10978b1cc63e70018ca89391b3068a0.
2019/09/13 09:38:14.0370973 4168  5600  DownloadManager PurgeContentForPatchUpdate::Deleting update content at C:\windows\SoftwareDistribution\Download\70cf8f64a467b1a627b7aac3acf986d0.
2019/09/13 09:38:14.0396303 4168  5600  DownloadManager PurgeContentForPatchUpdate::Deleting update content at C:\windows\SoftwareDistribution\Download\e3d5b790a8a94cf311f3b292f4992a89.
2019/09/13 09:39:47.3755734 4168  2724  Agent           Adding timer:
2019/09/13 09:39:47.3758810 4168  2724  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2019-09-14 13:39:47, not idle-only, not network-only
2019/09/13 09:40:01.6109071 4168  5600  DownloadManager Received power state change notification: Old: <unknown>; New: AC.
2019/09/13 09:40:01.6110610 4168  5600  DownloadManager Regulation: {9482F4B4-E343-43B6-B170-9A65BC822C77} - Loaded sequence number 65535 for regulation category PerUpdate.
2019/09/13 09:40:01.6110663 4168  5600  DownloadManager Regulation: {9482F4B4-E343-43B6-B170-9A65BC822C77} - Loaded sequence number 65535 for regulation category Low.
2019/09/13 09:40:01.6110740 4168  5600  DownloadManager Regulation: {9482F4B4-E343-43B6-B170-9A65BC822C77} - Loaded sequence number 65535 for regulation category Normal.
2019/09/13 09:40:01.6111597 4168  5600  DownloadManager Regulation: {9482F4B4-E343-43B6-B170-9A65BC822C77} - Loaded sequence number 65535 for regulation category High.
2019/09/13 09:40:01.7019756 4168  5600  DownloadManager Power state changed from <unknown> to AC.
2019/09/13 09:48:12.3570675 4168  8736  Agent           Earliest future timer found:
2019/09/13 09:48:12.3570887 4168  8736  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2019-09-14 13:39:47, not idle-only, not network-only
2019/09/13 09:48:13.3584408 4168  2724  Misc            CSusClientGlobal::DoServicePreShutdown
2019/09/13 09:48:13.3585729 4168  2724  IdleTimer       Idle timer disabled in preparation for service shutdown
2019/09/13 09:48:13.3585874 4168  2724  Misc            WUTaskManager uninit
2019/09/13 09:48:13.3585914 4168  2724  Agent           Earliest future timer found:
2019/09/13 09:48:13.3586109 4168  2724  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2019-09-14 13:39:47, not idle-only, not network-only
2019/09/13 09:48:13.3655323 4168  2724  Misc            CreateSessionStateChangeTrigger, TYPE:2, Enable:No
2019/09/13 09:48:13.3655711 4168  2724  Misc            CreateSessionStateChangeTrigger, TYPE:4, Enable:No
2019/09/13 09:48:13.5914282 4168  2724  Misc            Agent uninit
2019/09/13 09:48:13.5971769 4168  2724  Misc            Reporter uninit
2019/09/13 09:48:13.5974957 4168  2724  Misc            network cost manager uninit
2019/09/13 09:48:13.5975248 4168  2724  Misc            Eventer uninit
2019/09/13 09:48:14.5984565 4168  2724  Misc            ServiceManager uninit
2019/09/13 09:48:14.5985664 4168  2724  Misc            PersistentTimeoutScheduler uninit
2019/09/13 09:48:14.5985681 4168  2724  Misc            datastore uninit
2019/09/13 09:48:14.6468813 4168  2724  Misc            setting cache uninit
2019/09/13 09:48:14.6468843 4168  2724  Misc            security checker uninit
2019/09/13 09:48:14.6468883 4168  2724  Misc            Test Hook uninit
2019/09/13 09:48:14.6468890 4168  2724  Misc            IdleTimer uninit
2019/09/13 09:48:14.6472488 4168  2724  Shared          * END * Service exit Exit code = 0x240001

Other Server as Client:
2019-09-13    11:08:23:007     936    1348    AU    #############
2019-09-13    11:08:23:007     936    1348    AU    ## START ##  AU: Search for updates
2019-09-13    11:08:23:007     936    1348    AU    #########
2019-09-13    11:08:23:021     936    1348    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {D7A30D24-8564-4445-AD6A-1B5C7D910D74}]
2019-09-13    11:08:23:021     936    1978    Agent    *************
2019-09-13    11:08:23:021     936    1978    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2019-09-13    11:08:23:021     936    1978    Agent    *********
2019-09-13    11:08:23:021     936    1978    Agent      * Online = Yes; Ignore download priority = No
2019-09-13    11:08:23:021     936    1978    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2019-09-13    11:08:23:021     936    1978    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2019-09-13    11:08:23:021     936    1978    Agent      * Search Scope = {Machine}
2019-09-13    11:08:23:021     936    1978    Setup    Checking for agent SelfUpdate
2019-09-13    11:08:23:053     936    1978    Setup    Client version: Core: 7.6.7601.24436  Aux: 7.6.7601.24436
2019-09-13    11:08:23:099     936    1978    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2019-09-13    11:08:23:233     936    1978    Misc     Microsoft signed: NA
2019-09-13    11:08:23:237     936    1978    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPC502.tmp with dwProvFlags 0x00000080:
2019-09-13    11:08:23:292     936    1978    Misc     Microsoft signed: NA
2019-09-13    11:08:23:330     936    1978    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2019-09-13    11:08:23:340     936    1978    Misc     Microsoft signed: NA
2019-09-13    11:08:23:344     936    1978    Misc    Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2019-09-13    11:08:23:353     936    1978    Misc     Microsoft signed: NA
2019-09-13    11:08:23:379     936    1978    Setup    Determining whether a new setup handler needs to be downloaded
2019-09-13    11:08:23:380     936    1978    Setup    SelfUpdate handler is not found.  It will be downloaded
2019-09-13    11:08:23:380     936    1978    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2019-09-13    11:08:23:419     936    1978    Setup    Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2019-09-13    11:08:23:420     936    1978    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2019-09-13    11:08:23:548     936    1978    Setup    Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2019-09-13    11:08:23:549     936    1978    Setup    Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2019-09-13    11:08:23:723     936    1978    Setup    Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2019-09-13    11:08:23:724     936    1978    Setup    SelfUpdate check completed.  SelfUpdate is NOT required.
2019-09-13    11:08:24:440     936    1978    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
2019-09-13    11:08:24:440     936    1978    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://myservername.server.enterprise.com:8530/ClientWebService/client.asmx
2019-09-13    11:08:24:461     936    1978    PT    WARNING: Cached cookie has expired or new PID is available
2019-09-13    11:08:24:466     936    1978    PT    Initializing simple targeting cookie, clientId = b3f1d818-dacc-4bd0-9230-5118f418f423, target group = Servers, DNS name = imm-srv-01.univ.pitt.edu
2019-09-13    11:08:24:466     936    1978    PT      Server URL =http://myservername.server.enterprise.com:8530/SimpleAuthWebService/SimpleAuth.asmx
2019-09-13    11:09:57:227     936    1978    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
2019-09-13    11:09:57:227     936    1978    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://myservername.server.enterprise.com:8530/ClientWebService/client.asmx
2019-09-13    11:09:57:601     936    1978    Agent      * Added update {BFAF434D-585E-4666-8ECC-9D4526D0B60E}.200 to search result
2019-09-13    11:09:57:601     936    1978    Agent      * Added update {2641EC1C-3A24-4D10-8392-F99E50A0BDF7}.200 to search result
2019-09-13    11:09:57:601     936    1978    Agent      * Found 2 updates and 82 categories in search; evaluated appl. rules of 1295 out of 2754 deployed entities
2019-09-13    11:09:57:632     936    1978    Agent    *********
2019-09-13    11:09:57:632     936    1978    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2019-09-13    11:09:57:632     936    1978    Agent    *************
2019-09-13    11:09:57:635     936    1f04    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {D7A30D24-8564-4445-AD6A-1B5C7D910D74}]
2019-09-13    11:09:57:635     936    1f04    AU      # 2 updates detected
2019-09-13    11:09:57:635     936    1f04    AU    #########
2019-09-13    11:09:57:636     936    1f04    AU    ##  END  ##  AU: Search for updates [CallId = {D7A30D24-8564-4445-AD6A-1B5C7D910D74}]
2019-09-13    11:09:57:636     936    1f04    AU    #############
2019-09-13    11:09:57:636     936    1f04    AU    Successfully wrote event for AU health state:0
2019-09-13    11:09:57:636     936    1f04    AU    Featured notifications is disabled.
2019-09-13    11:09:57:637     936    1f04    AU    AU setting next detection timeout to 2019-09-14 11:10:32
2019-09-13    11:09:57:637     936    1f04    AU    Successfully wrote event for AU health state:0
2019-09-13    11:09:57:639     936    1f04    AU    Successfully wrote event for AU health state:0
2019-09-13    11:10:02:624     936    1978    Report    REPORT EVENT: {44DB017A-8D90-4799-9D9A-AE7F54FFF4FB}    2019-09-13 11:09:57:623-0400    1   147    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Software Synchronization    Windows Update Client successfully detected 2 updates.
2019-09-13    11:10:02:624     936    1978    Report    REPORT EVENT: {21786D9B-15D2-455F-A47E-F6D49BEC30BE}    2019-09-13 11:09:57:631-0400    1   156    101    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Pre-Deployment Check    Reporting client status.
2019-09-13    11:16:27:663     936    1978    Report    Uploading 2 events using cached cookie, reporting URL = http://myservername.server.enterprise.com:8530/ReportingWebService/ReportingWebService.asmx
2019-09-13    11:16:27:674     936    1978    Report    Reporter successfully uploaded 2 events.


Windows 10 WSUS clients error 403 when downloading updates from Microsoft Update

Windows update log from a fresh win10 client.  No issues downloading and installing updates from WSSUS server.  When you go to check online for updates from Microsoft the client find driver updates for example starts to download and then at the end it pauses and Errors 0x80244018.  When you check the windowsupdate log its basically saying its forbidden (403).  We are using a proxy to get to the internet.  Can somebody point me in the right direction, where / what you think is causing this?

BTW if you browse to the URL you also get 403.

http://tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/e1b4bfbb-8fa4-4adf-83e1-f859721ab167?P1=1568473994&P2=402&P3=2&P4=adGdF4zS1BtvARgVXga9O%2bd3C4WGz5s04wJL7sUUsIpA%2bLTWwYWkRw%2fmWDCLj%2bKzmMSeIRdpg%2fnTikCgzUKuOg%3d%3dto C:\WINDOWS\SoftwareDistribution\Download\483807a03e40bfacae30f918b1d033c8\131357a92cf8d73d3abd6eec898b6e682f91997d was not downloaded.
2019/09/14 16:01:55.1277889 16784 16840 DownloadManager FAILED [80244018] Error occurred while downloading update D0085070-2ED9-4E3C-B29D-9FAF0CF647EC.1; notifying dependent calls.

Thanks

Paul


PH

KB2394849 Hotfix for DFS

I need to download the hotfix KB2394849 but i see that is no longer available. I need to know if this hotfix are included into an cumulative updates.

Where can i see this?

thanks

WSUS 3.0SP2 Content file download failed. Reason: File cert verification failure

Hi,

We have a problem wtih an Upstream WSUS 3.0SP2 on Windows server 2008 Enterprise SP2.

Since june 12, several Updates approved for Windows 7 or for Windows 8.1 or IE 11 are not downloaded by our Upstream.

On this Upstream, I have test a donwload of update with Interner Explorer and the same Proxy server and its OK.

Any suggestions please ? 

UPstream server version  : 3.2.7600.307 (hotfix KB2720211 + KB2828185 + KB4484071)

In SoftwareDistribution.log, an exemple of download failed :

2019-06-19 03:43:43.647 UTCInfoWsusService.22ContentSyncAgent.ProcessBITSNotificationQueueContentSyncAgent recieved Transferred Event for Item: d0777547-6cfb-4f12-aed1-91ec38d56e33
2019-06-19 03:43:43.647 UTCInfoWsusService.22ContentSyncAgent.ContentSyncSPFireStateMachineEventContentSyncAgent firing Event: FileDownloaded for Item: d0777547-6cfb-4f12-aed1-91ec38d56e33
2019-06-19 03:43:43.694 UTCErrorWsusService.22ContentSyncAgent.ProcessBITSNotificationQueueDownloaded file e:\DATA\WSUS\WsusContent\E3\A2CB0FBB26057B1C0815E92687C838E14B7A03E3.cab caught exception at VerifyFile: System.IO.FileNotFoundException: Could not load file or assembly 'System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089' or one of its dependencies. The system cannot find the file specified.
File name: 'System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089'
   at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyCRC(String fileLocalPath, String additionalHash)
   at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyFile(String fileLocalPath, String additionalHash)
   at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.ProcessBITSNotificationQueue()

=== Pre-bind state information ===
LOG: User = NT AUTHORITY\NETWORK SERVICE
LOG: DisplayName = System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
 (Fully-specified)
LOG: Appbase = file:///C:/Program Files/Update Services/Service/bin/
LOG: Initial PrivatePath = NULL
Calling assembly : Microsoft.UpdateServices.ContentSyncAgent, Version=3.1.6001.1, Culture=neutral, PublicKeyToken=31bf3856ad364e35.
===
LOG: This bind starts in default load context.
LOG: Using application configuration file: C:\Program Files\Update Services\Service\bin\WsusService.exe.Config
LOG: Using machine configuration file from C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\machine.config.
LOG: Post-policy reference: System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
LOG: The same bind was seen before, and was failed with hr = 0x80070002.

   at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.ProcessBITSNotificationQueue()
   at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.WakeUpWorkerThreadProc()
   at System.Threading.ThreadHelper.ThreadStart_Context(Object state)
   at System.Threading.ExecutionContext.runTryCode(Object userData)
   at System.Runtime.CompilerServices.RuntimeHelpers.ExecuteCodeWithGuaranteedCleanup(TryCode code, CleanupCode backoutCode, Object userData)
   at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state)
   at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
   at System.Threading.ThreadHelper.ThreadStart()
2019-06-19 03:43:43.694 UTCWarningWsusService.22ContentSyncAgent.ProcessBITSNotificationQueueInvalid file deleted: e:\DATA\WSUS\WsusContent\E3\A2CB0FBB26057B1C0815E92687C838E14B7A03E3.cab
2019-06-19 03:43:43.694 UTCInfoWsusService.22ContentSyncAgent.ContentSyncSPFireStateMachineEventContentSyncAgent firing Event: FileVerificationFailed for Item: d0777547-6cfb-4f12-aed1-91ec38d56e33
2019-06-19 03:43:43.694 UTCInfoWsusService.22EventLogEventReporter.ReportEventEventId=364,Type=Error,Category=Synchronization,Message=Content file download failed. Reason: File cert verification failure. Source File: /c/msdownload/update/software/updt/2019/06/windows8.1-kb4502567-x86_a2cb0fbb26057b1c0815e92687c838e14b7a03e3.cab Destination File: e:\DATA\WSUS\WsusContent\E3\A2CB0FBB26057B1C0815E92687C838E14B7A03E3.cab.
2019-06-19 03:43:43.710 UTCInfoWsusService.22ContentSyncAgent.WakeUpWorkerThreadProcContentSyncAgent found no more Jobs, thread exitting
2019-06-19 03:43:43.710 UTCInfoWsusService.22EventLogEventReporter.ReportEventEventId=363,Type=Information,Category=Synchronization,Message=Content synchronization succeeded.

update issue

Hi

One of our server 2008 R2 SP1 having a problem with installing Windows updates.

I did check the failed security updates and i can see that the security update kb4471318 of 12-2018 is not installed on this machine and after that almost all the securtity update also failed.

I think the best action would be first to install the kb4471318. When I go to the .catalog.update.microsoft.com to download this update and install it manually I can see that there is 2 files to download one. should I download both the .exe file and .msu file and install them both?

This is what I see when try to download the file:

Image may be NSFW.
Clik here to view.


Shahin

WSUS Product and Classifications Settings for Windows 10 1903 Enterprise

Hello,

Finally approved to get rid of Windows 7 and do hardware refresh with Windows 10 1903 Enterprise on it. Bit late in the game. I am using WSUS for patching. WSUS product and classifications settings selection for Windows 10 1903 is very confusing.  There's like a dozen Windows 10 Products you can pick from. I would like to hear from experts here what are the settings that I need to choose to receive the monthly updates plus the future upgrades. 

Thanks,

HOW TO MAKE “Windows Server Update Service” THE DEFAULT AU SERVICE ON WINDOWS SERVER 2016

Hi,

I have a problem in my WSUS deployment in regard to Windows Server 2016. Windows Server 2016 cannot connect to WSUS server unless it has Internet connectivity of some sort. But as soon as I prevent access to the Internet, connection to the WSUS server would fail.

After some research I found that starting from Windows Server 2016 the default AU Service is Windows Update.

$MUSM=New-Object -ComObject"Microsoft.Update.ServiceManager"

$MUSM.Services

Name                 : Windows Server Update Service

ContentValidationCert : {}

ExpirationDate       : 6/18/5254 9:21:00 PM

IsManaged            : True

IsRegisteredWithAU   : True

IssueDate            : 1/1/2003 12:00:00 AM

OffersWindowsUpdates : True

RedirectUrls         : System.__ComObject

ServiceID            : 3da21691-e39d-4da6-8a4b-b43877bcb1b7

IsScanPackageService : False

CanRegisterWithAU    : True

ServiceUrl           :

SetupPrefix          :

IsDefaultAUService   : False

Name                 : Windows Update

ContentValidationCert : {}

ExpirationDate       : 6/18/5254 9:21:00 PM

IsManaged            : False

IsRegisteredWithAU   : True

IssueDate            : 1/1/2003 12:00:00 AM

OffersWindowsUpdates : True

RedirectUrls         : System.__ComObject

ServiceID            : 9482f4b4-e343-43b6-b170-9a65bc822c77

IsScanPackageService : False

CanRegisterWithAU    : True

ServiceUrl           :

SetupPrefix          :

IsDefaultAUService   : True

If you do the same thing on Windows Server 2012 R2 and downward, you will notice that “Windows Server Update Service” is the default AU Service.

I found the following registry key related to the subject.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RequestedAppCategories

It seems that if I could change the default AU Service to “Windows Server Update Service” (WSUS) the problem would be solved.

Are you aware of any technique or method to achieve that?

Yours.


Windows Server 2016 WSUS Clients shown as "Windows (Version 10.0)"

Dear all,

I have a question to add Windows Server 2016 WSUS Clients to WSUS Server 2012 R2.

In my domain I am using a Windows Server 2012 R2 Server as WSUS Server. Yesterday I installed the first Windows Server 2016 member server in the domain. This member server is a WSUS client, configured by GPO to get updates from the WSUS server.

The member server is shown as client in the WSUS console. I now have sorted the client with "Group by operating system" in the console.

Image may be NSFW.
Clik here to view.

The Windows Server 2016 member server and the Windows 10 clients are grouped to one operating system version group: "Windows (Version 10.0)".

Is this the right way to show the WSUS clients or is there any patch missing at WSUS server?? Has anyone experience with this case? I expect to group the clients to "Windows 10" and "Windows Server 2016".

Helpful answers are welcome! Thank you.


.net update multiple files

Hi,

We having an issue with .net updates on one of our server 2008 R2 that is VM.

I did check my server and see that the last installed .net security update iskb4487078 of 02-2019 and after that the  first security update in the automatic updates is KB4499406 from 05-2019 and this one is failed to install. After the failed update no .net updates listed.

I try to download it manually but when try to download it see multiple .exe and .msu files. Do I have to download and insteall them all?

Image may be NSFW.
Clik here to view.


Shahin

WSUS Install Failing - WinSer2016 - Installation on Non-Domain - Workgroup Only Server

Hi Folks,

I have been searching, but not yet been able to find an answer to this issue. I wonder if you can assist.

I have Windows Server 2016, running on a VM, logged into a workgroup. The reason we are doing this, is to publicly make available our WSUS Server, without interfering with the domain at all.

On trying to run the postinstall, it connects to the DB (SQL Hosted on the network), creates the content, but then fails thereafter with the following error:

System.DirectoryServices.ActiveDirectory.ActiveDirectoryObjectNotFoundException: The local computer is not joined to a domain or the domain cannot be contacted.
   at System.DirectoryServices.ActiveDirectory.Domain.GetComputerDomain()
   at Microsoft.UpdateServices.Administration.ConfigureDB.GetMachineAccountInfo(Byte[]& binarySid, String& accountName)
   at Microsoft.UpdateServices.Administration.ConfigureDB.Configure()
   at Microsoft.UpdateServices.Administration.ConfigureDB.Run(String instanceName, Action`1 logWriter, Boolean contentLocal)
   at Microsoft.UpdateServices.Administration.PostInstall.Run()
   at Microsoft.UpdateServices.Administration.PostInstall.Execute(String[] arguments)

I don't want to join this to the domain, as it falls outside of the company requirements (we have our own WSUS Server for internal hardware), as this is an extra offering for customers hardware for example, we need it to be in isolation.

How do I force the install to occur on a workgroup machine? This is going to be the "original" server, which will subsequently allow downstream servers to download the updates, and allow me to control the releases, along with workstations connecting directly to it as their own "Windows Update Server".

WSUS 10.0.14393.2007 (Server 2016) Keeps Crashing!! - System.Net.WebException

Hello,

I just built a WSUS server on my Windows Server 2016.
8 Cores
24GB RAM
500 GB HDD.

I WSUS set to get updates from the internet.

I do have the driver's classification selected (I know many say not to have this class, but it is needed in my environment)

WSUS is set to get updates from the internet


Issue:
Every time I go into the driver's update group to view driver's, my WSUS server crashes with the following error:

The WSUS administration console was unable to connect to the WSUS Server via the remote API. 

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

System.Net.WebException -- The operation has timed out

Source
System.Web.Services

Stack Trace:
   at System.Web.Services.Protocols.WebClientProtocol.GetWebResponse(WebRequest request)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.ApiRemotingCompressionProxy.GetWebResponse(WebRequest webRequest)
   at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
   at Microsoft.UpdateServices.Internal.ApiRemoting.ExecuteSPSearchUpdates(String updateScopeXml, String preferredCulture, Int32 publicationState)
   at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.ExecuteSPSearchUpdates(String updateScopeXml, String preferredCulture, ExtendedPublicationState publicationState)
   at Microsoft.UpdateServices.Internal.BaseApi.Update.SearchUpdates(UpdateScope searchScope, ExtendedPublicationState publicationState, UpdateServer updateServer)
   at Microsoft.UpdateServices.UI.AdminApiAccess.UpdateManager.GetUpdates(ExtendedUpdateScope filter)
   at Microsoft.UpdateServices.UI.AdminApiAccess.BulkUpdatePropertiesCache.GetAndCacheUpdates(ExtendedUpdateScope updateScope, ComputerTargetScope computerTargetScope)
   at Microsoft.UpdateServices.UI.SnapIn.Pages.UpdatesListPage.GetListRows()



I have changed the Recycling > Private Memory Limit KB) to "0". an restarted WSUS/and the server.
The loading updates does not move from 0% and the server continues to crash only when going into the Drivers class.

Image may be NSFW.
Clik here to view.

I have ran WSUS server cleanup, and I am still hitting this bug.

Any help would be appreciated!  Thank you!

WSUS 3.0SP2 error : Upstream synchronization failed with OutOfMemoryException

Hi,

Since august 14, I had a synchronization Failed with Microsoft Update from my upstreamWSUS 3.0SP2 on Windows server 2008 Enterprise SP2 (x86).

With error :

OutOfMemoryException: Exception of type 'System.OutOfMemoryException' was thrown.

at System.String.Replace(String oldValue, String newValue)

  at Microsoft.UpdateServices.Internal.XmlUpdateParser.Escape(String input)

  at Microsoft.UpdateServices.Internal.XmlUpdateParser.UpdateToFragments(String publishedXml, Boolean escapeFragments, ArrayList languages)

  at Microsoft.UpdateServices.Internal.DatabaseAccess.CommonDataAccess.ImportUpdate(Int32 ussRevLocalId, String xmlUpdateBlob, Byte[] xmlUpdateBlobCompressed, String xmlSdpBlob, Int32& localRevisionId)

  at Microsoft.UpdateServices.Internal.DatabaseAccess.CommonDataAccess.ImportUpdateWithFileUrls(Int32 upstreamServerLocalId, String xmlUpdateBlob, Byte[] xmlUpdateBlobCompressed, String xmlSdpBlob, ServerSyncUrlData[] fileUrls, Boolean setCatalogSiteFlag, Guid updateId)

  at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ImportSingleUpdate(ServerSyncUpdateData updateData, List`1 allFileUrls)

  at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ImportMultipleUpdates(List`1 metadata, List`

I’ve noticed that the OOM exception arrived each time during the synchronization when the wsusservice.exe used more than 800MB of Memory Private bytes.

So I’ve tried this :

  1. Increase the Virtual address space with the dos command : bcdedit /set IncreaseUserVa 3072
  2. Re-index the WSUS database (SUSDB) by using the SQL script from The Scripting Guys: Re-index the WSUS Database. (SUSDB on SQL server 2008 installed on a dedicated server under Windows server 2008 R2)
  3. Install the Hotfix for Windows Server Update Services 3.0 SP2 KB4039929 (An update to improve the performance of update metadata processing on Windows Server Update Services)
  4. Try different configuration for Wsuspool in IIS 6.0 (even if the process w3wp.exe never get in High CPU and High Memory)
  5. Try different configuration of web.config of the webservice”serversyncwebservice”.

And the synchronization were always failed.

Finally, last Friday, I found an article “WSUS synchronization fails with SoapException” (https://support.microsoft.com/en-gb/help/4482416/wsus-synchronization-fails-with-soapexception)

I changed with powershell the value of RedirectorChangeNumber from “0” to “4002",

letMUUrl with the value "https://sws.update.microsoft.com".

and the next manual synchronization was succeded and my Upstream got new Updates.

Since this correction, the automatic synchronizations at night are always succeeded but I get new errors in the SoftwareDistribution.log like this :

2019-09-17 08:20:42.595 UTC             Warning  w3wp.5   SoapUtilities.CreateException             ThrowException: actor = http://wsusrac.intra.groupama.fr/ReportingWebService/ReportingWebService.asmx, ID=2f43c384-af40-4488-af7b-3113bb44ae3d, ErrorCode=InvalidCookie, Message=, Client=?

2019-09-17 08:20:42.595 UTC             Error        w3wp.5  WebService.ReportEventBatch            Exception occured in ReportEventBatch: Fault occurred

  at Microsoft.UpdateServices.Internal.Reporting.WebService.ReportEventBatch(Cookie cookie, DateTime clientTime, ReportingEvent[] eventBatch)

So, my question is : Are the parameters RedirectorChangeNumber to 4002 and MUUrl tohttps://sws.update.microsoft.comreally good for a UPstream WSUS 3.0SP2 on Windows server 2008 Enterprise SP2 (x86) ?

UPstream server version  : 3.2.7600.307 (hotfix KB2720211 + KB2828185 + KB4484071 +KB4039929 )

help

You have two Windows Server Update Services (WSUS) servers named Server1 and Server2. Server01 synchronizes from Microsoft Update. Server2 synchronizes updates from Server1.Both servers are members of the same Active Directory domain. You configure Server1 to require SSL for all WSUS metadata by using a certificate issued by an enterprise root certification authority (CA). You need to ensure that Server2 synchronizes updates from Server1. What should you do on Server2? A. From the Update Services console, modify the Update Source and Proxy Server options. B. From a command prompt, run wsusutil.exe configuresslproxy server2 443. C. From a command prompt, run wsusutil.exe configuressl server1. D. From a command prompt, run wsusutil.exe configuresslproxy server1 443.

My friend and I did not understand because mopi I chose D as a response to your opinion what is the answer

Client does not trigger update installation.

I have similar situation as mentioned on following url I need some help from experts

https://social.technet.microsoft.com/Forums/lync/en-US/c66f2147-2c1e-4a0e-8045-3cc8f421448b/client-does-not-trigger-update-installation?forum=winserverwsus

Updates are downloading fine but will not get installed by itself you have to hit update now.

As messge appears "We'll automatically install updates when you aren't using your device, or you can install them now if you want." but it never happens. Even I leave computer unattended for 24 hours.

 

configuration for Windows 10

Dear all,

We start to deploy Windows 10 for users. Previous we set WSUS to automatic download and notify user for update. It work fine for Windows 7 users as we trained users to shutdown and update when they leave office.

But I see Windows 10 user have pending update but the the shutdown button only doesn't show shutdown and update. What wrong with my setting?



Clients can't connect to WSUS after changing server

Hello,

I'm decommissioning a 2008 R2 server and am migrating different roles to a new 2016 server.

I have setup WSUS on the 2016 Server. In DNS I changed the FQDN (wsus.domain.local) to the ip address of the new server.
There is a GPO setup that directs all clients to wsus.domain.local

Since I've done this change, I get the error80244019 on W7 Clients

Hereby an extract of the WindowsUpdate.log file

2019-09-04	11:18:33:379	1152	51c	AU	#############
2019-09-04	11:18:33:379	1152	51c	AU	## START ##  AU: Search for updates
2019-09-04	11:18:33:379	1152	51c	AU	#########
2019-09-04	11:18:33:379	1152	51c	AU	<<## SUBMITTED ## AU: Search for updates [CallId = {D2551871-3221-45A3-A3D8-96F02B451499}]
2019-09-04	11:18:33:379	1152	f8c	Agent	*************
2019-09-04	11:18:33:379	1152	f8c	Agent	** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2019-09-04	11:18:33:379	1152	f8c	Agent	*********
2019-09-04	11:18:33:379	1152	f8c	Agent	  * Online = Yes; Ignore download priority = No
2019-09-04	11:18:33:379	1152	f8c	Agent	  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2019-09-04	11:18:33:379	1152	f8c	Agent	  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2019-09-04	11:18:33:379	1152	f8c	Agent	  * Search Scope = {Machine}
2019-09-04	11:18:33:379	1152	f8c	Setup	Checking for agent SelfUpdate
2019-09-04	11:18:33:379	1152	f8c	Setup	Client version: Core: 7.6.7601.24436  Aux: 7.6.7601.24436
2019-09-04	11:18:33:394	1152	f8c	Misc	WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
2019-09-04	11:18:33:394	1152	f8c	Misc	WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
2019-09-04	11:18:33:394	1152	f8c	Misc	WARNING: DownloadFileInternal failed for http://wsus.domain.local/selfupdate/wuident.cab: error 0x80190194
2019-09-04	11:18:33:394	1152	f8c	Setup	FATAL: DownloadCab failed, err = 0x80190194
2019-09-04	11:18:33:394	1152	f8c	Setup	WARNING: SelfUpdate check failed to download package information, error = 0x80244019
2019-09-04	11:18:33:394	1152	f8c	Setup	FATAL: SelfUpdate check failed, err = 0x80244019
2019-09-04	11:18:33:394	1152	f8c	Agent	  * WARNING: Skipping scan, self-update check returned 0x80244019
2019-09-04	11:18:33:394	1152	f8c	Agent	  * WARNING: Exit code = 0x80244019
2019-09-04	11:18:33:394	1152	f8c	Agent	*********
2019-09-04	11:18:33:394	1152	f8c	Agent	**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2019-09-04	11:18:33:394	1152	f8c	Agent	*************
2019-09-04	11:18:33:394	1152	f8c	Agent	WARNING: WU client failed Searching for update with error 0x80244019
2019-09-04	11:18:33:394	1152	a84	AU	>>##  RESUMED  ## AU: Search for updates [CallId = {D2551871-3221-45A3-A3D8-96F02B451499}]
2019-09-04	11:18:33:394	1152	a84	AU	  # WARNING: Search callback failed, result = 0x80244019
2019-09-04	11:18:33:394	1152	a84	AU	  # WARNING: Failed to find updates with error code 80244019
2019-09-04	11:18:33:394	1152	a84	AU	#########
2019-09-04	11:18:33:394	1152	a84	AU	##  END  ##  AU: Search for updates [CallId = {D2551871-3221-45A3-A3D8-96F02B451499}]
2019-09-04	11:18:33:394	1152	a84	AU	#############

Can someone point me in the right direction ?

Regards,

Marc

Why does WSUS approve for ALL the groups?

I have a 2016 WSUS and 4 computer groups. When I approve updates for a certain group it updates ALL the groups regardless if I pick a certain group or not. 

Meaning, I have group A,B & C. If I approve updates for group B only A & C get the updates as well. 

Why is this happening? The whole purpose is to test the updates first on a test PC before you send everything to your production environment...right?

What am I missing?

 

WSUS E-Mail Notifications SMTP Relay Office 365?

Hello,

I'm trying to get the the E-Mail Notifications to work in the WSUS. but nothing is coming into my inbox in Office365. 

I followed this link and created a Windows Server 2019 SMTP Relay and was able to get this far but nothing is being sent to my inbox. 

https://techdirectarchive.com/2018/03/10/configuring-wsus-emails-notification-to-work-with-office365/

WSUS is saying it sent the email.

Image may be NSFW.
Clik here to view.


I also made a connector in Office365.

Image may be NSFW.
Clik here to view.

WSUS & Windows 10 Nightmare - Is it just me?

Hi All.

I support a few small businesses.Their environments are a mixture of all new 2016/Windows 10 configs or 2012r2/Windows 10. The one thing that they all have in common is that ever since Windows 10 upgrades, WSUS is constantly  ...well ...crap!

Always red triangles, always not reporting. The only things that seem to fix this is to delete the software distrib folder etc etc. WSUS just used to be something that you install, then forget about ...I cannot afford the time to manage it like this ...it's driving me up the wall.

Anyone living this nightmare, or is it just me? Any solutions? Are people just giving up on WSUS with Windows 10?

Many thanks for your thoughts!

Doug.

"View Updates" pop-up every time i login?

Has anyone seen it when you remote desktop to a server (specifically Windows Server 2016) and the screen goes dark, and a blue pop-up box says updates are available?  And you cant cancel or anything.  You are forced to click "View Updates" and then the updates setting pops up and takes over (instead of you doing what you actually are there to do). I have to kill the update setting window and then i can finally get to work.  This is very annoying.  Is it just us?  If not, how do i stop this from ever happening again??  We are admin-level accounts so the policies must apply to both admins and non-admins alike.  Basically ANY account that logs in should NOT get that annoying pop-up.
Viewing all 12874 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>