Client failing to recieve update via WSUS

I have created a virtual lab environment and I am testing WSUS.
I have deployed and configured my WSUS server as well as creating a GPO to point clients to my server.
When manually checking for updates through windows update I receive error code 80244019.
I have reviewed the update logs and feel there is an issue contacting my WSUS server. Any suggestions would be greatly appreciated
2014-04-02 00:13:00:860 848 798 AU Triggering AU detection through DetectNow API
2014-04-02 00:13:00:860 848 798 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Scheduled} added to AU services list
2014-04-02 00:13:00:860 848 798 AU Triggering Online detection (interactive)
2014-04-02 00:13:00:989 848 51c AU #############
2014-04-02 00:13:00:989 848 51c AU ## START ## AU: Search for updates
2014-04-02 00:13:00:989 848 51c AU #########
2014-04-02 00:13:01:001 848 51c AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Scheduled} added to AU services list
2014-04-02 00:13:01:001 848 51c IdleTmr WU operation (CSearchCall::Init ID 45) started; operation # 322; does use network; is not at background priority
2014-04-02 00:13:01:001 848 51c IdleTmr Incremented PDC RefCount for Network to 1
2014-04-02 00:13:01:001 848 51c IdleTmr Incremented idle timer priority operation counter to 2
2014-04-02 00:13:01:001 848 51c Agent *** START *** Queueing Finding updates [CallerId = AutomaticUpdatesWuApp Id = 45]
2014-04-02 00:13:01:001 848 51c AU <<## SUBMITTED ## AU: Search for updates [CallId = {4AA753DD-56B8-4DD2-BDC2-7FC77A75BEE4} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2014-04-02 00:13:01:001 848 81c Agent *** END *** Queueing Finding updates [CallerId = AutomaticUpdatesWuApp Id = 45]
2014-04-02 00:13:01:001 848 81c Agent *************
2014-04-02 00:13:01:001 848 81c Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdatesWuApp Id = 45]
2014-04-02 00:13:01:001 848 81c Agent *********
2014-04-02 00:13:01:001 848 81c Agent * Online = Yes; Ignore download priority = No
2014-04-02 00:13:01:001 848 81c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-04-02 00:13:01:001 848 81c Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-04-02 00:13:01:001 848 81c Agent * Search Scope = {Machine & All Users}
2014-04-02 00:13:01:001 848 81c Agent * Caller SID for Applicability: S-1-5-21-2929840714-3911456617-1138986597-1106
2014-04-02 00:13:01:001 848 81c EP Got WSUS Client/Server URL: "http://APP1.CORP.CONTOSO.COM/ClientWebService/client.asmx"
2014-04-02 00:13:01:001 848 81c Setup Checking for agent SelfUpdate
2014-04-02 00:13:01:048 848 81c Setup Client version: Core: 7.9.9600.16422 Aux: 7.9.9600.16384
2014-04-02 00:13:01:048 848 81c EP Got WSUS SelfUpdate URL: "http://APP1.CORP.CONTOSO.COM/selfupdate"
2014-04-02 00:13:01:064 848 81c Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
2014-04-02 00:13:01:064 848 81c Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
2014-04-02 00:13:01:064 848 81c Misc WARNING: DownloadFileInternal failed for http://APP1.CORP.CONTOSO.COM/selfupdate/wuident.cab: error 0x80190194
2014-04-02 00:13:01:064 848 81c Setup WARNING: SelfUpdate check failed to download package information, error = 0x80244019
2014-04-02 00:13:01:064 848 81c Setup FATAL: SelfUpdate check failed, err = 0x80244019
2014-04-02 00:13:01:079 848 81c Agent * WARNING: Skipping scan, self-update check returned 0x80244019
2014-04-02 00:13:01:079 848 81c Agent * WARNING: Exit code = 0x80244019
2014-04-02 00:13:01:079 848 81c Agent *********
2014-04-02 00:13:01:079 848 81c Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdatesWuApp Id = 45]
2014-04-02 00:13:01:079 848 81c Agent *************
2014-04-02 00:13:01:079 848 81c Agent WARNING: WU client failed Searching for update with error 0x80244019
2014-04-02 00:13:01:079 848 81c IdleTmr WU operation (CSearchCall::Init ID 45, operation # 322) stopped; does use network; is not at background priority
2014-04-02 00:13:01:079 848 81c IdleTmr Decremented PDC RefCount for Network to 0
2014-04-02 00:13:01:079 848 81c IdleTmr Decremented idle timer priority operation counter to 1
2014-04-02 00:13:01:079 848 8e0 AU >>## RESUMED ## AU: Search for updates [CallId = {4AA753DD-56B8-4DD2-BDC2-7FC77A75BEE4} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2014-04-02 00:13:01:079 848 8e0 AU # WARNING: Search callback failed, result = 0x80244019
2014-04-02 00:13:01:079 848 8e0 AU #########
2014-04-02 00:13:01:079 848 8e0 AU ## END ## AU: Search for updates [CallId = {4AA753DD-56B8-4DD2-BDC2-7FC77A75BEE4} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2014-04-02 00:13:01:079 848 8e0 AU #############
2014-04-02 00:13:01:079 848 8e0 AU All AU searches complete.
2014-04-02 00:13:01:079 848 8e0 AU # WARNING: Failed to find updates with error code 80244019
2014-04-02 00:13:01:079 848 8e0 AU Need to show Unable to Detect notification
2014-04-02 00:13:01:079 848 8e0 AU AU setting next detection timeout to 2014-04-02 04:13:01
2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 7 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
2014-04-02 00:13:02:939 848 79c AU Triggering AU detection through DetectNow API
2014-04-02 00:13:02:939 848 79c AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Scheduled} added to AU services list
2014-04-02 00:13:02:939 848 79c AU Triggering Online detection (interactive)
2014-04-02 00:13:03:079 848 51c AU #############
2014-04-02 00:13:03:079 848 51c AU ## START ## AU: Search for updates
2014-04-02 00:13:03:079 848 51c AU #########
2014-04-02 00:13:03:079 848 51c AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Scheduled} added to AU services list
2014-04-02 00:13:03:079 848 51c IdleTmr WU operation (CSearchCall::Init ID 46) started; operation # 331; does use network; is not at background priority
2014-04-02 00:13:03:079 848 51c IdleTmr Incremented PDC RefCount for Network to 1
2014-04-02 00:13:03:079 848 51c IdleTmr Incremented idle timer priority operation counter to 2
2014-04-02 00:13:03:079 848 51c Agent *** START *** Queueing Finding updates [CallerId = AutomaticUpdatesWuApp Id = 46]
2014-04-02 00:13:03:079 848 51c AU <<## SUBMITTED ## AU: Search for updates [CallId = {BF690BA2-3D86-45C0-9A18-D8BC8BC47DAC} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2014-04-02 00:13:03:079 848 81c Agent *** END *** Queueing Finding updates [CallerId = AutomaticUpdatesWuApp Id = 46]
2014-04-02 00:13:03:095 848 81c Agent *************
2014-04-02 00:13:03:095 848 81c Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdatesWuApp Id = 46]
2014-04-02 00:13:03:095 848 81c Agent *********
2014-04-02 00:13:03:095 848 81c Agent * Online = Yes; Ignore download priority = No
2014-04-02 00:13:03:095 848 81c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-04-02 00:13:03:095 848 81c Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-04-02 00:13:03:095 848 81c Agent * Search Scope = {Machine & All Users}
2014-04-02 00:13:03:095 848 81c Agent * Caller SID for Applicability: S-1-5-21-2929840714-3911456617-1138986597-1106
2014-04-02 00:13:03:095 848 81c EP Got WSUS Client/Server URL: "http://APP1.CORP.CONTOSO.COM/ClientWebService/client.asmx"
2014-04-02 00:13:03:095 848 81c Setup Checking for agent SelfUpdate
2014-04-02 00:13:03:095 848 81c Setup Client version: Core: 7.9.9600.16422 Aux: 7.9.9600.16384
2014-04-02 00:13:03:095 848 81c EP Got WSUS SelfUpdate URL: "http://APP1.CORP.CONTOSO.COM/selfupdate"
2014-04-02 00:13:03:110 848 81c Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
2014-04-02 00:13:03:110 848 81c Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
2014-04-02 00:13:03:110 848 81c Misc WARNING: DownloadFileInternal failed for http://APP1.CORP.CONTOSO.COM/selfupdate/wuident.cab: error 0x80190194
2014-04-02 00:13:03:110 848 81c Setup WARNING: SelfUpdate check failed to download package information, error = 0x80244019
2014-04-02 00:13:03:110 848 81c Setup FATAL: SelfUpdate check failed, err = 0x80244019
2014-04-02 00:13:03:110 848 81c Agent * WARNING: Skipping scan, self-update check returned 0x80244019
2014-04-02 00:13:03:110 848 81c Agent * WARNING: Exit code = 0x80244019
2014-04-02 00:13:03:110 848 81c Agent *********
2014-04-02 00:13:03:110 848 81c Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdatesWuApp Id = 46]
2014-04-02 00:13:03:110 848 81c Agent *************
2014-04-02 00:13:03:110 848 81c Agent WARNING: WU client failed Searching for update with error 0x80244019
2014-04-02 00:13:03:110 848 81c IdleTmr WU operation (CSearchCall::Init ID 46, operation # 331) stopped; does use network; is not at background priority
2014-04-02 00:13:03:110 848 81c IdleTmr Decremented PDC RefCount for Network to 0
2014-04-02 00:13:03:110 848 81c IdleTmr Decremented idle timer priority operation counter to 1
2014-04-02 00:13:03:110 848 8e0 AU >>## RESUMED ## AU: Search for updates [CallId = {BF690BA2-3D86-45C0-9A18-D8BC8BC47DAC} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2014-04-02 00:13:03:110 848 8e0 AU # WARNING: Search callback failed, result = 0x80244019
2014-04-02 00:13:03:110 848 8e0 AU #########
2014-04-02 00:13:03:110 848 8e0 AU ## END ## AU: Search for updates [CallId = {BF690BA2-3D86-45C0-9A18-D8BC8BC47DAC} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
2014-04-02 00:13:03:110 848 8e0 AU #############
2014-04-02 00:13:03:110 848 8e0 AU All AU searches complete.
2014-04-02 00:13:03:110 848 8e0 AU # WARNING: Failed to find updates with error code 80244019
2014-04-02 00:13:03:110 848 8e0 AU Need to show Unable to Detect notification
2014-04-02 00:13:03:110 848 8e0 AU AU setting next detection timeout to 2014-04-02 04:13:03
2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 7 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
2014-04-02 00:13:06:079 848 8dc Report REPORT EVENT: {CC3A61B2-6D72-4EE5-8290-267C01BB971C} 2014-04-02 00:13:01:079+0100 1 148 [AGENT_DETECTION_FAILED] 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 1 80244019 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x80244019.
2014-04-02 00:13:06:079 848 8dc Report REPORT EVENT: {15E44187-2503-438C-9813-EB6D81BFEA23} 2014-04-02 00:13:03:110+0100 1 148 [AGENT_DETECTION_FAILED] 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 1 80244019 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x80244019.
2014-04-02 00:13:06:079 848 8dc Report WARNING: Failed to get ProtocolVersion: 8024043d
2014-04-02 00:13:06:079 848 8dc Report WARNING: Failed to get ProtocolVersion: 8024043d
2014-04-02 00:13:06:079 848 8dc Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
2014-04-02 00:13:06:079 848 8dc Report WER Report sent: 7.9.9600.16422 0x80244019(0) D67661EB-2423-451D-BF5D-13199E37DF28 Scan 101 Managed
2014-04-02 00:13:06:142 848 8dc Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
2014-04-02 00:13:06:142 848 8dc Report WER Report sent: 7.9.9600.16422 0x80244019(0) D67661EB-2423-451D-BF5D-13199E37DF28 Scan 101 Managed
2014-04-02 00:13:06:142 848 8dc Report CWERReporter finishing event handling. (00000000)

During my initial investigation I had already confirmed both the background BITS and windows update services were running.
I can confirm that after checking my policy and amending the "Specify intranet Microsoft update service location" to the following, to include the correct port
http://App1.corp.contoso.com:8530
I have been able to resolve the issue.
Thank you for your comments
Kind regards

Similar Messages

  • Clients cant get the updates from WSUS.

    I have Installed WSUS on my Windows Server 2008 R2. The installation went smooth with no errors whatsoever. I am able to sync and download all the updates. The problem is that it doesn't see the computers. I went to the main server which is in charge of
    AD, DNS, GPs', gateway, storage, etc... and created the GPO for WSUS updates there. I configured so all the computers point to the WSUS server whenever the updates take place. I am able to access the WSUS server. I use the http://WSUSservername:portnumber/iuident.cab...
    and I am able to download the file... So connecting to the server is not the issue, I think. So I went ahead and opened the Windowsupdate.log and this is what I Get:
    2014-06-19 11:20:47:432
    940 1310
    Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 45]
    2014-06-19 11:20:47:432
    940 1310
    Agent *********
    2014-06-19 11:20:47:432
    940 1310
    Agent  * Online = Yes; Ignore download priority = No
    2014-06-19 11:20:47:432
    940 1310
    Agent  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0
    and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-06-19 11:20:47:432
    940 1310
    Agent  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-06-19 11:20:47:432
    940 1310
    Agent  * Search Scope = {Machine & All Users}
    2014-06-19 11:20:47:432
    940 1310
    Agent  * Caller SID for Applicability: S-1-5-21-3881866237-2239884609-2590477384-1659
    2014-06-19 11:20:47:432
    940 1310
    EP Got WSUS Client/Server URL: "http://xxx:xxxx/ClientWebService/client.asmx"
    2014-06-19 11:20:47:448
    940 1310
    Setup Checking for agent SelfUpdate
    2014-06-19 11:20:47:448
    940 1310
    Setup Client version: Core: 7.9.9600.17092  Aux: 7.9.9600.17031
    2014-06-19 11:20:47:448
    940 1310
    EP Got WSUS SelfUpdate URL: "http://xxx:xxx/selfupdate"
    2014-06-19 11:20:47:448
    940 1310
    Misc Validating signature for C:\WINDOWS\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2014-06-19 11:20:47:448
    940 1310
    Misc FATAL: Error: 0x80096002 when verifying trust for C:\WINDOWS\SoftwareDistribution\SelfUpdate\wuident.cab
    2014-06-19 11:20:47:448
    940 1310
    Misc WARNING: Digital Signatures on file C:\WINDOWS\SoftwareDistribution\SelfUpdate\wuident.cab are not trusted: Error 0x80096002
    2014-06-19 11:20:47:448
    940 1310
    Setup FATAL: Ident cab verification failed, err = 0x80096002
    2014-06-19 11:20:47:448
    940 1310
    Setup WARNING: SelfUpdate check failed to download package information, err = 0x80096002
    2014-06-19 11:20:47:448
    940 1310
    Setup FATAL: SelfUpdate check failed, err = 0x80096002
    2014-06-19 11:20:47:448
    940 1310
    Agent  * WARNING: Skipping scan, self-update check returned 0x80096002
    2014-06-19 11:20:47:448
    940 1310
    Agent  * WARNING: Exit code = 0x80096002
    2014-06-19 11:20:47:448
    940 1310
    Agent *********
    2014-06-19 11:20:47:448
    940 1310
    Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdatesWuApp  Id = 45]
    2014-06-19 11:20:47:448
    940 1310
    Agent *************
    2014-06-19 11:20:47:448
    940 1310
    Agent WARNING: WU client failed Searching for update with error 0x80096002
    2014-06-19 11:20:47:448
    940 1310
    IdleTmr WU operation (CSearchCall::Init ID 45, operation # 2757) stopped; does use network; is not at background priority
    2014-06-19 11:20:47:448
    940 1310
    IdleTmr Decremented PDC RefCount for Network to 0
    2014-06-19 11:20:47:448
    940 1310
    IdleTmr Decremented idle timer priority operation counter to 2
    2014-06-19 11:20:47:448
    940 1220
    AU >>##  RESUMED  ## AU: Search for updates [CallId = {22A97B41-0341-4B56-964E-999CCCE39A8D} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-06-19 11:20:47:448
    940 1220
    AU  # WARNING: Search callback failed, result = 0x80096002
    2014-06-19 11:20:47:448
    940 1220
    AU #########
    2014-06-19 11:20:47:448
    940 1220
    AU ##  END  ##  AU: Search for updates  [CallId = {22A97B41-0341-4B56-964E-999CCCE39A8D} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-06-19 11:20:47:448
    940 1220
    AU #############
    2014-06-19 11:20:47:448
    940 1220
    AU All AU searches complete.
    2014-06-19 11:20:47:448
    940 1220
    AU  # WARNING: Failed to find updates with error code 80096002
    2014-06-19 11:20:47:448
    940 1220
    AU AU setting next detection timeout to 2014-06-19 20:20:47
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 30 SID {S-1-5-21-3137932392-3689043322-37932657-1001} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3137932392-3689043322-37932657-1001} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3137932392-3689043322-37932657-1001} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 29 SID {S-1-5-21-3881866237-2239884609-2590477384-1330} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1330} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1330} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1156} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1156} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1156} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1659} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1659} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1659} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 18 SID {S-1-5-21-3881866237-2239884609-2590477384-1677} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1677} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2014-06-19 11:20:47:464
    940 1220
    AU  # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-3881866237-2239884609-2590477384-1677} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2014-06-19 11:20:52:447
    940 fe0
    Report REPORT EVENT: {FDA40604-08E6-4D8F-B639-2A68514682AE}
    2014-06-19 11:20:47:448-0400 1
    148 [AGENT_DETECTION_FAILED] 101
    {D67661EB-2423-451D-BF5D-13199E37DF28}
    1 80096002
    SelfUpdate Failure
    Software Synchronization Windows Update Client failed to detect with error 0x80096002.
    2014-06-19 11:20:52:447
    940 fe0
    Report WARNING: Failed to get ProtocolVersion: 8024043d
    2014-06-19 11:20:52:447
    940 fe0
    Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2014-06-19 11:20:52:447
    940 fe0
    Report WER Report sent: 7.9.9600.17092 0x80096002(0) D67661EB-2423-451D-BF5D-13199E37DF28 Scan 101 Managed
    2014-06-19 11:20:52:447
    940 fe0
    Report CWERReporter finishing event handling. (00000000)
    2014-06-19 11:21:27:754
    940 11d4
    WuTask WUTaskHandler successfully started the task.
    2014-06-19 11:21:27:755
    940 10bc
    WuTask WUTaskManager received event to unregister task.
    2014-06-19 11:21:38:400
    940 10bc
    AU AU received policy change subscription event
    I omitted the server name for security reasons.. The port I am using is 8530. I think the log says that Identification FAILS.
    We had previously installed WSUS using System Center essentials but after a year it stopped working. I went ahead an uninstalled the WSUS, Aplication Server, and whe Web IIS server and installed all of them again. I literally manually installed the WSUS
    server this time and it is working fine.
    Any thoughts on what could the problem be?
    -Paulo

    Misc WARNING: Digital Signatures on file C:\WINDOWS\SoftwareDistribution\SelfUpdate\wuident.cab are not trusted: Error 0x80096002
    Looks like you've failed to install KB2734608 on your WSUS v3.2 server.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Getting Windows 10 Updates via WSUS?

    There are a number of us previewing Windows 10 within our organisation, and these machines reside in OUs which result in them getting updates via WSUS. I presume this configuration is the cause of there being no update ring or update build options within
    the OS. Looking at our WSUS, we have no Windows 10 product catalog for us to approve any updates. 
    What's the expected update mechanism from Microsoft on Enterprise Previewers? I had assumed that the OS would be locked to updates direct from MS but it seems it is still working with WSUS.

    Hey,
    it's not fair to be honest. Of course you should not use a technical preview in a production Environment.
    But it is possible to create a DEV active Directory which is using WSUS too.
    So why not having a WSUS DEV product categorie to Support technical previews in WSUS from the Moment it is joined to a DEV Domain?
    Regards,
    Klaus

  • Install Adobe updates via WSUS and ignore UAC restrictions

    Hi
    My company has currently set new UAC security settings but we have an issue where we are not able to update Adobe products because UAC stops it, UAC also does not prompt for elevation it just out right blocks updates.
    We really need a way to either allow the updater to run/install past the UAC restrictions OR find a way to distribute adobe updates via WSUS if it's possible
    Thanks

    I am not sure what you mean, I am able to install all updates from Microsoft through WSUS. I read something about being able to install an Adobe add-on or something like this to enable WSUS to download updates for Adobe and distribute them this way. This would save on network traffic and downloads, considering there are so many Adobe updates, it would be nicer to download them once and distribute. Otherwise how do big networks send out Adobe updates if they update it at all?
    I am not sure where the updateshandler.log is stored as searching the entire drive did not display anything. Something that might help is that some PCs use Adobe acrobat 8 and some use acrobat 10.

  • Unable to install security updates via WSUS on Windows 2008 client servers

    When I try install to install updates on Windows 2008 client servers I get the error : Code 80244019  Windows Update encountered an unknown error
    After running the WSUS Client Diagnostic Tool I get the result : GetFileVersion(szEngineDir,&susVersion) failed with hr=0x80070002 The system cannot find the file specified.
    On a Windows 2003 server the WSUS Client Diagnostic Tool shows no error message. So I guess the problem seems to be specificly related to Windows 2008 servers.
    The client server has been integrated into a WSUS console version 3.2.7600.226 runnning on a Windows 2003 Enterprise Edition SP2.
    Thanks in advance for the help in resolving this issue.

    When I try install to install updates on Windows 2008 client servers I get the error : Code 80244019  Windows Update encountered an unknown error
    The 0x80244019 error is an HTTP 404 error and when encountered trying to "install updates", which really occurs when trying to
    download the update files so that the updates can be installed, is almost always a function of the desired file having been manually deleted from the WSUS server. The file that should be there for the needed update, isn't, but it used to be.
    If all of the clients are getting this error on all updates, then that's a function of the content store on the WSUS server being missing, in the wrong place, or configured with the wrong ACLs.
    After running the WSUS Client Diagnostic Tool I get the result : GetFileVersion(szEngineDir,&susVersion) failed with hr=0x80070002
    This result is inconclusive, and not really relevant. The CDT is 32-bit only and can't be used on 64-bit systems. Plus, we already know the client is talking to the WSUS server -- you've reported the error code -- so the Client Diagnostic Tool will
    tell us nothing of use at this point (even if it did work on 64-bit systems).
    On a Windows 2003 server the WSUS Client Diagnostic Tool shows no error message.
    Cool. It works on a 32-bit system.
    So I guess the problem seems to be specificly related to Windows 2008 servers.
    No... BUT... allow me to make an example of this for just a moment, and forgive me for that.
    This is a great example of arriving at the wrong conclusion, caused by not considering ALL of the differences, as well as the scope and capability of the diagnostics performed. The error is not because one is '2003' and the other '2008; the error is because
    one is 'x86' and the other is (obviously) 'x64'. And, in either case, diagnosing the client was wasted effort because the client is already working. (It got a real HTTP error message from the WSUS server.)
    Now, we need to get some real diagnostic information to find out why you're getting this error code. :-)
    Please post the actual entries from the WindowsUpdate.log where this error code appears, plus a hundred lines prior, and let's get some context around the error code, and the exact update that's involved in this issue.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Server 2012 R2 Clients will not update via WSUS

    We're having a problem with our Server 2012 R2 servers not updating as of about a month ago.  I've read the article about KB2959977.  I don't know if that is the issue or not, but the timing seems about right.  If I go to install this update
    on the affected servers, I get a Window that just hangs at "Searching for updates on this computer".
    When I look at the Windows update log, I get repeated entries of:
    2014-08-04 10:22:03:030  896 5a4 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1
    With the number at the end of cNetworkInterfaces incrementing and decrementing every few minutes or so
    2014-08-04 09:23:42:079  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:24:19:647  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:24:19:834  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:25:22:702  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:25:22:702  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:25:37:850  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:25:37:865  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:26:40:926  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:26:40:926  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:26:40:926  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:27:11:499  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:27:11:905  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:28:14:569  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:28:14:569  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:28:20:384  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:28:20:431  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:29:23:452  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:29:23:452  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:29:23:452  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:29:42:113  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:29:42:457  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:30:45:176  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:30:45:176  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:30:45:192  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:31:21:106  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:31:21:481  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:32:24:198  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:32:24:214  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:32:42:561  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:32:42:999  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:33:45:652  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:33:45:652  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:34:19:376  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:34:19:516  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:35:22:526  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:35:22:526  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:35:22:526  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:35:22:526  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:36:11:346  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:36:11:534  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:37:14:415  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:37:14:415  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:37:14:415  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:37:14:415  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:37:22:462  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:37:22:540  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:38:25:561  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:38:25:561  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:38:45:781  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:38:46:047  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:39:48:804  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:39:48:804  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:40:23:180  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:40:23:555  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:41:26:324  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:41:26:324  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:41:47:481  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:41:47:559  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:42:50:501  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:42:50:517  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:42:50:517  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:43:21:737  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:43:22:065  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:44:24:803  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:44:24:803  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:45:17:791  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:45:18:072  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:46:20:855  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:46:20:855  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:46:24:495  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:46:24:574  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:47:27:562  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:47:27:562  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:47:27:562  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:47:27:562  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:47:47:516  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:47:47:578  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:48:50:551  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:48:50:567  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:49:24:958  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:49:25:083  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:50:28:024  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:50:28:024  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:50:28:024  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:50:47:727  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:50:48:086  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:51:50:775  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:51:50:791  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:52:23:746  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:52:24:089  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:53:26:795  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:53:26:795  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:53:26:795  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:53:26:795  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:54:25:641  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:54:26:094  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:55:28:688  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:55:28:688  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:55:47:813  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:55:48:094  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:56:50:876  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:56:50:876  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:56:50:876  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:56:50:876  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:57:26:173  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:57:26:595  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:58:29:235  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:58:29:235  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:58:29:235  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:58:29:266  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:58:45:157  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:58:45:595  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:59:48:157  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:59:48:157  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:59:48:157  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:59:48:173  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 10:00:21:298  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 10:00:21:595  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    I've attempted deleting it from the actual WSUS server itself, stopping the service, deleting the Software Distribution folder, restarting the service, wuauclt /resetquthorization /detectnow and various other combinations to re-initialize but all I end up
    getting are these constant messages in the logs.
    Other interesting errors are:
    2014-08-04 08:50:23:644 2132 1140 CltUI FATAL: CNetworkCostChangeHandler::RegisterForCostChangeNotifications: CoCreateInstance failed with error 80004002
    2014-08-04 08:50:23:644 2132 1140 CltUI WARNING: RegisterNetworkCostChangeNotification: Error 80004002
    Anyone else seeing this sort of weird behavior?  Only happens on 2012 R2 servers.

    Hello,
    In order to resolve the issue, we need get more information.
    What is the current version of your WSUS server? For WSUS 3.2, please apply
    KB3734608.
    How did you configure your GPO?
    Run nslookup WSUSservername, does the output show the correct IP address?

  • Cluster aware updating via WSUS

    I can't seem to find this information anywhere,
    I have setup a 2 node hyper-v 2012 baremetal cluster and configured it with cluster aware updating role (CAU)
    the environment is not internet facing and the updates need to come through a local WSUS server, a capability
    mentioned
    in many articles, however no guidelines on how to actually do it
    CAU is configured with the microsoft.windowsupdateplugin in self-updating mode
    I'm not sure how to point the CAU role to the local WSUS host, obviously no updates are occuring since there is no internet access to the MS update servers and WSUS cannot simply be auto-discovered
    has anyone done this or know how to make this work?  I can only assume I would have to pass on some sort of argument to the CAUpluginArguments field with the http/s link to the WSUS infrastructure but can't find the proper string
    thanks in advance,
    armin

    For clarity, when setting up the special GPO to send the WSUS settings to the cluster, what is the best way to configure the "Configure Automatic Updates" policy?  Is it to '3 - Autodownload and notify for install' and then the CAU client on the hosts
    will take it from there?
    It must be AUOption='3'. It's the only way to ensure the binaries are available for installation when CAU kicks off the update, and still not involve the configuration of a
    scheduled installation event.
    The technet seems to suggest that both option 2 & 3 on that list would work,
    I would be skeptical of AUOption='2'. How are the binaries going to get downloaded? If CAU tells the WUA to install updates, and the updates are not downloaded, ready for installation, nothing's going to get installed. (Unless somebody is claiming that CAU
    will also launch a download. However, that would unnecessarily extend the amount of time needed to patch a given node of the cluster, so certainly an undesirable configuration at best. Much better to have all files downloaded
    before launching the installation task.
    I'd also point out that if you're implementing CAU, there's no reason NOT to let the binaries download automatically. AUOption='2' would be used when you want to control WHEN the binaries are downloaded by launching the download interactively.
    Is it correct to apply the WSUS GPO to that whole OU, to all 4 machine names?
    The GPO is just a methodology to configure a Windows Update Agent with the desired settings. Neither the GPO, nor the WUA, care whether it's on a cluster node or not. What's correct is to configure the machine the way you want it configured.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Windows Server 2012R2 fails to get update from WSUS with error code 80072ee6

    Hi all,
    I've deployed WSUS role on a Windows Server 2012R2 machine. WSUS listen on port 8530. Now I'm trying a test server (this machine runs WIndows Server 2012R2 too). I've configured a GPO but when I try to check for updates I get the errore in the subject.
    I've checked windowsupdate.log and theese are the settings of the client:
    AIR Mode is disabled
    2014-02-05 12:59:00:357
    776 fe0
    AU  # Policy Driven Provider:  http://MyWSUS.MyDomain.local:8530
    2014-02-05 12:59:00:357
    776 fe0
    AU  # Detection frequency: 22
    2014-02-05 12:59:00:357
    776 fe0
    AU  # Target group: CSM Servers
    2014-02-05 12:59:00:357
    776 fe0
    AU  # Approval type: Pre-install notify (Policy)
    2014-02-05 12:59:00:357
    776 fe0
    AU  # Auto-install minor updates: No (User preference)
    2014-02-05 12:59:00:357
    776 fe0
    AU  # Will interact with non-admins (Non-admins are elevated (User preference))
    I confirm that from the test server I can telnet to my wsus server on TCP port 8530

    Hi,
    This issue occurs if the URL under the Group Policy setting 'Specify intranet Microsoft update service location' is invalid.
    You receive a "80072EE6" error code when you download an update from Windows Server Update Services in Windows 7-based or Windows Server 2008 R2-based
    computer
    http://support.microsoft.com/kb/2724184
    Make sure that the URL is correct and the name can be resolved.
    Hope this helps.

  • Push urgent update via WSUS?

    Hello, 
    I am using WSUS 2012 and have a couple of questions.  We have created multiple Computer Groups in the WSUS console to manage the different departments and regional offices and it is working great,wih our GPOs.  Once we approve the updates then
    afer a couple of days they will have them.
    1.) If we need to push an urgent update out or remove one very quickly how can we do this?
    2.) What is the best way to show what Computer groups we have approve updates on?
    Thanks

    Hello TB303,
    1.) The best to force an update to be catch out of your WSUS settings is to force the computer to get the last updates from the server with the following command line :
    wuauclt /detectnow (see :
    http://technet.microsoft.com/en-us/library/cc720477%28v=ws.10%29.aspx)
    You'll just have to wait for about 15-30 minutes and the computer will have the updates been downloaded.
    But you have to take in consideration that the settings you put in your GPO on the way updates are treated (Download and wait for install, Download and install, etc.) will be applied even with the command line
    2.) The best is to create Filtered View and to manage the Columns to see the Install counts or the last connection date.
    TiGrOu.

  • Unable to update using WSUS - No Client Detection

    Hi,
    I have recently implemented several Server 2012 machines onto our network - These are set to replace our old 2003 Servers.
    The new 2012 Servers are being configured to overtake the roles that I had setup on the 2003 Servers.
    I am currently trying to configure WSUS on a new 2012 Server - This appears to be configured correctly but I am having issues with the client machines connecting to the WSUS server - The client machines are set to pick up the WSUS server via GPO.
    It appears that the WSUS server is being blocked by our Proxy server - Although the Proxy server (TMG) is set to allow internal traffic.
    Looking at the Windows update log - I am getting the below errors.
    2015-02-03 09:59:28:996  536 c98 AU AU received policy change subscription event
    2015-02-03 10:00:50:736  536 3874 AU Triggering AU detection through DetectNow API
    2015-02-03 10:00:50:736  536 3874 AU Triggering Online detection (non-interactive)
    2015-02-03 10:00:50:737  536 c98 AU #############
    2015-02-03 10:00:50:737  536 c98 AU ## START ##  AU: Search for updates
    2015-02-03 10:00:50:737  536 c98 AU #########
    2015-02-03 10:00:50:739  536 c98 AU <<## SUBMITTED ## AU: Search for updates [CallId = {D6E096AD-8B3E-4A0E-B638-756CFBBF0833}]
    2015-02-03 10:00:50:739  536 2a64 Agent *************
    2015-02-03 10:00:50:739  536 2a64 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-02-03 10:00:50:739  536 2a64 Agent *********
    2015-02-03 10:00:50:739  536 2a64 Agent   * Online = Yes; Ignore download priority = No
    2015-02-03 10:00:50:739  536 2a64 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
    or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2015-02-03 10:00:50:739  536 2a64 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2015-02-03 10:00:50:739  536 2a64 Agent   * Search Scope = {Machine}
    2015-02-03 10:00:50:739  536 2a64 Setup Checking for agent SelfUpdate
    2015-02-03 10:00:50:740  536 2a64 Setup Client version: Core: 7.6.7600.320  Aux: 7.6.7600.320
    2015-02-03 10:00:50:884  536 2a64 Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x801901f6
    2015-02-03 10:00:50:884  536 2a64 Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x801901f6
    2015-02-03 10:00:50:884  536 2a64 Misc WARNING: DownloadFileInternal failed for http://gbsal01-wsv001:8080/selfupdate/wuident.cab: error 0x801901f6
    2015-02-03 10:00:50:884  536 2a64 Setup FATAL: DownloadCab failed, err = 0x801901F6
    2015-02-03 10:00:50:884  536 2a64 Setup WARNING: SelfUpdate check failed to download package information, error = 0x80244021
    2015-02-03 10:00:50:884  536 2a64 Setup FATAL: SelfUpdate check failed, err = 0x80244021
    2015-02-03 10:00:50:885  536 2a64 Agent   * WARNING: Skipping scan, self-update check returned 0x80244021
    2015-02-03 10:00:50:889  536 2a64 Agent   * WARNING: Exit code = 0x80244021
    2015-02-03 10:00:50:889  536 2a64 Agent *********
    2015-02-03 10:00:50:889  536 2a64 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-02-03 10:00:50:889  536 2a64 Agent *************
    2015-02-03 10:00:50:889  536 2a64 Agent WARNING: WU client failed Searching for update with error 0x80244021
    2015-02-03 10:00:50:889  536 4170 AU >>##  RESUMED  ## AU: Search for updates [CallId = {D6E096AD-8B3E-4A0E-B638-756CFBBF0833}]
    2015-02-03 10:00:50:889  536 4170 AU   # WARNING: Search callback failed, result = 0x80244021
    2015-02-03 10:00:50:889  536 4170 AU   # WARNING: Failed to find updates with error code 80244021
    2015-02-03 10:00:50:889  536 4170 AU #########
    2015-02-03 10:00:50:889  536 4170 AU ##  END  ##  AU: Search for updates [CallId = {D6E096AD-8B3E-4A0E-B638-756CFBBF0833}]
    2015-02-03 10:00:50:889  536 4170 AU #############
    2015-02-03 10:00:50:890  536 4170 AU Successfully wrote event for AU health state:0
    2015-02-03 10:00:50:890  536 4170 AU AU setting next detection timeout to 2015-02-03 15:00:50
    2015-02-03 10:00:50:890  536 4170 AU Setting AU scheduled install time to 2015-02-03 12:00:00
    2015-02-03 10:00:50:891  536 4170 AU Successfully wrote event for AU health state:0
    2015-02-03 10:00:50:892  536 4170 AU Successfully wrote event for AU health state:0
    Does anyone have any ideas please?
    Thanks
    Tom

    Does anyone have any ideas please?
    2015-02-03 10:00:50:884  536 2a64 Misc WARNING: DownloadFileInternal failed for http://gbsal01-wsv001:8080/selfupdate/wuident.cab: error 0x801901f6
    What's with the port 8080 ???
    It appears that the WSUS server is being blocked by our Proxy server - Although the Proxy server (TMG) is set to allow internal traffic.
    Why is *internal* traffic even going near the TMG server?
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2015)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Clients cannot update from WSUS server - error 8024400E

    Alright, so I'm troubleshooting our WSUS server and seem to be stuck. I am running WSUS 3.2.7600.226 on Server 2003.  The client I have been using for testing is Windows 7 x64, but we have this issue on all clients (XP, 7 x86, and 7 x64).  I started
    with an error of 800B0001 and after googling installed KB2720211 to fix it. Now I am getting error 8024400E on clients when I attempt to update. I followed a technet walkthrough and verified that my WSUS settings are all correct (at least regarding iis,
    registry, gpo settings, and file system permissions). I am able to download CAB files from the WSUS server by going to the proper address in a browser. Here is a snippet from my WindowsUpdate log on my client:
    2013-12-20 10:27:29:784 972 23ac AU #############
    2013-12-20 10:27:29:784 972 23ac AU ## START ## AU: Search for updates
    2013-12-20 10:27:29:784 972 23ac AU #########
    2013-12-20 10:27:29:785 972 23ac AU <<## SUBMITTED ## AU: Search for updates [CallId = {749E5CD5-F4DE-48FC-A691-3610EF622CE3}]
    2013-12-20 10:27:29:785 972 2bcc Agent *************
    2013-12-20 10:27:29:785 972 2bcc Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
    2013-12-20 10:27:29:785 972 2bcc Agent *********
    2013-12-20 10:27:29:785 972 2bcc Agent * Online = Yes; Ignore download priority = No
    2013-12-20 10:27:29:785 972 2bcc Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation'
    and RebootRequired=1"
    2013-12-20 10:27:29:785 972 2bcc Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2013-12-20 10:27:29:785 972 2bcc Agent * Search Scope = {Machine}
    2013-12-20 10:27:29:785 972 2bcc Setup Checking for agent SelfUpdate
    2013-12-20 10:27:29:785 972 2bcc Setup Client version: Core: 7.6.7600.256 Aux: 7.6.7600.256
    2013-12-20 10:27:29:785 972 2bcc Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2013-12-20 10:27:29:789 972 2bcc Misc Microsoft signed: Yes
    2013-12-20 10:27:29:794 972 2bcc Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2013-12-20 10:27:29:797 972 2bcc Misc Microsoft signed: Yes
    2013-12-20 10:27:29:799 972 2bcc Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2013-12-20 10:27:29:803 972 2bcc Misc Microsoft signed: Yes
    2013-12-20 10:27:29:808 972 2bcc Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2013-12-20 10:27:29:812 972 2bcc Misc Microsoft signed: Yes
    2013-12-20 10:27:29:821 972 2bcc Setup Determining whether a new setup handler needs to be downloaded
    2013-12-20 10:27:29:821 972 2bcc Setup SelfUpdate handler is not found. It will be downloaded
    2013-12-20 10:27:29:821 972 2bcc Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
    2013-12-20 10:27:29:823 972 2bcc Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2013-12-20 10:27:29:823 972 2bcc Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2013-12-20 10:27:29:835 972 2bcc Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2013-12-20 10:27:29:835 972 2bcc Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2013-12-20 10:27:29:852 972 2bcc Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2013-12-20 10:27:29:852 972 2bcc Setup SelfUpdate check completed. SelfUpdate is NOT required.
    2013-12-20 10:27:29:884 972 2bcc PT +++++++++++ PT: Synchronizing server updates +++++++++++
    2013-12-20 10:27:29:884 972 2bcc PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://wsusservername/ClientWebService/client.asmx
    2013-12-20 10:27:29:896 972 2bcc PT WARNING: Cached cookie has expired or new PID is available
    2013-12-20 10:27:29:896 972 2bcc PT Initializing simple targeting cookie, clientId = 488f3922-1a4e-4921-b015-25957eeb6500, target group = http://wsusservername, DNS name = mycomputer.domain.local
    2013-12-20 10:27:29:896 972 2bcc PT Server URL = http://wsusservername/SimpleAuthWebService/SimpleAuth.asmx
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: GetAuthorizationCookie failure, error = 0x8024400E, soap client error = 7, soap error code = 400, HTTP status code = 200
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: SOAP Fault: 0x000190
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: faultstring:Fault occurred
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: ErrorCode:InternalServerError(5)
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: Message:(null)
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: Method:"http://www.microsoft.com/SoftwareDistribution/Server/SimpleAuthWebService/GetAuthorizationCookie";
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: ID:9d989bf6-04e3-44a9-8ffd-f20bb997b3f0
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: Failed to initialize Simple Targeting Cookie: 0x8024400e
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: PopulateAuthCookies failed: 0x8024400e
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: RefreshCookie failed: 0x8024400e
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: RefreshPTState failed: 0x8024400e
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: Sync of Updates: 0x8024400e
    2013-12-20 10:27:29:902 972 2bcc PT WARNING: SyncServerUpdatesInternal failed: 0x8024400e
    2013-12-20 10:27:29:902 972 2bcc Agent * WARNING: Failed to synchronize, error = 0x8024400E
    2013-12-20 10:27:29:902 972 2bcc Agent * WARNING: Exit code = 0x8024400E
    2013-12-20 10:27:29:902 972 2bcc Agent *********
    2013-12-20 10:27:29:902 972 2bcc Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
    2013-12-20 10:27:29:902 972 2bcc Agent *************
    2013-12-20 10:27:29:902 972 2bcc Agent WARNING: WU client failed Searching for update with error 0x8024400e
    2013-12-20 10:27:29:902 972 1bc8 AU >>## RESUMED ## AU: Search for updates [CallId = {749E5CD5-F4DE-48FC-A691-3610EF622CE3}]
    2013-12-20 10:27:29:902 972 1bc8 AU # WARNING: Search callback failed, result = 0x8024400E
    2013-12-20 10:27:29:902 972 1bc8 AU # WARNING: Failed to find updates with error code 8024400E
    2013-12-20 10:27:29:902 972 1bc8 AU #########
    2013-12-20 10:27:29:902 972 1bc8 AU ## END ## AU: Search for updates [CallId = {749E5CD5-F4DE-48FC-A691-3610EF622CE3}]
    2013-12-20 10:27:29:902 972 1bc8 AU #############
    2013-12-20 10:27:29:903 972 1bc8 AU Successfully wrote event for AU health state:0
    2013-12-20 10:27:29:903 972 1bc8 AU AU setting next detection timeout to 2013-12-20 21:27:29
    2013-12-20 10:27:29:903 972 1bc8 AU Setting AU scheduled install time to 2013-12-21 10:00:00
    2013-12-20 10:27:29:903 972 1bc8 AU Successfully wrote event for AU health state:0
    2013-12-20 10:27:29:904 972 1bc8 AU Successfully wrote event for AU health state:0
    2013-12-20 10:27:34:498 972 2bcc Report REPORT EVENT: {2519DC64-E7F9-499B-A2F8-B58DA4A0C08A} 2013-12-20 10:27:29:902-0600 1 148 101 {00000000-0000-0000-0000-000000000000} 0 8024400e AutomaticUpdates Failure Software Synchronization Windows Update Client failed
    to detect with error 0x8024400e.
    2013-12-20 10:27:34:502 972 2bcc Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2013-12-20 10:27:34:502 972 2bcc Report WER Report sent: 7.6.7600.256 0x8024400e 00000000-0000-0000-0000-000000000000 Scan 101 Managed
    2013-12-20 10:27:34:502 972 2bcc Report CWERReporter finishing event handling. (00000000)
    I focused in on "GetAuthorizationCookie failure, error = 0x8024400E, soap client error = 7, soap error code = 400, HTTP status code = 200" and did some googling which all points at Microsoft Office 2003 SP1 update as being the culprit, and I followed
    the instructions on a technet site to disable the update and am still getting the same error. I'm stumped at this point, and I thought I would post here in the hope that someone can help me before I end up just wiping it out and reinstalling (which I'm worried
    won't even solve it).

    I focused in on "GetAuthorizationCookie failure, error = 0x8024400E, soap client error = 7, soap error code = 400, HTTP status code = 200" and did some googling which all points at Microsoft Office 2003 SP1 update as being the culprit, and I followed
    the instructions on a technet site to disable the update and am still getting the same error.
    While you're definitely on the right track, the Office2003SP1 update really has not been an issue since WSUS Service Pack 2 was released in October 2009 (and really, the Office2003SP1 update that was the cause of this was replaced long before that even,
    so you probably don't even have the defective update on your server).
    However, the error is generally associated with the presence of defective update(s) on the WSUS server, so the first thing to do is address any potential issues caused by a failed install of KB2720211.
    If the error still persists after verifying that all other aspects of the server are fully operational, review the list of not-Declined updates on your WSUS server and make sure that:
    All Expired updates are Declined (and then run the Server Cleanup Wizard and let it delete the expired updates).
    All approvals for older revisions have been removed (and then run the Server Cleanup Wizard and let it delete the older revisions).
    All approvals for superseded updates have been removed. (And then, when they report as 100% Not Applicable, decline them, and then run the Server Cleanup Wizard so that it can delete the files associated with those updates).
    Once all of the potentially problematic updates have been removed from the view of the Windows Update Agent, and if this error then persists, we can evaluate it from a more focused perspective.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • CLIENT UNABLE TO UPDATE from WSUS SERVER

    Dear all
    we have a WSUS server installed on windows server 2012, the clients is no longer able to download updates, getting error WindowsUpdate_80072EE2" "WindowsUpdate_dt000"
    here is the client log file
    2014-02-17 18:20:13:346 1024 f98 Misc WARNING: Send failed with hr = 80072ee2.
    2014-02-17 18:20:13:346 1024 f98 Misc WARNING: SendRequest failed with hr = 80072ee2. Proxy List used: <(null)>
    Bypass List used : <(null)> Auth Schemes used : <>
    2014-02-17 18:20:13:346 1024 f98 Misc WARNING: WinHttp: SendRequestUsingProxy failed for <http://rwf-1:8530/selfupdate/wuident.cab>.
    error 0x80072ee2
    2014-02-17 18:20:13:346 1024 f98 Misc WARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed.
    error 0x80072ee2
    2014-02-17 18:20:13:346 1024 f98 Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80072ee2
    2014-02-17 18:20:13:346 1024 f98 Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072ee2
    2014-02-17 18:20:13:358 1024 f98 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-02-17 18:20:13:363 1024 f98 Misc Microsoft signed: Yes
    2014-02-17 18:20:13:365 1024 f98 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-02-17 18:20:13:371 1024 f98 Misc Microsoft signed: Yes
    2014-02-17 18:20:13:379 1024 f98 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-02-17 18:20:13:385 1024 f98 Misc Microsoft signed: Yes
    2014-02-17 18:20:13:400 1024 f98 Setup Determining whether a new setup handler needs to be downloaded
    2014-02-17 18:20:13:400 1024 f98 Setup SelfUpdate handler is not found.  It will be downloaded
    2014-02-17 18:20:13:400 1024 f98 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256"
    2014-02-17 18:20:13:403 1024 f98 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256"
    is already installed.
    2014-02-17 18:20:13:403 1024 f98 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    2014-02-17 18:20:13:414 1024 f98 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    is already installed.
    2014-02-17 18:20:13:414 1024 f98 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    2014-02-17 18:20:13:432 1024 f98 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    is already installed.
    2014-02-17 18:20:13:432 1024 f98 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2014-02-17 18:20:13:723 1024 f98 PT +++++++++++  PT: Synchronizing
    server updates  +++++++++++
    2014-02-17 18:20:13:723 1024 f98 PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL
    = http://rwf-1:8530/ClientWebService/client.asmx
    2014-02-17 18:20:13:858 1024 f98 PT WARNING: Cached cookie has expired or new PID is available
    2014-02-17 18:20:13:858 1024 f98 PT Initializing simple targeting cookie, clientId = 5c40eee5-ae54-4cbd-8758-a694a59ade20,
    target group = ROLMAN, DNS name = it.rolmanworld.com
    2014-02-17 18:20:13:858 1024 f98 PT  Server URL = http://rwf-1:8530/SimpleAuthWebService/SimpleAuth.asmx
    2014-02-17 18:21:14:006 1024 f98 Misc WARNING: Send failed with hr = 80072ee2.
    2014-02-17 18:21:14:006 1024 f98 Misc WARNING: SendRequest failed with hr = 80072ee2. Proxy List used: <(null)>
    Bypass List used : <(null)> Auth Schemes used : <>
    2014-02-17 18:21:14:006 1024 f98 PT  + Last proxy send request failed with hr = 0x80072EE2, HTTP status
    code = 0
    2014-02-17 18:21:14:006 1024 f98 PT  + Caller provided credentials = No
    2014-02-17 18:21:14:006 1024 f98 PT  + Impersonate flags = 0
    2014-02-17 18:21:14:006 1024 f98 PT  + Possible authorization schemes used = 
    2014-02-17 18:21:14:006 1024 f98 PT WARNING: GetCookie failure, error = 0x80072EE2, soap client error = 5, soap
    error code = 0, HTTP status code = 200
    2014-02-17 18:21:14:006 1024 f98 PT WARNING: PTError: 0x80072ee2
    2014-02-17 18:21:14:006 1024 f98 PT WARNING: GetCookie_WithRecovery failed : 0x80072ee2
    2014-02-17 18:21:14:006 1024 f98 PT WARNING: RefreshCookie failed: 0x80072ee2
    2014-02-17 18:21:14:006 1024 f98 PT WARNING: RefreshPTState failed: 0x80072ee2
    2014-02-17 18:21:14:006 1024 f98 PT WARNING: Sync of Updates: 0x80072ee2
    2014-02-17 18:21:14:006 1024 f98 PT WARNING: SyncServerUpdatesInternal failed: 0x80072ee2
    2014-02-17 18:21:14:006 1024 f98 Agent  * WARNING: Failed to synchronize, error = 0x80072EE2
    2014-02-17 18:21:14:009 1024 f98 Agent  * WARNING: Exit code = 0x80072EE2
    2014-02-17 18:21:14:009 1024 f98 Agent *********
    2014-02-17 18:21:14:009 1024 f98 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-02-17 18:21:14:009 1024 f98 Agent *************
    2014-02-17 18:21:14:009 1024 f98 Agent WARNING: WU client failed Searching for update with error 0x80072ee2
    2014-02-17 18:21:14:024 1024 d9c AU >>##  RESUMED  ## AU: Search for updates [CallId = {B6B4993C-E64D-41EE-BB3B-4C0259522B34}]
    2014-02-17 18:21:14:024 1024 d9c AU  # WARNING: Search callback failed, result = 0x80072EE2
    2014-02-17 18:21:14:024 1024 d9c AU  # WARNING: Failed to find updates with error code 80072EE2
    2014-02-17 18:21:14:024 1024 d9c AU #########
    2014-02-17 18:21:14:024 1024 d9c AU ##  END  ##  AU: Search for updates [CallId = {B6B4993C-E64D-41EE-BB3B-4C0259522B34}]
    2014-02-17 18:21:14:024 1024 d9c AU #############
    2014-02-17 18:21:14:024 1024 d9c AU Successfully wrote event for AU health state:0
    2014-02-17 18:21:14:024 1024 d9c AU AU setting next detection timeout to 2014-02-17 19:21:14
    2014-02-17 18:21:14:024 1024 d9c AU Successfully wrote event for AU health state:0
    2014-02-17 18:21:14:025 1024 d9c AU Successfully wrote event for AU health state:0
    2014-02-17 18:21:19:010 1024 f98 Report REPORT EVENT: {37C49AAA-0782-441A-85BD-BC86F384B332}2014-02-17 18:21:14:009+0400 1 148 101 {00000000-0000-0000-0000-000000000000} 0 80072ee2AutomaticUpdates Failure Software
    Synchronization Windows Update Client failed to detect with error 0x80072ee2.
    2014-02-17 18:21:19:060 1024 f98 Report CWERReporter::HandleEvents - WER report upload completed with status
    0x8
    2014-02-17 18:21:19:060 1024 f98 Report WER Report sent: 7.6.7600.256 0x80072ee2 00000000-0000-0000-0000-000000000000
    Scan 101 Managed
    2014-02-17 18:21:19:060 1024 f98 Report CWERReporter finishing event handling. (00000000)
    I've tried all the ways, restarting the services, file permissions, and many other
    PLEASE HELP
    thank you

    thank you for your reply, 
    I tried so many ways but couldn't solve it, then I removed the WSUS rule, and re-install it
    then after installing the rule i'm getting error when configuring the WSUS  ERROR : http://i.imgur.com/eqm9ViT.png
    Post install is starting
    Fatal Error: Failed to start and configure the WSUS service
    and here is the log file
    2014-02-20 08:37:47  Postinstall started
    2014-02-20 08:37:47  Detected role services: Api, UI, WidDatabase, Services
    2014-02-20 08:37:47  Start: LoadSettingsFromParameters
    2014-02-20 08:37:47  Content local is: True
    2014-02-20 08:37:47  Content directory is: E:\WSUS
    2014-02-20 08:37:47  SQL instname is: 
    2014-02-20 08:37:47  End: LoadSettingsFromParameters
    2014-02-20 08:37:47  Start: Run
    2014-02-20 08:37:47  Configuring content directory...
    2014-02-20 08:37:47  Configuring groups...
    2014-02-20 08:37:48  Starting group configuration for WSUS Administrators...
    2014-02-20 08:37:48  Found group in regsitry, attempting to use it...
    2014-02-20 08:37:48  Searching for existing group...
    2014-02-20 08:37:48  Existing group was found
    2014-02-20 08:37:48  Writing group to registry...
    2014-02-20 08:37:48  Finished group creation
    2014-02-20 08:37:48  Starting group configuration for WSUS Reporters...
    2014-02-20 08:37:48  Found group in regsitry, attempting to use it...
    2014-02-20 08:37:48  Searching for existing group...
    2014-02-20 08:37:48  Existing group was found
    2014-02-20 08:37:48  Writing group to registry...
    2014-02-20 08:37:48  Finished group creation
    2014-02-20 08:37:48  Configuring permissions...
    2014-02-20 08:37:48  Fetching content directory...
    2014-02-20 08:37:48  Fetching ContentDir from registry store
    2014-02-20 08:37:48  Value is E:\WSUS
    2014-02-20 08:37:48  Fetching group SIDs...
    2014-02-20 08:37:48  Fetching WsusAdministratorsSid from registry store
    2014-02-20 08:37:48  Value is S-1-5-21-495251104-1553465597-2720485832-1634
    2014-02-20 08:37:48  Fetching WsusReportersSid from registry store
    2014-02-20 08:37:48  Value is S-1-5-21-495251104-1553465597-2720485832-1635
    2014-02-20 08:37:48  Creating group principals...
    2014-02-20 08:37:49  Granting directory permissions...
    2014-02-20 08:37:49  Granting permissions on content directory...
    2014-02-20 08:37:49  Granting registry permissions...
    2014-02-20 08:37:49  Granting registry permissions...
    2014-02-20 08:37:49  Granting registry permissions...
    2014-02-20 08:37:49  Configuring shares...
    2014-02-20 08:37:49  Configuring network shares...
    2014-02-20 08:37:49  Fetching content directory...
    2014-02-20 08:37:49  Fetching ContentDir from registry store
    2014-02-20 08:37:49  Value is E:\WSUS
    2014-02-20 08:37:49  Fetching WSUS admin SID...
    2014-02-20 08:37:49  Fetching WsusAdministratorsSid from registry store
    2014-02-20 08:37:49  Value is S-1-5-21-495251104-1553465597-2720485832-1634
    2014-02-20 08:37:49  Content directory is local, creating content shares...
    2014-02-20 08:37:49  Creating share "UpdateServicesPackages" with path "E:\WSUS\UpdateServicesPackages" and description "A network share to be used by client systems for collecting all software packages (usually applications) published on this WSUS system."
    2014-02-20 08:37:49  Deleting existing share...
    2014-02-20 08:37:49  Creating share...
    2014-02-20 08:37:49  Share successfully created
    2014-02-20 08:37:49  Creating share "WsusContent" with path "E:\WSUS\WsusContent" and description "A network share to be used by Local Publishing to place published content on this WSUS system."
    2014-02-20 08:37:49  Deleting existing share...
    2014-02-20 08:37:49  Creating share...
    2014-02-20 08:37:49  Share successfully created
    2014-02-20 08:37:49  Creating share "WSUSTemp" with path "C:\Program Files\Update Services\LogFiles\WSUSTemp" and description "A network share used by Local Publishing from a Remote WSUS Console Instance."
    2014-02-20 08:37:49  Deleting existing share...
    2014-02-20 08:37:50  Creating share...
    2014-02-20 08:37:50  Share successfully created
    2014-02-20 08:37:50  Finished creating content shares
    2014-02-20 08:37:50  Configuring WID database...
    2014-02-20 08:37:50  Configuring the database...
    2014-02-20 08:37:50  Establishing DB connection...
    2014-02-20 08:37:50  Checking to see if database exists...
    2014-02-20 08:37:50  Database exists
    2014-02-20 08:37:50  Switching database to single user mode...
    2014-02-20 08:37:53  Loading install type query...
    2014-02-20 08:37:53  DECLARE @currentScriptVersion   int
    DECLARE @currentDBVersion       int
    IF NOT EXISTS(SELECT * FROM sys.databases WHERE name='SUSDB')
    BEGIN
        SELECT 1
    END
    ELSE
    BEGIN
        SET @currentScriptVersion = (9200 + 16384)
        SET @currentDBVersion = (SELECT SchemaVersion FROM SUSDB.dbo.tbSchemaVersion WHERE ComponentName = 'CoreDB')
        IF @currentDBVersion < 926
        BEGIN
            SELECT 3
        END
        ELSE IF @currentDBVersion < @currentScriptVersion
        BEGIN
            SELECT 2
        END
        ELSE IF @currentDBVersion = @currentScriptVersion
        BEGIN
            SELECT 0
        END
        ELSE
        BEGIN
            SELECT 4
        END
    END
    2014-02-20 08:37:53  Install type is: Reinstall
    2014-02-20 08:37:53  Creating logins...
    2014-02-20 08:37:53  Fetching account info for S-1-5-20
    2014-02-20 08:37:53  Found principal
    2014-02-20 08:37:53  Found account
    2014-02-20 08:37:53  Got binary SID
    2014-02-20 08:37:53  Fetching WsusAdministratorsSid from registry store
    2014-02-20 08:37:53  Value is S-1-5-21-495251104-1553465597-2720485832-1634
    2014-02-20 08:37:53  Fetching account info for S-1-5-21-495251104-1553465597-2720485832-1634
    2014-02-20 08:37:53  Fetching account info for S-1-5-21-495251104-1553465597-2720485832-1634
    2014-02-20 08:37:53  Found principal
    2014-02-20 08:37:53  Found account
    2014-02-20 08:37:53  Got binary SID
    2014-02-20 08:37:53  Setting content location...
    2014-02-20 08:37:53  Fetching ContentDir from registry store
    2014-02-20 08:37:53  Value is E:\WSUS
    2014-02-20 08:37:53  Swtching DB to multi-user mode......
    2014-02-20 08:37:56  Finished setting multi-user mode
    2014-02-20 08:37:56  Writing DB settings to registry...
    2014-02-20 08:37:56  Marking PostInstall done for UpdateServices-WidDatabase in the registry...
    2014-02-20 08:37:56  Configuring IIS...
    2014-02-20 08:37:56  Start: ConfigureWebsite
    2014-02-20 08:37:56  Configuring website on port 8530
    2014-02-20 08:38:48  2014-02-20 08:38:10  Info      IISCustomAction    Performing Setup Action, Command /Install 
    2014-02-20 08:38:46  Info      IISCustomAction    Command /Install Succeeded
    2014-02-20 08:38:48  End: ConfigureWebsite
    2014-02-20 08:38:48  Configuring performance counters...
    2014-02-20 08:38:48  Configuring Stats.NET perf counter...
    2014-02-20 08:38:48  Configuring reporting perf counter...
    2014-02-20 08:38:48  Configuring client webservice perf counter...
    2014-02-20 08:38:48  Configuring server sync webservice perf counter...
    2014-02-20 08:38:48  Configuring API remoting perf counter...
    2014-02-20 08:38:48  Bringing services online...
    2014-02-20 08:38:48  Checking initialization status... 
    2014-02-20 08:38:48  StartServer starting...
    2014-02-20 08:38:48  Generating encryption key to write to the registry...
    2014-02-20 08:38:48  Generating encryption key to write to the database...
    2014-02-20 08:38:48  Generating encryption key succeeded...
    2014-02-20 08:38:48  Setting WSUSService to autostart...
    2014-02-20 08:38:48  WSUSService is set to autostart.
    2014-02-20 08:38:48  Starting WSUSService...
    2014-02-20 08:38:48  Failed to start WsusService. Exception: System.InvalidOperationException: Cannot start service WSUSService on computer '.'. ---> System.ComponentModel.Win32Exception: An instance of the service is already running
       --- End of inner exception stack trace ---
       at System.ServiceProcess.ServiceController.Start(String[] args)
       at Microsoft.UpdateServices.Setup.StartServer.StartServer.StartAndConfigureService()
    2014-02-20 08:38:48  Importing default detectoids.
    2014-02-20 08:38:48  Importing CriticalUpdates.xml...
    2014-02-20 08:38:49  Importing Drivers.xml...
    2014-02-20 08:38:49  Importing FeaturePacks.xml...
    2014-02-20 08:38:49  Importing MicrosoftCorporation.xml...
    2014-02-20 08:38:49  Importing SecurityUpdates.xml...
    2014-02-20 08:38:49  Importing ServicePacks.xml...
    2014-02-20 08:38:49  Importing Tools.xml...
    2014-02-20 08:38:49  Importing UpdateRollups.xml...
    2014-02-20 08:38:49  Importing Updates.xml...
    2014-02-20 08:38:49  Importing Windows.xml...
    2014-02-20 08:38:49  Importing Windows2000family.xml...
    2014-02-20 08:38:49  Importing WindowsServer2003DatacenterEdition.xml...
    2014-02-20 08:38:50  Importing WindowsServer2003Family.xml...
    2014-02-20 08:38:50  Importing WindowsXPfamily.xml...
    2014-02-20 08:38:50  Importing LocalPublisher.xml...
    2014-02-20 08:38:50  Importing LocallyPublishedPackages.xml...
    2014-02-20 08:38:50  Importing Applications.xml...
    2014-02-20 08:38:50  Importing Exchange.xml...
    2014-02-20 08:38:50  Importing Office.xml...
    2014-02-20 08:38:50  Importing SQL.xml...
    2014-02-20 08:38:50  Importing Exchange2000Server.xml...
    2014-02-20 08:38:50  Importing ExchangeServer2003.xml...
    2014-02-20 08:38:50  Importing OfficeXP.xml...
    2014-02-20 08:38:50  Importing Office2003.xml...
    2014-02-20 08:38:50  Importing SQLServer.xml...
    2014-02-20 08:38:50  Importing WindowsXP64BitEditionVersion2003.xml...
    2014-02-20 08:38:50  Importing DefinitionUpdateSusXml.xml...
    2014-02-20 08:38:50  Importing ClientServicingApiDetectoid.xml...
    2014-02-20 08:38:50  Importing default detectoids succeeded.
    2014-02-20 08:38:52  FixSubscriptionCategories failed. Exception: System.Net.WebException: The request failed with HTTP status 400: Bad Request.
       at System.Web.Services.Protocols.SoapHttpClientProtocol.ReadResponse(SoapClientMessage message, WebResponse response, Stream responseStream, Boolean asyncCall)
       at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
       at Microsoft.UpdateServices.Internal.ApiRemoting.GetServerVersion()
       at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.GetServerVersion()
       at Microsoft.UpdateServices.Internal.BaseApi.UpdateServer.CreateUpdateServer(String serverName, Boolean useSecureConnection, Int32 portNumber)
       at Microsoft.UpdateServices.Internal.BaseApi.UpdateServer..ctor(Boolean bypassApiRemoting)
       at Microsoft.UpdateServices.Setup.StartServer.StartServer.FixSubscriptionCategories()
    2014-02-20 08:38:52  StartServer encountered errors. Exception=The request failed with HTTP status 400: Bad Request.
    2014-02-20 08:38:52  Microsoft.UpdateServices.Administration.CommandException: Failed to start and configure the WSUS service
       at Microsoft.UpdateServices.Administration.PostInstall.Run()
       at Microsoft.UpdateServices.Administration.PostInstall.Execute(String[] arguments)
    PLEASE HELP
    BEST REGARDS

  • Windows 8.1 will not get Forefront Client Updates from WSUS

    Recently I noticed that my Windows 8.1 clients were not getting updates from WSUS 3.2.  After some searching I found it was an issue with HTTPS and the solution was to disable HTTPS or enable TLS.  So I enabled TLS on the Server 2008 R2 WSUS server
    and that fixed the issue with my 8.1 clients not getting updates except for Forefront Endpoint Protection 2010.   My SCCM server deploys the client fine but it is version 2.1 and normally the client and definition updates come from WSUS with the
    latest client version being 4.5.  However, my Windows 8.1 machines will not get the client updates even though they are automatically approved for all machines.
    I am just wondering what else I can check or change to make sure my Windows 8.1 clients get the Forefront client updates as they should??   I am wondering if I manually install the 4.1 client update if it will take the client updates after that.  
    I only have about eight Windows 8.1 machines so if I have to do that by hand for now then I will and I think my organization will be moving to Server 2012 and SCCM 2012 this summer sometime.

    I reread your post and have another suggestion. If your SCCM 2007 server is still deploying the old 2.1 FEP client version, then you should install the latest anti-malware platform update for the SCCM server so you can deploy it from there instead of WSUS:
    http://support.microsoft.com/kb/2952678
    http://blogs.msdn.com/b/minfangl/archive/2013/08/15/guidance-on-install-anti-malware-platform-updates-for-fep-2010-su1-and-scep-2012-sp1.aspx
    Also, you may be affected by this:
    "Anti-malware platform updates on MU will use special detection logic and applicability rules to make the anti-malware platform updates available only on computers with previous N-2 anti-malware platforms installed. For example, on April 8<sup>th</sup>,
    anti-malware platform of version 4.5.x will be released on MU, and it will only be offered to computers where anti-malware platform version 4.3.x or 4.4.x is available. If a computer has FEP or SCEP client with version 4.1.x, it has to be upgraded to version
    4.3.x first, then to the latest version (4.5.x). If a computer has FEP or SCEP client with version older than 4.1.x, because of the same N-2 rule, it has to be upgraded to 4.1.x first, then to 4.3.x, and then to the latest version (4.5.x). Required updates
    will be kept on MU to ensure that this upgrade process is available for computers running older versions of the Microsoft anti-malware platform."
    http://blogs.technet.com/b/configmgrteam/archive/2014/03/27/anti-malware-platform-updates-for-endpoint-protection-will-be-released-to-mu.aspx

  • WSUS throwing 13002, "Client computers are installing updates with a higher than 25 percent failure rate. This is not normal."

    Hello,
    Within the past two months our WSUS Server started throwing error 13002, "Client computers are installing updates with a higher than 25 percent failure rate.  This is not normal."  We currently have 252 computers with errors in WSUS,
    and 33 updates with errors.  We have never had issues up until two months ago.  If you keep rebooting the machine, and keep running updates, they eventually all install.  I believe I will see the machines with errors go away as the weekly scheduled
    WSUS install runs over and over, and the machines reboot.
    - We run IE8 in our environment and sometimes IE9.
    - We have 300 clients, all running Windows 7 SP1 x64.
    - Our WSUS server is running on Server 2008 R2.  The WSUS build number is 3.2.7600.262.
    - We created an alternate WSUS 4.0 server on Server 2012, and redownloaded all updates.  We put one client on it and it is showing errors on 3 updates, KB890830, KB931125, and KB2917500.
    - Clients are throwing errors 800F0902, 80242016, and 80070005.
    - I've noticed something with the C:\Windows\SoftwareDistribution\Download folder on the clients.  When an update runs and fails, there is a "Install" folder created inside this folder.  If you try to open it after the failure you get
    "Access Denied"  If you reboot the machine, the install folder goes away.  (I assume this is a temp folder created to run updates).  I've checked the permissions on this folder on various machines and all seems normal.  I think
    this is the root of the problem, and why we need to keep rebooting to get all of the updates to run.  
    - I tried deleting the Software Distribution folder on a client after stopping the update service, then restarting the update service.  The folder redownloads but the client still throws errors.
    - I've gone through our Group Policies looking for anything that can cause this and found nothing.  We've created a test OU blocking inheritance, and only applying a WSUS policy in it to make it get the updates internally.  I then rebuilt multiple
    machines using Dell KACE, and still had failures.
    - We run SEP 11 and 12 on our clients.  I've tried removing the AV, making sure the firewall was off, etc.  It still throws errors.
    - I've spoken with our network team, and installed wireshark on a few clients looking for network errors and found nothing.
    - I've tried various Dell KACE scripted installs on test machines (erasing and rebuilding the machines from scratch), after which I run Windows Updates from WSUS.  They have thrown errors.
    - I've rebuilt a machine using Dell KACE, undomained it, then ran updates externally from WSUS going to Microsoft's site, and I'm still getting errors.
    - I've tried removing all software from the Dell KACE build to where it is just installing the OS and I'm still getting errors.
    - I tried taking a plain Windows 7 x64 DVD and installing that on a test machine, then without domaining it and without installing any other software, running updates from Microsofts update site.  This seems to work, althrough it does throw some errors
    but I believe those are related to having to reboot your machine in order to complete the updates (I can't remember that error code at the moment).
    Has anyone else been experiencing this?  Any suggestions as to how I can fix this?

    Hi,
    Error 800f0902
    Please try the method in this thread:
    Error
    Code: 800f0902
    Error 80242016
    If you receive Windows Update error 80242016 while checking for updates, it might be caused by a connection interruption between your computer and the Windows Update servers.
    80070005
    Usually means access denied
    Since it worked perfectly for a while, did you make any change on the server? Any applications new installed on clients?

  • Disconnect WSUS server and Process of Approving Updates via Metadata.

    Hi Folks:
    I have recently setup 2 WSUS servers.   The first one has connectivity to the Internet and of course has access to Microsoft updates.   The second WSUS server is part of a disconnected network.   Both WSUS servers are supporting client workstations
    of various operating system versions.   The connected WSUS server is fairly easy, from a management viewpoint.   I simply check to see what updates are "Needed" and I approve them for download.   However, the disconnected WSUS server
    is the one that I need some advice on.   I want to have a fairly simply procedure for the disconnected WSUS server, but here is the procedure that I think would work:
    Transfer metadata and updates via disc from the connected WSUS server to the disconnected WSUS server (using documented export/import procedure).
    Check to see what is "Needed" updates on the disconnected WSUS server, once the WSUS server has had a chance to absorb all the imported metadata and updates.   This means that the disconnected WSUS server has determined from it's supported
    client workstations, what updates are required.
    Generate a list of those "Needed" updates in some form, so that I can now approve those updates on the CONNECTED WSUS server for download.  
    Once those updates have been downloaded to the connected WSUS server, transfer the updates and metadata again to the disconnected WSUS server.   Approve those updates, so that they can now be sent out to the client workstations on the disconnected
    network.
    If that is my procedure (can someone like Lawrence Garvin), please let me know, if that sounds correct.   I'm concerned about the double export/import of the metadata and updates.
    Also, I'm wondering if it would be better to have separate connected WSUS server for supporting the disconnected WSUS to keep things straight.
    For example:
    One connected WSUS servers supporting the set of client workstations, that are on the connect WSUS server's network.
    One disconnected WSUS server supporting the set of client workstations that are on the disconnected WSUS server's network.
    One more connected WSUS server, that would be used to download and transfer metadata and updates to the disconnect WSUS server.   The advantage in keeping this separate, is that you would never confuse approved updates between the connected network
    client workstations and the disconnected network client workstations.  Especially, if they have different versions of software, that require updating.  
    Any input would be appreciated.

    You will likely also want to configure your WSUS server to "Download express installation files." under the "Update Files and Languages," setting on your options.
    I will unequivocally disagree with this statement, for several reasons:
    First, there's nothing that needs to be deployed that would use Express Installation Files anyway. Express Installation Files were designed to facilitate the deployment of Very Large Updates (read: SERVICE PACKS) across slow-speed links by significantly
    reducing the size of the binary that must be downloaded by the CLIENT. There are NO service packs in the catalog that won't already be installed on any client system.
    Second, in exchange for that ability of clients to download less, it significantly increased the size of the binary that must be downloaded by the SERVER from Microsoft. Express Installation Files will cause hundreds of gigabytes of extra binaries to be
    downloaded, which will need to be transferred to the disconnected server. None of which will actually ever be used.
    Third, most disconnected networks do not include WAN links, so the primary purpose of Express Installation File is contra-indicated by the very scenario being discussed.
    Otherwise by default you might get just an installer downloaded onto the WSUS server and clients might still need internet access to download the actual package contents.
    It would seem that you do not correctly understand Express Installation Files.
    There is an in-depth explanation of Express Installation Files in the WSUS Deployment Guide. For additional information see
    https://technet.microsoft.com/en-us/library/dd939908(v=ws.10).aspx#express
    I also would not recommend a internet facing WSUS server just to provide updates to the disconnected WSUS server as that will also need to download a full copy of the content to that server when it is likely already downloaded onto your internet
    / production WSUS server anyway.
    Seemingly you are also not actually familiar with the documented guidance for how to manage disconnected networks. An Internet-facing (connected) WSUS server is *exactly* how this is done.
    You may also find this part of the Deployment Guide to be useful reading:
    Configure a Disconnected Network to Receive Updates
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

Maybe you are looking for

  • Analysis Authorization

    We have a need to restrict the majority of our users from seeing transactions of few business accounts.  The restricted accounts can be based on a specific gl account, fund range, or they can be a combination of a fund and cost center (or fund and fu

  • I get two screens while uploading a document in a library

    Hi, I get two upload screens while uploading a document to a library. Take a look at the below screenshots. Can somebody please tell me how can I club these two to one. I need only one upload screen with all the metadata listed. Many thanks for your

  • Direct to Stage

    Hi I'm trying to play a windows media file in my Director project, but its always on top, and I cannot put a button on top of it, of course, to let the user choose to skip the intro movie. Well the movie is always on top because of direct to stage, b

  • Export jobs at em

    hi lest say I create a new database using export/import. Can I also transfer jobs from one database to other which are scheduled at enterprise manager? oracle 10g

  • WLC 5508 - upgrade image + H-REAP

    All, good day. I have a bug reported (CSCsy23704) for the H-REAP functionality. This sunday I will perform an image upgrade to try to solve this issue. What would it be the best image to go for?. After the upgrade, what will happen with the APs?, sho