Push urgent update via WSUS?

Hello, 
I am using WSUS 2012 and have a couple of questions.  We have created multiple Computer Groups in the WSUS console to manage the different departments and regional offices and it is working great,wih our GPOs.  Once we approve the updates then
afer a couple of days they will have them.
1.) If we need to push an urgent update out or remove one very quickly how can we do this?
2.) What is the best way to show what Computer groups we have approve updates on?
Thanks

Hello TB303,
1.) The best to force an update to be catch out of your WSUS settings is to force the computer to get the last updates from the server with the following command line :
wuauclt /detectnow (see :
http://technet.microsoft.com/en-us/library/cc720477%28v=ws.10%29.aspx)
You'll just have to wait for about 15-30 minutes and the computer will have the updates been downloaded.
But you have to take in consideration that the settings you put in your GPO on the way updates are treated (Download and wait for install, Download and install, etc.) will be applied even with the command line
2.) The best is to create Filtered View and to manage the Columns to see the Install counts or the last connection date.
TiGrOu.

Similar Messages

  • Getting Windows 10 Updates via WSUS?

    There are a number of us previewing Windows 10 within our organisation, and these machines reside in OUs which result in them getting updates via WSUS. I presume this configuration is the cause of there being no update ring or update build options within
    the OS. Looking at our WSUS, we have no Windows 10 product catalog for us to approve any updates. 
    What's the expected update mechanism from Microsoft on Enterprise Previewers? I had assumed that the OS would be locked to updates direct from MS but it seems it is still working with WSUS.

    Hey,
    it's not fair to be honest. Of course you should not use a technical preview in a production Environment.
    But it is possible to create a DEV active Directory which is using WSUS too.
    So why not having a WSUS DEV product categorie to Support technical previews in WSUS from the Moment it is joined to a DEV Domain?
    Regards,
    Klaus

  • Install Adobe updates via WSUS and ignore UAC restrictions

    Hi
    My company has currently set new UAC security settings but we have an issue where we are not able to update Adobe products because UAC stops it, UAC also does not prompt for elevation it just out right blocks updates.
    We really need a way to either allow the updater to run/install past the UAC restrictions OR find a way to distribute adobe updates via WSUS if it's possible
    Thanks

    I am not sure what you mean, I am able to install all updates from Microsoft through WSUS. I read something about being able to install an Adobe add-on or something like this to enable WSUS to download updates for Adobe and distribute them this way. This would save on network traffic and downloads, considering there are so many Adobe updates, it would be nicer to download them once and distribute. Otherwise how do big networks send out Adobe updates if they update it at all?
    I am not sure where the updateshandler.log is stored as searching the entire drive did not display anything. Something that might help is that some PCs use Adobe acrobat 8 and some use acrobat 10.

  • PUSH Security Updates from WSUS Forcefully

    Hi experts
    I want to know how to push security updates forcefully to a set of computers in WSUS
    Thank You. 
    TechSpec90

    I want to know how to push security updates forcefully to a set of computers in WSUS
    You don't.
    WSUS doesn't push updates at all.
    Per Milos' suggestion.... read the Deployment Guide.
    I would also suggest the
    WSUS Overview as well.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Unable to install security updates via WSUS on Windows 2008 client servers

    When I try install to install updates on Windows 2008 client servers I get the error : Code 80244019  Windows Update encountered an unknown error
    After running the WSUS Client Diagnostic Tool I get the result : GetFileVersion(szEngineDir,&susVersion) failed with hr=0x80070002 The system cannot find the file specified.
    On a Windows 2003 server the WSUS Client Diagnostic Tool shows no error message. So I guess the problem seems to be specificly related to Windows 2008 servers.
    The client server has been integrated into a WSUS console version 3.2.7600.226 runnning on a Windows 2003 Enterprise Edition SP2.
    Thanks in advance for the help in resolving this issue.

    When I try install to install updates on Windows 2008 client servers I get the error : Code 80244019  Windows Update encountered an unknown error
    The 0x80244019 error is an HTTP 404 error and when encountered trying to "install updates", which really occurs when trying to
    download the update files so that the updates can be installed, is almost always a function of the desired file having been manually deleted from the WSUS server. The file that should be there for the needed update, isn't, but it used to be.
    If all of the clients are getting this error on all updates, then that's a function of the content store on the WSUS server being missing, in the wrong place, or configured with the wrong ACLs.
    After running the WSUS Client Diagnostic Tool I get the result : GetFileVersion(szEngineDir,&susVersion) failed with hr=0x80070002
    This result is inconclusive, and not really relevant. The CDT is 32-bit only and can't be used on 64-bit systems. Plus, we already know the client is talking to the WSUS server -- you've reported the error code -- so the Client Diagnostic Tool will
    tell us nothing of use at this point (even if it did work on 64-bit systems).
    On a Windows 2003 server the WSUS Client Diagnostic Tool shows no error message.
    Cool. It works on a 32-bit system.
    So I guess the problem seems to be specificly related to Windows 2008 servers.
    No... BUT... allow me to make an example of this for just a moment, and forgive me for that.
    This is a great example of arriving at the wrong conclusion, caused by not considering ALL of the differences, as well as the scope and capability of the diagnostics performed. The error is not because one is '2003' and the other '2008; the error is because
    one is 'x86' and the other is (obviously) 'x64'. And, in either case, diagnosing the client was wasted effort because the client is already working. (It got a real HTTP error message from the WSUS server.)
    Now, we need to get some real diagnostic information to find out why you're getting this error code. :-)
    Please post the actual entries from the WindowsUpdate.log where this error code appears, plus a hundred lines prior, and let's get some context around the error code, and the exact update that's involved in this issue.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Cluster aware updating via WSUS

    I can't seem to find this information anywhere,
    I have setup a 2 node hyper-v 2012 baremetal cluster and configured it with cluster aware updating role (CAU)
    the environment is not internet facing and the updates need to come through a local WSUS server, a capability
    mentioned
    in many articles, however no guidelines on how to actually do it
    CAU is configured with the microsoft.windowsupdateplugin in self-updating mode
    I'm not sure how to point the CAU role to the local WSUS host, obviously no updates are occuring since there is no internet access to the MS update servers and WSUS cannot simply be auto-discovered
    has anyone done this or know how to make this work?  I can only assume I would have to pass on some sort of argument to the CAUpluginArguments field with the http/s link to the WSUS infrastructure but can't find the proper string
    thanks in advance,
    armin

    For clarity, when setting up the special GPO to send the WSUS settings to the cluster, what is the best way to configure the "Configure Automatic Updates" policy?  Is it to '3 - Autodownload and notify for install' and then the CAU client on the hosts
    will take it from there?
    It must be AUOption='3'. It's the only way to ensure the binaries are available for installation when CAU kicks off the update, and still not involve the configuration of a
    scheduled installation event.
    The technet seems to suggest that both option 2 & 3 on that list would work,
    I would be skeptical of AUOption='2'. How are the binaries going to get downloaded? If CAU tells the WUA to install updates, and the updates are not downloaded, ready for installation, nothing's going to get installed. (Unless somebody is claiming that CAU
    will also launch a download. However, that would unnecessarily extend the amount of time needed to patch a given node of the cluster, so certainly an undesirable configuration at best. Much better to have all files downloaded
    before launching the installation task.
    I'd also point out that if you're implementing CAU, there's no reason NOT to let the binaries download automatically. AUOption='2' would be used when you want to control WHEN the binaries are downloaded by launching the download interactively.
    Is it correct to apply the WSUS GPO to that whole OU, to all 4 machine names?
    The GPO is just a methodology to configure a Windows Update Agent with the desired settings. Neither the GPO, nor the WUA, care whether it's on a cluster node or not. What's correct is to configure the machine the way you want it configured.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Server 2012 R2 Clients will not update via WSUS

    We're having a problem with our Server 2012 R2 servers not updating as of about a month ago.  I've read the article about KB2959977.  I don't know if that is the issue or not, but the timing seems about right.  If I go to install this update
    on the affected servers, I get a Window that just hangs at "Searching for updates on this computer".
    When I look at the Windows update log, I get repeated entries of:
    2014-08-04 10:22:03:030  896 5a4 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1
    With the number at the end of cNetworkInterfaces incrementing and decrementing every few minutes or so
    2014-08-04 09:23:42:079  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:24:19:647  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:24:19:834  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:25:22:702  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:25:22:702  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:25:37:850  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:25:37:865  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:26:40:926  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:26:40:926  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:26:40:926  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:27:11:499  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:27:11:905  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:28:14:569  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:28:14:569  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:28:20:384  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:28:20:431  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:29:23:452  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:29:23:452  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:29:23:452  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:29:42:113  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:29:42:457  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:30:45:176  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:30:45:176  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:30:45:192  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:31:21:106  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:31:21:481  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:32:24:198  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:32:24:214  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:32:42:561  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:32:42:999  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:33:45:652  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:33:45:652  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:34:19:376  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:34:19:516  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:35:22:526  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:35:22:526  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:35:22:526  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:35:22:526  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:36:11:346  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:36:11:534  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:37:14:415  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:37:14:415  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:37:14:415  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:37:14:415  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:37:22:462  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:37:22:540  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:38:25:561  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:38:25:561  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:38:45:781  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:38:46:047  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:39:48:804  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:39:48:804  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:40:23:180  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:40:23:555  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:41:26:324  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:41:26:324  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:41:47:481  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:41:47:559  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:42:50:501  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:42:50:517  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:42:50:517  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:43:21:737  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:43:22:065  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:44:24:803  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:44:24:803  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:45:17:791  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:45:18:072  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:46:20:855  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:46:20:855  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:46:24:495  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:46:24:574  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:47:27:562  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:47:27:562  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:47:27:562  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:47:27:562  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:47:47:516  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:47:47:578  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:48:50:551  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:48:50:567  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:49:24:958  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:49:25:083  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:50:28:024  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:50:28:024  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:50:28:024  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:50:47:727  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:50:48:086  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:51:50:775  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:51:50:791  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:52:23:746  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:52:24:089  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:53:26:795  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:53:26:795  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:53:26:795  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:53:26:795  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:54:25:641  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:54:26:094  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:55:28:688  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:55:28:688  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:55:47:813  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:55:48:094  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:56:50:876  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:56:50:876  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:56:50:876  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:56:50:876  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:57:26:173  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:57:26:595  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:58:29:235  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:58:29:235  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:58:29:235  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:58:29:266  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:58:45:157  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:58:45:595  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-08-04 09:59:48:157  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:59:48:157  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 09:59:48:157  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 09:59:48:173  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 0.
    2014-08-04 10:00:21:298  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2014-08-04 10:00:21:595  880 a2c Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    I've attempted deleting it from the actual WSUS server itself, stopping the service, deleting the Software Distribution folder, restarting the service, wuauclt /resetquthorization /detectnow and various other combinations to re-initialize but all I end up
    getting are these constant messages in the logs.
    Other interesting errors are:
    2014-08-04 08:50:23:644 2132 1140 CltUI FATAL: CNetworkCostChangeHandler::RegisterForCostChangeNotifications: CoCreateInstance failed with error 80004002
    2014-08-04 08:50:23:644 2132 1140 CltUI WARNING: RegisterNetworkCostChangeNotification: Error 80004002
    Anyone else seeing this sort of weird behavior?  Only happens on 2012 R2 servers.

    Hello,
    In order to resolve the issue, we need get more information.
    What is the current version of your WSUS server? For WSUS 3.2, please apply
    KB3734608.
    How did you configure your GPO?
    Run nslookup WSUSservername, does the output show the correct IP address?

  • Client failing to recieve update via WSUS

    I have created a virtual lab environment and I am testing WSUS.
    I have deployed and configured my WSUS server as well as creating a GPO to point clients to my server.
    When manually checking for updates through windows update I receive error code 80244019.
    I have reviewed the update logs and feel there is an issue contacting my WSUS server. Any suggestions would be greatly appreciated
    2014-04-02 00:13:00:860 848 798 AU Triggering AU detection through DetectNow API
    2014-04-02 00:13:00:860 848 798 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Scheduled} added to AU services list
    2014-04-02 00:13:00:860 848 798 AU Triggering Online detection (interactive)
    2014-04-02 00:13:00:989 848 51c AU #############
    2014-04-02 00:13:00:989 848 51c AU ## START ## AU: Search for updates
    2014-04-02 00:13:00:989 848 51c AU #########
    2014-04-02 00:13:01:001 848 51c AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Scheduled} added to AU services list
    2014-04-02 00:13:01:001 848 51c IdleTmr WU operation (CSearchCall::Init ID 45) started; operation # 322; does use network; is not at background priority
    2014-04-02 00:13:01:001 848 51c IdleTmr Incremented PDC RefCount for Network to 1
    2014-04-02 00:13:01:001 848 51c IdleTmr Incremented idle timer priority operation counter to 2
    2014-04-02 00:13:01:001 848 51c Agent *** START *** Queueing Finding updates [CallerId = AutomaticUpdatesWuApp Id = 45]
    2014-04-02 00:13:01:001 848 51c AU <<## SUBMITTED ## AU: Search for updates [CallId = {4AA753DD-56B8-4DD2-BDC2-7FC77A75BEE4} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-04-02 00:13:01:001 848 81c Agent *** END *** Queueing Finding updates [CallerId = AutomaticUpdatesWuApp Id = 45]
    2014-04-02 00:13:01:001 848 81c Agent *************
    2014-04-02 00:13:01:001 848 81c Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdatesWuApp Id = 45]
    2014-04-02 00:13:01:001 848 81c Agent *********
    2014-04-02 00:13:01:001 848 81c Agent * Online = Yes; Ignore download priority = No
    2014-04-02 00:13:01:001 848 81c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-04-02 00:13:01:001 848 81c Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-04-02 00:13:01:001 848 81c Agent * Search Scope = {Machine & All Users}
    2014-04-02 00:13:01:001 848 81c Agent * Caller SID for Applicability: S-1-5-21-2929840714-3911456617-1138986597-1106
    2014-04-02 00:13:01:001 848 81c EP Got WSUS Client/Server URL: "http://APP1.CORP.CONTOSO.COM/ClientWebService/client.asmx"
    2014-04-02 00:13:01:001 848 81c Setup Checking for agent SelfUpdate
    2014-04-02 00:13:01:048 848 81c Setup Client version: Core: 7.9.9600.16422 Aux: 7.9.9600.16384
    2014-04-02 00:13:01:048 848 81c EP Got WSUS SelfUpdate URL: "http://APP1.CORP.CONTOSO.COM/selfupdate"
    2014-04-02 00:13:01:064 848 81c Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
    2014-04-02 00:13:01:064 848 81c Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
    2014-04-02 00:13:01:064 848 81c Misc WARNING: DownloadFileInternal failed for http://APP1.CORP.CONTOSO.COM/selfupdate/wuident.cab: error 0x80190194
    2014-04-02 00:13:01:064 848 81c Setup WARNING: SelfUpdate check failed to download package information, error = 0x80244019
    2014-04-02 00:13:01:064 848 81c Setup FATAL: SelfUpdate check failed, err = 0x80244019
    2014-04-02 00:13:01:079 848 81c Agent * WARNING: Skipping scan, self-update check returned 0x80244019
    2014-04-02 00:13:01:079 848 81c Agent * WARNING: Exit code = 0x80244019
    2014-04-02 00:13:01:079 848 81c Agent *********
    2014-04-02 00:13:01:079 848 81c Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdatesWuApp Id = 45]
    2014-04-02 00:13:01:079 848 81c Agent *************
    2014-04-02 00:13:01:079 848 81c Agent WARNING: WU client failed Searching for update with error 0x80244019
    2014-04-02 00:13:01:079 848 81c IdleTmr WU operation (CSearchCall::Init ID 45, operation # 322) stopped; does use network; is not at background priority
    2014-04-02 00:13:01:079 848 81c IdleTmr Decremented PDC RefCount for Network to 0
    2014-04-02 00:13:01:079 848 81c IdleTmr Decremented idle timer priority operation counter to 1
    2014-04-02 00:13:01:079 848 8e0 AU >>## RESUMED ## AU: Search for updates [CallId = {4AA753DD-56B8-4DD2-BDC2-7FC77A75BEE4} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-04-02 00:13:01:079 848 8e0 AU # WARNING: Search callback failed, result = 0x80244019
    2014-04-02 00:13:01:079 848 8e0 AU #########
    2014-04-02 00:13:01:079 848 8e0 AU ## END ## AU: Search for updates [CallId = {4AA753DD-56B8-4DD2-BDC2-7FC77A75BEE4} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-04-02 00:13:01:079 848 8e0 AU #############
    2014-04-02 00:13:01:079 848 8e0 AU All AU searches complete.
    2014-04-02 00:13:01:079 848 8e0 AU # WARNING: Failed to find updates with error code 80244019
    2014-04-02 00:13:01:079 848 8e0 AU Need to show Unable to Detect notification
    2014-04-02 00:13:01:079 848 8e0 AU AU setting next detection timeout to 2014-04-02 04:13:01
    2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
    2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 7 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
    2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2014-04-02 00:13:01:095 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2014-04-02 00:13:02:939 848 79c AU Triggering AU detection through DetectNow API
    2014-04-02 00:13:02:939 848 79c AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Scheduled} added to AU services list
    2014-04-02 00:13:02:939 848 79c AU Triggering Online detection (interactive)
    2014-04-02 00:13:03:079 848 51c AU #############
    2014-04-02 00:13:03:079 848 51c AU ## START ## AU: Search for updates
    2014-04-02 00:13:03:079 848 51c AU #########
    2014-04-02 00:13:03:079 848 51c AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Scheduled} added to AU services list
    2014-04-02 00:13:03:079 848 51c IdleTmr WU operation (CSearchCall::Init ID 46) started; operation # 331; does use network; is not at background priority
    2014-04-02 00:13:03:079 848 51c IdleTmr Incremented PDC RefCount for Network to 1
    2014-04-02 00:13:03:079 848 51c IdleTmr Incremented idle timer priority operation counter to 2
    2014-04-02 00:13:03:079 848 51c Agent *** START *** Queueing Finding updates [CallerId = AutomaticUpdatesWuApp Id = 46]
    2014-04-02 00:13:03:079 848 51c AU <<## SUBMITTED ## AU: Search for updates [CallId = {BF690BA2-3D86-45C0-9A18-D8BC8BC47DAC} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-04-02 00:13:03:079 848 81c Agent *** END *** Queueing Finding updates [CallerId = AutomaticUpdatesWuApp Id = 46]
    2014-04-02 00:13:03:095 848 81c Agent *************
    2014-04-02 00:13:03:095 848 81c Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdatesWuApp Id = 46]
    2014-04-02 00:13:03:095 848 81c Agent *********
    2014-04-02 00:13:03:095 848 81c Agent * Online = Yes; Ignore download priority = No
    2014-04-02 00:13:03:095 848 81c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-04-02 00:13:03:095 848 81c Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-04-02 00:13:03:095 848 81c Agent * Search Scope = {Machine & All Users}
    2014-04-02 00:13:03:095 848 81c Agent * Caller SID for Applicability: S-1-5-21-2929840714-3911456617-1138986597-1106
    2014-04-02 00:13:03:095 848 81c EP Got WSUS Client/Server URL: "http://APP1.CORP.CONTOSO.COM/ClientWebService/client.asmx"
    2014-04-02 00:13:03:095 848 81c Setup Checking for agent SelfUpdate
    2014-04-02 00:13:03:095 848 81c Setup Client version: Core: 7.9.9600.16422 Aux: 7.9.9600.16384
    2014-04-02 00:13:03:095 848 81c EP Got WSUS SelfUpdate URL: "http://APP1.CORP.CONTOSO.COM/selfupdate"
    2014-04-02 00:13:03:110 848 81c Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80190194
    2014-04-02 00:13:03:110 848 81c Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80190194
    2014-04-02 00:13:03:110 848 81c Misc WARNING: DownloadFileInternal failed for http://APP1.CORP.CONTOSO.COM/selfupdate/wuident.cab: error 0x80190194
    2014-04-02 00:13:03:110 848 81c Setup WARNING: SelfUpdate check failed to download package information, error = 0x80244019
    2014-04-02 00:13:03:110 848 81c Setup FATAL: SelfUpdate check failed, err = 0x80244019
    2014-04-02 00:13:03:110 848 81c Agent * WARNING: Skipping scan, self-update check returned 0x80244019
    2014-04-02 00:13:03:110 848 81c Agent * WARNING: Exit code = 0x80244019
    2014-04-02 00:13:03:110 848 81c Agent *********
    2014-04-02 00:13:03:110 848 81c Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdatesWuApp Id = 46]
    2014-04-02 00:13:03:110 848 81c Agent *************
    2014-04-02 00:13:03:110 848 81c Agent WARNING: WU client failed Searching for update with error 0x80244019
    2014-04-02 00:13:03:110 848 81c IdleTmr WU operation (CSearchCall::Init ID 46, operation # 331) stopped; does use network; is not at background priority
    2014-04-02 00:13:03:110 848 81c IdleTmr Decremented PDC RefCount for Network to 0
    2014-04-02 00:13:03:110 848 81c IdleTmr Decremented idle timer priority operation counter to 1
    2014-04-02 00:13:03:110 848 8e0 AU >>## RESUMED ## AU: Search for updates [CallId = {BF690BA2-3D86-45C0-9A18-D8BC8BC47DAC} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-04-02 00:13:03:110 848 8e0 AU # WARNING: Search callback failed, result = 0x80244019
    2014-04-02 00:13:03:110 848 8e0 AU #########
    2014-04-02 00:13:03:110 848 8e0 AU ## END ## AU: Search for updates [CallId = {BF690BA2-3D86-45C0-9A18-D8BC8BC47DAC} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-04-02 00:13:03:110 848 8e0 AU #############
    2014-04-02 00:13:03:110 848 8e0 AU All AU searches complete.
    2014-04-02 00:13:03:110 848 8e0 AU # WARNING: Failed to find updates with error code 80244019
    2014-04-02 00:13:03:110 848 8e0 AU Need to show Unable to Detect notification
    2014-04-02 00:13:03:110 848 8e0 AU AU setting next detection timeout to 2014-04-02 04:13:03
    2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
    2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-2929840714-3911456617-1138986597-1106} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 7 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}
    2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2014-04-02 00:13:03:110 848 8e0 AU # Publishing WNF Per user update count event Count: 0 SID {S-1-5-21-1674019052-998012437-141338546-1001} Service {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2014-04-02 00:13:06:079 848 8dc Report REPORT EVENT: {CC3A61B2-6D72-4EE5-8290-267C01BB971C} 2014-04-02 00:13:01:079+0100 1 148 [AGENT_DETECTION_FAILED] 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 1 80244019 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x80244019.
    2014-04-02 00:13:06:079 848 8dc Report REPORT EVENT: {15E44187-2503-438C-9813-EB6D81BFEA23} 2014-04-02 00:13:03:110+0100 1 148 [AGENT_DETECTION_FAILED] 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 1 80244019 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x80244019.
    2014-04-02 00:13:06:079 848 8dc Report WARNING: Failed to get ProtocolVersion: 8024043d
    2014-04-02 00:13:06:079 848 8dc Report WARNING: Failed to get ProtocolVersion: 8024043d
    2014-04-02 00:13:06:079 848 8dc Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2014-04-02 00:13:06:079 848 8dc Report WER Report sent: 7.9.9600.16422 0x80244019(0) D67661EB-2423-451D-BF5D-13199E37DF28 Scan 101 Managed
    2014-04-02 00:13:06:142 848 8dc Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2014-04-02 00:13:06:142 848 8dc Report WER Report sent: 7.9.9600.16422 0x80244019(0) D67661EB-2423-451D-BF5D-13199E37DF28 Scan 101 Managed
    2014-04-02 00:13:06:142 848 8dc Report CWERReporter finishing event handling. (00000000)

    During my initial investigation I had already confirmed both the background BITS and windows update services were running.
    I can confirm that after checking my policy and amending the "Specify intranet Microsoft update service location" to the following, to include the correct port
    http://App1.corp.contoso.com:8530
    I have been able to resolve the issue.
    Thank you for your comments
    Kind regards

  • Disconnect WSUS server and Process of Approving Updates via Metadata.

    Hi Folks:
    I have recently setup 2 WSUS servers.   The first one has connectivity to the Internet and of course has access to Microsoft updates.   The second WSUS server is part of a disconnected network.   Both WSUS servers are supporting client workstations
    of various operating system versions.   The connected WSUS server is fairly easy, from a management viewpoint.   I simply check to see what updates are "Needed" and I approve them for download.   However, the disconnected WSUS server
    is the one that I need some advice on.   I want to have a fairly simply procedure for the disconnected WSUS server, but here is the procedure that I think would work:
    Transfer metadata and updates via disc from the connected WSUS server to the disconnected WSUS server (using documented export/import procedure).
    Check to see what is "Needed" updates on the disconnected WSUS server, once the WSUS server has had a chance to absorb all the imported metadata and updates.   This means that the disconnected WSUS server has determined from it's supported
    client workstations, what updates are required.
    Generate a list of those "Needed" updates in some form, so that I can now approve those updates on the CONNECTED WSUS server for download.  
    Once those updates have been downloaded to the connected WSUS server, transfer the updates and metadata again to the disconnected WSUS server.   Approve those updates, so that they can now be sent out to the client workstations on the disconnected
    network.
    If that is my procedure (can someone like Lawrence Garvin), please let me know, if that sounds correct.   I'm concerned about the double export/import of the metadata and updates.
    Also, I'm wondering if it would be better to have separate connected WSUS server for supporting the disconnected WSUS to keep things straight.
    For example:
    One connected WSUS servers supporting the set of client workstations, that are on the connect WSUS server's network.
    One disconnected WSUS server supporting the set of client workstations that are on the disconnected WSUS server's network.
    One more connected WSUS server, that would be used to download and transfer metadata and updates to the disconnect WSUS server.   The advantage in keeping this separate, is that you would never confuse approved updates between the connected network
    client workstations and the disconnected network client workstations.  Especially, if they have different versions of software, that require updating.  
    Any input would be appreciated.

    You will likely also want to configure your WSUS server to "Download express installation files." under the "Update Files and Languages," setting on your options.
    I will unequivocally disagree with this statement, for several reasons:
    First, there's nothing that needs to be deployed that would use Express Installation Files anyway. Express Installation Files were designed to facilitate the deployment of Very Large Updates (read: SERVICE PACKS) across slow-speed links by significantly
    reducing the size of the binary that must be downloaded by the CLIENT. There are NO service packs in the catalog that won't already be installed on any client system.
    Second, in exchange for that ability of clients to download less, it significantly increased the size of the binary that must be downloaded by the SERVER from Microsoft. Express Installation Files will cause hundreds of gigabytes of extra binaries to be
    downloaded, which will need to be transferred to the disconnected server. None of which will actually ever be used.
    Third, most disconnected networks do not include WAN links, so the primary purpose of Express Installation File is contra-indicated by the very scenario being discussed.
    Otherwise by default you might get just an installer downloaded onto the WSUS server and clients might still need internet access to download the actual package contents.
    It would seem that you do not correctly understand Express Installation Files.
    There is an in-depth explanation of Express Installation Files in the WSUS Deployment Guide. For additional information see
    https://technet.microsoft.com/en-us/library/dd939908(v=ws.10).aspx#express
    I also would not recommend a internet facing WSUS server just to provide updates to the disconnected WSUS server as that will also need to download a full copy of the content to that server when it is likely already downloaded onto your internet
    / production WSUS server anyway.
    Seemingly you are also not actually familiar with the documented guidance for how to manage disconnected networks. An Internet-facing (connected) WSUS server is *exactly* how this is done.
    You may also find this part of the Deployment Guide to be useful reading:
    Configure a Disconnected Network to Receive Updates
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • We are having problems pushing push adobe reader install and updates via Microsoft deployment

    We are having problems pushing push adobe reader install and updates via Microsoft deployment. We issue is with our mail server. We cant open PDF within outlook.
    Cliff Butler
    Coastal Connection
    www.coastal-connection.com

    Hi ccbutler,
    What is the current version of Acrobat/Reader installed and what is the version of Outlook installed.
    Was it working before if yes do you have idea when did problem started.
    ~Ajlan Huda.

  • Windows Update Agent via WSUS

    Hi All,
    Is there a way to import the latest Windows Update Agent into WSUS and therefore all 3000 machines that connect to WSUS get the update?
    Reason this has cropped up is because I want to update all machines to IE9 from IE8. Have approved Internet Explorer 9 in WSUS. Some machines have updated ok. Others wont update and clicking on Check for updates (where it checks WSUS) tells me there are
    no updates to install. If I 'Check for Updates from Microsoft Online' it immediately tells me that the machine needs an update. The update that gets installed is Windows Update Agent 7.6.7600.320 which is fine except that means each user will have
    to download the update from MS Update and I want WSUS to do it like it does every other Critical and Important update. Does anyone know the KB number I should be looking for or what I need to import from the Catalogue into WSUS so the Update Agent is deployed
    to all machines. All machines are Windows 7 SP1 32bit. There must be a way otherwise machines are going to be stuck on IE8 and also not receive any future Win 7 updates from WSUS.
    I know IE8 is old and so is IE9 but due to various NHS systems out there some only support IE8 or 9. Tragic I know.
    Thanks
    Rich

    The proper way to distribute the latest WUA (.320) to the clients in a WSUS administered environment, is to update the WSUS server(s) with this update:
    An update to harden Windows Server Update Services
    then the clients WUA will be selfupdated when they connect to the WSUS server.
    Rolf Lidvall, Swedish Radio (Ltd)

  • Windows 8.1 update via Intune software deployment

    Hi Forum
    Is it possible to push or make available the Windows 8.1 update via Windows Intune software deployment?
    This is for laptops.
    Thanks in advance
    NN

    Yes it will be, but not yet. See http://social.technet.microsoft.com/Forums/en-US/79d259ff-47ff-4728-8ee9-28a5e06e5ba5/i-dont-see-httpsupportmicrosoftcomkb2919355-within-updates-for-windows-intune-is-it-out-of?forum=windowsintuneprod
    Jason | http://blog.configmgrftw.com

  • SCCM 2012 SP1 agent install via WSUS

    Hi guys,
    I'm having got an issue when I try installing the agent via WSUS. When I try installing manually everything seems to work.
    Here are the infos from the ccmsetup.log:
    ==========[ ccmsetup started in process 2252 ]========== ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Running on platform X86 ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Updated security on object C:\WINDOWS\ccmsetup\cache\. ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Launch from folder C:\WINDOWS\SoftwareDistribution\Download\Install\ ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    CcmSetup version: 5.0.7804.1000 ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Running on OS (6.1.7601). Service Pack (1.0). SuiteMask = 256. Product Type = 1 ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Ccmsetup command line: "C:\WINDOWS\SoftwareDistribution\Download\Install\ccmsetup.exe"  ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    CCMGetGlobalService(&spService), HRESULT=87d00219 (e:\nts_sccm_release\sms\framework\core\ccmcore\ccmconditions.cpp,39) ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    LSJoinedToADDomain ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Local Machine is joined to an AD domain ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    LSGetADForestAndDomainName ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Current AD forest name is mydomain.tld, domain name is mydomain.tld ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Domain joined client is in Intranet ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    LSGetAssignedSiteFromAD ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    DhcpGetOriginalSubnetMask entry point is supported. ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Begin checking Alternate Network Configuration ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    spNamespace.Open(sNamespacePath), HRESULT=8004100e (e:\nts_sccm_release\sms\framework\ccmutillib\ccmiputil.cpp,1109) ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Finished checking Alternate Network Configuration ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    LSGetADSiteName ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Current AD site of machine is DE-Zeilarn ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Attempting to query AD for assigned site code ccmsetup 08.02.2013 13:45:46 196 (0x00C4)
    Performing AD query: '(&(ObjectCategory=MSSMSRoamingBoundaryRange)(|(&(MSSMSRangedIPLow<=2887256160)(MSSMSRangedIPHigh>=2887256160))))' ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Performing AD query: '(&(ObjectCategory=mSSMSSite)(|(mSSMSRoamingBoundaries=172.24.8.0)(mSSMSRoamingBoundaries=DE-Zeilarn)(mSSMSSiteCode=XYZ)))' ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSIsSiteCompatible : Verifying Site Compatibility for <XYZ> ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMGetGlobalService(&spService), HRESULT=87d00219 (e:\nts_sccm_release\sms\framework\core\ccmcore\ccmconditions.cpp,39) ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSGetADForestAndDomainName ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Current AD forest name is mydomain.tld, domain name is mydomain.tld ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Domain joined client is in Intranet ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSGetSiteVersionFromAD ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSGetSiteVersionFromAD : Attempting to query AD for MPs for site 'XYZ' ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Performing AD query: '(&(ObjectCategory=mSSMSManagementPoint)(mSSMSSiteCode=XYZ))' ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSGetSiteVersionFromAD : Successfully retrieved version '5.00.7804.1000' for site 'XYZ' ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSIsSiteCompatible : Site Version = '5.00.7804.1000' Site Capabilities = <Capabilities SchemaVersion="1.0"><Property Name="SSL" Version="1"/><Property Name="SSLState" Value="31"/></Capabilities> ccmsetup 08.02.2013
    13:45:47 196 (0x00C4)
    LSIsSiteVersionCompatible : Site Version '5.00.7804.1000' is compatible. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSIsSiteCompatible : Site <XYZ> Version '5.00.7804.1000' is compatible. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSGetAssignedSiteFromAD : Trying to Assign to the Site <XYZ> ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Got site code 'XYZ' from AD. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Retrieving client operational settings from AD. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Performing AD query: '(&(ObjectCategory=mSSMSManagementPoint)(mSSMSDefaultMP=TRUE)(mSSMSSiteCode=XYZ))' ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    OperationalXml '<ClientOperationalSettings><Version>5.00.7804.1000</Version><SecurityConfiguration><SecurityModeMask>0</SecurityModeMask><SecurityModeMaskEx>448</SecurityModeMaskEx><HTTPPort>80</HTTPPort><HTTPSPort>443</HTTPSPort><CertificateStoreName></CertificateStoreName><CertificateIssuers>CN=root-ca</CertificateIssuers><CertificateSelectionCriteria></CertificateSelectionCriteria><CertificateSelectFirstFlag>1</CertificateSelectFirstFlag><SiteSigningCert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iteSigningCert></SecurityConfiguration><RootSiteCode>XYZ</RootSiteCode><CCM>
    <CommandLine>SMSSITECODE=XYZ</CommandLine> </CCM><FSP> <FSPServer></FSPServer> </FSP><Capabilities SchemaVersion ="1.0"><Property Name="SSL" Version="1" /><Property Name="SSLState"
    Value="31" /></Capabilities><Domain Value="mydomain.tld" /><Forest Value="mydomain.tld" /></ClientOperationalSettings>' ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    HTTP is selected for Client. The current state is 0. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    The MP name retrieved is 'mysccmserver.mydomain.tld' with version '7804' and capabilities '<Capabilities SchemaVersion="1.0"><Property Name="SSL" Version="1"/><Property Name="SSLState" Value="31"/></Capabilities>' ccmsetup 08.02.2013
    13:45:47 196 (0x00C4)
    MP 'mysccmserver.mydomain.tld' is not compatible ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Retrieved 0 MP records from AD for site 'XYZ' ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Received client operational settings: <ClientOperationalSettings><Version>5.00.7804.1000</Version><SecurityConfiguration><SecurityModeMask>0</SecurityModeMask><SecurityModeMaskEx>448</SecurityModeMaskEx><HTTPPort>80</HTTPPort><HTTPSPort>443</HTTPSPort><CertificateStoreName></CertificateStoreName><CertificateIssuers>CN=root-ca</CertificateIssuers><CertificateSelectionCriteria></CertificateSelectionCriteria><CertificateSelectFirstFlag>1</CertificateSelectFirstFlag><SiteSigningCert>308202F4308201DCA003020102021011B05A5A5C9B0BBA4299C744025DA257300D06092A864886F70D01010B05003016311430120603550403130B53697465205365727665723020170D3133303131363138303730375A180F32313132313232343138303730375A3016311430120603550403130B536974652053657276657230820122300D06092A864886F70D01010105000382010F003082010A02820101009855D66E3C7F2CBA9E701E06597B77942120C27D6A4B7FACE3DB214363C20E6AD12BFFB7225A5D9B84A316B6EC20979007CB6FEE71A82D879091A0EEC7E07C7952EDA27ED31C76E63CF8ABA411B8BA79AB8B48B4FA4204085E8836B7F4619A0E29160528C91D205A8C4F1CBDF5C78CC27ED7C5BAA9369E74F7B610C77BAA777E5B31DF65DC562129D26A5C730161D7D1E2946B3953F8923BFE80A812AE2304A8B3701400CE11BF4F1521A693B9624BF25A19AD1A8E56DE9B99793D60CFA4D9B83E4777B169FF33CEF04298AAEECE733AB9A9CCD7380C8073079D95D650434D2FF7AD33AB21A0DAE4EDB64343E94141108F594925BE214933AC9E3BC043FD332F0203010001A33C303A30220603551D11041B301982175649455343434D322E65696E737465696E2E6C6F63616C30140603551D25040D300B06092B060104018237650B300D06092A864886F70D01010B0500038201010089A4B76FFBF73A0F9872BF2B6C14B7EAFAEDBCDEB2793675048BEA300BADC1E168FE75E6A8207B0BADD5C9FC533F62687DD393DDE8C0E68E1973DE32B9DC85DAF41D2AB62F34AC8C88CF8C02FCCE04695D732317430561D3D0F8C95719AA605D0E68488CAB9B3A98461D19EF9E62FF2F37A8E45CCAFE65E48A46CE48987A41858CE2B7324D5F529E0E3A76DE8374787851C9F7044FBEF89C583CC42717F3BDFDF4E73A64FBE4A2991B32C7C2C30117EFE584111112C39368A4712BBD147934D38B4C4FB9E12A6254969A6DDFFE40DA7D687F42D8528A6F8117028C3F25401D1892574303F6C02E208E4F938429B0AC4DC9F9EDC98B6D40D2EBD9266223D02EBF</SiteSigningCert></SecurityConfiguration><RootSiteCode>XYZ</RootSiteCode><CCM>
    <CommandLine>SMSSITECODE=XYZ</CommandLine> </CCM><FSP> <FSPServer></FSPServer> </FSP><Capabilities SchemaVersion ="1.0"><Property Name="SSL" Version="1" /><Property Name="SSLState"
    Value="31" /></Capabilities><Domain Value="mydomain.tld" /><Forest Value="mydomain.tld" /></ClientOperationalSettings>. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Security settings: Http port 80; https port 443; select first cert 1; sslstate 480 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Security settings: Certificate Issuers =  ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    FromAD: command line = SMSSITECODE=XYZ ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSGetManagementPointsForSiteFromAD ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMGetGlobalService(&spService), HRESULT=87d00219 (e:\nts_sccm_release\sms\framework\core\ccmcore\ccmconditions.cpp,39) ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSGetADForestAndDomainName ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Current AD forest name is mydomain.tld, domain name is mydomain.tld ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Domain joined client is in Intranet ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CMPInfoFromADCache requests are throttled for 00:59:59 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    SslState value: 480 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Ccmsetup was run without any user parameters specified. Running without registering ccmsetup as a service. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Detected sitecode 'XYZ' from AD. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMHTTPPORT:    80 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMHTTPSPORT:    443 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMHTTPSSTATE:    480 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMHTTPSCERTNAME:     ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    FSP:     ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMCERTISSUERS:    CN=root-ca ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMFIRSTCERT:    1 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Creating CCMCertStore ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMCERTID:    SMS;FB0F35392A7FF68D2FA9C97D0CD54A3E0057964E ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    No MP or source location has been explicitly specified.  Trying to discover a valid content location... ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Looking for MPs from AD... ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Retrieving client operational settings from AD. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CMPInfoFromADCache requests are throttled for 00:59:59 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Received client operational settings: <ClientOperationalSettings><Version>5.00.7804.1000</Version><SecurityConfiguration><SecurityModeMask>0</SecurityModeMask><SecurityModeMaskEx>448</SecurityModeMaskEx><HTTPPort>80</HTTPPort><HTTPSPort>443</HTTPSPort><CertificateStoreName></CertificateStoreName><CertificateIssuers>CN=root-ca</CertificateIssuers><CertificateSelectionCriteria></CertificateSelectionCriteria><CertificateSelectFirstFlag>1</CertificateSelectFirstFlag><SiteSigningCert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iteSigningCert></SecurityConfiguration><RootSiteCode>XYZ</RootSiteCode><CCM>
    <CommandLine>SMSSITECODE=XYZ</CommandLine> </CCM><FSP> <FSPServer></FSPServer> </FSP><Capabilities SchemaVersion ="1.0"><Property Name="SSL" Version="1" /><Property Name="SSLState"
    Value="31" /></Capabilities><Domain Value="mydomain.tld" /><Forest Value="mydomain.tld" /></ClientOperationalSettings>. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Security settings: Http port 80; https port 443; select first cert 1; sslstate 480 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Security settings: Certificate Issuers = CN=root-ca ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    FromAD: command line = SMSSITECODE=XYZ ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSGetManagementPointsForSiteFromAD ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CCMGetGlobalService(&spService), HRESULT=87d00219 (e:\nts_sccm_release\sms\framework\core\ccmcore\ccmconditions.cpp,39) ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    LSGetADForestAndDomainName ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Current AD forest name is mydomain.tld, domain name is mydomain.tld ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Domain joined client is in Intranet ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CMPInfoFromADCache requests are throttled for 00:59:59 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Current directory 'C:\WINDOWS\SoftwareDistribution\Download\Install' is not a valid source location. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    No valid source or MP locations could be identified to download content from. Ccmsetup.exe cannot continue. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    DetermineInstallSource(), HRESULT=80004005 (e:\nts_sccm_release\sms\setup\ccmsetup\ccmsetup.cpp,4426) ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    Failed to parse '"C:\WINDOWS\SoftwareDistribution\Download\Install\ccmsetup.exe" ' with error 0x80004005 ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CFSPStateMessage::CFSPStateMessage FSPStateMessage 08.02.2013 13:45:47 196 (0x00C4)
    A Fallback Status Point has not been specified.  Message with STATEID='100' will not be sent. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CFSPStateMessage::~CFSPStateMessage FSPStateMessage 08.02.2013 13:45:47 196 (0x00C4)
    CFSPStateMessage::CFSPStateMessage FSPStateMessage 08.02.2013 13:45:47 196 (0x00C4)
    A Fallback Status Point has not been specified.  Message with STATEID='307' will not be sent. ccmsetup 08.02.2013 13:45:47 196 (0x00C4)
    CFSPStateMessage::~CFSPStateMessage FSPStateMessage 08.02.2013 13:45:47 196 (0x00C4)
    ParseCommandLine(), HRESULT=80004005
    My boundaries and boundary groups are configured, I can see the objects in the Systems Management Container in AD, but still the agent install via WSUS will not work. Any suggestions?
    Cheers
    Sebastian Bammer

    see my latest post. It looks like a bug in the setup. It selects a certificate but still it presents information that iis on the mp does not accept. Check your iis logs. Manual install works for ssl only sites. I haven't got any other methods yet. I will
    keep you updated.

  • How to push software update thru ARD

    How can I push software update to the client macs thru the ARD? Please help.

    Hi
    You don't really need ARD to push Apple specific Software Updates to mac clients. You could utilize the Software Update Service instead:
    http://images.apple.com/server/macosx/docs/SystemImaging_and_SW_Update_Adminv10.5.pdf
    More of the same from here:
    http://www.apple.com/server/macosx/resources/
    If by Software Updates you mean 3rd-Party applications such as Adobe's suite of products then unless they are .pkgs or .mpkgs you won't be able to. However even for these you could utilize PackageMaker:
    http://oreilly.com/pub/a/mac/2003/09/16/packagemaker.html?page=last&x-maxdepth=0
    http://forums.macosxhints.com/showthread.php?t=91068
    http://developer.apple.com/documentation/Porting/Conceptual/PortingUnix/distribu ting/chapter9_section_3.html#//appleref/doc/uid/TP40002855-TPXREF102
    and build a .pkg for non-pkg applications and push those out using ARD. Another way of doing this is via the command line man softwareupdate - which can be also be done using ARD.
    Tony

  • Windows Updates constantly failing and reverting after SCCM 2012 R2 pushes out updates

    Hi folks,
    I wonder could anyone help me with a strange problem I am having!
    We use SCCM 2012 R2 and I am trying to roll out updates to a Windows 2008 R2 Standard 64 bit server. 
    When I deploy the updates to the server they get to the server and install but during the reboot it says Windows Modules Installer for a while then shows the failure configuring Windows Updates, reverting changes screen.
    I’ve tried the suggestions of disabling 'Windows Management Instrumentation' and 'Windows Modules Installer' and renaming the repository folder but still no joy.
    If I use Windows Update to install the updates the updates do go on but then when I add it to the collection in SCCM to push out the patches it sees the server as if the updates aren’t installed and begins doing the installs. 
    After the patches installs using SCCM and when the server is rebooted it goes back into the loop of saying Windows Modules Installer and reverts the updates and strips out the patches again.
    I was hoping that when the Windows Updates were installed via Windows Update and once I put the server into the collection to push out the updates to the server it would have shown that the updates are already installed on the server and show that server
    as being compliant in SCCM but unfortunately that isn’t happening.
    It sights a couple of errors in the Setup event logs on the offending server: -
    For multiple patches - Package KBXXXXXXX failed to be changed to the Installed state. Status: 0x80070643
    For multiple patches - Initiating changes for package KBXXXXXXX. Current state is Invalid Resolved. Target state is Installed. Client id: WindowsUpdateAgent.
    After doing some research,
    0x80070643 refers to a .Net Framework issue so I’ve ran a .Net Repair tool but that didn’t work either so I’m running out of ideas so any help would be greatly appreciated on how I can get this sever updated using SCCM and showing as compliant.
    Thanks,
    Bonemister

    Hi Torsten,
    Thanks for your reply!
    I was afraid you were going to say that as it just doesn't make sense that when I install the update using Windows Update via the Ire-nternet and when the install and re-scan no updates are required.  It is only when I ask SCCM to check for patches
    that it sees updates are missing and installed the updates before the OS reverts when.
    Is there a way in SCCM to remove the record of what patches have been installed onto a particular server?  I tried deleted the server out of SCCM then applying the Windows Updates via the web then added the server back into SCCM and see did it pick
    up the newly installed updates on the server.
    The thing is I don't think that WindowsUpdate.log will show any failures as Windows update is showing as no more updates required.  It is just when SCCM installs that patches that the problem happens so that is what is leading me to think it is an SCCM
    problem.
    My main goal is to get the updates into the server and for it so show as complient!
    I'll check back through the even logs again.  Are they any SCCM logs that show patches failing to install and why?
    Thanks again,
    Bonemister

Maybe you are looking for

  • Memory Problem for T400

    I brought my ThinkPads T400 one year ago. In this year, I brought Window 7 and installed in my laptop. After I installed all the drivers for the laptop. I can only use 2.99 GB memory out of 4GB. What is the problem? Do everyone knows? (Everything wor

  • Print spooler crashes whenever I try to print to Deskjet F4280 over the network.

    Greetings, I have a nice and cheap F4280 connected to my computer via USB. My computer is running Windows XP SP3 (downgraded from Vista, had the same problem with Vista as well). I can print fine from my printer, but whenever I try to print from a la

  • Error Executing Database Query (Encountered [nullstring])

    The attached code gives the following error message. I did have nullstrings being submitted as the "notes" and "internal notes," but I removed them in an (unsuccessful) attempt to solve this problem. Can this be fixed? Thanks! quote: Error Executing

  • Itunes comes on when i plug my headset in

    how do i stop itunes from starting on my iphone when i plug in my headset?

  • I am not able to see the trace files for SQL query

    Hello, I am using windows vista OS. SQL> select * from v$version; BANNER Oracle Database 10g Enterprise Edition Release 10.2.0.3.0 - Prod PL/SQL Release 10.2.0.3.0 - Production CORE 10.2.0.3.0 Production TNS for 32-bit Windows: Version 10.2.0.3.0 - P