Update agent in workgroup server

Hi,
I have DPM server and two client servers to backup. all servers in workgroup.
I installed the agents manually and attached the DPM server.
The DPM Server see the clients, but when I'm going to DPM console "Management -> Agents" I can see "Agent status OK" and "Agents Updates > Update available" when I click  "Update available" I get an Error
message that I need to update manually, need to go from the client server to folder "C:\Program Files\Microsoft System Center 2012 R2\DPM\DPM\ProtectionAgents\RA\4.2.1205.0\amd64" on DPM server and run the installation.
when I'm doing it from the client server I get a massage that this is the same agent version, but the " Update available" massage is still shown in the DPM console.
need help for this issue 
thanks,

Hi,
You need to install the agent from under the "C:\Program Files\Microsoft System Center 2012 R2\DPM\DPM\Agents\RA\4.2.1xxx.0\amd64 folder.  That is the location for updated agents from update rollups.
Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
This posting is provided "AS IS" with no warranties, and confers no rights.

Similar Messages

  • DPM 2012 R2 agent update on Windows 2003 server x64

    Hi,
    I have an old windows 2003 server x64 protected by DPM 2012 Sp1. After DPM upgrade to 2012 R2 I cannot update DPM Agent on server. If I try to update agent manually error message is : agentsetup.exe is not a valid win32 application.
    Mihai

    command back,
    edit: it seems like a reboot is definitely needed to get it working 
    got it working like described here: http://support.microsoft.com/kb/2958100/en-us
    Install the Microsoft Visual C++ 2008 Redistributable on Windows Server 2003 servers if it is not already installed.
    Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)
    Microsoft Visual C++ 2008 Redistributable Package (x64)
    Note The following error occurs if the C++ redistributable is not installed:
    Data Protection Manager Setup
    Could not load the setup launch screen. Please contact Microsoft Product Support.
    Copy the Windows Server 2003 Agent installer that is located on in the DPM server to the Windows Server 2003 server, and then install the agent.
    64-bit: <var>DPM Installation Location</var>\DPM\agents\RA\4.2.1226.0\amd64\1033\DPMAgentInstaller_Win2K3_AMD64.exe
    32-bit: <var>DPM Installation Location</var>\DPM\agents\RA\4.2.1226.0\i386\1033\
    DPMAgentInstaller_Win2K3_i386.exe
    Run the following command at an administrative command prompt:
    cd DPM Agent Installation Location\DPM\bin\setdpmserver.exe –dpmservername DPM Server Name
    Run the following Windows Powershell cmdlet to establish a connection with the DPM server:
    Attach-ProductionServer.ps1 DPMServerNameProductionServerNameUserNamePasswordDomain
    regards
    Stefan

  • DPM 2012 R2 agent update on Windows 2003 server x64 - Exchange

    According to the release notes on http://blogs.technet.com/b/dpm/archive/2014/04/23/now-available-update-rollup-2-for-system-center-2012-r2-data-protection-manager.aspx the following workloads are supported on Win2K3 with DPM2012 R2 UR2:
    SQL 2005
    SQL 2008
    SQL 2008 R2
    SharePoint 2007
    Does that mean protecting Exchange 2007 on Win2K3 is no longer an option after upgrading to DPM 2012 R2 (UR2)? It works on DPM 2012 SP1 but I need to know if it will continue to work after upgrading.
    (This question follows on from this thread http://social.technet.microsoft.com/Forums/en-US/c425421b-b726-4125-82fc-beae8947722c/dpm-2012-r2-agent-update-on-windows-2003-server-x64?forum=dpmsetup which was marked as 'answered')

    Hi,
    Yes, Exchange 2007 backup will continue to work. I think that due to the timeframe of the UR2 release not all workloads were able to be re-certified, thus the limit in supported workloads.
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
    This posting is provided "AS IS" with no warranties, and confers no rights.

  • Agent update on VMM management server

    Hi!
    I just installed Update Rollup 3 for SCVMM 2012 R2. Updating the agents on all hosts in the fabric was smooth sailing, but the "Agent Version" on the VMM management servers (clustered) still shows 3.2.7510.0 (base R2 installation). Viewing
    the Properties of the servers it shows that RU3 is installed, but I can't figure out how to update the VMM agent on these management servers.
    Does anyone have ideas on how I can update the agents to the latest version? I am guessing that the management servers' agents also are supposed to be updated after rollup installations, not just the other servers in the fabric?

    The SCVMM Server Agent should be updated on the SCVMM Server when the SCVMM Server UR is applied.
    Past experience is that this is the expected behavior.
    The Agent (being its own component) will have a different version from the SCVMM Server itself.  If there was no need to update the agent in the UR, then it would not revise.
    I know that UR2 included an agent update as I had to push new agents to my Hyper-V Servers - I have not updated to UR3 yet.
    Brian Ehlert
    http://ITProctology.blogspot.com
    Learn. Apply. Repeat.

  • Attach agent for a server in a workgroup

    I have SCDPM 2012 on a 2012 server trying to attach to a 2008r2 workgroup server I receive the following error:
    Attach protected computer elmscadawhist failed:
    Error 32685: This server does not match the DPM server setting on server elmscadawhist.
    Error details: The parameter is incorrect (0x80070057)
    Recommended action: 1) Ensure that you have specified the correct protected computer.
    2) In case you have specified the correct protected computer, run the SetDpmServer utility on elmscadawhist with the correct DPM server name, and then retry the operation.

    Hi
    Did you manually install the agent and use the DPM server name at the end?

  • Updated agent show old version

    Hi,
    I have just updated DPM from 2012 to 2012 R2. everything went well and i have patched it it the latest rollup 4.2.1235.
    I updated the agents ok, but I have a few workgroup machines. I updated the agent on the workgroup server and they are showing the correct version from the protected server, but DPM still says it is the old version 4.1. have refreshed the console and restarted
    the DPM and protected server but it did not help.
    any ideas?
    sg

    Try to rejoin the Agents to DPM
    Seidl Michael | http://www.techguy.at |
    twitter.com/techguyat | facebook.com/techguyat

  • Cannot perform a clean install of CF 10 - ODBC Agent and ODBC Server are not in Services - Win2k8 R2

    I've tried to perform a clean install on a Win2k8 R2 x64 server several times and I can't seem to get it to install.
    I was upgrading from CF 9, which took several attempts. I eventually got CF 10 working and running with the latest updates. But the server would only run for about 15 minutes and everything would come to a screaching hault. ColdFusion pages would fail to load with no error. The pages would hang and wait for the server to respond, which it never did. Restarting IIS would fix the problem.
    I have about 20 CF sites on the machine. I came accross an article that talked about pool sizes, etc. I ended up trying a few things with the Web Server Configuration Tool, and as I was adding/deleting servers, I got an error that some application unexpectedly quit, but it wasn't the wsconfig tool. This happened about 3 times as I was deleting servers that I had previously added. Then I tried loading the CF Admin and I got a 500.0 internal server error.
    So I bit the bullet and figured I would start all over again. I uninstalled CF 10... now there's nothing on the machine. Re-installed CF 10, and I get the same 500.0 Internal Server Error. I uninstalled, restarted, installed... same thing. Then I found an error in the event viewer that reads:
    The description for Event ID 0 from source ColdFusion 10 ODBC Server cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.
    If the event originated on another computer, the display information had to be saved with the event.
    The following information was included with the event:
    ColdFusion 10 ODBC Server error: 0
    StartServiceCtrlDispatcher Error!
    Then I found out that neither the ColdFusion 10 ODBC Agent or the ColdFusion 10 ODBC Server have been installed... at least they're not showing up in the list of services. msconfig also shows that they don't exist at all. I tried reinstalling several times and I can't get them to show up.
    PS: It's 6:15 AM and I've been working on this since 10 PM last night. I NEED HELP! Thanks!

    Hello,
    Once you move your application from any prior version of ColdFusion to ColdFusion 10, you will have to tune your application, as the architecture changed from JRun to Tomcat.
    You can refer to the article http://blogs.coldfusion.com/post.cfm/tuning-coldfusion-10-iis-connector-configuration for parameters, that needs to be tuned appropriately to make CF connector works flawlessly.
    Hope this helps
    Regards,
    Anit Kumar

  • Windows Update Agent via WSUS

    Hi All,
    Is there a way to import the latest Windows Update Agent into WSUS and therefore all 3000 machines that connect to WSUS get the update?
    Reason this has cropped up is because I want to update all machines to IE9 from IE8. Have approved Internet Explorer 9 in WSUS. Some machines have updated ok. Others wont update and clicking on Check for updates (where it checks WSUS) tells me there are
    no updates to install. If I 'Check for Updates from Microsoft Online' it immediately tells me that the machine needs an update. The update that gets installed is Windows Update Agent 7.6.7600.320 which is fine except that means each user will have
    to download the update from MS Update and I want WSUS to do it like it does every other Critical and Important update. Does anyone know the KB number I should be looking for or what I need to import from the Catalogue into WSUS so the Update Agent is deployed
    to all machines. All machines are Windows 7 SP1 32bit. There must be a way otherwise machines are going to be stuck on IE8 and also not receive any future Win 7 updates from WSUS.
    I know IE8 is old and so is IE9 but due to various NHS systems out there some only support IE8 or 9. Tragic I know.
    Thanks
    Rich

    The proper way to distribute the latest WUA (.320) to the clients in a WSUS administered environment, is to update the WSUS server(s) with this update:
    An update to harden Windows Server Update Services
    then the clients WUA will be selfupdated when they connect to the WSUS server.
    Rolf Lidvall, Swedish Radio (Ltd)

  • Some computers download and install the two approved updates, others only download Windows Update Agent and not the approved updates.

    Some computers download and install the two approved updates, others only download Windows Update Agent and not the approved updates.

    UN-successful Windows Update Log:
    2014-05-07 09:33:56:180
    1036 e70
    Misc ===========  Logging initialized (build: 7.6.7600.256, tz: -0400)  ===========
    2014-05-07 09:33:56:220
    1036 e70
    Misc  = Process: C:\Windows\system32\svchost.exe
    2014-05-07 09:33:56:221
    1036 e70
    Misc  = Module: c:\windows\system32\wuaueng.dll
    2014-05-07 09:33:56:180
    1036 e70
    Service *************
    2014-05-07 09:33:56:221
    1036 e70
    Service ** START **  Service: Service startup
    2014-05-07 09:33:56:222
    1036 e70
    Service *********
    2014-05-07 09:33:56:544
    1036 e70
    Agent  * WU client version 7.6.7600.256
    2014-05-07 09:33:56:545
    1036 e70
    Agent  * Base directory: C:\Windows\SoftwareDistribution
    2014-05-07 09:33:56:546
    1036 e70
    Agent  * Access type: No proxy
    2014-05-07 09:33:56:547
    1036 e70
    Agent  * Network state: Connected
    2014-05-07 09:33:57:315
    1036 e70
    Setup Service restarting after SelfUpdate
    2014-05-07 09:33:57:545
    1036 e70
    Setup Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
    2014-05-07 09:33:57:592
    1036 e70
    Report CWERReporter::Init succeeded
    2014-05-07 09:33:58:326
    1036 e70
    Report ***********  Report: Initializing static reporting data  ***********
    2014-05-07 09:33:58:376
    1036 e70
    Report  * OS Version = 6.1.7601.1.0.65792
    2014-05-07 09:33:58:376
    1036 e70
    Report  * OS Product Type = 0x00000030
    2014-05-07 09:33:58:394
    1036 e70
    Report  * Computer Brand = Hewlett-Packard
    2014-05-07 09:33:58:444
    1036 e70
    Report  * Computer Model = HP Compaq 4000 Pro SFF PC
    2014-05-07 09:33:58:455
    1036 e70
    Report  * Bios Revision = 786H7 v02.00
    2014-05-07 09:33:58:504
    1036 e70
    Report  * Bios Name = Default System BIOS
    2014-05-07 09:33:58:554
    1036 e70
    Report  * Bios Release Date = 2011-01-31T00:00:00
    2014-05-07 09:33:58:554
    1036 e70
    Report  * Locale ID = 1033
    2014-05-07 09:34:03:562
    1036 f08
    Report REPORT EVENT: {082D455B-6E51-4238-A997-1D27D9214A72}
    2014-05-07 09:33:58:565-0400 1
    199 101
    {0011B9ED-9189-4D58-BE25-FA2F13FC3D6C}
    1 240005
    SelfUpdate Success
    Content Install Installation successful and restart required for the following update: Windows Update Aux
    2014-05-07 09:34:03:614
    1036 f08
    Report CWERReporter finishing event handling. (00000000)
    2014-05-07 09:34:42:049
    1036 e70
    Agent ***********  Agent: Initializing Windows Update Agent  ***********
    2014-05-07 09:34:42:049
    1036 e70
    Agent ***********  Agent: Initializing global settings cache  ***********
    2014-05-07 09:34:42:049
    1036 e70
    Agent  * WSUS server: http://csd26.csd.local:80
    2014-05-07 09:34:42:049
    1036 e70
    Agent  * WSUS status server: http://csd26.csd.local:80
    2014-05-07 09:34:42:049
    1036 e70
    Agent  * Target group: CO
    2014-05-07 09:34:42:049
    1036 e70
    Agent  * Windows Update access disabled: No
    2014-05-07 09:34:42:063
    1036 e70
    DnldMgr Download manager restoring 0 downloads
    2014-05-07 09:34:42:089
    1036 e70
    AU ###########  AU: Initializing Automatic Updates  ###########
    2014-05-07 09:34:42:089
    1036 e70
    AU AU setting next detection timeout to 2014-05-07 13:34:42
    2014-05-07 09:34:42:090
    1036 e70
    AU AU setting next sqm report timeout to 2014-05-07 13:34:42
    2014-05-07 09:34:42:090
    1036 e70
    AU  # WSUS server: http://csd26.csd.local:80
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Detection frequency: 22
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Target group: CO
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Approval type: Scheduled (Policy)
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Scheduled install day/time: Every day at 3:00
    2014-05-07 09:34:42:090
    1036 e70
    AU  # Auto-install minor updates: Yes (User preference)
    2014-05-07 09:34:42:105
    1036 e70
    AU Initializing featured updates
    2014-05-07 09:34:42:116
    1036 e70
    AU Found 0 cached featured updates
    2014-05-07 09:34:42:116
    1036 e70
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:34:42:117
    1036 e70
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:34:42:117
    1036 e70
    AU AU finished delayed initialization
    2014-05-07 09:34:42:117
    1036 e70
    AU AU setting next sqm report timeout to 2014-05-08 13:34:42
    2014-05-07 09:34:42:117
    1036 e70
    AU #############
    2014-05-07 09:34:42:117
    1036 e70
    AU ## START ##  AU: Search for updates
    2014-05-07 09:34:42:117
    1036 e70
    AU #########
    2014-05-07 09:34:42:291
    1036 e70
    AU <<## SUBMITTED ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
    2014-05-07 09:34:42:341
    1036 f08
    Agent *************
    2014-05-07 09:34:42:341
    1036 f08
    Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-05-07 09:34:42:341
    1036 f08
    Agent *********
    2014-05-07 09:34:42:341
    1036 f08
    Agent  * Online = Yes; Ignore download priority = No
    2014-05-07 09:34:42:341
    1036 f08
    Agent  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0
    and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-05-07 09:34:42:341
    1036 f08
    Agent  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-05-07 09:34:42:341
    1036 f08
    Agent  * Search Scope = {Machine}
    2014-05-07 09:34:42:341
    1036 f08
    Setup Checking for agent SelfUpdate
    2014-05-07 09:34:42:342
    1036 f08
    Setup Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
    2014-05-07 09:34:42:349
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-05-07 09:34:42:392
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:669
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-05-07 09:34:44:676
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:754
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-05-07 09:34:44:777
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:781
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-05-07 09:34:44:788
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:837
    1036 f08
    Setup Determining whether a new setup handler needs to be downloaded
    2014-05-07 09:34:44:855
    1036 f08
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe:
    2014-05-07 09:34:44:862
    1036 f08
    Misc Microsoft signed: Yes
    2014-05-07 09:34:44:862
    1036 f08
    Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe are not trusted: Error 0x800b0001
    2014-05-07 09:34:44:862
    1036 f08
    Setup WARNING: Trust verification failed for WuSetupV.exe. It will be deleted and downloaded, error = 0x800B0001
    2014-05-07 09:34:44:863
    1036 f08
    Setup SelfUpdate handler update required: Current version: 7.6.7600.256, required version: 7.6.7600.256
    2014-05-07 09:34:44:873
    1036 f08
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256"
    2014-05-07 09:34:44:932
    1036 f08
    Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
    2014-05-07 09:34:44:933
    1036 f08
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    2014-05-07 09:34:45:048
    1036 f08
    Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
    2014-05-07 09:34:45:048
    1036 f08
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    2014-05-07 09:34:45:234
    1036 f08
    Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
    2014-05-07 09:34:45:235
    1036 f08
    Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2014-05-07 09:34:48:415
    1036 f08
    PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-05-07 09:34:48:415
    1036 f08
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://csd26.csd.local:80/ClientWebService/client.asmx
    2014-05-07 09:34:48:424
    1036 f08
    PT WARNING: Cached cookie has expired or new PID is available
    2014-05-07 09:34:48:424
    1036 f08
    PT Initializing simple targeting cookie, clientId = 97287ab2-5824-44d2-bf93-8a98da659f77, target group = CO, DNS name = c18714.csd.local
    2014-05-07 09:34:48:424
    1036 f08
    PT  Server URL = http://csd26.csd.local:80/SimpleAuthWebService/SimpleAuth.asmx
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING: GetCookie failure, error = 0x8024400D, soap client error = 7, soap error code = 300, HTTP status code = 200
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING: SOAP Fault: 0x00012c
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     faultstring:Fault occurred
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     ErrorCode:ConfigChanged(2)
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     Message:(null)
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetCookie"
    2014-05-07 09:34:48:454
    1036 f08
    PT WARNING:     ID:cb5babad-3a1d-4e6b-946e-736ed4746e3f
    2014-05-07 09:34:48:464
    1036 f08
    PT WARNING: Cached cookie has expired or new PID is available
    2014-05-07 09:34:48:464
    1036 f08
    PT Initializing simple targeting cookie, clientId = 97287ab2-5824-44d2-bf93-8a98da659f77, target group = CO, DNS name = c18714.csd.local
    2014-05-07 09:34:48:464
    1036 f08
    PT  Server URL = http://csd26.csd.local:80/SimpleAuthWebService/SimpleAuth.asmx
    2014-05-07 09:35:06:497
    1036 e70
    AU Forced install timer expired for scheduled install
    2014-05-07 09:35:06:497
    1036 e70
    AU UpdateDownloadProperties: 0 download(s) are still in progress.
    2014-05-07 09:35:06:497
    1036 e70
    AU Setting AU scheduled install time to 2014-05-08 07:00:00
    2014-05-07 09:35:06:498
    1036 e70
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:35:14:236
    1036 f08
    PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2014-05-07 09:35:14:236
    1036 f08
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://csd26.csd.local:80/ClientWebService/client.asmx
    2014-05-07 09:35:20:118
    1036 f08
    Agent  * Found 0 updates and 79 categories in search; evaluated appl. rules of 859 out of 1494 deployed entities
    2014-05-07 09:35:20:194
    1036 f08
    Agent *********
    2014-05-07 09:35:20:194
    1036 f08
    Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-05-07 09:35:20:194
    1036 f08
    Agent *************
    2014-05-07 09:35:20:209
    1036 f08
    Report CWERReporter finishing event handling. (00000000)
    2014-05-07 09:35:20:209
    1036 f08
    Report CWERReporter finishing event handling. (00000000)
    2014-05-07 09:35:20:209
    1036 bb8
    AU >>##  RESUMED  ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
    2014-05-07 09:35:20:209
    1036 bb8
    AU  # 0 updates detected
    2014-05-07 09:35:20:209
    1036 bb8
    AU #########
    2014-05-07 09:35:20:209
    1036 bb8
    AU ##  END  ##  AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
    2014-05-07 09:35:20:209
    1036 bb8
    AU #############
    2014-05-07 09:35:20:210
    1036 bb8
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:35:20:210
    1036 bb8
    AU Featured notifications is disabled.
    2014-05-07 09:35:20:211
    1036 bb8
    AU AU setting next detection timeout to 2014-05-08 11:19:46
    2014-05-07 09:35:20:211
    1036 bb8
    AU Setting AU scheduled install time to 2014-05-08 07:00:00
    2014-05-07 09:35:20:212
    1036 bb8
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:35:20:212
    1036 bb8
    AU Successfully wrote event for AU health state:0
    2014-05-07 09:35:25:183
    1036 f08
    Report REPORT EVENT: {C1B39107-F517-4477-AAE3-9B1F1D6002BF}
    2014-05-07 09:35:20:193-0400 1
    147 101
    {00000000-0000-0000-0000-000000000000}
    0 0 AutomaticUpdates
    Success Software Synchronization
    Windows Update Client successfully detected 0 updates.
    2014-05-07 09:35:25:183
    1036 f08
    Report REPORT EVENT: {669B9537-BB71-4190-BA58-A97F725AE4D8}
    2014-05-07 09:35:20:194-0400 1
    156 101
    {00000000-0000-0000-0000-000000000000}
    0 0 AutomaticUpdates
    Success Pre-Deployment Check
    Reporting client status.
    2014-05-07 09:35:25:184
    1036 f08
    Report CWERReporter finishing event handling. (00000000)
    2014-05-07 09:37:32:440
    1036 f08
    Report Uploading 3 events using cached cookie, reporting URL = http://csd26.csd.local:80/ReportingWebService/ReportingWebService.asmx
    2014-05-07 09:37:32:454
    1036 f08
    Report Reporter successfully uploaded 3 events.

  • Intermittent Scan issues for Update Agent

    I am having an issue with SUP/WSUS that I am hoping someone can point me on the right direction on..
    The environment is:
    SCCM 2012 R2 Primary Site Server on Server 2012 R2 Update
    SQL 2012 SP1 on Server 2012 R2 Update (standalone server) that houses the SCCM DB and the WSUS DB.  
    Software Update Point is on Server 2012 R2 Update (standalone) with WSUS roll installed. WSUS is configured for SSL (with "requires ssl" checked on the role) and using port 8531.
    No issues with the SUP install.  The SUP is synchronizing just fine with Microsoft and I am able manage update objects in the SCCM Admin console (create update groups, ADR's, etc.)  
    WSUSCtrl.log:
    Checking for supported version of WSUS (min WSUS 3.0 SP2 + KB2720211 + KB2734608)
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    Checking runtime v2.0.50727... SMS_WSUS_CONTROL_MANAGER
    5/27/2014 2:16:03 PM 3304 (0x0CE8)
    Did not find supported version of assembly Microsoft.UpdateServices.Administration.
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    Checking runtime v4.0.30319... SMS_WSUS_CONTROL_MANAGER
    5/27/2014 2:16:03 PM 3304 (0x0CE8)
    Found supported assembly Microsoft.UpdateServices.Administration version 4.0.0.0, file version 6.3.9600.16384
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    Found supported assembly Microsoft.UpdateServices.BaseApi version 4.0.0.0, file version 6.3.9600.16384
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    Supported WSUS version found SMS_WSUS_CONTROL_MANAGER
    5/27/2014 2:16:03 PM 3304 (0x0CE8)
    Attempting connection to local WSUS server
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    Successfully connected to local WSUS server
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    No changes - local WSUS Server Proxy settings are correctly configured as Proxy Name  and Proxy Port 80
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    Attempting connection to local WSUS server
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    Successfully connected to local WSUS server
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    There are no unhealthy WSUS Server components on WSUS Server SERVER.SUBDOMAIN.DOMAIN.ORG
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    Successfully checked database connection on WSUS server SERVER.SUBDOMAIN.DOMAIN.ORG
    SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
    3304 (0x0CE8)
    The clients are getting the local policy pointing it to the correct URL.  This is also verified in the log:
    LocationServices.log:
    Current AD site of machine is EWJ LocationServices
    5/27/2014 1:45:41 PM 4236 (0x108C)
    Created and Sent Location Request '{3ABC15E0-70D3-4AE6-991C-B6BAF165C808}' for package {729742E6-9B66-4516-8A69-8569560D88C7}
    LocationServices 5/27/2014 1:45:41 PM
    4236 (0x108C)
    Calling back with the following WSUS locations
    LocationServices 5/27/2014 1:45:41 PM
    4236 (0x108C)
    WSUS Path='https://server.subdomain.domain.org:8531', Server='server.subdomain.domain.org', Version='10'
    LocationServices 5/27/2014 1:45:41 PM
    4236 (0x108C)
    Calling back with locations for WSUS request {3ABC15E0-70D3-4AE6-991C-B6BAF165C808}
    LocationServices 5/27/2014 1:45:41 PM
    4236 (0x108C)
    The issue comes into play in the fact that what appears to be about 85-90% of the time, the client scan cycle fails with error 0x80244004.  This is both Windows 7 x86/64 Pro and Windows XP SP3.  The error translates to:
    Same as SOAPCLIENT_CONNECT_ERROR - SOAP client failed to connect to the server.
    Source: Windows Update Agent
    The REALLY bizarre thing is that the OS's are inverted on their failure rates.  Win 7 fails 85-90% of the time, where as Win XP succeeds 85-90% of the time.
    We completely rebuilt the SUP Server (including OS and reconfigured it again for SSL) and alas the issue remains.
    Here's some snippets from the logs files from a machine when it fails:
    ScanAgent.log
    Message received: '<?xml version='1.0' ?>
    <UpdateSourceMessage MessageType='ScanByUpdateSource'>
    <ForceScan>TRUE</ForceScan>
    <UpdateSourceIDs>
    <ID>{729742E6-9B66-4516-8A69-8569560D88C7}
    </ID>
    </UpdateSourceIDs>
    </UpdateSourceMessage>'
    ScanAgent
    5/27/2014 1:45:41 PM 4236 (0x108C)
    *****ScanByUpdateSource request received with ForceReScan=2, ScanOptions=0x0000000a,  WSUSLocationTimeout = 604800
    ScanAgent 5/27/2014 1:45:41 PM
    4236 (0x108C)
    Sources are current, but Invalid. TTL is also invalid.
    ScanAgent 5/27/2014 1:45:41 PM
    4236 (0x108C)
    ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): - - - - - -Locations requested for ScanJobID={DDFF8212-94D4-4BDC-8A47-41E203F6AD79} (LocationRequestID={3ABC15E0-70D3-4AE6-991C-B6BAF165C808}), will process the scan request once locations are available.
    ScanAgent 5/27/2014 1:45:41 PM
    4236 (0x108C)
    *****WSUSLocationUpdate received for location request guid={3ABC15E0-70D3-4AE6-991C-B6BAF165C808}
    ScanAgent 5/27/2014 1:45:41 PM
    4236 (0x108C)
    Sources are current, but Invalid. TTL is also invalid.
    ScanAgent 5/27/2014 1:45:41 PM
    2216 (0x08A8)
    ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJob::OnScanComplete -Scan Failed with Error=0x80244004
    ScanAgent 5/27/2014 1:45:44 PM
    4236 (0x108C)
    ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJob::ScheduleScanRetry- ScanRetry Timer task successfully scheduled. Will wake up in next 1800 seconds
    ScanAgent 5/27/2014 1:45:44 PM
    4236 (0x108C)
    ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJob::OnScanComplete - Scan Retry successfully scheduled
    ScanAgent 5/27/2014 1:45:44 PM
    4236 (0x108C)
    ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJobManager::OnScanComplete- Scan has failed, scan request will be pending for scan retry cycle.
    ScanAgent 5/27/2014 1:45:44 PM
    4236 (0x108C)
    CScanAgent::ScanCompleteCallback - failed at OnScanComplete with error=0x87d00631
    ScanAgent 5/27/2014 1:45:44 PM
    4236 (0x108C)
    WindowsUpdate.log:
    2014-05-27 13:45:41:482
    2956 8a8
    COMAPI -------------
    2014-05-27 13:45:41:482
    2956 8a8
    COMAPI -- START --  COMAPI: Search [ClientId = CcmExec]
    2014-05-27 13:45:41:482
    2956 8a8
    COMAPI ---------
    2014-05-27 13:45:41:497
    936 ed4
    Agent *************
    2014-05-27 13:45:41:497
    936 ed4
    Agent ** START **  Agent: Finding updates [CallerId = CcmExec]
    2014-05-27 13:45:41:497
    936 ed4
    Agent *********
    2014-05-27 13:45:41:497
    936 ed4
    Agent  * Include potentially superseded updates
    2014-05-27 13:45:41:497
    936 ed4
    Agent  * Online = Yes; Ignore download priority = Yes
    2014-05-27 13:45:41:497
    936 ed4
    Agent  * Criteria = "(DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')"
    2014-05-27 13:45:41:497
    936 ed4
    Agent  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-05-27 13:45:41:497
    936 ed4
    Agent  * Search Scope = {Machine}
    2014-05-27 13:45:41:497
    2956 8a8
    COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
    2014-05-27 13:45:44:025
    936 ed4
    PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-05-27 13:45:44:025
    936 ed4
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = https://server.subdomain.domain::8531/ClientWebService/client.asmx
    2014-05-27 13:45:44:056
    936 ed4
    PT WARNING: Cached cookie has expired or new PID is available
    2014-05-27 13:45:44:056
    936 ed4
    PT Initializing simple targeting cookie, clientId = cf0c5d2d-2a04-41a7-8a1b-4182de886397, target group = , DNS name = sccmtstw7x641.subdomain.domain:
    2014-05-27 13:45:44:056
    936 ed4
    PT  Server URL = https://server.subdomain.domain:8531/SimpleAuthWebService/SimpleAuth.asmx
    2014-05-27 13:45:44:056
    936 ed4
    PT WARNING: GetAuthorizationCookie failure, error = 0x80244004, soap client error = 4, soap error code = 0, HTTP status code = 200
    2014-05-27 13:45:44:056
    936 ed4
    PT WARNING: Failed to initialize Simple Targeting Cookie: 0x80244004
    2014-05-27 13:45:44:056
    936 ed4
    PT WARNING: PopulateAuthCookies failed: 0x80244004
    2014-05-27 13:45:44:056
    936 ed4
    PT WARNING: RefreshCookie failed: 0x80244004
    2014-05-27 13:45:44:056
    936 ed4
    PT WARNING: RefreshPTState failed: 0x80244004
    2014-05-27 13:45:44:056
    936 ed4
    PT WARNING: Sync of Updates: 0x80244004
    2014-05-27 13:45:44:056
    936 ed4
    PT WARNING: SyncServerUpdatesInternal failed: 0x80244004
    2014-05-27 13:45:44:056
    936 ed4
    Agent  * WARNING: Failed to synchronize, error = 0x80244004
    2014-05-27 13:45:44:056
    936 ed4
    Agent  * WARNING: Exit code = 0x80244004
    2014-05-27 13:45:44:056
    936 ed4
    Agent *********
    2014-05-27 13:45:44:056
    936 ed4
    Agent **  END  **  Agent: Finding updates [CallerId = CcmExec]
    2014-05-27 13:45:44:056
    936 ed4
    Agent *************
    2014-05-27 13:45:44:056
    936 ed4
    Agent WARNING: WU client failed Searching for update with error 0x80244004
    2014-05-27 13:45:44:071
    2956 8a8
    COMAPI >>--  RESUMED  -- COMAPI: Search [ClientId = CcmExec]
    2014-05-27 13:45:44:071
    2956 8a8
    COMAPI  - Updates found = 0
    2014-05-27 13:45:44:071
    2956 8a8
    COMAPI  - WARNING: Exit code = 0x00000000, Result code = 0x80244004
    2014-05-27 13:45:44:071
    2956 8a8
    COMAPI ---------
    2014-05-27 13:45:44:071
    2956 8a8
    COMAPI --  END  --  COMAPI: Search [ClientId = CcmExec]
    2014-05-27 13:45:44:071
    2956 8a8
    COMAPI -------------
    2014-05-27 13:45:44:071
    2956 8a8
    COMAPI WARNING: Operation failed due to earlier error, hr=80244004
    2014-05-27 13:45:44:071
    2956 8a8
    COMAPI FATAL: Unable to complete asynchronous search. (hr=80244004)
    Log file for contrast on a client when it works:
    ScanAgent.log
    Message received: '<?xml version='1.0' ?>
    <UpdateSourceMessage MessageType='ScanByUpdateSource'>
    <ForceScan>TRUE</ForceScan>
    <UpdateSourceIDs>
    <ID>{729742E6-9B66-4516-8A69-8569560D88C7}
    </ID>
    </UpdateSourceIDs>
    </UpdateSourceMessage>'
    ScanAgent
    5/27/2014 1:43:20 PM 4052 (0x0FD4)
    *****ScanByUpdateSource request received with ForceReScan=2, ScanOptions=0x0000000a,  WSUSLocationTimeout = 604800
    ScanAgent 5/27/2014 1:43:20 PM
    4052 (0x0FD4)
    Sources are current and valid. TTLs are however, invalid.
    ScanAgent 5/27/2014 1:43:20 PM
    4052 (0x0FD4)
    ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): - - - - - -Locations requested for ScanJobID={1BF68613-35BB-4627-A3F3-FCA455547578} (LocationRequestID={F6F11712-31EA-49BF-AD63-FF3FEF1BA29C}), will process the scan request once locations are available.
    ScanAgent 5/27/2014 1:43:20 PM
    4052 (0x0FD4)
    *****WSUSLocationUpdate received for location request guid={F6F11712-31EA-49BF-AD63-FF3FEF1BA29C}
    ScanAgent 5/27/2014 1:43:20 PM
    3648 (0x0E40)
    Sources are current and valid. TTLs are however, invalid.
    ScanAgent 5/27/2014 1:43:20 PM
    4052 (0x0FD4)
    ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): Performing Full Scan.
    ScanAgent 5/27/2014 1:43:20 PM
    4052 (0x0FD4)
    ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): Scan Succeeded, Resetting Source to Current and TTLs to Valid
    ScanAgent 5/27/2014 1:43:35 PM
    3648 (0x0E40)
    ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): CScanJob::OnScanComplete - Scan completed successfully, ScanType=1
    ScanAgent 5/27/2014 1:43:35 PM
    3648 (0x0E40)
    ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): CScanJobManager::OnScanComplete -ScanJob is completed.
    ScanAgent 5/27/2014 1:43:35 PM
    3648 (0x0E40)
    ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): CScanJobManager::OnScanComplete - Reporting Scan request complete to clients...
    ScanAgent 5/27/2014 1:43:35 PM
    3648 (0x0E40)
    - - Calling back to client on Scan request complete...
    ScanAgent 5/27/2014 1:43:35 PM
    3648 (0x0E40)
    CScanAgent::ScanComplete- Scan completion received.
    ScanAgent 5/27/2014 1:43:35 PM
    3648 (0x0E40)
    I have verified there are no proxy settings on any of these devices by running "Netsh winhttp show proxy"
    Current WinHTTP proxy settings:
        Direct access (no proxy server).
    Firewall is OFF on both clients and servers.  There are no WU GPO settings applied.
    Anyone have any clues on where to look next?  I have been scouring the internet for a couple of days now and seems that all roads with this type of error leads back to a proxy issue, but since no proxy's are in play here, hasn't been of much help.  Still
    digging through stuff but if anyone has any pointers on where to look next it would much appreciated!
    Thanks,

    Found this Technet article: http://social.technet.microsoft.com/Forums/ru-RU/a1c81d16-d5d0-4367-bae6-3338aab0633f/client-updates-failing-windowsupdatelog-0x80244004?forum=configmanagersecurity
    I ran a Wireshark trace and received the exact same error on my client.  I have sent this over to the client to take a closer look.  Fingers crossed that this is the issue as it should be a simple fix.  *fingers crossed*

  • (7.3) WORKGROUP SERVER VS. ENTERPRISE SERVER

    제품 : ORACLE SERVER
    작성날짜 : 2003-06-10
    PURPOSE
    Oracle Version 7.3을 기준으로 workgroup server가 제공하는 기능과,
    engerprise server가 제공하는 기능을 나열한다.
    Explanation
    Core Engine:          WorkGroup Server(7.3)     Enterprise Server(7.3)
    Row Level Locking          Yes          Yes
    Multi-Versioning          Yes          Yes
    Synonyms               Yes          Yes
    Cascade Deletes          Yes          Yes
    Cascade Updates          Yes          Yes
    Outer Joins          Yes          Yes
    Triggers Per Table     9          9
    Bitmapped Indexes          Yes          Yes
    Hashed Indexes          Yes          Yes
    Star Queries          Yes          Yes
    Security:          Nonintuitive      Online
    Backups               Yes          Yes
    Role-Based Security     Yes          Yes
    C2 Level Security          Yes          Yes
    Distributed Functions:     
    Distributed SQL Queries     Yes          Yes
    Database Links          Yes          Yes
    Read-only Snapshots     Yes          Yes
    Updateable Snapshots     Yes          Yes
    Heterogeneous Gateways     No          Yes
    Automatic Two-Phase     
    Commit               Yes          Yes
    Advanced Replication:
    Publish & Subscribe      Yes          Yes
    Workflow
    (Dynamic Ownership)     No          Yes
    Update Anywhere          No          Yes
    Failover               No          Yes
    Bidirectional          No          Yes
    Automatic Modifications     No          Yes
    Automatic Conflict Resolution     Yes          Yes
    Parallel Server:          No          Yes
    Unstructured Data:     
    BLOBs               Yes          Yes
    Single Pass Dynamic
    Web Pages               Yes          Yes
    Management:
    Enterprise Manager          Yes          Yes
    Record and Play Back
    Console               Yes          Yes
    Multipaneled Summary
    Screen                    Yes          Yes
    Full Distributed Server
    Management               Yes          Yes
    Graphical Map View          Yes          Yes
    Lights Out Task Scheduling     Yes     Yes
    One-Button Install          Yes          No
    Client/Server Software
    Distribution               Yes          Yes
    Extra Cost Options:
    Context               No          Yes
    Documents               No          Yes
    Video                    No          Yes
    Messaging               No          Yes
    Oracle Fail-Safe          Yes          No

    Could you define what you mean by "spoof". Could you plaese provide the line in the hosts file which solved your problem? Was it just something like:
    <IPADDR> <NAME-WITH-DOMAIN> <NAME-WITHOUT-DOMAIN>
    Please advise

  • Error 3260 from Workgroup server

    Hello everybody
    My Englisch is not very gut but i hope you can understand me
    I have a problem with DPM Agent at one Server. I take allways the same error:
    Error 3260: The credentials specified for server targetserver are invalid. Recommenden action: Rerun the operation with the same credentials that were provided when running SetDpmServer for the target server.
    Ich have tried to install the Agent from 2 different DPM Server (DPM 2012 and DPM 2010) but i take the same error. I have treid multiplie Password but nothing can help.
    From target Server i run:
    SetDpmServer.exe -dpmservername dpmserver –isnondomainserver –username dpmuser –password
    The Server is not in a Domain. The Firewall is offline. Ping from DPM server to target server and from target server to DPM server is ok.
    I know how to install the DPM Agent because we have more Server than we with DPM Backup. The only problem ist with this one server .
    I think the problem is not the credentials because i have tried to connecting from dpm server to target server with the dpm server per RDP and it works.
    I post from both server the DPM error log:
    DPM server:
    0D38 06C0 01/06 11:19:53.895 07 AgentCommunication.cs(623) NORMAL <ProductionServer xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" ServerName="tagetserver" DomainName="" NetBiosName="targetserver" IsDPM="false" DPMserverName="dpmserver" xmlns="http://schemas.microsoft.com/2003/dls/am/TaskDefinitions.xsd" />
    0D38 06C0 01/06 11:19:54.177 03 ntlmutils.cpp(183) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING Failed: Hr: = [0x80070002] : Error trying to open key [HKLM\Software\Microsoft\Microsoft Data Protection Manager\Agent\2.0\NtlmAuthData\targetserver]
    0D38 06C0 01/06 11:19:54.789 03 ntlmutils.cpp(624) 6611DA42-A0D6-42F9-86AB-507100F4A709 NORMAL Created user account dpmuser.
    0D38 06C0 01/06 11:19:55.838 07 AgentCommunication.cs(322) NORMAL Created NTLM user account dpmuser
    0D38 06C0 01/06 11:19:55.838 07 AgentCommunication.cs(649) NORMAL Setcommunication on server targetserver: Created user account dpmserver\dpmuser
    0D38 06C0 01/06 11:19:56.107 07 Win32LG.cs(690) NORMAL Added account[dpmserver\dpmuser] to group[Distributed COM Users] on server [].
    0D38 06C0 01/06 11:19:56.358 07 Win32LG.cs(690) NORMAL Added account[dpmserver\dpmuser] to group[MSDPMTrustedMachines] on server [].
    0D38 06C0 01/06 11:19:56.614 07 Win32LG.cs(690) NORMAL Added account[dpmserver\dpmuser] to group[DPMRADmTrustedMachines] on server [].
    0D38 06C0 01/06 11:21:00.995 22 agentserviceproxy.cpp(250) [00000000673897A0] 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING Failed: Hr: = [0x80070005] : error in CoCreateInstanceEx for server [targetserver]
    0D38 06C0 01/06 11:21:00.995 22 agentserviceproxy.cpp(155) [00000000673897A0] 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING Failed: Hr: = [0x80070005] : F: lVal : InitInterfaceRemote()
    0D38 06C0 01/06 11:21:01.185 07 AgentCommunication.cs(511) WARNING GetNonDomainServerProperties: Caught unauthorizedAccessException = System.UnauthorizedAccessException: Access is denied. (Exception from HRESULT: 0x80070005 (E_ACCESSDENIED))
    0D38 06C0 01/06 11:21:01.185 07 AgentCommunication.cs(511) WARNING at System.Runtime.InteropServices.Marshal.ThrowExceptionForHRInternal(Int32 errorCode, IntPtr errorInfo)
    0D38 06C0 01/06 11:21:01.185 07 AgentCommunication.cs(511) WARNING at Microsoft.Internal.EnterpriseStorage.Dls.DPMRA.DPMRAServicesProxy.Initialize()
    0D38 06C0 01/06 11:21:01.185 07 AgentCommunication.cs(511) WARNING at Microsoft.Internal.EnterpriseStorage.Dls.AgentManager.AgentCommunication.GetNonDomainServerProperties(NetworkCredential userCredentials, String serverName, DpsTimeZone& timeZone, Version& osVersion, SystemOSType& osType, Boolean& isDpm, Boolean& isDc, FqMachineName& psMachine, Int64& serverAttributes)
    0D38 06C0 01/06 11:21:01.196 07 AgentCommunication.cs(574) NORMAL CleanupOnAttachFailure: Delete user dpmuser
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING Caught Dls exception: Microsoft.Internal.EnterpriseStorage.Dls.Utils.DlsException: exception ---> System.UnauthorizedAccessException: Access is denied. (Exception from HRESULT: 0x80070005 (E_ACCESSDENIED))
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at System.Runtime.InteropServices.Marshal.ThrowExceptionForHRInternal(Int32 errorCode, IntPtr errorInfo)
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.DPMRA.DPMRAServicesProxy.Initialize()
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.AgentManager.AgentCommunication.GetNonDomainServerProperties(NetworkCredential userCredentials, String serverName, DpsTimeZone& timeZone, Version& osVersion, SystemOSType& osType, Boolean& isDpm, Boolean& isDc, FqMachineName& psMachine, Int64& serverAttributes)
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING --- End of inner exception stack trace ---
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.AgentManager.AgentCommunication.GetNonDomainServerProperties(NetworkCredential userCredentials, String serverName, DpsTimeZone& timeZone, Version& osVersion, SystemOSType& osType, Boolean& isDpm, Boolean& isDc, FqMachineName& psMachine, Int64& serverAttributes)
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.AgentManager.AgentCommunication.SetCommunication(String productionServerXML, String userName, String password, String domain, Boolean configurePS, Boolean isNonDomainServer, Guid& serverId)
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.Engine.CAgentManagerServices.SetCommunication(UInt16* bstrProductionServerXML, UInt16* bstrUserName, UInt16* bstrPassword, UInt16* bstrDomain, Byte configurePS, Byte isNonDomainServer, _GUID* pguidServerId)
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.Engine.CCoreServices.SetCommunication(CCoreServices* , UInt16* productionServerXML, UInt16* bstrUserName, UInt16* bstrPassword, UInt16* bstrDomain, Byte configurePS, Byte isNonDomainServer, _GUID* pguidServerId, tagSAFEARRAY** exceptionResult)
    0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING *** Mojito error was: NonDomainInvalidCredentials; 0; None
    0D38 06C0 01/06 11:21:01.642 23 emservices.cpp(156) 6611DA42-A0D6-42F9-86AB-507100F4A709 NORMAL CEMServices::RaiseOrResolveAlert()
    0D38 06C0 01/06 11:21:01.780 02 EventManager.cs(88) NORMAL Publishing event from ServerAlert.cs(556): AlertStateChange, [ObjectId=00000000-0000-0000-0000-000000000000]
    0D38 06C0 01/06 11:21:02.891 09 coreservices.cpp(7011) 6611DA42-A0D6-42F9-86AB-507100F4A709 NORMAL CCoreServices::UpdateAlertVisibilityIfInvisible() entered
    0D38 06C0 01/06 11:21:02.891 16 engineservices.cpp(356) 6611DA42-A0D6-42F9-86AB-507100F4A709 NORMAL CEngineServices::UpdateAlertVisibilityIfInvisible entered. alertId={21D41B70-56D2-4812-8B8C-C03DBD4D7663}, newVisibility=0, invisibilityTimeout=0
    0D38 06C0 01/06 11:21:02.920 02 EventManager.cs(88) NORMAL Publishing event from ServerAlert.cs(722): AlertStateChange, [ObjectId=00000000-0000-0000-0000-000000000000]
    Target server
    129C 08F8 12/04 14:28:09.818 03 runtime.cpp(818) [00000000001C7D10] ACTIVITY InitializeSecurity found 3 authorized entities
    129C 08F8 12/04 14:28:09.818 03 runtime.cpp(836) [00000000001C7D10] ACTIVITY InitializeSecurity added COM perm for targetserver\dpmuser
    129C 08F8 12/04 14:28:09.818 03 runtime.cpp(854) [00000000001C7D10] ACTIVITY InitializeSecurity added COM perm for DPMRADCOMTrustedMachines
    129C 08F8 12/04 14:28:09.818 03 runtime.cpp(891) [00000000001C7D10] ACTIVITY InitializeSecurity added DM perm for DPMRADmTrustedMachines
    129C 08F8 12/04 14:28:09.818 03 runtime.cpp(94) NORMAL Found 1 writer account(s) under VSS access control.
    129C 08F8 12/04 14:28:09.818 03 runtime.cpp(161) NORMAL Added writer account [0] 'NT Authority\NetworkService' to the DACL.
    129C 08F8 12/04 14:28:09.818 03 runtime.cpp(1018) [00000000001C7D10] NORMAL CoInitializeSecurity from a workgroup machine enbaling CLOAKING
    129C 08F8 12/04 14:28:09.834 22 genericthreadpool.cpp(804) [00000000001C7D10] NORMAL Hr: = [0x80070002] CGenericThreadPool::m_dwMaximumNumberOfThreads[20]
    129C 08F8 12/04 14:28:09.834 22 agentutils.cpp(2624) WARNING Failed: Hr: = [0x80070645] : U: lVal : hr
    129C 1418 12/04 14:28:09.834 03 timer.cpp(490) ACTIVITY CTimerMgr::TimerThread
    129C 1418 12/04 14:28:09.834 03 timer.cpp(503) [0000000000261FC0] ACTIVITY CTimerMgr::TimerThreadInternal
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [0000000000285E20] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [0000000000288110] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [000000000028A400] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [000000000028C6F0] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [000000000028E9E0] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
    129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [0000000000290CD0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(761) [0000000000292FC0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(761) [00000000002952B0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(761) [00000000002975A0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
    129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(761) [00000000001C8FB0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
    129C 08F8 12/04 14:28:09.865 20 commengine.cpp(350) [0000000000261A30] ACTIVITY Hr: = [0x80070002] ConnectionNoActivityTimeout: 300
    129C 08F8 12/04 14:28:09.865 20 commengine.cpp(364) [0000000000261A30] ACTIVITY Hr: = [0x80070002] m_dwConnectionNoActivityTimeoutForSlowReceiver: 3600
    129C 1B4C 12/04 14:28:09.865 03 timer.cpp(490) ACTIVITY CTimerMgr::TimerThread
    129C 1B4C 12/04 14:28:09.865 03 timer.cpp(503) [000000000029A3B8] ACTIVITY CTimerMgr::TimerThreadInternal
    129C 08F8 12/04 14:28:09.865 29 dpmra.cpp(162) [000000000020A9B0] NORMAL CDPMRA::Initialize [000000000020A9B0]
    129C 08F8 12/04 14:28:09.865 31 vaagent.cpp(226) NORMAL CVAAgent: Initialize globals
    129C 08F8 12/04 14:28:09.881 29 mta.cpp(126) ACTIVITY CMTA::AddSchemasToSchemaCache => Initialize loaded schemas
    129C 08F8 12/04 14:28:09.912 29 dpmra.cpp(184) [000000000020A9B0] NORMAL CDPMRA::Initialize loaded schemas
    129C 08F8 12/04 14:28:09.912 22 genericthreadpool.cpp(75) [00000000001CF1A0] NORMAL CGenericThreadPool: constructor
    129C 08F8 12/04 14:28:09.912 22 genericthreadpool.cpp(804) [00000000001CF1A0] NORMAL Hr: = [0x80070002] CGenericThreadPool::m_dwMaximumNumberOfThreads[256]
    129C 08F8 12/04 14:28:09.912 29 dpmra.cpp(271) [000000000020A9B0] NORMAL CreateDefaultSubTask [000000000020A9B0]
    129C 08F8 12/04 14:28:09.912 29 dpmra.cpp(194) [000000000020A9B0] NORMAL Temporary storage path reg key found
    129C 08F8 12/04 14:28:09.912 29 dpmra.cpp(210) [000000000020A9B0] NORMAL MTA Temp location Path = [C:\Program Files\Microsoft Data Protection Manager\DPM\temp\MTA\]
    129C 08F8 12/04 14:28:09.912 29 mtamethrottlehelper.cpp(114) [00000000001CFC60] NORMAL Hr: = [0x80070002] Number of encryption threads = [2]
    129C 08F8 12/04 14:28:09.912 03 service.cpp(298) [000000000017FAE0] ACTIVITY CService::AnnounceServiceStatus
    129C 0DD8 12/04 14:28:09.912 04 xxcmdproc.cpp(372) [000000000020D220] NORMAL SaveCredential - DpmServerName=[dpmserver], UserName=[dpmuser]
    129C 1418 12/04 14:33:09.904 03 runtime.cpp(1652) [00000000001C7D10] NORMAL CDLSRuntime::ProcessIdleTimeout
    129C 1418 12/04 14:33:09.904 03 runtime.cpp(646) [00000000001C7D10] NORMAL CDLSRuntime::Uninitialize, bForce: 0
    129C 1418 12/04 14:33:09.904 05 genericagent.cpp(264) [000000000020A9B0] NORMAL Agent Can Shutdown if there is only default wokitem active[1]
    129C 1418 12/04 14:33:09.904 29 dpmra.cpp(360) [000000000020A9B0] NORMAL CDPMRA::Shutting down dpmra, force-shutdown :yes
    129C 1418 12/04 14:33:09.904 03 workitem.cpp(391) NORMAL Timing out WI [00000000002410B0], WI GUID = {B71B4544-7067-4A30-B5FB-BA320B10D82A}, ..last DM activity happened 1188388017msec back, WI Idle Timeout = 390000msec
    129C 1418 12/04 14:33:09.904 22 genericthreadpool.cpp(664) [00000000001CF1A0] NORMAL CGenericThreadPool: Waiting for threads to exit
    129C 1418 12/04 14:33:11.904 22 genericthreadpool.cpp(664) [00000000001CF1A0] NORMAL CGenericThreadPool: Waiting for threads to exit
    129C 1BA0 12/04 14:33:13.904 20 cc_base.cpp(1226) [000000000028E9E0] NORMAL DM: Aborting http state machine for reason 0
    129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [0000000000288110] NORMAL DM: Aborting http state machine for reason 0
    129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [0000000000285E20] NORMAL DM: Aborting http state machine for reason 0
    129C 19B8 12/04 14:33:13.904 20 cc_base.cpp(1226) [000000000028C6F0] NORMAL DM: Aborting http state machine for reason 0
    129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [00000000002975A0] NORMAL DM: Aborting http state machine for reason 0
    129C 19B8 12/04 14:33:13.904 20 cc_base.cpp(1226) [00000000002952B0] NORMAL DM: Aborting http state machine for reason 0
    129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [000000000028A400] NORMAL DM: Going to timeout connection
    129C 0C18 12/04 14:33:13.904 20 cc_base.cpp(1226) [000000000028A400] NORMAL DM: Aborting http state machine for reason 0
    129C 1BA0 12/04 14:33:13.904 20 cc_base.cpp(1226) [00000000001C8FB0] NORMAL DM: Aborting http state machine for reason 0
    129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [0000000000290CD0] NORMAL DM: Going to timeout connection
    129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [0000000000292FC0] NORMAL DM: Aborting http state machine for reason 0
    129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [0000000000292FC0] NORMAL DM: Going to timeout connection
    129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [00000000002952B0] NORMAL DM: Going to timeout connection
    129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [00000000001C8FB0] NORMAL DM: Going to timeout connection
    129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [0000000000290CD0] NORMAL DM: Aborting http state machine for reason 0
    129C 1418 12/04 14:33:13.904 22 genericthreadpool.cpp(664) [00000000001C7D10] NORMAL CGenericThreadPool: Waiting for threads to exit
    129C 1418 12/04 14:33:15.904 29 dpmra.cpp(127) [000000000020A9B0] NORMAL CDPMRA: destructor [000000000020A9B0]
    129C 1B4C 12/04 14:33:15.920 03 timer.cpp(513) [000000000029A3B8] ACTIVITY Shutting down timer thread.
    129C 1418 12/04 14:33:15.920 03 service.cpp(81) ACTIVITY CService::StopThisService
    129C 1418 12/04 14:33:15.920 03 service.cpp(281) [000000000017FAE0] ACTIVITY CService::StopService()
    129C 08F8 12/04 14:33:15.920 03 service.cpp(298) [000000000017FAE0] ACTIVITY CService::AnnounceServiceStatus
    I hope somebody can help me

    hi,
    it is not possible to find the run time errors in application server while writing the file.using sy-subrc only we can find out. where it is writing correctly like this.
    we can see all the application server files in this Tcode: AL11

  • SCCM Software Update Agent remains disabled

    Dear All,
    on single notebooks the Software Updates Agent remains disabled even if the Client Settings policy is set to enale the agent as in the attached images:
    Even though if I set e.g. the remote tool agent as disabled, the agent becomes disabled on the same notebooks, where the SUA does not change state. Therefore a communication error is excluded.
    Does anyone know where to look after more information about this issue and eventually how to solve it?
    CMClient Version on all Clients: 5.00.7804.1000
    OS on the Client: Win 8 or Win 8.1 U1
    SCCM Version on the Server: System Center Configuration manager 2012 SP 1 5.0.7804.1500
    Policy:
    Best,
    Pictop

    Hi t.c.rich,
    Thank you for the response.
    Here the log file.
    <![LOG[Successfully completed scan.]LOG]!><time="12:09:30.983-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="3864" file="cwuahandler.cpp:3557">
    <![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="12:51:54.966-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="sourcemanager.cpp:1232">
    <![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="12:51:55.045-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="sourcemanager.cpp:936">
    <![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="12:51:55.064-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="sourcemanager.cpp:1265">
    <![LOG[Scan results will include all superseded updates.]LOG]!><time="12:51:55.076-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="cwuahandler.cpp:2913">
    <![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="12:51:55.076-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="cwuahandler.cpp:2916">
    <![LOG[Async searching of updates using WUAgent started.]LOG]!><time="12:51:56.701-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="cwuahandler.cpp:579">
    <![LOG[Async searching completed.]LOG]!><time="12:52:18.732-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="336" file="cwuahandler.cpp:2068">
    <![LOG[Successfully completed scan.]LOG]!><time="12:52:19.513-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="1880" file="cwuahandler.cpp:3557">
    <![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="12:52:19.748-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="sourcemanager.cpp:1232">
    <![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="12:52:19.748-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="sourcemanager.cpp:936">
    <![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="sourcemanager.cpp:1265">
    <![LOG[Scan results will include all superseded updates.]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:2913">
    <![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:2916">
    <![LOG[Async searching of updates using WUAgent started.]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:579">
    <![LOG[Async searching completed.]LOG]!><time="12:52:38.998-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4768" file="cwuahandler.cpp:2068">
    <![LOG[Successfully completed scan.]LOG]!><time="12:52:39.888-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:3557">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="13:38:54.626-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="3660" file="cwuahandler.cpp:2527">
    <![LOG[Removed Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="10:28:37.696-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="488" file="sourcemanager.cpp:1338">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:28:39.508-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="488" file="cwuahandler.cpp:2527">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:29:04.622-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="2368" file="cwuahandler.cpp:2527">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:42:29.805-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="3092" file="cwuahandler.cpp:2527">
    <![LOG[Tried to remove an update source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) that does not exist.]LOG]!><time="10:45:25.357-120" date="10-10-2014" component="WUAHandler" context="" type="2" thread="3944" file="sourcemanager.cpp:1315">
    <![LOG[Failed to Remove Update Source from WUAgent ({543A840D-5C46-4239-ADB9-17E8FC7359E5}). Error = 0x87d00691.]LOG]!><time="10:45:25.357-120" date="10-10-2014" component="WUAHandler" context="" type="3" thread="3944" file="cwuahandler.cpp:2359">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:46:37.231-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="2540" file="cwuahandler.cpp:2527">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:49:55.122-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="2128" file="cwuahandler.cpp:2527">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="11:31:03.370-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="1224" file="cwuahandler.cpp:2527">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="14:30:29.411-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3960" file="cwuahandler.cpp:2527">
    <![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="14:38:38.915-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="2844" file="sourcemanager.cpp:1232">
    <![LOG[Unable to read existing resultant WUA policy. Error = 0x80070002.]LOG]!><time="14:38:38.915-60" date="01-27-2015" component="WUAHandler" context="" type="2" thread="2844" file="sourcemanager.cpp:920">
    <![LOG[Enabling WUA Managed server policy to use server: HTTP://sccm.domain.com:8530]LOG]!><time="14:38:38.915-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="2844" file="sourcemanager.cpp:948">
    <![LOG[Waiting for 2 mins for Group Policy to notify of WUA policy change...]LOG]!><time="14:38:39.165-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="2844" file="sourcemanager.cpp:954">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="14:40:06.416-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="5736" file="cwuahandler.cpp:2527">
    <![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="14:40:06.416-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="sourcemanager.cpp:1232">
    <![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="14:40:06.447-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="sourcemanager.cpp:936">
    <![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="14:40:06.462-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="sourcemanager.cpp:1265">
    <![LOG[Scan results will include superseded updates only when they are superseded by service packs and definition updates.]LOG]!><time="14:40:06.478-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="cwuahandler.cpp:2909">
    <![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="14:40:06.478-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="cwuahandler.cpp:2916">
    <![LOG[Async searching of updates using WUAgent started.]LOG]!><time="14:40:06.494-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="cwuahandler.cpp:579">
    <![LOG[Async searching completed.]LOG]!><time="14:44:15.950-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="1120" file="cwuahandler.cpp:2068">
    <![LOG[Successfully completed scan.]LOG]!><time="14:44:17.325-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="6180" file="cwuahandler.cpp:3557">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="15:51:02.561-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="4008" file="cwuahandler.cpp:2527">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="12:50:50.102-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="4444" file="cwuahandler.cpp:2527">
    <![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="14:00:00.167-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="sourcemanager.cpp:1232">
    <![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="14:00:00.214-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="sourcemanager.cpp:936">
    <![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="14:00:00.214-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="sourcemanager.cpp:1265">
    <![LOG[Scan results will include all superseded updates.]LOG]!><time="14:00:00.229-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:2913">
    <![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="14:00:00.229-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:2916">
    <![LOG[Async searching of updates using WUAgent started.]LOG]!><time="14:00:01.995-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:579">
    <![LOG[Async searching completed.]LOG]!><time="14:00:21.979-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5076" file="cwuahandler.cpp:2068">
    <![LOG[Successfully completed scan.]LOG]!><time="14:00:23.354-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:3557">
    <![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="08:12:47.409-60" date="01-30-2015" component="WUAHandler" context="" type="1" thread="5084" file="cwuahandler.cpp:2527">
    Regards,
    Pictop

  • Windows Update Agent rebooting systems after Software Update deployment

    I have a software update deployment that is configured to install software updates on a collection of servers at 4:00 AM with a suppressed reboot. The updates get deployed and no reboot occurs as expected.  Then ~8 hours later WUA starts up and the
    servers get rebooted.
    There is a maintenance window applied to the collection from 4:00 AM to 6:00 AM to allow the updates to install.
    I've read a few forum and blog posts on this issue and have implemented some settings via GPO, but the reboots are still occurring.  The settings that were applied are referenced in the link below.
    https://support.microsoft.com/kb/2476479?wa=wsignin1.0
    Here is a snippet from the WindowsUpdate.log:
    2014-10-22 12:00:26:153 1428 8a88 AU Received AU Resume timeout
    2014-10-22 12:00:26:153 1428 8a88 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
    2014-10-22 12:00:26:153 1428 8a88 AU Can not perform non-interactive scan if AU is interactive-only
    2014-10-22 12:02:08:512 1428 8a88 AU AU received policy change subscription event
    2014-10-22 12:16:43:463 1428 8a88 AU ###########  AU: Uninitializing Automatic Updates  ###########
    2014-10-22 12:16:43:479 1428 8a88 WuTask Uninit WU Task Manager
    2014-10-22 12:16:43:697 1428 8a88 Service *********
    2014-10-22 12:16:43:697 1428 8a88 Service **  END  **  Service: Service exit [Exit code = 0x240001]
    2014-10-22 12:16:43:697 1428 8a88 Service *************
    2014-10-22 12:19:29:728 1428 e584 Misc ===========  Logging initialized (build: 7.8.9200.16604, tz: -0400)  ===========
    2014-10-22 12:19:29:728 1428 e584 Misc   = Process: C:\WINDOWS\system32\svchost.exe
    2014-10-22 12:19:29:728 1428 e584 Misc   = Module: c:\windows\system32\wuaueng.dll
    2014-10-22 12:19:29:728 1428 e584 Service *************
    2014-10-22 12:19:29:728 1428 e584 Service ** START **  Service: Service startup
    2014-10-22 12:19:29:728 1428 e584 Service *********
    2014-10-22 12:19:29:744 1428 e584 Agent   * WU client version 7.8.9200.16604
    2014-10-22 12:19:29:744 1428 e584 Agent   * Base directory: C:\WINDOWS\SoftwareDistribution
    2014-10-22 12:19:29:744 1428 e584 Agent   * Access type: No proxy
    2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv4, cNetworkInterfaces = 2.
    2014-10-22 12:19:29:744 1428 e584 Agent   * Network state: Connected
    2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
    2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv4, cNetworkInterfaces = 2.
    2014-10-22 12:19:29:791 1428 e584 Agent ***********  Agent: Initializing global settings cache  ***********
    2014-10-22 12:19:29:791 1428 e584 Agent   * Endpoint Provider: 00000000-0000-0000-0000-000000000000
    2014-10-22 12:19:29:791 1428 e584 Agent   * WSUS server:
    http://Internal-WSUS.Domain:8530
    2014-10-22 12:19:29:791 1428 e584 Agent   * WSUS status server:
    http://Internal-WSUS.Domain:8530
    2014-10-22 12:19:29:791 1428 e584 Agent   * Target group: (Unassigned Computers)
    2014-10-22 12:19:29:791 1428 e584 Agent   * Windows Update access disabled: No
    2014-10-22 12:19:29:791 1428 e584 Misc WARNING: Network Cost is assumed to be not supported as something failed with trying to get handles to wcmapi.dll
    2014-10-22 12:19:29:806 1428 e584 WuTask WuTaskManager delay initialize completed successfully..
    2014-10-22 12:19:29:822 1428 e584 Report CWERReporter::Init succeeded
    2014-10-22 12:19:29:822 1428 e584 Agent ***********  Agent: Initializing Windows Update Agent  ***********
    2014-10-22 12:19:29:822 1428 e584 DnldMgr Download manager restoring 0 downloads
    2014-10-22 12:19:29:838 1428 e584 AU ###########  AU: Initializing Automatic Updates  ###########
    2014-10-22 12:19:29:838 1428 e584 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
    2014-10-22 12:19:29:838 1428 e584 AU AIR Mode is disabled
    2014-10-22 12:19:29:838 1428 e584 AU   # Policy Driven Provider:
    http://Internal-WSUS.Domain:8530
    2014-10-22 12:19:29:838 1428 e584 AU   # Detection frequency: 22
    2014-10-22 12:19:29:838 1428 e584 AU   # Approval type: Disabled (User preference)
    2014-10-22 12:19:29:838 1428 e584 AU   # Auto-install minor updates: No (User preference)
    2014-10-22 12:19:29:838 1428 e584 AU   # ServiceTypeDefault: Service 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 Approval type: (Pre-install notify)
    2014-10-22 12:19:29:838 1428 e584 AU   # Will interact with non-admins (Non-admins are elevated (User preference))
    2014-10-22 12:19:29:838 1428 e584 AU WARNING: Failed to get Wu Exemption info from NLM, assuming not exempt, error = 0x80240037
    2014-10-22 12:19:29:853 1428 e584 AU AU finished delayed initialization
    2014-10-22 12:19:29:884 1428 e584 AU #############
    2014-10-22 12:19:29:884 1428 e584 AU ## START ##  AU: Search for updates
    2014-10-22 12:19:29:884 1428 e584 AU #########
    2014-10-22 12:19:29:884 1428 e584 Agent SkipSelfUpdateCheck search flag set for serverId: 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782
    2014-10-22 12:19:30:416 1428 e584 Report ***********  Report: Initializing static reporting data  ***********
    2014-10-22 12:19:30:416 1428 e584 Report   * OS Version = 6.2.9200.0.0.197008
    2014-10-22 12:19:30:416 1428 e584 Report   * OS Product Type = 0x00000008
    2014-10-22 12:19:30:416 1428 e584 Report   * Computer Brand = HP
    2014-10-22 12:19:30:416 1428 e584 Report   * Computer Model = ProLiant BL460c Gen8
    2014-10-22 12:19:30:416 1428 e584 Report   * Platform Role = 1
    2014-10-22 12:19:30:416 1428 e584 Report   * AlwaysOn/AlwaysConnected (AOAC) = 0
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Revision = I31
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Name = Default System BIOS
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Release Date = 2014-02-10T00:00:00
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Sku Number = 641016-B21     
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Vendor = HP
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Family = ProLiant
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Major Release = 255
    2014-10-22 12:19:30:431 1428 e584 Report   * Bios Minor Release = 255
    2014-10-22 12:19:30:431 1428 e584 Report   * Locale ID = 1033
    2014-10-22 12:19:30:431 1428 e584 AU <<## SUBMITTED ## AU: Search for updates  [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:30:431 1428 dae0 Agent *************
    2014-10-22 12:19:30:431 1428 dae0 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-10-22 12:19:30:431 1428 dae0 Agent *********
    2014-10-22 12:19:30:431 1428 dae0 Agent   * Online = No; Ignore download priority = No
    2014-10-22 12:19:30:431 1428 dae0 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
    or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-10-22 12:19:30:431 1428 dae0 Agent   * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
    2014-10-22 12:19:30:431 1428 dae0 Agent   * Search Scope = {Machine & All Users}
    2014-10-22 12:19:30:431 1428 dae0 Agent   * Caller SID for Applicability: S-1-5-18
    2014-10-22 12:19:30:494 1428 dae0 Agent   * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
    2014-10-22 12:19:30:494 1428 dae0 Agent *********
    2014-10-22 12:19:30:494 1428 dae0 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-10-22 12:19:30:494 1428 dae0 Agent *************
    2014-10-22 12:19:30:509 1428 d158 AU >>##  RESUMED  ## AU: Search for updates [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:30:509 1428 d158 AU   # 0 updates detected
    2014-10-22 12:19:30:509 1428 d158 AU #########
    2014-10-22 12:19:30:509 1428 d158 AU ##  END  ##  AU: Search for updates  [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:30:509 1428 d158 AU #############
    2014-10-22 12:19:30:509 1428 d158 AU All AU searches complete.
    2014-10-22 12:19:30:525 1428 e584 AU #############
    2014-10-22 12:19:30:525 1428 e584 AU ## START ##  AU: Search for updates
    2014-10-22 12:19:30:525 1428 e584 AU #########
    2014-10-22 12:19:30:525 1428 e584 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
    2014-10-22 12:19:30:525 1428 e584 Agent SkipSelfUpdateCheck search flag set for serverId: 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782
    2014-10-22 12:19:30:525 1428 e584 AU <<## SUBMITTED ## AU: Search for updates  [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:30:525 1428 dae0 Agent *************
    2014-10-22 12:19:30:525 1428 dae0 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-10-22 12:19:30:525 1428 dae0 Agent *********
    2014-10-22 12:19:30:525 1428 dae0 Agent   * Online = Yes; Ignore download priority = No
    2014-10-22 12:19:30:525 1428 dae0 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
    or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-10-22 12:19:30:525 1428 dae0 Agent   * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
    2014-10-22 12:19:30:525 1428 dae0 Agent   * Search Scope = {Machine & All Users}
    2014-10-22 12:19:30:525 1428 dae0 Agent   * Caller SID for Applicability: S-1-5-18
    2014-10-22 12:19:30:525 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\wuredir.cab:
    2014-10-22 12:19:30:541 1428 dae0 Misc  Microsoft signed: Yes
    2014-10-22 12:19:30:541 1428 dae0 Misc  Infrastructure signed: Yes
    2014-10-22 12:19:30:556 1428 dae0 EP Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: "http://fe2.ws.microsoft.com/w81/2/redir/v2-storeauth.cab"
    2014-10-22 12:19:30:588 1428 dae0 Agent Checking for updated auth cab for service 117cab2d-82b1-4b5a-a08c-4d62dbee7782 at
    http://fe2.ws.microsoft.com/w81/2/redir/v2-storeauth.cab
    2014-10-22 12:19:30:588 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\117cab2d-82b1-4b5a-a08c-4d62dbee7782.cab:
    2014-10-22 12:19:30:603 1428 dae0 Misc  Microsoft signed: Yes
    2014-10-22 12:19:30:603 1428 dae0 Misc  Infrastructure signed: Yes
    2014-10-22 12:19:30:775 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\117cab2d-82b1-4b5a-a08c-4d62dbee7782.cab:
    2014-10-22 12:19:30:791 1428 dae0 Misc  Microsoft signed: Yes
    2014-10-22 12:19:30:791 1428 dae0 Misc  Infrastructure signed: Yes
    2014-10-22 12:19:30:791 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\WuRedir\117CAB2D-82B1-4B5A-A08C-4D62DBEE7782\wuredir.cab:
    2014-10-22 12:19:30:806 1428 dae0 Misc  Microsoft signed: Yes
    2014-10-22 12:19:30:806 1428 dae0 Misc  Infrastructure signed: Yes
    2014-10-22 12:19:30:822 1428 dae0 EP Got 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 redir Client/Server URL: "https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx"
    2014-10-22 12:19:30:978 1428 dae0 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-10-22 12:19:30:978 1428 dae0 PT   + ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}, Server URL =
    https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx
    2014-10-22 12:19:31:025 1428 dae0 Agent   * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
    2014-10-22 12:19:31:025 1428 dae0 Agent *********
    2014-10-22 12:19:31:025 1428 dae0 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-10-22 12:19:31:025 1428 dae0 Agent *************
    2014-10-22 12:19:31:025 1428 d158 AU >>##  RESUMED  ## AU: Search for updates [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:31:025 1428 d158 AU   # 0 updates detected
    2014-10-22 12:19:31:025 1428 d158 AU #########
    2014-10-22 12:19:31:025 1428 d158 AU ##  END  ##  AU: Search for updates  [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-10-22 12:19:31:025 1428 d158 AU #############
    2014-10-22 12:19:31:025 1428 d158 AU All AU searches complete.
    2014-10-22 12:19:31:025 1428 d158 AU AU setting next detection timeout to 2014-10-23 14:19:28
    2014-10-22 12:19:36:025 1428 e214 Report REPORT EVENT: {E04012FD-8FFD-4259-96D5-A5A34127F0A0} 2014-10-22 12:19:31:025-0400 1 147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software
    Synchronization Windows Update Client successfully detected 0 updates.
    2014-10-22 12:19:36:025 1428 e214 Report CWERReporter finishing event handling. (00000000)
    2014-10-22 12:29:29:914 1428 e584 AU AU invoking RebootSystem (OnRebootNow)
    2014-10-22 12:29:30:055 1428 e584 AU Allowing auto firmware installs at next shutdown
    2014-10-22 12:29:30:102 1428 e584 Misc WARNING: SUS Client is rebooting system.
    2014-10-22 12:29:30:102 1428 e584 AU AU invoking RebootSystem (OnRebootRetry)
    2014-10-22 12:29:30:367 1428 e584 Shutdwn Checking to see whether install at shutdown is appropriate
    2014-10-22 12:29:30:367 1428 e584 Shutdwn user declined update at shutdown
    2014-10-22 12:29:30:367 1428 e584 AU AU initiates service shutdown
    2014-10-22 12:29:30:367 1428 e584 AU ###########  AU: Uninitializing Automatic Updates  ###########
    2014-10-22 12:29:30:399 1428 e584 WuTask Uninit WU Task Manager
    2014-10-22 12:29:30:445 1428 e584 Agent Sending shutdown notification to client
    2014-10-22 12:29:30:445 5788 8084 COMAPI WARNING: Received service shutdown/self-update notification.
    2014-10-22 12:29:30:461 1428 e584 Report CWERReporter finishing event handling. (00000000)
    2014-10-22 12:29:30:539 1428 e584 Service *********
    2014-10-22 12:29:30:539 1428 e584 Service **  END  **  Service: Service exit [Exit code = 0x240001]
    2014-10-22 12:29:30:539 1428 e584 Service *************
    Any assistance is appreciated.
    -Tim

    Hi,
    Any update?
    Best Regards,
    Joyce
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • 80246002 error after installing Windows Update Agent 7.6.7600.320

    This problem prevents Windows Update from being able to search, download, and install updates.
    I am experiencing this issue on machines running Server 2008 R2 and Windows 7 Enterprise (I imagine this an issue with Windows Update and not the OS so this is probably affecting other OS' as well).
    This problem is becoming widespread quickly.
    The proposed fix (method 1) in the article below did not resolve the problem:
    http://support.microsoft.com/kb/958056/en-us
    Note: Method 2 is not viable when applying more than one update at a time especially when you are updating multiple machines.
    Several others are posting similar problems:
    http://windowsitpro.com/windows-update/tracking-error-80246002-windows-update-problem
    http://forums.techguy.org/windows-7/1132320-windows-update-problems-4.html
    This is preventing scheduled server maintenance from being performed.
    Could this be a targeted attack? Happening at the end of the week before a long holiday weekend is not leaving me with a very good feeling...
    I would hope that fixing this issue would be a very high priority.
    BTW - There is no "Windows Update Issue" forum category that I could find - If there is, sorry for posting in the wrong area.
    Cheers,
    Jeff

    My fix that worked...
    Reviewed the operational log for the WindowsUpdateClient (buried in the Event viewer here:
    Application and Services Logs -> Microsoft -> Windows -> WindowsUpdateClient -> Operational
    After review, I noticed that event 30 "Windows Updates established connectivity" was no longer occurring and that event 42 "There has been a change in the health of Windows Update" was the only thing after the error (Event 25 "Windows Update failed
    to check for updates with error 0x80246002")
    Even though the machine was restarted after applying the "Windows Update Agent 7.6.7600.320" patch and I had tried restarting the Windows Update service, the service appears to be hung.
    Solution:
    1.) restart the Windows update service
    2.) monitor the operational log for the WindowsUpdateClient (refreshing every 5-10 seconds)
    3.) verify that event 30 happens (you should see event 38 after restarting the service followed by (2) event 42, then event 30)
    4.) Once event 30 happens go to the Windows update GUI and run the "Check for updates" - yay!
    5.) You can go back into the operational log and see event 26 "Windows Update successfully found x updates" followed by an event 40 for each update found.
    What is really strange is that I checked the first machine that experienced the problem and it magically fixed itself.
    It seems like this may have been caused by DDOS attack on the source for windows updates that the Windows Update service connects to. Or the source location was having maintenance performed.
    Regardless, in my case, this was not a problem with the OS or the patch but the inability for the Windows Update Service to establish connectivity.
    Hope that helps somebody :)
    Cheers,
    Jeff 

Maybe you are looking for

  • Will Office Web Apps Server 2013 work with SharePoint 2013 sites hosted in SP2010 compatibility mode?

    We are planning a upgrade of a SP2010 farm to 2013. There has been a bit of customization so we wish to run the old sites on the new SP2013 platform in SP2010 compatibility mode. So my question is will Office Web Apps Server 2013 work with the old si

  • How to find out the SET PARAMETER ID for FB02 transaction

    hi masters, i m working on a alv report and in that i have to make a BELNR field as a interactive field. i m using the 'user command' for this. FORM user_command USING ucomm TYPE sy-ucomm                     selfield TYPE slis_selfield.   IF selfield

  • Adding new RAM to Mac Pro

    I just got my new Mac Pro. It comes with (2) 1G sticks of DDR2 RAM. I bought (4) 2G sticks of DDR2 RAM from OWC to put in it. Can I just add my 2G sticks and keep the 1G sticks in, or do they all have to be the same size? I spoke with 2 different App

  • Display multiple personal no in abap hr

    Hi experts, I have a requirement in ABAP HR. Existing functionality is like this.when i execute my report it will display single personal no in blocked list. like in first block it will display employee earning details, in second block it will displa

  • Which paragraph style options break TOC generation?

    Hi, I've had a problem with generating tables of contents in InDesign CS3 and which persists in InDesign CS4. After much experimenting I've learned that there's something in the paragraph style settings for the headings I want to include in a TOC tha