Update agent in workgroup server
Hi,
I have DPM server and two client servers to backup. all servers in workgroup.
I installed the agents manually and attached the DPM server.
The DPM Server see the clients, but when I'm going to DPM console "Management -> Agents" I can see "Agent status OK" and "Agents Updates > Update available" when I click "Update available" I get an Error
message that I need to update manually, need to go from the client server to folder "C:\Program Files\Microsoft System Center 2012 R2\DPM\DPM\ProtectionAgents\RA\4.2.1205.0\amd64" on DPM server and run the installation.
when I'm doing it from the client server I get a massage that this is the same agent version, but the " Update available" massage is still shown in the DPM console.
need help for this issue
thanks,
Hi,
You need to install the agent from under the "C:\Program Files\Microsoft System Center 2012 R2\DPM\DPM\Agents\RA\4.2.1xxx.0\amd64 folder. That is the location for updated agents from update rollups.
Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
This posting is provided "AS IS" with no warranties, and confers no rights.
Similar Messages
-
DPM 2012 R2 agent update on Windows 2003 server x64
Hi,
I have an old windows 2003 server x64 protected by DPM 2012 Sp1. After DPM upgrade to 2012 R2 I cannot update DPM Agent on server. If I try to update agent manually error message is : agentsetup.exe is not a valid win32 application.
Mihaicommand back,
edit: it seems like a reboot is definitely needed to get it working
got it working like described here: http://support.microsoft.com/kb/2958100/en-us
Install the Microsoft Visual C++ 2008 Redistributable on Windows Server 2003 servers if it is not already installed.
Microsoft Visual C++ 2008 SP1 Redistributable Package (x86)
Microsoft Visual C++ 2008 Redistributable Package (x64)
Note The following error occurs if the C++ redistributable is not installed:
Data Protection Manager Setup
Could not load the setup launch screen. Please contact Microsoft Product Support.
Copy the Windows Server 2003 Agent installer that is located on in the DPM server to the Windows Server 2003 server, and then install the agent.
64-bit: <var>DPM Installation Location</var>\DPM\agents\RA\4.2.1226.0\amd64\1033\DPMAgentInstaller_Win2K3_AMD64.exe
32-bit: <var>DPM Installation Location</var>\DPM\agents\RA\4.2.1226.0\i386\1033\
DPMAgentInstaller_Win2K3_i386.exe
Run the following command at an administrative command prompt:
cd DPM Agent Installation Location\DPM\bin\setdpmserver.exe –dpmservername DPM Server Name
Run the following Windows Powershell cmdlet to establish a connection with the DPM server:
Attach-ProductionServer.ps1 DPMServerNameProductionServerNameUserNamePasswordDomain
regards
Stefan -
DPM 2012 R2 agent update on Windows 2003 server x64 - Exchange
According to the release notes on http://blogs.technet.com/b/dpm/archive/2014/04/23/now-available-update-rollup-2-for-system-center-2012-r2-data-protection-manager.aspx the following workloads are supported on Win2K3 with DPM2012 R2 UR2:
SQL 2005
SQL 2008
SQL 2008 R2
SharePoint 2007
Does that mean protecting Exchange 2007 on Win2K3 is no longer an option after upgrading to DPM 2012 R2 (UR2)? It works on DPM 2012 SP1 but I need to know if it will continue to work after upgrading.
(This question follows on from this thread http://social.technet.microsoft.com/Forums/en-US/c425421b-b726-4125-82fc-beae8947722c/dpm-2012-r2-agent-update-on-windows-2003-server-x64?forum=dpmsetup which was marked as 'answered')Hi,
Yes, Exchange 2007 backup will continue to work. I think that due to the timeframe of the UR2 release not all workloads were able to be re-certified, thus the limit in supported workloads.
Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
This posting is provided "AS IS" with no warranties, and confers no rights. -
Agent update on VMM management server
Hi!
I just installed Update Rollup 3 for SCVMM 2012 R2. Updating the agents on all hosts in the fabric was smooth sailing, but the "Agent Version" on the VMM management servers (clustered) still shows 3.2.7510.0 (base R2 installation). Viewing
the Properties of the servers it shows that RU3 is installed, but I can't figure out how to update the VMM agent on these management servers.
Does anyone have ideas on how I can update the agents to the latest version? I am guessing that the management servers' agents also are supposed to be updated after rollup installations, not just the other servers in the fabric?The SCVMM Server Agent should be updated on the SCVMM Server when the SCVMM Server UR is applied.
Past experience is that this is the expected behavior.
The Agent (being its own component) will have a different version from the SCVMM Server itself. If there was no need to update the agent in the UR, then it would not revise.
I know that UR2 included an agent update as I had to push new agents to my Hyper-V Servers - I have not updated to UR3 yet.
Brian Ehlert
http://ITProctology.blogspot.com
Learn. Apply. Repeat. -
Attach agent for a server in a workgroup
I have SCDPM 2012 on a 2012 server trying to attach to a 2008r2 workgroup server I receive the following error:
Attach protected computer elmscadawhist failed:
Error 32685: This server does not match the DPM server setting on server elmscadawhist.
Error details: The parameter is incorrect (0x80070057)
Recommended action: 1) Ensure that you have specified the correct protected computer.
2) In case you have specified the correct protected computer, run the SetDpmServer utility on elmscadawhist with the correct DPM server name, and then retry the operation.Hi
Did you manually install the agent and use the DPM server name at the end? -
Updated agent show old version
Hi,
I have just updated DPM from 2012 to 2012 R2. everything went well and i have patched it it the latest rollup 4.2.1235.
I updated the agents ok, but I have a few workgroup machines. I updated the agent on the workgroup server and they are showing the correct version from the protected server, but DPM still says it is the old version 4.1. have refreshed the console and restarted
the DPM and protected server but it did not help.
any ideas?
sgTry to rejoin the Agents to DPM
Seidl Michael | http://www.techguy.at |
twitter.com/techguyat | facebook.com/techguyat -
Cannot perform a clean install of CF 10 - ODBC Agent and ODBC Server are not in Services - Win2k8 R2
I've tried to perform a clean install on a Win2k8 R2 x64 server several times and I can't seem to get it to install.
I was upgrading from CF 9, which took several attempts. I eventually got CF 10 working and running with the latest updates. But the server would only run for about 15 minutes and everything would come to a screaching hault. ColdFusion pages would fail to load with no error. The pages would hang and wait for the server to respond, which it never did. Restarting IIS would fix the problem.
I have about 20 CF sites on the machine. I came accross an article that talked about pool sizes, etc. I ended up trying a few things with the Web Server Configuration Tool, and as I was adding/deleting servers, I got an error that some application unexpectedly quit, but it wasn't the wsconfig tool. This happened about 3 times as I was deleting servers that I had previously added. Then I tried loading the CF Admin and I got a 500.0 internal server error.
So I bit the bullet and figured I would start all over again. I uninstalled CF 10... now there's nothing on the machine. Re-installed CF 10, and I get the same 500.0 Internal Server Error. I uninstalled, restarted, installed... same thing. Then I found an error in the event viewer that reads:
The description for Event ID 0 from source ColdFusion 10 ODBC Server cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to be saved with the event.
The following information was included with the event:
ColdFusion 10 ODBC Server error: 0
StartServiceCtrlDispatcher Error!
Then I found out that neither the ColdFusion 10 ODBC Agent or the ColdFusion 10 ODBC Server have been installed... at least they're not showing up in the list of services. msconfig also shows that they don't exist at all. I tried reinstalling several times and I can't get them to show up.
PS: It's 6:15 AM and I've been working on this since 10 PM last night. I NEED HELP! Thanks!Hello,
Once you move your application from any prior version of ColdFusion to ColdFusion 10, you will have to tune your application, as the architecture changed from JRun to Tomcat.
You can refer to the article http://blogs.coldfusion.com/post.cfm/tuning-coldfusion-10-iis-connector-configuration for parameters, that needs to be tuned appropriately to make CF connector works flawlessly.
Hope this helps
Regards,
Anit Kumar -
Hi All,
Is there a way to import the latest Windows Update Agent into WSUS and therefore all 3000 machines that connect to WSUS get the update?
Reason this has cropped up is because I want to update all machines to IE9 from IE8. Have approved Internet Explorer 9 in WSUS. Some machines have updated ok. Others wont update and clicking on Check for updates (where it checks WSUS) tells me there are
no updates to install. If I 'Check for Updates from Microsoft Online' it immediately tells me that the machine needs an update. The update that gets installed is Windows Update Agent 7.6.7600.320 which is fine except that means each user will have
to download the update from MS Update and I want WSUS to do it like it does every other Critical and Important update. Does anyone know the KB number I should be looking for or what I need to import from the Catalogue into WSUS so the Update Agent is deployed
to all machines. All machines are Windows 7 SP1 32bit. There must be a way otherwise machines are going to be stuck on IE8 and also not receive any future Win 7 updates from WSUS.
I know IE8 is old and so is IE9 but due to various NHS systems out there some only support IE8 or 9. Tragic I know.
Thanks
RichThe proper way to distribute the latest WUA (.320) to the clients in a WSUS administered environment, is to update the WSUS server(s) with this update:
An update to harden Windows Server Update Services
then the clients WUA will be selfupdated when they connect to the WSUS server.
Rolf Lidvall, Swedish Radio (Ltd) -
Some computers download and install the two approved updates, others only download Windows Update Agent and not the approved updates.
UN-successful Windows Update Log:
2014-05-07 09:33:56:180
1036 e70
Misc =========== Logging initialized (build: 7.6.7600.256, tz: -0400) ===========
2014-05-07 09:33:56:220
1036 e70
Misc = Process: C:\Windows\system32\svchost.exe
2014-05-07 09:33:56:221
1036 e70
Misc = Module: c:\windows\system32\wuaueng.dll
2014-05-07 09:33:56:180
1036 e70
Service *************
2014-05-07 09:33:56:221
1036 e70
Service ** START ** Service: Service startup
2014-05-07 09:33:56:222
1036 e70
Service *********
2014-05-07 09:33:56:544
1036 e70
Agent * WU client version 7.6.7600.256
2014-05-07 09:33:56:545
1036 e70
Agent * Base directory: C:\Windows\SoftwareDistribution
2014-05-07 09:33:56:546
1036 e70
Agent * Access type: No proxy
2014-05-07 09:33:56:547
1036 e70
Agent * Network state: Connected
2014-05-07 09:33:57:315
1036 e70
Setup Service restarting after SelfUpdate
2014-05-07 09:33:57:545
1036 e70
Setup Client version: Core: 7.6.7600.256 Aux: 7.6.7600.256
2014-05-07 09:33:57:592
1036 e70
Report CWERReporter::Init succeeded
2014-05-07 09:33:58:326
1036 e70
Report *********** Report: Initializing static reporting data ***********
2014-05-07 09:33:58:376
1036 e70
Report * OS Version = 6.1.7601.1.0.65792
2014-05-07 09:33:58:376
1036 e70
Report * OS Product Type = 0x00000030
2014-05-07 09:33:58:394
1036 e70
Report * Computer Brand = Hewlett-Packard
2014-05-07 09:33:58:444
1036 e70
Report * Computer Model = HP Compaq 4000 Pro SFF PC
2014-05-07 09:33:58:455
1036 e70
Report * Bios Revision = 786H7 v02.00
2014-05-07 09:33:58:504
1036 e70
Report * Bios Name = Default System BIOS
2014-05-07 09:33:58:554
1036 e70
Report * Bios Release Date = 2011-01-31T00:00:00
2014-05-07 09:33:58:554
1036 e70
Report * Locale ID = 1033
2014-05-07 09:34:03:562
1036 f08
Report REPORT EVENT: {082D455B-6E51-4238-A997-1D27D9214A72}
2014-05-07 09:33:58:565-0400 1
199 101
{0011B9ED-9189-4D58-BE25-FA2F13FC3D6C}
1 240005
SelfUpdate Success
Content Install Installation successful and restart required for the following update: Windows Update Aux
2014-05-07 09:34:03:614
1036 f08
Report CWERReporter finishing event handling. (00000000)
2014-05-07 09:34:42:049
1036 e70
Agent *********** Agent: Initializing Windows Update Agent ***********
2014-05-07 09:34:42:049
1036 e70
Agent *********** Agent: Initializing global settings cache ***********
2014-05-07 09:34:42:049
1036 e70
Agent * WSUS server: http://csd26.csd.local:80
2014-05-07 09:34:42:049
1036 e70
Agent * WSUS status server: http://csd26.csd.local:80
2014-05-07 09:34:42:049
1036 e70
Agent * Target group: CO
2014-05-07 09:34:42:049
1036 e70
Agent * Windows Update access disabled: No
2014-05-07 09:34:42:063
1036 e70
DnldMgr Download manager restoring 0 downloads
2014-05-07 09:34:42:089
1036 e70
AU ########### AU: Initializing Automatic Updates ###########
2014-05-07 09:34:42:089
1036 e70
AU AU setting next detection timeout to 2014-05-07 13:34:42
2014-05-07 09:34:42:090
1036 e70
AU AU setting next sqm report timeout to 2014-05-07 13:34:42
2014-05-07 09:34:42:090
1036 e70
AU # WSUS server: http://csd26.csd.local:80
2014-05-07 09:34:42:090
1036 e70
AU # Detection frequency: 22
2014-05-07 09:34:42:090
1036 e70
AU # Target group: CO
2014-05-07 09:34:42:090
1036 e70
AU # Approval type: Scheduled (Policy)
2014-05-07 09:34:42:090
1036 e70
AU # Scheduled install day/time: Every day at 3:00
2014-05-07 09:34:42:090
1036 e70
AU # Auto-install minor updates: Yes (User preference)
2014-05-07 09:34:42:105
1036 e70
AU Initializing featured updates
2014-05-07 09:34:42:116
1036 e70
AU Found 0 cached featured updates
2014-05-07 09:34:42:116
1036 e70
AU Successfully wrote event for AU health state:0
2014-05-07 09:34:42:117
1036 e70
AU Successfully wrote event for AU health state:0
2014-05-07 09:34:42:117
1036 e70
AU AU finished delayed initialization
2014-05-07 09:34:42:117
1036 e70
AU AU setting next sqm report timeout to 2014-05-08 13:34:42
2014-05-07 09:34:42:117
1036 e70
AU #############
2014-05-07 09:34:42:117
1036 e70
AU ## START ## AU: Search for updates
2014-05-07 09:34:42:117
1036 e70
AU #########
2014-05-07 09:34:42:291
1036 e70
AU <<## SUBMITTED ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
2014-05-07 09:34:42:341
1036 f08
Agent *************
2014-05-07 09:34:42:341
1036 f08
Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-05-07 09:34:42:341
1036 f08
Agent *********
2014-05-07 09:34:42:341
1036 f08
Agent * Online = Yes; Ignore download priority = No
2014-05-07 09:34:42:341
1036 f08
Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0
and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-05-07 09:34:42:341
1036 f08
Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-05-07 09:34:42:341
1036 f08
Agent * Search Scope = {Machine}
2014-05-07 09:34:42:341
1036 f08
Setup Checking for agent SelfUpdate
2014-05-07 09:34:42:342
1036 f08
Setup Client version: Core: 7.6.7600.256 Aux: 7.6.7600.256
2014-05-07 09:34:42:349
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-05-07 09:34:42:392
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:669
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-05-07 09:34:44:676
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:754
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-05-07 09:34:44:777
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:781
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-05-07 09:34:44:788
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:837
1036 f08
Setup Determining whether a new setup handler needs to be downloaded
2014-05-07 09:34:44:855
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe:
2014-05-07 09:34:44:862
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:862
1036 f08
Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe are not trusted: Error 0x800b0001
2014-05-07 09:34:44:862
1036 f08
Setup WARNING: Trust verification failed for WuSetupV.exe. It will be deleted and downloaded, error = 0x800B0001
2014-05-07 09:34:44:863
1036 f08
Setup SelfUpdate handler update required: Current version: 7.6.7600.256, required version: 7.6.7600.256
2014-05-07 09:34:44:873
1036 f08
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256"
2014-05-07 09:34:44:932
1036 f08
Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
2014-05-07 09:34:44:933
1036 f08
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
2014-05-07 09:34:45:048
1036 f08
Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
2014-05-07 09:34:45:048
1036 f08
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
2014-05-07 09:34:45:234
1036 f08
Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
2014-05-07 09:34:45:235
1036 f08
Setup SelfUpdate check completed. SelfUpdate is NOT required.
2014-05-07 09:34:48:415
1036 f08
PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-05-07 09:34:48:415
1036 f08
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://csd26.csd.local:80/ClientWebService/client.asmx
2014-05-07 09:34:48:424
1036 f08
PT WARNING: Cached cookie has expired or new PID is available
2014-05-07 09:34:48:424
1036 f08
PT Initializing simple targeting cookie, clientId = 97287ab2-5824-44d2-bf93-8a98da659f77, target group = CO, DNS name = c18714.csd.local
2014-05-07 09:34:48:424
1036 f08
PT Server URL = http://csd26.csd.local:80/SimpleAuthWebService/SimpleAuth.asmx
2014-05-07 09:34:48:454
1036 f08
PT WARNING: GetCookie failure, error = 0x8024400D, soap client error = 7, soap error code = 300, HTTP status code = 200
2014-05-07 09:34:48:454
1036 f08
PT WARNING: SOAP Fault: 0x00012c
2014-05-07 09:34:48:454
1036 f08
PT WARNING: faultstring:Fault occurred
2014-05-07 09:34:48:454
1036 f08
PT WARNING: ErrorCode:ConfigChanged(2)
2014-05-07 09:34:48:454
1036 f08
PT WARNING: Message:(null)
2014-05-07 09:34:48:454
1036 f08
PT WARNING: Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetCookie"
2014-05-07 09:34:48:454
1036 f08
PT WARNING: ID:cb5babad-3a1d-4e6b-946e-736ed4746e3f
2014-05-07 09:34:48:464
1036 f08
PT WARNING: Cached cookie has expired or new PID is available
2014-05-07 09:34:48:464
1036 f08
PT Initializing simple targeting cookie, clientId = 97287ab2-5824-44d2-bf93-8a98da659f77, target group = CO, DNS name = c18714.csd.local
2014-05-07 09:34:48:464
1036 f08
PT Server URL = http://csd26.csd.local:80/SimpleAuthWebService/SimpleAuth.asmx
2014-05-07 09:35:06:497
1036 e70
AU Forced install timer expired for scheduled install
2014-05-07 09:35:06:497
1036 e70
AU UpdateDownloadProperties: 0 download(s) are still in progress.
2014-05-07 09:35:06:497
1036 e70
AU Setting AU scheduled install time to 2014-05-08 07:00:00
2014-05-07 09:35:06:498
1036 e70
AU Successfully wrote event for AU health state:0
2014-05-07 09:35:14:236
1036 f08
PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2014-05-07 09:35:14:236
1036 f08
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://csd26.csd.local:80/ClientWebService/client.asmx
2014-05-07 09:35:20:118
1036 f08
Agent * Found 0 updates and 79 categories in search; evaluated appl. rules of 859 out of 1494 deployed entities
2014-05-07 09:35:20:194
1036 f08
Agent *********
2014-05-07 09:35:20:194
1036 f08
Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-05-07 09:35:20:194
1036 f08
Agent *************
2014-05-07 09:35:20:209
1036 f08
Report CWERReporter finishing event handling. (00000000)
2014-05-07 09:35:20:209
1036 f08
Report CWERReporter finishing event handling. (00000000)
2014-05-07 09:35:20:209
1036 bb8
AU >>## RESUMED ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
2014-05-07 09:35:20:209
1036 bb8
AU # 0 updates detected
2014-05-07 09:35:20:209
1036 bb8
AU #########
2014-05-07 09:35:20:209
1036 bb8
AU ## END ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
2014-05-07 09:35:20:209
1036 bb8
AU #############
2014-05-07 09:35:20:210
1036 bb8
AU Successfully wrote event for AU health state:0
2014-05-07 09:35:20:210
1036 bb8
AU Featured notifications is disabled.
2014-05-07 09:35:20:211
1036 bb8
AU AU setting next detection timeout to 2014-05-08 11:19:46
2014-05-07 09:35:20:211
1036 bb8
AU Setting AU scheduled install time to 2014-05-08 07:00:00
2014-05-07 09:35:20:212
1036 bb8
AU Successfully wrote event for AU health state:0
2014-05-07 09:35:20:212
1036 bb8
AU Successfully wrote event for AU health state:0
2014-05-07 09:35:25:183
1036 f08
Report REPORT EVENT: {C1B39107-F517-4477-AAE3-9B1F1D6002BF}
2014-05-07 09:35:20:193-0400 1
147 101
{00000000-0000-0000-0000-000000000000}
0 0 AutomaticUpdates
Success Software Synchronization
Windows Update Client successfully detected 0 updates.
2014-05-07 09:35:25:183
1036 f08
Report REPORT EVENT: {669B9537-BB71-4190-BA58-A97F725AE4D8}
2014-05-07 09:35:20:194-0400 1
156 101
{00000000-0000-0000-0000-000000000000}
0 0 AutomaticUpdates
Success Pre-Deployment Check
Reporting client status.
2014-05-07 09:35:25:184
1036 f08
Report CWERReporter finishing event handling. (00000000)
2014-05-07 09:37:32:440
1036 f08
Report Uploading 3 events using cached cookie, reporting URL = http://csd26.csd.local:80/ReportingWebService/ReportingWebService.asmx
2014-05-07 09:37:32:454
1036 f08
Report Reporter successfully uploaded 3 events. -
Intermittent Scan issues for Update Agent
I am having an issue with SUP/WSUS that I am hoping someone can point me on the right direction on..
The environment is:
SCCM 2012 R2 Primary Site Server on Server 2012 R2 Update
SQL 2012 SP1 on Server 2012 R2 Update (standalone server) that houses the SCCM DB and the WSUS DB.
Software Update Point is on Server 2012 R2 Update (standalone) with WSUS roll installed. WSUS is configured for SSL (with "requires ssl" checked on the role) and using port 8531.
No issues with the SUP install. The SUP is synchronizing just fine with Microsoft and I am able manage update objects in the SCCM Admin console (create update groups, ADR's, etc.)
WSUSCtrl.log:
Checking for supported version of WSUS (min WSUS 3.0 SP2 + KB2720211 + KB2734608)
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Checking runtime v2.0.50727... SMS_WSUS_CONTROL_MANAGER
5/27/2014 2:16:03 PM 3304 (0x0CE8)
Did not find supported version of assembly Microsoft.UpdateServices.Administration.
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Checking runtime v4.0.30319... SMS_WSUS_CONTROL_MANAGER
5/27/2014 2:16:03 PM 3304 (0x0CE8)
Found supported assembly Microsoft.UpdateServices.Administration version 4.0.0.0, file version 6.3.9600.16384
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Found supported assembly Microsoft.UpdateServices.BaseApi version 4.0.0.0, file version 6.3.9600.16384
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Supported WSUS version found SMS_WSUS_CONTROL_MANAGER
5/27/2014 2:16:03 PM 3304 (0x0CE8)
Attempting connection to local WSUS server
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Successfully connected to local WSUS server
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
No changes - local WSUS Server Proxy settings are correctly configured as Proxy Name and Proxy Port 80
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Attempting connection to local WSUS server
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Successfully connected to local WSUS server
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
There are no unhealthy WSUS Server components on WSUS Server SERVER.SUBDOMAIN.DOMAIN.ORG
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Successfully checked database connection on WSUS server SERVER.SUBDOMAIN.DOMAIN.ORG
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
The clients are getting the local policy pointing it to the correct URL. This is also verified in the log:
LocationServices.log:
Current AD site of machine is EWJ LocationServices
5/27/2014 1:45:41 PM 4236 (0x108C)
Created and Sent Location Request '{3ABC15E0-70D3-4AE6-991C-B6BAF165C808}' for package {729742E6-9B66-4516-8A69-8569560D88C7}
LocationServices 5/27/2014 1:45:41 PM
4236 (0x108C)
Calling back with the following WSUS locations
LocationServices 5/27/2014 1:45:41 PM
4236 (0x108C)
WSUS Path='https://server.subdomain.domain.org:8531', Server='server.subdomain.domain.org', Version='10'
LocationServices 5/27/2014 1:45:41 PM
4236 (0x108C)
Calling back with locations for WSUS request {3ABC15E0-70D3-4AE6-991C-B6BAF165C808}
LocationServices 5/27/2014 1:45:41 PM
4236 (0x108C)
The issue comes into play in the fact that what appears to be about 85-90% of the time, the client scan cycle fails with error 0x80244004. This is both Windows 7 x86/64 Pro and Windows XP SP3. The error translates to:
Same as SOAPCLIENT_CONNECT_ERROR - SOAP client failed to connect to the server.
Source: Windows Update Agent
The REALLY bizarre thing is that the OS's are inverted on their failure rates. Win 7 fails 85-90% of the time, where as Win XP succeeds 85-90% of the time.
We completely rebuilt the SUP Server (including OS and reconfigured it again for SSL) and alas the issue remains.
Here's some snippets from the logs files from a machine when it fails:
ScanAgent.log
Message received: '<?xml version='1.0' ?>
<UpdateSourceMessage MessageType='ScanByUpdateSource'>
<ForceScan>TRUE</ForceScan>
<UpdateSourceIDs>
<ID>{729742E6-9B66-4516-8A69-8569560D88C7}
</ID>
</UpdateSourceIDs>
</UpdateSourceMessage>'
ScanAgent
5/27/2014 1:45:41 PM 4236 (0x108C)
*****ScanByUpdateSource request received with ForceReScan=2, ScanOptions=0x0000000a, WSUSLocationTimeout = 604800
ScanAgent 5/27/2014 1:45:41 PM
4236 (0x108C)
Sources are current, but Invalid. TTL is also invalid.
ScanAgent 5/27/2014 1:45:41 PM
4236 (0x108C)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): - - - - - -Locations requested for ScanJobID={DDFF8212-94D4-4BDC-8A47-41E203F6AD79} (LocationRequestID={3ABC15E0-70D3-4AE6-991C-B6BAF165C808}), will process the scan request once locations are available.
ScanAgent 5/27/2014 1:45:41 PM
4236 (0x108C)
*****WSUSLocationUpdate received for location request guid={3ABC15E0-70D3-4AE6-991C-B6BAF165C808}
ScanAgent 5/27/2014 1:45:41 PM
4236 (0x108C)
Sources are current, but Invalid. TTL is also invalid.
ScanAgent 5/27/2014 1:45:41 PM
2216 (0x08A8)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJob::OnScanComplete -Scan Failed with Error=0x80244004
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJob::ScheduleScanRetry- ScanRetry Timer task successfully scheduled. Will wake up in next 1800 seconds
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJob::OnScanComplete - Scan Retry successfully scheduled
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJobManager::OnScanComplete- Scan has failed, scan request will be pending for scan retry cycle.
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
CScanAgent::ScanCompleteCallback - failed at OnScanComplete with error=0x87d00631
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
WindowsUpdate.log:
2014-05-27 13:45:41:482
2956 8a8
COMAPI -------------
2014-05-27 13:45:41:482
2956 8a8
COMAPI -- START -- COMAPI: Search [ClientId = CcmExec]
2014-05-27 13:45:41:482
2956 8a8
COMAPI ---------
2014-05-27 13:45:41:497
936 ed4
Agent *************
2014-05-27 13:45:41:497
936 ed4
Agent ** START ** Agent: Finding updates [CallerId = CcmExec]
2014-05-27 13:45:41:497
936 ed4
Agent *********
2014-05-27 13:45:41:497
936 ed4
Agent * Include potentially superseded updates
2014-05-27 13:45:41:497
936 ed4
Agent * Online = Yes; Ignore download priority = Yes
2014-05-27 13:45:41:497
936 ed4
Agent * Criteria = "(DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')"
2014-05-27 13:45:41:497
936 ed4
Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-05-27 13:45:41:497
936 ed4
Agent * Search Scope = {Machine}
2014-05-27 13:45:41:497
2956 8a8
COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
2014-05-27 13:45:44:025
936 ed4
PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-05-27 13:45:44:025
936 ed4
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = https://server.subdomain.domain::8531/ClientWebService/client.asmx
2014-05-27 13:45:44:056
936 ed4
PT WARNING: Cached cookie has expired or new PID is available
2014-05-27 13:45:44:056
936 ed4
PT Initializing simple targeting cookie, clientId = cf0c5d2d-2a04-41a7-8a1b-4182de886397, target group = , DNS name = sccmtstw7x641.subdomain.domain:
2014-05-27 13:45:44:056
936 ed4
PT Server URL = https://server.subdomain.domain:8531/SimpleAuthWebService/SimpleAuth.asmx
2014-05-27 13:45:44:056
936 ed4
PT WARNING: GetAuthorizationCookie failure, error = 0x80244004, soap client error = 4, soap error code = 0, HTTP status code = 200
2014-05-27 13:45:44:056
936 ed4
PT WARNING: Failed to initialize Simple Targeting Cookie: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: PopulateAuthCookies failed: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: RefreshCookie failed: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: RefreshPTState failed: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: Sync of Updates: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: SyncServerUpdatesInternal failed: 0x80244004
2014-05-27 13:45:44:056
936 ed4
Agent * WARNING: Failed to synchronize, error = 0x80244004
2014-05-27 13:45:44:056
936 ed4
Agent * WARNING: Exit code = 0x80244004
2014-05-27 13:45:44:056
936 ed4
Agent *********
2014-05-27 13:45:44:056
936 ed4
Agent ** END ** Agent: Finding updates [CallerId = CcmExec]
2014-05-27 13:45:44:056
936 ed4
Agent *************
2014-05-27 13:45:44:056
936 ed4
Agent WARNING: WU client failed Searching for update with error 0x80244004
2014-05-27 13:45:44:071
2956 8a8
COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = CcmExec]
2014-05-27 13:45:44:071
2956 8a8
COMAPI - Updates found = 0
2014-05-27 13:45:44:071
2956 8a8
COMAPI - WARNING: Exit code = 0x00000000, Result code = 0x80244004
2014-05-27 13:45:44:071
2956 8a8
COMAPI ---------
2014-05-27 13:45:44:071
2956 8a8
COMAPI -- END -- COMAPI: Search [ClientId = CcmExec]
2014-05-27 13:45:44:071
2956 8a8
COMAPI -------------
2014-05-27 13:45:44:071
2956 8a8
COMAPI WARNING: Operation failed due to earlier error, hr=80244004
2014-05-27 13:45:44:071
2956 8a8
COMAPI FATAL: Unable to complete asynchronous search. (hr=80244004)
Log file for contrast on a client when it works:
ScanAgent.log
Message received: '<?xml version='1.0' ?>
<UpdateSourceMessage MessageType='ScanByUpdateSource'>
<ForceScan>TRUE</ForceScan>
<UpdateSourceIDs>
<ID>{729742E6-9B66-4516-8A69-8569560D88C7}
</ID>
</UpdateSourceIDs>
</UpdateSourceMessage>'
ScanAgent
5/27/2014 1:43:20 PM 4052 (0x0FD4)
*****ScanByUpdateSource request received with ForceReScan=2, ScanOptions=0x0000000a, WSUSLocationTimeout = 604800
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
Sources are current and valid. TTLs are however, invalid.
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): - - - - - -Locations requested for ScanJobID={1BF68613-35BB-4627-A3F3-FCA455547578} (LocationRequestID={F6F11712-31EA-49BF-AD63-FF3FEF1BA29C}), will process the scan request once locations are available.
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
*****WSUSLocationUpdate received for location request guid={F6F11712-31EA-49BF-AD63-FF3FEF1BA29C}
ScanAgent 5/27/2014 1:43:20 PM
3648 (0x0E40)
Sources are current and valid. TTLs are however, invalid.
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): Performing Full Scan.
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): Scan Succeeded, Resetting Source to Current and TTLs to Valid
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): CScanJob::OnScanComplete - Scan completed successfully, ScanType=1
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): CScanJobManager::OnScanComplete -ScanJob is completed.
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): CScanJobManager::OnScanComplete - Reporting Scan request complete to clients...
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
- - Calling back to client on Scan request complete...
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
CScanAgent::ScanComplete- Scan completion received.
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
I have verified there are no proxy settings on any of these devices by running "Netsh winhttp show proxy"
Current WinHTTP proxy settings:
Direct access (no proxy server).
Firewall is OFF on both clients and servers. There are no WU GPO settings applied.
Anyone have any clues on where to look next? I have been scouring the internet for a couple of days now and seems that all roads with this type of error leads back to a proxy issue, but since no proxy's are in play here, hasn't been of much help. Still
digging through stuff but if anyone has any pointers on where to look next it would much appreciated!
Thanks,Found this Technet article: http://social.technet.microsoft.com/Forums/ru-RU/a1c81d16-d5d0-4367-bae6-3338aab0633f/client-updates-failing-windowsupdatelog-0x80244004?forum=configmanagersecurity
I ran a Wireshark trace and received the exact same error on my client. I have sent this over to the client to take a closer look. Fingers crossed that this is the issue as it should be a simple fix. *fingers crossed* -
(7.3) WORKGROUP SERVER VS. ENTERPRISE SERVER
제품 : ORACLE SERVER
작성날짜 : 2003-06-10
PURPOSE
Oracle Version 7.3을 기준으로 workgroup server가 제공하는 기능과,
engerprise server가 제공하는 기능을 나열한다.
Explanation
Core Engine: WorkGroup Server(7.3) Enterprise Server(7.3)
Row Level Locking Yes Yes
Multi-Versioning Yes Yes
Synonyms Yes Yes
Cascade Deletes Yes Yes
Cascade Updates Yes Yes
Outer Joins Yes Yes
Triggers Per Table 9 9
Bitmapped Indexes Yes Yes
Hashed Indexes Yes Yes
Star Queries Yes Yes
Security: Nonintuitive Online
Backups Yes Yes
Role-Based Security Yes Yes
C2 Level Security Yes Yes
Distributed Functions:
Distributed SQL Queries Yes Yes
Database Links Yes Yes
Read-only Snapshots Yes Yes
Updateable Snapshots Yes Yes
Heterogeneous Gateways No Yes
Automatic Two-Phase
Commit Yes Yes
Advanced Replication:
Publish & Subscribe Yes Yes
Workflow
(Dynamic Ownership) No Yes
Update Anywhere No Yes
Failover No Yes
Bidirectional No Yes
Automatic Modifications No Yes
Automatic Conflict Resolution Yes Yes
Parallel Server: No Yes
Unstructured Data:
BLOBs Yes Yes
Single Pass Dynamic
Web Pages Yes Yes
Management:
Enterprise Manager Yes Yes
Record and Play Back
Console Yes Yes
Multipaneled Summary
Screen Yes Yes
Full Distributed Server
Management Yes Yes
Graphical Map View Yes Yes
Lights Out Task Scheduling Yes Yes
One-Button Install Yes No
Client/Server Software
Distribution Yes Yes
Extra Cost Options:
Context No Yes
Documents No Yes
Video No Yes
Messaging No Yes
Oracle Fail-Safe Yes NoCould you define what you mean by "spoof". Could you plaese provide the line in the hosts file which solved your problem? Was it just something like:
<IPADDR> <NAME-WITH-DOMAIN> <NAME-WITHOUT-DOMAIN>
Please advise -
Error 3260 from Workgroup server
Hello everybody
My Englisch is not very gut but i hope you can understand me
I have a problem with DPM Agent at one Server. I take allways the same error:
Error 3260: The credentials specified for server targetserver are invalid. Recommenden action: Rerun the operation with the same credentials that were provided when running SetDpmServer for the target server.
Ich have tried to install the Agent from 2 different DPM Server (DPM 2012 and DPM 2010) but i take the same error. I have treid multiplie Password but nothing can help.
From target Server i run:
SetDpmServer.exe -dpmservername dpmserver –isnondomainserver –username dpmuser –password
The Server is not in a Domain. The Firewall is offline. Ping from DPM server to target server and from target server to DPM server is ok.
I know how to install the DPM Agent because we have more Server than we with DPM Backup. The only problem ist with this one server .
I think the problem is not the credentials because i have tried to connecting from dpm server to target server with the dpm server per RDP and it works.
I post from both server the DPM error log:
DPM server:
0D38 06C0 01/06 11:19:53.895 07 AgentCommunication.cs(623) NORMAL <ProductionServer xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" ServerName="tagetserver" DomainName="" NetBiosName="targetserver" IsDPM="false" DPMserverName="dpmserver" xmlns="http://schemas.microsoft.com/2003/dls/am/TaskDefinitions.xsd" />
0D38 06C0 01/06 11:19:54.177 03 ntlmutils.cpp(183) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING Failed: Hr: = [0x80070002] : Error trying to open key [HKLM\Software\Microsoft\Microsoft Data Protection Manager\Agent\2.0\NtlmAuthData\targetserver]
0D38 06C0 01/06 11:19:54.789 03 ntlmutils.cpp(624) 6611DA42-A0D6-42F9-86AB-507100F4A709 NORMAL Created user account dpmuser.
0D38 06C0 01/06 11:19:55.838 07 AgentCommunication.cs(322) NORMAL Created NTLM user account dpmuser
0D38 06C0 01/06 11:19:55.838 07 AgentCommunication.cs(649) NORMAL Setcommunication on server targetserver: Created user account dpmserver\dpmuser
0D38 06C0 01/06 11:19:56.107 07 Win32LG.cs(690) NORMAL Added account[dpmserver\dpmuser] to group[Distributed COM Users] on server [].
0D38 06C0 01/06 11:19:56.358 07 Win32LG.cs(690) NORMAL Added account[dpmserver\dpmuser] to group[MSDPMTrustedMachines] on server [].
0D38 06C0 01/06 11:19:56.614 07 Win32LG.cs(690) NORMAL Added account[dpmserver\dpmuser] to group[DPMRADmTrustedMachines] on server [].
0D38 06C0 01/06 11:21:00.995 22 agentserviceproxy.cpp(250) [00000000673897A0] 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING Failed: Hr: = [0x80070005] : error in CoCreateInstanceEx for server [targetserver]
0D38 06C0 01/06 11:21:00.995 22 agentserviceproxy.cpp(155) [00000000673897A0] 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING Failed: Hr: = [0x80070005] : F: lVal : InitInterfaceRemote()
0D38 06C0 01/06 11:21:01.185 07 AgentCommunication.cs(511) WARNING GetNonDomainServerProperties: Caught unauthorizedAccessException = System.UnauthorizedAccessException: Access is denied. (Exception from HRESULT: 0x80070005 (E_ACCESSDENIED))
0D38 06C0 01/06 11:21:01.185 07 AgentCommunication.cs(511) WARNING at System.Runtime.InteropServices.Marshal.ThrowExceptionForHRInternal(Int32 errorCode, IntPtr errorInfo)
0D38 06C0 01/06 11:21:01.185 07 AgentCommunication.cs(511) WARNING at Microsoft.Internal.EnterpriseStorage.Dls.DPMRA.DPMRAServicesProxy.Initialize()
0D38 06C0 01/06 11:21:01.185 07 AgentCommunication.cs(511) WARNING at Microsoft.Internal.EnterpriseStorage.Dls.AgentManager.AgentCommunication.GetNonDomainServerProperties(NetworkCredential userCredentials, String serverName, DpsTimeZone& timeZone, Version& osVersion, SystemOSType& osType, Boolean& isDpm, Boolean& isDc, FqMachineName& psMachine, Int64& serverAttributes)
0D38 06C0 01/06 11:21:01.196 07 AgentCommunication.cs(574) NORMAL CleanupOnAttachFailure: Delete user dpmuser
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING Caught Dls exception: Microsoft.Internal.EnterpriseStorage.Dls.Utils.DlsException: exception ---> System.UnauthorizedAccessException: Access is denied. (Exception from HRESULT: 0x80070005 (E_ACCESSDENIED))
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at System.Runtime.InteropServices.Marshal.ThrowExceptionForHRInternal(Int32 errorCode, IntPtr errorInfo)
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.DPMRA.DPMRAServicesProxy.Initialize()
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.AgentManager.AgentCommunication.GetNonDomainServerProperties(NetworkCredential userCredentials, String serverName, DpsTimeZone& timeZone, Version& osVersion, SystemOSType& osType, Boolean& isDpm, Boolean& isDc, FqMachineName& psMachine, Int64& serverAttributes)
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING --- End of inner exception stack trace ---
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.AgentManager.AgentCommunication.GetNonDomainServerProperties(NetworkCredential userCredentials, String serverName, DpsTimeZone& timeZone, Version& osVersion, SystemOSType& osType, Boolean& isDpm, Boolean& isDc, FqMachineName& psMachine, Int64& serverAttributes)
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.AgentManager.AgentCommunication.SetCommunication(String productionServerXML, String userName, String password, String domain, Boolean configurePS, Boolean isNonDomainServer, Guid& serverId)
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.Engine.CAgentManagerServices.SetCommunication(UInt16* bstrProductionServerXML, UInt16* bstrUserName, UInt16* bstrPassword, UInt16* bstrDomain, Byte configurePS, Byte isNonDomainServer, _GUID* pguidServerId)
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING at Microsoft.Internal.EnterpriseStorage.Dls.Engine.CCoreServices.SetCommunication(CCoreServices* , UInt16* productionServerXML, UInt16* bstrUserName, UInt16* bstrPassword, UInt16* bstrDomain, Byte configurePS, Byte isNonDomainServer, _GUID* pguidServerId, tagSAFEARRAY** exceptionResult)
0D38 06C0 01/06 11:21:01.581 09 serviceutils.cpp(476) 6611DA42-A0D6-42F9-86AB-507100F4A709 WARNING *** Mojito error was: NonDomainInvalidCredentials; 0; None
0D38 06C0 01/06 11:21:01.642 23 emservices.cpp(156) 6611DA42-A0D6-42F9-86AB-507100F4A709 NORMAL CEMServices::RaiseOrResolveAlert()
0D38 06C0 01/06 11:21:01.780 02 EventManager.cs(88) NORMAL Publishing event from ServerAlert.cs(556): AlertStateChange, [ObjectId=00000000-0000-0000-0000-000000000000]
0D38 06C0 01/06 11:21:02.891 09 coreservices.cpp(7011) 6611DA42-A0D6-42F9-86AB-507100F4A709 NORMAL CCoreServices::UpdateAlertVisibilityIfInvisible() entered
0D38 06C0 01/06 11:21:02.891 16 engineservices.cpp(356) 6611DA42-A0D6-42F9-86AB-507100F4A709 NORMAL CEngineServices::UpdateAlertVisibilityIfInvisible entered. alertId={21D41B70-56D2-4812-8B8C-C03DBD4D7663}, newVisibility=0, invisibilityTimeout=0
0D38 06C0 01/06 11:21:02.920 02 EventManager.cs(88) NORMAL Publishing event from ServerAlert.cs(722): AlertStateChange, [ObjectId=00000000-0000-0000-0000-000000000000]
Target server
129C 08F8 12/04 14:28:09.818 03 runtime.cpp(818) [00000000001C7D10] ACTIVITY InitializeSecurity found 3 authorized entities
129C 08F8 12/04 14:28:09.818 03 runtime.cpp(836) [00000000001C7D10] ACTIVITY InitializeSecurity added COM perm for targetserver\dpmuser
129C 08F8 12/04 14:28:09.818 03 runtime.cpp(854) [00000000001C7D10] ACTIVITY InitializeSecurity added COM perm for DPMRADCOMTrustedMachines
129C 08F8 12/04 14:28:09.818 03 runtime.cpp(891) [00000000001C7D10] ACTIVITY InitializeSecurity added DM perm for DPMRADmTrustedMachines
129C 08F8 12/04 14:28:09.818 03 runtime.cpp(94) NORMAL Found 1 writer account(s) under VSS access control.
129C 08F8 12/04 14:28:09.818 03 runtime.cpp(161) NORMAL Added writer account [0] 'NT Authority\NetworkService' to the DACL.
129C 08F8 12/04 14:28:09.818 03 runtime.cpp(1018) [00000000001C7D10] NORMAL CoInitializeSecurity from a workgroup machine enbaling CLOAKING
129C 08F8 12/04 14:28:09.834 22 genericthreadpool.cpp(804) [00000000001C7D10] NORMAL Hr: = [0x80070002] CGenericThreadPool::m_dwMaximumNumberOfThreads[20]
129C 08F8 12/04 14:28:09.834 22 agentutils.cpp(2624) WARNING Failed: Hr: = [0x80070645] : U: lVal : hr
129C 1418 12/04 14:28:09.834 03 timer.cpp(490) ACTIVITY CTimerMgr::TimerThread
129C 1418 12/04 14:28:09.834 03 timer.cpp(503) [0000000000261FC0] ACTIVITY CTimerMgr::TimerThreadInternal
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [0000000000285E20] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [0000000000288110] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [000000000028A400] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [000000000028C6F0] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 2, QoS Index: 5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [000000000028E9E0] NORMAL DM: - EndPoint:0000000000285C80, Family: 2, Indx:5, Port:0
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
129C 08F8 12/04 14:28:09.849 20 cc_base.cpp(761) [0000000000290CD0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(761) [0000000000292FC0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(761) [00000000002952B0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(761) [00000000002975A0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(913) NORMAL DM: - Spotted QoS IPv6, Index:4
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(908) NORMAL DM: - Spotted QoS IPv4, Index:5
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(1036) NORMAL Created Socket with Family: 23, QoS Index: 4
129C 08F8 12/04 14:28:09.865 20 cc_base.cpp(761) [00000000001C8FB0] NORMAL DM: - EndPoint:0000000000285D50, Family: 23, Indx:4, Port:0
129C 08F8 12/04 14:28:09.865 20 commengine.cpp(350) [0000000000261A30] ACTIVITY Hr: = [0x80070002] ConnectionNoActivityTimeout: 300
129C 08F8 12/04 14:28:09.865 20 commengine.cpp(364) [0000000000261A30] ACTIVITY Hr: = [0x80070002] m_dwConnectionNoActivityTimeoutForSlowReceiver: 3600
129C 1B4C 12/04 14:28:09.865 03 timer.cpp(490) ACTIVITY CTimerMgr::TimerThread
129C 1B4C 12/04 14:28:09.865 03 timer.cpp(503) [000000000029A3B8] ACTIVITY CTimerMgr::TimerThreadInternal
129C 08F8 12/04 14:28:09.865 29 dpmra.cpp(162) [000000000020A9B0] NORMAL CDPMRA::Initialize [000000000020A9B0]
129C 08F8 12/04 14:28:09.865 31 vaagent.cpp(226) NORMAL CVAAgent: Initialize globals
129C 08F8 12/04 14:28:09.881 29 mta.cpp(126) ACTIVITY CMTA::AddSchemasToSchemaCache => Initialize loaded schemas
129C 08F8 12/04 14:28:09.912 29 dpmra.cpp(184) [000000000020A9B0] NORMAL CDPMRA::Initialize loaded schemas
129C 08F8 12/04 14:28:09.912 22 genericthreadpool.cpp(75) [00000000001CF1A0] NORMAL CGenericThreadPool: constructor
129C 08F8 12/04 14:28:09.912 22 genericthreadpool.cpp(804) [00000000001CF1A0] NORMAL Hr: = [0x80070002] CGenericThreadPool::m_dwMaximumNumberOfThreads[256]
129C 08F8 12/04 14:28:09.912 29 dpmra.cpp(271) [000000000020A9B0] NORMAL CreateDefaultSubTask [000000000020A9B0]
129C 08F8 12/04 14:28:09.912 29 dpmra.cpp(194) [000000000020A9B0] NORMAL Temporary storage path reg key found
129C 08F8 12/04 14:28:09.912 29 dpmra.cpp(210) [000000000020A9B0] NORMAL MTA Temp location Path = [C:\Program Files\Microsoft Data Protection Manager\DPM\temp\MTA\]
129C 08F8 12/04 14:28:09.912 29 mtamethrottlehelper.cpp(114) [00000000001CFC60] NORMAL Hr: = [0x80070002] Number of encryption threads = [2]
129C 08F8 12/04 14:28:09.912 03 service.cpp(298) [000000000017FAE0] ACTIVITY CService::AnnounceServiceStatus
129C 0DD8 12/04 14:28:09.912 04 xxcmdproc.cpp(372) [000000000020D220] NORMAL SaveCredential - DpmServerName=[dpmserver], UserName=[dpmuser]
129C 1418 12/04 14:33:09.904 03 runtime.cpp(1652) [00000000001C7D10] NORMAL CDLSRuntime::ProcessIdleTimeout
129C 1418 12/04 14:33:09.904 03 runtime.cpp(646) [00000000001C7D10] NORMAL CDLSRuntime::Uninitialize, bForce: 0
129C 1418 12/04 14:33:09.904 05 genericagent.cpp(264) [000000000020A9B0] NORMAL Agent Can Shutdown if there is only default wokitem active[1]
129C 1418 12/04 14:33:09.904 29 dpmra.cpp(360) [000000000020A9B0] NORMAL CDPMRA::Shutting down dpmra, force-shutdown :yes
129C 1418 12/04 14:33:09.904 03 workitem.cpp(391) NORMAL Timing out WI [00000000002410B0], WI GUID = {B71B4544-7067-4A30-B5FB-BA320B10D82A}, ..last DM activity happened 1188388017msec back, WI Idle Timeout = 390000msec
129C 1418 12/04 14:33:09.904 22 genericthreadpool.cpp(664) [00000000001CF1A0] NORMAL CGenericThreadPool: Waiting for threads to exit
129C 1418 12/04 14:33:11.904 22 genericthreadpool.cpp(664) [00000000001CF1A0] NORMAL CGenericThreadPool: Waiting for threads to exit
129C 1BA0 12/04 14:33:13.904 20 cc_base.cpp(1226) [000000000028E9E0] NORMAL DM: Aborting http state machine for reason 0
129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [0000000000288110] NORMAL DM: Aborting http state machine for reason 0
129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [0000000000285E20] NORMAL DM: Aborting http state machine for reason 0
129C 19B8 12/04 14:33:13.904 20 cc_base.cpp(1226) [000000000028C6F0] NORMAL DM: Aborting http state machine for reason 0
129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [00000000002975A0] NORMAL DM: Aborting http state machine for reason 0
129C 19B8 12/04 14:33:13.904 20 cc_base.cpp(1226) [00000000002952B0] NORMAL DM: Aborting http state machine for reason 0
129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [000000000028A400] NORMAL DM: Going to timeout connection
129C 0C18 12/04 14:33:13.904 20 cc_base.cpp(1226) [000000000028A400] NORMAL DM: Aborting http state machine for reason 0
129C 1BA0 12/04 14:33:13.904 20 cc_base.cpp(1226) [00000000001C8FB0] NORMAL DM: Aborting http state machine for reason 0
129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [0000000000290CD0] NORMAL DM: Going to timeout connection
129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [0000000000292FC0] NORMAL DM: Aborting http state machine for reason 0
129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [0000000000292FC0] NORMAL DM: Going to timeout connection
129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [00000000002952B0] NORMAL DM: Going to timeout connection
129C 1418 12/04 14:33:13.904 20 cc_base.cpp(388) [00000000001C8FB0] NORMAL DM: Going to timeout connection
129C 1A38 12/04 14:33:13.904 20 cc_base.cpp(1226) [0000000000290CD0] NORMAL DM: Aborting http state machine for reason 0
129C 1418 12/04 14:33:13.904 22 genericthreadpool.cpp(664) [00000000001C7D10] NORMAL CGenericThreadPool: Waiting for threads to exit
129C 1418 12/04 14:33:15.904 29 dpmra.cpp(127) [000000000020A9B0] NORMAL CDPMRA: destructor [000000000020A9B0]
129C 1B4C 12/04 14:33:15.920 03 timer.cpp(513) [000000000029A3B8] ACTIVITY Shutting down timer thread.
129C 1418 12/04 14:33:15.920 03 service.cpp(81) ACTIVITY CService::StopThisService
129C 1418 12/04 14:33:15.920 03 service.cpp(281) [000000000017FAE0] ACTIVITY CService::StopService()
129C 08F8 12/04 14:33:15.920 03 service.cpp(298) [000000000017FAE0] ACTIVITY CService::AnnounceServiceStatus
I hope somebody can help mehi,
it is not possible to find the run time errors in application server while writing the file.using sy-subrc only we can find out. where it is writing correctly like this.
we can see all the application server files in this Tcode: AL11 -
SCCM Software Update Agent remains disabled
Dear All,
on single notebooks the Software Updates Agent remains disabled even if the Client Settings policy is set to enale the agent as in the attached images:
Even though if I set e.g. the remote tool agent as disabled, the agent becomes disabled on the same notebooks, where the SUA does not change state. Therefore a communication error is excluded.
Does anyone know where to look after more information about this issue and eventually how to solve it?
CMClient Version on all Clients: 5.00.7804.1000
OS on the Client: Win 8 or Win 8.1 U1
SCCM Version on the Server: System Center Configuration manager 2012 SP 1 5.0.7804.1500
Policy:
Best,
PictopHi t.c.rich,
Thank you for the response.
Here the log file.
<![LOG[Successfully completed scan.]LOG]!><time="12:09:30.983-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="3864" file="cwuahandler.cpp:3557">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="12:51:54.966-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="sourcemanager.cpp:1232">
<![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="12:51:55.045-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="sourcemanager.cpp:936">
<![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="12:51:55.064-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="sourcemanager.cpp:1265">
<![LOG[Scan results will include all superseded updates.]LOG]!><time="12:51:55.076-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="cwuahandler.cpp:2913">
<![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="12:51:55.076-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="cwuahandler.cpp:2916">
<![LOG[Async searching of updates using WUAgent started.]LOG]!><time="12:51:56.701-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="cwuahandler.cpp:579">
<![LOG[Async searching completed.]LOG]!><time="12:52:18.732-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="336" file="cwuahandler.cpp:2068">
<![LOG[Successfully completed scan.]LOG]!><time="12:52:19.513-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="1880" file="cwuahandler.cpp:3557">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="12:52:19.748-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="sourcemanager.cpp:1232">
<![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="12:52:19.748-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="sourcemanager.cpp:936">
<![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="sourcemanager.cpp:1265">
<![LOG[Scan results will include all superseded updates.]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:2913">
<![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:2916">
<![LOG[Async searching of updates using WUAgent started.]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:579">
<![LOG[Async searching completed.]LOG]!><time="12:52:38.998-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4768" file="cwuahandler.cpp:2068">
<![LOG[Successfully completed scan.]LOG]!><time="12:52:39.888-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:3557">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="13:38:54.626-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="3660" file="cwuahandler.cpp:2527">
<![LOG[Removed Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="10:28:37.696-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="488" file="sourcemanager.cpp:1338">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:28:39.508-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="488" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:29:04.622-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="2368" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:42:29.805-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="3092" file="cwuahandler.cpp:2527">
<![LOG[Tried to remove an update source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) that does not exist.]LOG]!><time="10:45:25.357-120" date="10-10-2014" component="WUAHandler" context="" type="2" thread="3944" file="sourcemanager.cpp:1315">
<![LOG[Failed to Remove Update Source from WUAgent ({543A840D-5C46-4239-ADB9-17E8FC7359E5}). Error = 0x87d00691.]LOG]!><time="10:45:25.357-120" date="10-10-2014" component="WUAHandler" context="" type="3" thread="3944" file="cwuahandler.cpp:2359">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:46:37.231-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="2540" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:49:55.122-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="2128" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="11:31:03.370-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="1224" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="14:30:29.411-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3960" file="cwuahandler.cpp:2527">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="14:38:38.915-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="2844" file="sourcemanager.cpp:1232">
<![LOG[Unable to read existing resultant WUA policy. Error = 0x80070002.]LOG]!><time="14:38:38.915-60" date="01-27-2015" component="WUAHandler" context="" type="2" thread="2844" file="sourcemanager.cpp:920">
<![LOG[Enabling WUA Managed server policy to use server: HTTP://sccm.domain.com:8530]LOG]!><time="14:38:38.915-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="2844" file="sourcemanager.cpp:948">
<![LOG[Waiting for 2 mins for Group Policy to notify of WUA policy change...]LOG]!><time="14:38:39.165-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="2844" file="sourcemanager.cpp:954">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="14:40:06.416-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="5736" file="cwuahandler.cpp:2527">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="14:40:06.416-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="sourcemanager.cpp:1232">
<![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="14:40:06.447-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="sourcemanager.cpp:936">
<![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="14:40:06.462-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="sourcemanager.cpp:1265">
<![LOG[Scan results will include superseded updates only when they are superseded by service packs and definition updates.]LOG]!><time="14:40:06.478-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="cwuahandler.cpp:2909">
<![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="14:40:06.478-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="cwuahandler.cpp:2916">
<![LOG[Async searching of updates using WUAgent started.]LOG]!><time="14:40:06.494-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="cwuahandler.cpp:579">
<![LOG[Async searching completed.]LOG]!><time="14:44:15.950-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="1120" file="cwuahandler.cpp:2068">
<![LOG[Successfully completed scan.]LOG]!><time="14:44:17.325-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="6180" file="cwuahandler.cpp:3557">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="15:51:02.561-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="4008" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="12:50:50.102-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="4444" file="cwuahandler.cpp:2527">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="14:00:00.167-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="sourcemanager.cpp:1232">
<![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="14:00:00.214-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="sourcemanager.cpp:936">
<![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="14:00:00.214-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="sourcemanager.cpp:1265">
<![LOG[Scan results will include all superseded updates.]LOG]!><time="14:00:00.229-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:2913">
<![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="14:00:00.229-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:2916">
<![LOG[Async searching of updates using WUAgent started.]LOG]!><time="14:00:01.995-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:579">
<![LOG[Async searching completed.]LOG]!><time="14:00:21.979-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5076" file="cwuahandler.cpp:2068">
<![LOG[Successfully completed scan.]LOG]!><time="14:00:23.354-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:3557">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="08:12:47.409-60" date="01-30-2015" component="WUAHandler" context="" type="1" thread="5084" file="cwuahandler.cpp:2527">
Regards,
Pictop -
Windows Update Agent rebooting systems after Software Update deployment
I have a software update deployment that is configured to install software updates on a collection of servers at 4:00 AM with a suppressed reboot. The updates get deployed and no reboot occurs as expected. Then ~8 hours later WUA starts up and the
servers get rebooted.
There is a maintenance window applied to the collection from 4:00 AM to 6:00 AM to allow the updates to install.
I've read a few forum and blog posts on this issue and have implemented some settings via GPO, but the reboots are still occurring. The settings that were applied are referenced in the link below.
https://support.microsoft.com/kb/2476479?wa=wsignin1.0
Here is a snippet from the WindowsUpdate.log:
2014-10-22 12:00:26:153 1428 8a88 AU Received AU Resume timeout
2014-10-22 12:00:26:153 1428 8a88 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
2014-10-22 12:00:26:153 1428 8a88 AU Can not perform non-interactive scan if AU is interactive-only
2014-10-22 12:02:08:512 1428 8a88 AU AU received policy change subscription event
2014-10-22 12:16:43:463 1428 8a88 AU ########### AU: Uninitializing Automatic Updates ###########
2014-10-22 12:16:43:479 1428 8a88 WuTask Uninit WU Task Manager
2014-10-22 12:16:43:697 1428 8a88 Service *********
2014-10-22 12:16:43:697 1428 8a88 Service ** END ** Service: Service exit [Exit code = 0x240001]
2014-10-22 12:16:43:697 1428 8a88 Service *************
2014-10-22 12:19:29:728 1428 e584 Misc =========== Logging initialized (build: 7.8.9200.16604, tz: -0400) ===========
2014-10-22 12:19:29:728 1428 e584 Misc = Process: C:\WINDOWS\system32\svchost.exe
2014-10-22 12:19:29:728 1428 e584 Misc = Module: c:\windows\system32\wuaueng.dll
2014-10-22 12:19:29:728 1428 e584 Service *************
2014-10-22 12:19:29:728 1428 e584 Service ** START ** Service: Service startup
2014-10-22 12:19:29:728 1428 e584 Service *********
2014-10-22 12:19:29:744 1428 e584 Agent * WU client version 7.8.9200.16604
2014-10-22 12:19:29:744 1428 e584 Agent * Base directory: C:\WINDOWS\SoftwareDistribution
2014-10-22 12:19:29:744 1428 e584 Agent * Access type: No proxy
2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv4, cNetworkInterfaces = 2.
2014-10-22 12:19:29:744 1428 e584 Agent * Network state: Connected
2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv4, cNetworkInterfaces = 2.
2014-10-22 12:19:29:791 1428 e584 Agent *********** Agent: Initializing global settings cache ***********
2014-10-22 12:19:29:791 1428 e584 Agent * Endpoint Provider: 00000000-0000-0000-0000-000000000000
2014-10-22 12:19:29:791 1428 e584 Agent * WSUS server:
http://Internal-WSUS.Domain:8530
2014-10-22 12:19:29:791 1428 e584 Agent * WSUS status server:
http://Internal-WSUS.Domain:8530
2014-10-22 12:19:29:791 1428 e584 Agent * Target group: (Unassigned Computers)
2014-10-22 12:19:29:791 1428 e584 Agent * Windows Update access disabled: No
2014-10-22 12:19:29:791 1428 e584 Misc WARNING: Network Cost is assumed to be not supported as something failed with trying to get handles to wcmapi.dll
2014-10-22 12:19:29:806 1428 e584 WuTask WuTaskManager delay initialize completed successfully..
2014-10-22 12:19:29:822 1428 e584 Report CWERReporter::Init succeeded
2014-10-22 12:19:29:822 1428 e584 Agent *********** Agent: Initializing Windows Update Agent ***********
2014-10-22 12:19:29:822 1428 e584 DnldMgr Download manager restoring 0 downloads
2014-10-22 12:19:29:838 1428 e584 AU ########### AU: Initializing Automatic Updates ###########
2014-10-22 12:19:29:838 1428 e584 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
2014-10-22 12:19:29:838 1428 e584 AU AIR Mode is disabled
2014-10-22 12:19:29:838 1428 e584 AU # Policy Driven Provider:
http://Internal-WSUS.Domain:8530
2014-10-22 12:19:29:838 1428 e584 AU # Detection frequency: 22
2014-10-22 12:19:29:838 1428 e584 AU # Approval type: Disabled (User preference)
2014-10-22 12:19:29:838 1428 e584 AU # Auto-install minor updates: No (User preference)
2014-10-22 12:19:29:838 1428 e584 AU # ServiceTypeDefault: Service 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 Approval type: (Pre-install notify)
2014-10-22 12:19:29:838 1428 e584 AU # Will interact with non-admins (Non-admins are elevated (User preference))
2014-10-22 12:19:29:838 1428 e584 AU WARNING: Failed to get Wu Exemption info from NLM, assuming not exempt, error = 0x80240037
2014-10-22 12:19:29:853 1428 e584 AU AU finished delayed initialization
2014-10-22 12:19:29:884 1428 e584 AU #############
2014-10-22 12:19:29:884 1428 e584 AU ## START ## AU: Search for updates
2014-10-22 12:19:29:884 1428 e584 AU #########
2014-10-22 12:19:29:884 1428 e584 Agent SkipSelfUpdateCheck search flag set for serverId: 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782
2014-10-22 12:19:30:416 1428 e584 Report *********** Report: Initializing static reporting data ***********
2014-10-22 12:19:30:416 1428 e584 Report * OS Version = 6.2.9200.0.0.197008
2014-10-22 12:19:30:416 1428 e584 Report * OS Product Type = 0x00000008
2014-10-22 12:19:30:416 1428 e584 Report * Computer Brand = HP
2014-10-22 12:19:30:416 1428 e584 Report * Computer Model = ProLiant BL460c Gen8
2014-10-22 12:19:30:416 1428 e584 Report * Platform Role = 1
2014-10-22 12:19:30:416 1428 e584 Report * AlwaysOn/AlwaysConnected (AOAC) = 0
2014-10-22 12:19:30:431 1428 e584 Report * Bios Revision = I31
2014-10-22 12:19:30:431 1428 e584 Report * Bios Name = Default System BIOS
2014-10-22 12:19:30:431 1428 e584 Report * Bios Release Date = 2014-02-10T00:00:00
2014-10-22 12:19:30:431 1428 e584 Report * Bios Sku Number = 641016-B21
2014-10-22 12:19:30:431 1428 e584 Report * Bios Vendor = HP
2014-10-22 12:19:30:431 1428 e584 Report * Bios Family = ProLiant
2014-10-22 12:19:30:431 1428 e584 Report * Bios Major Release = 255
2014-10-22 12:19:30:431 1428 e584 Report * Bios Minor Release = 255
2014-10-22 12:19:30:431 1428 e584 Report * Locale ID = 1033
2014-10-22 12:19:30:431 1428 e584 AU <<## SUBMITTED ## AU: Search for updates [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:30:431 1428 dae0 Agent *************
2014-10-22 12:19:30:431 1428 dae0 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-10-22 12:19:30:431 1428 dae0 Agent *********
2014-10-22 12:19:30:431 1428 dae0 Agent * Online = No; Ignore download priority = No
2014-10-22 12:19:30:431 1428 dae0 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-10-22 12:19:30:431 1428 dae0 Agent * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
2014-10-22 12:19:30:431 1428 dae0 Agent * Search Scope = {Machine & All Users}
2014-10-22 12:19:30:431 1428 dae0 Agent * Caller SID for Applicability: S-1-5-18
2014-10-22 12:19:30:494 1428 dae0 Agent * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
2014-10-22 12:19:30:494 1428 dae0 Agent *********
2014-10-22 12:19:30:494 1428 dae0 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-10-22 12:19:30:494 1428 dae0 Agent *************
2014-10-22 12:19:30:509 1428 d158 AU >>## RESUMED ## AU: Search for updates [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:30:509 1428 d158 AU # 0 updates detected
2014-10-22 12:19:30:509 1428 d158 AU #########
2014-10-22 12:19:30:509 1428 d158 AU ## END ## AU: Search for updates [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:30:509 1428 d158 AU #############
2014-10-22 12:19:30:509 1428 d158 AU All AU searches complete.
2014-10-22 12:19:30:525 1428 e584 AU #############
2014-10-22 12:19:30:525 1428 e584 AU ## START ## AU: Search for updates
2014-10-22 12:19:30:525 1428 e584 AU #########
2014-10-22 12:19:30:525 1428 e584 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
2014-10-22 12:19:30:525 1428 e584 Agent SkipSelfUpdateCheck search flag set for serverId: 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782
2014-10-22 12:19:30:525 1428 e584 AU <<## SUBMITTED ## AU: Search for updates [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:30:525 1428 dae0 Agent *************
2014-10-22 12:19:30:525 1428 dae0 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-10-22 12:19:30:525 1428 dae0 Agent *********
2014-10-22 12:19:30:525 1428 dae0 Agent * Online = Yes; Ignore download priority = No
2014-10-22 12:19:30:525 1428 dae0 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-10-22 12:19:30:525 1428 dae0 Agent * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
2014-10-22 12:19:30:525 1428 dae0 Agent * Search Scope = {Machine & All Users}
2014-10-22 12:19:30:525 1428 dae0 Agent * Caller SID for Applicability: S-1-5-18
2014-10-22 12:19:30:525 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\wuredir.cab:
2014-10-22 12:19:30:541 1428 dae0 Misc Microsoft signed: Yes
2014-10-22 12:19:30:541 1428 dae0 Misc Infrastructure signed: Yes
2014-10-22 12:19:30:556 1428 dae0 EP Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: "http://fe2.ws.microsoft.com/w81/2/redir/v2-storeauth.cab"
2014-10-22 12:19:30:588 1428 dae0 Agent Checking for updated auth cab for service 117cab2d-82b1-4b5a-a08c-4d62dbee7782 at
http://fe2.ws.microsoft.com/w81/2/redir/v2-storeauth.cab
2014-10-22 12:19:30:588 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\117cab2d-82b1-4b5a-a08c-4d62dbee7782.cab:
2014-10-22 12:19:30:603 1428 dae0 Misc Microsoft signed: Yes
2014-10-22 12:19:30:603 1428 dae0 Misc Infrastructure signed: Yes
2014-10-22 12:19:30:775 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\117cab2d-82b1-4b5a-a08c-4d62dbee7782.cab:
2014-10-22 12:19:30:791 1428 dae0 Misc Microsoft signed: Yes
2014-10-22 12:19:30:791 1428 dae0 Misc Infrastructure signed: Yes
2014-10-22 12:19:30:791 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\WuRedir\117CAB2D-82B1-4B5A-A08C-4D62DBEE7782\wuredir.cab:
2014-10-22 12:19:30:806 1428 dae0 Misc Microsoft signed: Yes
2014-10-22 12:19:30:806 1428 dae0 Misc Infrastructure signed: Yes
2014-10-22 12:19:30:822 1428 dae0 EP Got 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 redir Client/Server URL: "https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx"
2014-10-22 12:19:30:978 1428 dae0 PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-10-22 12:19:30:978 1428 dae0 PT + ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}, Server URL =
https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx
2014-10-22 12:19:31:025 1428 dae0 Agent * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
2014-10-22 12:19:31:025 1428 dae0 Agent *********
2014-10-22 12:19:31:025 1428 dae0 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-10-22 12:19:31:025 1428 dae0 Agent *************
2014-10-22 12:19:31:025 1428 d158 AU >>## RESUMED ## AU: Search for updates [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:31:025 1428 d158 AU # 0 updates detected
2014-10-22 12:19:31:025 1428 d158 AU #########
2014-10-22 12:19:31:025 1428 d158 AU ## END ## AU: Search for updates [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:31:025 1428 d158 AU #############
2014-10-22 12:19:31:025 1428 d158 AU All AU searches complete.
2014-10-22 12:19:31:025 1428 d158 AU AU setting next detection timeout to 2014-10-23 14:19:28
2014-10-22 12:19:36:025 1428 e214 Report REPORT EVENT: {E04012FD-8FFD-4259-96D5-A5A34127F0A0} 2014-10-22 12:19:31:025-0400 1 147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software
Synchronization Windows Update Client successfully detected 0 updates.
2014-10-22 12:19:36:025 1428 e214 Report CWERReporter finishing event handling. (00000000)
2014-10-22 12:29:29:914 1428 e584 AU AU invoking RebootSystem (OnRebootNow)
2014-10-22 12:29:30:055 1428 e584 AU Allowing auto firmware installs at next shutdown
2014-10-22 12:29:30:102 1428 e584 Misc WARNING: SUS Client is rebooting system.
2014-10-22 12:29:30:102 1428 e584 AU AU invoking RebootSystem (OnRebootRetry)
2014-10-22 12:29:30:367 1428 e584 Shutdwn Checking to see whether install at shutdown is appropriate
2014-10-22 12:29:30:367 1428 e584 Shutdwn user declined update at shutdown
2014-10-22 12:29:30:367 1428 e584 AU AU initiates service shutdown
2014-10-22 12:29:30:367 1428 e584 AU ########### AU: Uninitializing Automatic Updates ###########
2014-10-22 12:29:30:399 1428 e584 WuTask Uninit WU Task Manager
2014-10-22 12:29:30:445 1428 e584 Agent Sending shutdown notification to client
2014-10-22 12:29:30:445 5788 8084 COMAPI WARNING: Received service shutdown/self-update notification.
2014-10-22 12:29:30:461 1428 e584 Report CWERReporter finishing event handling. (00000000)
2014-10-22 12:29:30:539 1428 e584 Service *********
2014-10-22 12:29:30:539 1428 e584 Service ** END ** Service: Service exit [Exit code = 0x240001]
2014-10-22 12:29:30:539 1428 e584 Service *************
Any assistance is appreciated.
-TimHi,
Any update?
Best Regards,
Joyce
We
are trying to better understand customer views on social support experience, so your participation in this
interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place. -
80246002 error after installing Windows Update Agent 7.6.7600.320
This problem prevents Windows Update from being able to search, download, and install updates.
I am experiencing this issue on machines running Server 2008 R2 and Windows 7 Enterprise (I imagine this an issue with Windows Update and not the OS so this is probably affecting other OS' as well).
This problem is becoming widespread quickly.
The proposed fix (method 1) in the article below did not resolve the problem:
http://support.microsoft.com/kb/958056/en-us
Note: Method 2 is not viable when applying more than one update at a time especially when you are updating multiple machines.
Several others are posting similar problems:
http://windowsitpro.com/windows-update/tracking-error-80246002-windows-update-problem
http://forums.techguy.org/windows-7/1132320-windows-update-problems-4.html
This is preventing scheduled server maintenance from being performed.
Could this be a targeted attack? Happening at the end of the week before a long holiday weekend is not leaving me with a very good feeling...
I would hope that fixing this issue would be a very high priority.
BTW - There is no "Windows Update Issue" forum category that I could find - If there is, sorry for posting in the wrong area.
Cheers,
JeffMy fix that worked...
Reviewed the operational log for the WindowsUpdateClient (buried in the Event viewer here:
Application and Services Logs -> Microsoft -> Windows -> WindowsUpdateClient -> Operational
After review, I noticed that event 30 "Windows Updates established connectivity" was no longer occurring and that event 42 "There has been a change in the health of Windows Update" was the only thing after the error (Event 25 "Windows Update failed
to check for updates with error 0x80246002")
Even though the machine was restarted after applying the "Windows Update Agent 7.6.7600.320" patch and I had tried restarting the Windows Update service, the service appears to be hung.
Solution:
1.) restart the Windows update service
2.) monitor the operational log for the WindowsUpdateClient (refreshing every 5-10 seconds)
3.) verify that event 30 happens (you should see event 38 after restarting the service followed by (2) event 42, then event 30)
4.) Once event 30 happens go to the Windows update GUI and run the "Check for updates" - yay!
5.) You can go back into the operational log and see event 26 "Windows Update successfully found x updates" followed by an event 40 for each update found.
What is really strange is that I checked the first machine that experienced the problem and it magically fixed itself.
It seems like this may have been caused by DDOS attack on the source for windows updates that the Windows Update service connects to. Or the source location was having maintenance performed.
Regardless, in my case, this was not a problem with the OS or the patch but the inability for the Windows Update Service to establish connectivity.
Hope that helps somebody :)
Cheers,
Jeff
Maybe you are looking for
-
We are planning a upgrade of a SP2010 farm to 2013. There has been a bit of customization so we wish to run the old sites on the new SP2013 platform in SP2010 compatibility mode. So my question is will Office Web Apps Server 2013 work with the old si
-
How to find out the SET PARAMETER ID for FB02 transaction
hi masters, i m working on a alv report and in that i have to make a BELNR field as a interactive field. i m using the 'user command' for this. FORM user_command USING ucomm TYPE sy-ucomm selfield TYPE slis_selfield. IF selfield
-
I just got my new Mac Pro. It comes with (2) 1G sticks of DDR2 RAM. I bought (4) 2G sticks of DDR2 RAM from OWC to put in it. Can I just add my 2G sticks and keep the 1G sticks in, or do they all have to be the same size? I spoke with 2 different App
-
Display multiple personal no in abap hr
Hi experts, I have a requirement in ABAP HR. Existing functionality is like this.when i execute my report it will display single personal no in blocked list. like in first block it will display employee earning details, in second block it will displa
-
Which paragraph style options break TOC generation?
Hi, I've had a problem with generating tables of contents in InDesign CS3 and which persists in InDesign CS4. After much experimenting I've learned that there's something in the paragraph style settings for the headings I want to include in a TOC tha