Update agent?
Hi there,
After upgrading the server to SP1 I want to update the agent version on all our clients
11.0.0.40909 to 11.1.0.10447
How is that accomplished and would it make a difference unless you run RHEL6? I mean the new version is perhaps only for rhel6
I tried to update the agent from http://serverort/zenworks-setup
but I guess its the old version of the agent
sles0222:/tmp # ./PreAgentPkg_AgentLinuxComplete.bin
Starting the installation...
Checking pre-requisites...
Error :Exiting the installation as this device already has ZENworks agent installed.
Cleaning up the installation files...
The ZENworks Adaptive Agent has been successfully installed.
Similar Messages
-
Hi All,
Is there a way to import the latest Windows Update Agent into WSUS and therefore all 3000 machines that connect to WSUS get the update?
Reason this has cropped up is because I want to update all machines to IE9 from IE8. Have approved Internet Explorer 9 in WSUS. Some machines have updated ok. Others wont update and clicking on Check for updates (where it checks WSUS) tells me there are
no updates to install. If I 'Check for Updates from Microsoft Online' it immediately tells me that the machine needs an update. The update that gets installed is Windows Update Agent 7.6.7600.320 which is fine except that means each user will have
to download the update from MS Update and I want WSUS to do it like it does every other Critical and Important update. Does anyone know the KB number I should be looking for or what I need to import from the Catalogue into WSUS so the Update Agent is deployed
to all machines. All machines are Windows 7 SP1 32bit. There must be a way otherwise machines are going to be stuck on IE8 and also not receive any future Win 7 updates from WSUS.
I know IE8 is old and so is IE9 but due to various NHS systems out there some only support IE8 or 9. Tragic I know.
Thanks
RichThe proper way to distribute the latest WUA (.320) to the clients in a WSUS administered environment, is to update the WSUS server(s) with this update:
An update to harden Windows Server Update Services
then the clients WUA will be selfupdated when they connect to the WSUS server.
Rolf Lidvall, Swedish Radio (Ltd) -
[SCCM 2012 R2] Windows Update Agent do not scan correctly thus SCCM has bad reports
Hi All,
My colleagues reported that after manual download and installation of update Office 2010 SP2 ... SCCM still do not report as Installed:
https://support.microsoft.com/en-us/kb/2687455
KB2687455 update on SCCM is reported as:
Update ID: 9c5e43a3-3ae9-434d-b105-a9d7902d5f9f
Update Title: Service Pack 2 for Microsoft Office 2010 (KB2687455) 32-Bit Edition
Test Computer:
After investigation I found out that Windows Update Agent (verbose logging) is reporting that this update is really not installed: Agent Update {9C5E43A3-3AE9-434D-B105-A9D7902D5F9F} is deployed for scan, and is installable. It will be reported
as installable.
Update KB2687455 is shown in Programs and Features/Installed Updates as installed on this computer.
Question:
This update is MSP (not standard update) so it cannot be queried by win32_quickfixengineering WMI class. How to query all installed updates on system (registry, API, ...)?
How WUA query ALL installed updates?
Thank you in advance.
Regards,Hi,
You could check the version number. The version number of Office 2010 SP2 is greater than or equal to
14.0.7015.1000.
The script in the blog below could get List of installed Windows / office Updates.
http://www.blackforce.co.uk/2013/01/27/get-list-of-installed-windows-office-updates-command-line
The sample in the following article can be used to determine if a critical security update is installed on a computer. If the update isn't installed, the user can ensure that the update is downloaded and installed. The user can also ensure that
they are notified about the status of the installation.
https://msdn.microsoft.com/en-us/library/windows/desktop/aa387101(v=vs.85).aspx
Note: Microsoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft
does not guarantee the accuracy of this third-party contact information.
Best Regards,
Joyce
Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected] -
Windows update requesting to install Windows Update Agent 7.6.7600.320
I received this today when trying to manually scan for available updates via the windows update in control panel. It shows message as below. Seems that it will install the latest Windows Update Agent 7.6.7600.320. Will this machine able to get any patch
deployed via SCCM if the WUA is not updated to the latest version?I can't say I've heard of any widespread issues with this version of the WUA so YMMV as always. If you do have an issue, you should contact CSS though.
As for it being pushed automatically, that's correct and is no different than past WUA agent updates. It is considered an infrastructure update and is thus automatically installed via Windows Update or WSUS regardless of your client update settings unless
you've actually disabled the WUA via group policy (not the service though) -- this includes ConfigMgr also because ConfigMgr does not in way pre-empt WSUS and leverages WSUS behind the scenes.
Jason | http://blog.configmgrftw.com | @jasonsandys -
[Windows 7] Windows Update Agent does not scan correctly
Hi All,
After manual installation of update Office 2010 SP2 (KB2687455) ... WUA does not report (KB2687455)
as Installed:
https://support.microsoft.com/en-us/kb/2687455
KB2687455 update is reported as:
Update ID: 9c5e43a3-3ae9-434d-b105-a9d7902d5f9f
Update Title: Service Pack 2 for Microsoft Office 2010 (KB2687455) 32-Bit Edition
MSI Product: {90140000-0015-0409-0000-0000000FF1CE}
MSI Patch: {D6A2CD7F-C90C-4B90-BBA7-2BADE2E08610}
After investigation I found out that Windows Update Agent (verbose logging) is reporting this update as not installed:
EEHndlr MSI PatchInfo for product {90140000-0015-0409-0000-0000000FF1CE} and patch {D6A2CD7F-C90C-4B90-BBA7-2BADE2E08610} returned 0x8007066f with state ''
EEHndlr MSI PatchInfo for product {90140000-0015-0409-0000-0000000FF1CE} and patch {D6A2CD7F-C90C-4B90-BBA7-2BADE2E08610} returned 'Unknown Patch'
Perf, PatchStateForProduct, time, 4, patch, primary, {D6A2CD7F-C90C-4B90-BBA7-2BADE2E08610}, product, {90140000-0015-0409-0000-0000000FF1CE}, context, 112456208
Agent Update {9C5E43A3-3AE9-434D-B105-A9D7902D5F9F} is deployed for scan, and is installable. It will be reported as
installable.
Update KB2687455 is shown in Programs and Features/Installed Updates as installed on this computer.
Question:
This update is MSP (not standard update) so it cannot be queried by win32_quickfixengineering WMI class. How to query all installed updates on system (registry, API, ...)?
How WUA query ALL installed updates?
How to fix this issue?
Thank you in advance.
Regards,Hi,
You could check the version number. The version number of Office 2010 SP2 is greater than or equal to
14.0.7015.1000.
The script in the blog below could get List of installed Windows / office Updates.
http://www.blackforce.co.uk/2013/01/27/get-list-of-installed-windows-office-updates-command-line
The sample in the following article can be used to determine if a critical security update is installed on a computer. If the update isn't installed, the user can ensure that the update is downloaded and installed. The user can also ensure that
they are notified about the status of the installation.
https://msdn.microsoft.com/en-us/library/windows/desktop/aa387101(v=vs.85).aspx
Note: Microsoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft
does not guarantee the accuracy of this third-party contact information.
Best Regards,
Joyce
Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected] -
Some computers download and install the two approved updates, others only download Windows Update Agent and not the approved updates.
UN-successful Windows Update Log:
2014-05-07 09:33:56:180
1036 e70
Misc =========== Logging initialized (build: 7.6.7600.256, tz: -0400) ===========
2014-05-07 09:33:56:220
1036 e70
Misc = Process: C:\Windows\system32\svchost.exe
2014-05-07 09:33:56:221
1036 e70
Misc = Module: c:\windows\system32\wuaueng.dll
2014-05-07 09:33:56:180
1036 e70
Service *************
2014-05-07 09:33:56:221
1036 e70
Service ** START ** Service: Service startup
2014-05-07 09:33:56:222
1036 e70
Service *********
2014-05-07 09:33:56:544
1036 e70
Agent * WU client version 7.6.7600.256
2014-05-07 09:33:56:545
1036 e70
Agent * Base directory: C:\Windows\SoftwareDistribution
2014-05-07 09:33:56:546
1036 e70
Agent * Access type: No proxy
2014-05-07 09:33:56:547
1036 e70
Agent * Network state: Connected
2014-05-07 09:33:57:315
1036 e70
Setup Service restarting after SelfUpdate
2014-05-07 09:33:57:545
1036 e70
Setup Client version: Core: 7.6.7600.256 Aux: 7.6.7600.256
2014-05-07 09:33:57:592
1036 e70
Report CWERReporter::Init succeeded
2014-05-07 09:33:58:326
1036 e70
Report *********** Report: Initializing static reporting data ***********
2014-05-07 09:33:58:376
1036 e70
Report * OS Version = 6.1.7601.1.0.65792
2014-05-07 09:33:58:376
1036 e70
Report * OS Product Type = 0x00000030
2014-05-07 09:33:58:394
1036 e70
Report * Computer Brand = Hewlett-Packard
2014-05-07 09:33:58:444
1036 e70
Report * Computer Model = HP Compaq 4000 Pro SFF PC
2014-05-07 09:33:58:455
1036 e70
Report * Bios Revision = 786H7 v02.00
2014-05-07 09:33:58:504
1036 e70
Report * Bios Name = Default System BIOS
2014-05-07 09:33:58:554
1036 e70
Report * Bios Release Date = 2011-01-31T00:00:00
2014-05-07 09:33:58:554
1036 e70
Report * Locale ID = 1033
2014-05-07 09:34:03:562
1036 f08
Report REPORT EVENT: {082D455B-6E51-4238-A997-1D27D9214A72}
2014-05-07 09:33:58:565-0400 1
199 101
{0011B9ED-9189-4D58-BE25-FA2F13FC3D6C}
1 240005
SelfUpdate Success
Content Install Installation successful and restart required for the following update: Windows Update Aux
2014-05-07 09:34:03:614
1036 f08
Report CWERReporter finishing event handling. (00000000)
2014-05-07 09:34:42:049
1036 e70
Agent *********** Agent: Initializing Windows Update Agent ***********
2014-05-07 09:34:42:049
1036 e70
Agent *********** Agent: Initializing global settings cache ***********
2014-05-07 09:34:42:049
1036 e70
Agent * WSUS server: http://csd26.csd.local:80
2014-05-07 09:34:42:049
1036 e70
Agent * WSUS status server: http://csd26.csd.local:80
2014-05-07 09:34:42:049
1036 e70
Agent * Target group: CO
2014-05-07 09:34:42:049
1036 e70
Agent * Windows Update access disabled: No
2014-05-07 09:34:42:063
1036 e70
DnldMgr Download manager restoring 0 downloads
2014-05-07 09:34:42:089
1036 e70
AU ########### AU: Initializing Automatic Updates ###########
2014-05-07 09:34:42:089
1036 e70
AU AU setting next detection timeout to 2014-05-07 13:34:42
2014-05-07 09:34:42:090
1036 e70
AU AU setting next sqm report timeout to 2014-05-07 13:34:42
2014-05-07 09:34:42:090
1036 e70
AU # WSUS server: http://csd26.csd.local:80
2014-05-07 09:34:42:090
1036 e70
AU # Detection frequency: 22
2014-05-07 09:34:42:090
1036 e70
AU # Target group: CO
2014-05-07 09:34:42:090
1036 e70
AU # Approval type: Scheduled (Policy)
2014-05-07 09:34:42:090
1036 e70
AU # Scheduled install day/time: Every day at 3:00
2014-05-07 09:34:42:090
1036 e70
AU # Auto-install minor updates: Yes (User preference)
2014-05-07 09:34:42:105
1036 e70
AU Initializing featured updates
2014-05-07 09:34:42:116
1036 e70
AU Found 0 cached featured updates
2014-05-07 09:34:42:116
1036 e70
AU Successfully wrote event for AU health state:0
2014-05-07 09:34:42:117
1036 e70
AU Successfully wrote event for AU health state:0
2014-05-07 09:34:42:117
1036 e70
AU AU finished delayed initialization
2014-05-07 09:34:42:117
1036 e70
AU AU setting next sqm report timeout to 2014-05-08 13:34:42
2014-05-07 09:34:42:117
1036 e70
AU #############
2014-05-07 09:34:42:117
1036 e70
AU ## START ## AU: Search for updates
2014-05-07 09:34:42:117
1036 e70
AU #########
2014-05-07 09:34:42:291
1036 e70
AU <<## SUBMITTED ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
2014-05-07 09:34:42:341
1036 f08
Agent *************
2014-05-07 09:34:42:341
1036 f08
Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-05-07 09:34:42:341
1036 f08
Agent *********
2014-05-07 09:34:42:341
1036 f08
Agent * Online = Yes; Ignore download priority = No
2014-05-07 09:34:42:341
1036 f08
Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0
and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-05-07 09:34:42:341
1036 f08
Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-05-07 09:34:42:341
1036 f08
Agent * Search Scope = {Machine}
2014-05-07 09:34:42:341
1036 f08
Setup Checking for agent SelfUpdate
2014-05-07 09:34:42:342
1036 f08
Setup Client version: Core: 7.6.7600.256 Aux: 7.6.7600.256
2014-05-07 09:34:42:349
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-05-07 09:34:42:392
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:669
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
2014-05-07 09:34:44:676
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:754
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-05-07 09:34:44:777
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:781
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
2014-05-07 09:34:44:788
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:837
1036 f08
Setup Determining whether a new setup handler needs to be downloaded
2014-05-07 09:34:44:855
1036 f08
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe:
2014-05-07 09:34:44:862
1036 f08
Misc Microsoft signed: Yes
2014-05-07 09:34:44:862
1036 f08
Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe are not trusted: Error 0x800b0001
2014-05-07 09:34:44:862
1036 f08
Setup WARNING: Trust verification failed for WuSetupV.exe. It will be deleted and downloaded, error = 0x800B0001
2014-05-07 09:34:44:863
1036 f08
Setup SelfUpdate handler update required: Current version: 7.6.7600.256, required version: 7.6.7600.256
2014-05-07 09:34:44:873
1036 f08
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256"
2014-05-07 09:34:44:932
1036 f08
Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
2014-05-07 09:34:44:933
1036 f08
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
2014-05-07 09:34:45:048
1036 f08
Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
2014-05-07 09:34:45:048
1036 f08
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
2014-05-07 09:34:45:234
1036 f08
Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
2014-05-07 09:34:45:235
1036 f08
Setup SelfUpdate check completed. SelfUpdate is NOT required.
2014-05-07 09:34:48:415
1036 f08
PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-05-07 09:34:48:415
1036 f08
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://csd26.csd.local:80/ClientWebService/client.asmx
2014-05-07 09:34:48:424
1036 f08
PT WARNING: Cached cookie has expired or new PID is available
2014-05-07 09:34:48:424
1036 f08
PT Initializing simple targeting cookie, clientId = 97287ab2-5824-44d2-bf93-8a98da659f77, target group = CO, DNS name = c18714.csd.local
2014-05-07 09:34:48:424
1036 f08
PT Server URL = http://csd26.csd.local:80/SimpleAuthWebService/SimpleAuth.asmx
2014-05-07 09:34:48:454
1036 f08
PT WARNING: GetCookie failure, error = 0x8024400D, soap client error = 7, soap error code = 300, HTTP status code = 200
2014-05-07 09:34:48:454
1036 f08
PT WARNING: SOAP Fault: 0x00012c
2014-05-07 09:34:48:454
1036 f08
PT WARNING: faultstring:Fault occurred
2014-05-07 09:34:48:454
1036 f08
PT WARNING: ErrorCode:ConfigChanged(2)
2014-05-07 09:34:48:454
1036 f08
PT WARNING: Message:(null)
2014-05-07 09:34:48:454
1036 f08
PT WARNING: Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetCookie"
2014-05-07 09:34:48:454
1036 f08
PT WARNING: ID:cb5babad-3a1d-4e6b-946e-736ed4746e3f
2014-05-07 09:34:48:464
1036 f08
PT WARNING: Cached cookie has expired or new PID is available
2014-05-07 09:34:48:464
1036 f08
PT Initializing simple targeting cookie, clientId = 97287ab2-5824-44d2-bf93-8a98da659f77, target group = CO, DNS name = c18714.csd.local
2014-05-07 09:34:48:464
1036 f08
PT Server URL = http://csd26.csd.local:80/SimpleAuthWebService/SimpleAuth.asmx
2014-05-07 09:35:06:497
1036 e70
AU Forced install timer expired for scheduled install
2014-05-07 09:35:06:497
1036 e70
AU UpdateDownloadProperties: 0 download(s) are still in progress.
2014-05-07 09:35:06:497
1036 e70
AU Setting AU scheduled install time to 2014-05-08 07:00:00
2014-05-07 09:35:06:498
1036 e70
AU Successfully wrote event for AU health state:0
2014-05-07 09:35:14:236
1036 f08
PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2014-05-07 09:35:14:236
1036 f08
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://csd26.csd.local:80/ClientWebService/client.asmx
2014-05-07 09:35:20:118
1036 f08
Agent * Found 0 updates and 79 categories in search; evaluated appl. rules of 859 out of 1494 deployed entities
2014-05-07 09:35:20:194
1036 f08
Agent *********
2014-05-07 09:35:20:194
1036 f08
Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-05-07 09:35:20:194
1036 f08
Agent *************
2014-05-07 09:35:20:209
1036 f08
Report CWERReporter finishing event handling. (00000000)
2014-05-07 09:35:20:209
1036 f08
Report CWERReporter finishing event handling. (00000000)
2014-05-07 09:35:20:209
1036 bb8
AU >>## RESUMED ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
2014-05-07 09:35:20:209
1036 bb8
AU # 0 updates detected
2014-05-07 09:35:20:209
1036 bb8
AU #########
2014-05-07 09:35:20:209
1036 bb8
AU ## END ## AU: Search for updates [CallId = {5AA2F00A-8964-4543-A740-EC45C5FD5752}]
2014-05-07 09:35:20:209
1036 bb8
AU #############
2014-05-07 09:35:20:210
1036 bb8
AU Successfully wrote event for AU health state:0
2014-05-07 09:35:20:210
1036 bb8
AU Featured notifications is disabled.
2014-05-07 09:35:20:211
1036 bb8
AU AU setting next detection timeout to 2014-05-08 11:19:46
2014-05-07 09:35:20:211
1036 bb8
AU Setting AU scheduled install time to 2014-05-08 07:00:00
2014-05-07 09:35:20:212
1036 bb8
AU Successfully wrote event for AU health state:0
2014-05-07 09:35:20:212
1036 bb8
AU Successfully wrote event for AU health state:0
2014-05-07 09:35:25:183
1036 f08
Report REPORT EVENT: {C1B39107-F517-4477-AAE3-9B1F1D6002BF}
2014-05-07 09:35:20:193-0400 1
147 101
{00000000-0000-0000-0000-000000000000}
0 0 AutomaticUpdates
Success Software Synchronization
Windows Update Client successfully detected 0 updates.
2014-05-07 09:35:25:183
1036 f08
Report REPORT EVENT: {669B9537-BB71-4190-BA58-A97F725AE4D8}
2014-05-07 09:35:20:194-0400 1
156 101
{00000000-0000-0000-0000-000000000000}
0 0 AutomaticUpdates
Success Pre-Deployment Check
Reporting client status.
2014-05-07 09:35:25:184
1036 f08
Report CWERReporter finishing event handling. (00000000)
2014-05-07 09:37:32:440
1036 f08
Report Uploading 3 events using cached cookie, reporting URL = http://csd26.csd.local:80/ReportingWebService/ReportingWebService.asmx
2014-05-07 09:37:32:454
1036 f08
Report Reporter successfully uploaded 3 events. -
MBSA Windows Update Agent installation
I'm implementing MBSA on our domain. I've worked through the various firewall issues, etc. Next I received a Security Update Scan Result that "Computer has an older version of the client and security database demands a newer
version. Current version is and minmum required version is ." This is pasted directly from the screen. It appears information is missing from the message.
Based on research of the message, I reran the scan with the "Configure computers for Microsoft Update and scanning prerequisites" option selected. Then I get the result "Windows Update Agent installation succeeded.Restart
the target computer to have Windows Update Agent updated completely." Scanning the computer after a restart just repeats the same results. Looking in the WindowsUpdate.log on the target computer, there are messages stating that 3
CBS packages were evaluated and that each is not applicable. "WUESTUP has finished. Exit code is 0. Reboot is NOT needed." I have checked and the
wuaueng.dll version is 7.6.7600.256, which I believe is the latest.
I have seen this result on multiple Windows 7 computers I have tested. None have worked so far. What is causing MBSA to report one thing and the target to indicate something else?
Ken Kemp Eddy County, NM ITAt this point, no. Since I didn't turn up an answer here, I've had to set this aside for more pressing matters. I hope to get back to it at some point soon.
If you are fortunate enough to find an answer, please be sure to share it here.
Ken Kemp Eddy County, NM IT -
Intermittent Scan issues for Update Agent
I am having an issue with SUP/WSUS that I am hoping someone can point me on the right direction on..
The environment is:
SCCM 2012 R2 Primary Site Server on Server 2012 R2 Update
SQL 2012 SP1 on Server 2012 R2 Update (standalone server) that houses the SCCM DB and the WSUS DB.
Software Update Point is on Server 2012 R2 Update (standalone) with WSUS roll installed. WSUS is configured for SSL (with "requires ssl" checked on the role) and using port 8531.
No issues with the SUP install. The SUP is synchronizing just fine with Microsoft and I am able manage update objects in the SCCM Admin console (create update groups, ADR's, etc.)
WSUSCtrl.log:
Checking for supported version of WSUS (min WSUS 3.0 SP2 + KB2720211 + KB2734608)
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Checking runtime v2.0.50727... SMS_WSUS_CONTROL_MANAGER
5/27/2014 2:16:03 PM 3304 (0x0CE8)
Did not find supported version of assembly Microsoft.UpdateServices.Administration.
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Checking runtime v4.0.30319... SMS_WSUS_CONTROL_MANAGER
5/27/2014 2:16:03 PM 3304 (0x0CE8)
Found supported assembly Microsoft.UpdateServices.Administration version 4.0.0.0, file version 6.3.9600.16384
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Found supported assembly Microsoft.UpdateServices.BaseApi version 4.0.0.0, file version 6.3.9600.16384
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Supported WSUS version found SMS_WSUS_CONTROL_MANAGER
5/27/2014 2:16:03 PM 3304 (0x0CE8)
Attempting connection to local WSUS server
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Successfully connected to local WSUS server
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
No changes - local WSUS Server Proxy settings are correctly configured as Proxy Name and Proxy Port 80
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Attempting connection to local WSUS server
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Successfully connected to local WSUS server
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
There are no unhealthy WSUS Server components on WSUS Server SERVER.SUBDOMAIN.DOMAIN.ORG
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
Successfully checked database connection on WSUS server SERVER.SUBDOMAIN.DOMAIN.ORG
SMS_WSUS_CONTROL_MANAGER 5/27/2014 2:16:03 PM
3304 (0x0CE8)
The clients are getting the local policy pointing it to the correct URL. This is also verified in the log:
LocationServices.log:
Current AD site of machine is EWJ LocationServices
5/27/2014 1:45:41 PM 4236 (0x108C)
Created and Sent Location Request '{3ABC15E0-70D3-4AE6-991C-B6BAF165C808}' for package {729742E6-9B66-4516-8A69-8569560D88C7}
LocationServices 5/27/2014 1:45:41 PM
4236 (0x108C)
Calling back with the following WSUS locations
LocationServices 5/27/2014 1:45:41 PM
4236 (0x108C)
WSUS Path='https://server.subdomain.domain.org:8531', Server='server.subdomain.domain.org', Version='10'
LocationServices 5/27/2014 1:45:41 PM
4236 (0x108C)
Calling back with locations for WSUS request {3ABC15E0-70D3-4AE6-991C-B6BAF165C808}
LocationServices 5/27/2014 1:45:41 PM
4236 (0x108C)
The issue comes into play in the fact that what appears to be about 85-90% of the time, the client scan cycle fails with error 0x80244004. This is both Windows 7 x86/64 Pro and Windows XP SP3. The error translates to:
Same as SOAPCLIENT_CONNECT_ERROR - SOAP client failed to connect to the server.
Source: Windows Update Agent
The REALLY bizarre thing is that the OS's are inverted on their failure rates. Win 7 fails 85-90% of the time, where as Win XP succeeds 85-90% of the time.
We completely rebuilt the SUP Server (including OS and reconfigured it again for SSL) and alas the issue remains.
Here's some snippets from the logs files from a machine when it fails:
ScanAgent.log
Message received: '<?xml version='1.0' ?>
<UpdateSourceMessage MessageType='ScanByUpdateSource'>
<ForceScan>TRUE</ForceScan>
<UpdateSourceIDs>
<ID>{729742E6-9B66-4516-8A69-8569560D88C7}
</ID>
</UpdateSourceIDs>
</UpdateSourceMessage>'
ScanAgent
5/27/2014 1:45:41 PM 4236 (0x108C)
*****ScanByUpdateSource request received with ForceReScan=2, ScanOptions=0x0000000a, WSUSLocationTimeout = 604800
ScanAgent 5/27/2014 1:45:41 PM
4236 (0x108C)
Sources are current, but Invalid. TTL is also invalid.
ScanAgent 5/27/2014 1:45:41 PM
4236 (0x108C)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): - - - - - -Locations requested for ScanJobID={DDFF8212-94D4-4BDC-8A47-41E203F6AD79} (LocationRequestID={3ABC15E0-70D3-4AE6-991C-B6BAF165C808}), will process the scan request once locations are available.
ScanAgent 5/27/2014 1:45:41 PM
4236 (0x108C)
*****WSUSLocationUpdate received for location request guid={3ABC15E0-70D3-4AE6-991C-B6BAF165C808}
ScanAgent 5/27/2014 1:45:41 PM
4236 (0x108C)
Sources are current, but Invalid. TTL is also invalid.
ScanAgent 5/27/2014 1:45:41 PM
2216 (0x08A8)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJob::OnScanComplete -Scan Failed with Error=0x80244004
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJob::ScheduleScanRetry- ScanRetry Timer task successfully scheduled. Will wake up in next 1800 seconds
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJob::OnScanComplete - Scan Retry successfully scheduled
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
ScanJob({DDFF8212-94D4-4BDC-8A47-41E203F6AD79}): CScanJobManager::OnScanComplete- Scan has failed, scan request will be pending for scan retry cycle.
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
CScanAgent::ScanCompleteCallback - failed at OnScanComplete with error=0x87d00631
ScanAgent 5/27/2014 1:45:44 PM
4236 (0x108C)
WindowsUpdate.log:
2014-05-27 13:45:41:482
2956 8a8
COMAPI -------------
2014-05-27 13:45:41:482
2956 8a8
COMAPI -- START -- COMAPI: Search [ClientId = CcmExec]
2014-05-27 13:45:41:482
2956 8a8
COMAPI ---------
2014-05-27 13:45:41:497
936 ed4
Agent *************
2014-05-27 13:45:41:497
936 ed4
Agent ** START ** Agent: Finding updates [CallerId = CcmExec]
2014-05-27 13:45:41:497
936 ed4
Agent *********
2014-05-27 13:45:41:497
936 ed4
Agent * Include potentially superseded updates
2014-05-27 13:45:41:497
936 ed4
Agent * Online = Yes; Ignore download priority = Yes
2014-05-27 13:45:41:497
936 ed4
Agent * Criteria = "(DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')"
2014-05-27 13:45:41:497
936 ed4
Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-05-27 13:45:41:497
936 ed4
Agent * Search Scope = {Machine}
2014-05-27 13:45:41:497
2956 8a8
COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
2014-05-27 13:45:44:025
936 ed4
PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-05-27 13:45:44:025
936 ed4
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = https://server.subdomain.domain::8531/ClientWebService/client.asmx
2014-05-27 13:45:44:056
936 ed4
PT WARNING: Cached cookie has expired or new PID is available
2014-05-27 13:45:44:056
936 ed4
PT Initializing simple targeting cookie, clientId = cf0c5d2d-2a04-41a7-8a1b-4182de886397, target group = , DNS name = sccmtstw7x641.subdomain.domain:
2014-05-27 13:45:44:056
936 ed4
PT Server URL = https://server.subdomain.domain:8531/SimpleAuthWebService/SimpleAuth.asmx
2014-05-27 13:45:44:056
936 ed4
PT WARNING: GetAuthorizationCookie failure, error = 0x80244004, soap client error = 4, soap error code = 0, HTTP status code = 200
2014-05-27 13:45:44:056
936 ed4
PT WARNING: Failed to initialize Simple Targeting Cookie: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: PopulateAuthCookies failed: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: RefreshCookie failed: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: RefreshPTState failed: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: Sync of Updates: 0x80244004
2014-05-27 13:45:44:056
936 ed4
PT WARNING: SyncServerUpdatesInternal failed: 0x80244004
2014-05-27 13:45:44:056
936 ed4
Agent * WARNING: Failed to synchronize, error = 0x80244004
2014-05-27 13:45:44:056
936 ed4
Agent * WARNING: Exit code = 0x80244004
2014-05-27 13:45:44:056
936 ed4
Agent *********
2014-05-27 13:45:44:056
936 ed4
Agent ** END ** Agent: Finding updates [CallerId = CcmExec]
2014-05-27 13:45:44:056
936 ed4
Agent *************
2014-05-27 13:45:44:056
936 ed4
Agent WARNING: WU client failed Searching for update with error 0x80244004
2014-05-27 13:45:44:071
2956 8a8
COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = CcmExec]
2014-05-27 13:45:44:071
2956 8a8
COMAPI - Updates found = 0
2014-05-27 13:45:44:071
2956 8a8
COMAPI - WARNING: Exit code = 0x00000000, Result code = 0x80244004
2014-05-27 13:45:44:071
2956 8a8
COMAPI ---------
2014-05-27 13:45:44:071
2956 8a8
COMAPI -- END -- COMAPI: Search [ClientId = CcmExec]
2014-05-27 13:45:44:071
2956 8a8
COMAPI -------------
2014-05-27 13:45:44:071
2956 8a8
COMAPI WARNING: Operation failed due to earlier error, hr=80244004
2014-05-27 13:45:44:071
2956 8a8
COMAPI FATAL: Unable to complete asynchronous search. (hr=80244004)
Log file for contrast on a client when it works:
ScanAgent.log
Message received: '<?xml version='1.0' ?>
<UpdateSourceMessage MessageType='ScanByUpdateSource'>
<ForceScan>TRUE</ForceScan>
<UpdateSourceIDs>
<ID>{729742E6-9B66-4516-8A69-8569560D88C7}
</ID>
</UpdateSourceIDs>
</UpdateSourceMessage>'
ScanAgent
5/27/2014 1:43:20 PM 4052 (0x0FD4)
*****ScanByUpdateSource request received with ForceReScan=2, ScanOptions=0x0000000a, WSUSLocationTimeout = 604800
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
Sources are current and valid. TTLs are however, invalid.
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): - - - - - -Locations requested for ScanJobID={1BF68613-35BB-4627-A3F3-FCA455547578} (LocationRequestID={F6F11712-31EA-49BF-AD63-FF3FEF1BA29C}), will process the scan request once locations are available.
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
*****WSUSLocationUpdate received for location request guid={F6F11712-31EA-49BF-AD63-FF3FEF1BA29C}
ScanAgent 5/27/2014 1:43:20 PM
3648 (0x0E40)
Sources are current and valid. TTLs are however, invalid.
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): Performing Full Scan.
ScanAgent 5/27/2014 1:43:20 PM
4052 (0x0FD4)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): Scan Succeeded, Resetting Source to Current and TTLs to Valid
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): CScanJob::OnScanComplete - Scan completed successfully, ScanType=1
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): CScanJobManager::OnScanComplete -ScanJob is completed.
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
ScanJob({1BF68613-35BB-4627-A3F3-FCA455547578}): CScanJobManager::OnScanComplete - Reporting Scan request complete to clients...
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
- - Calling back to client on Scan request complete...
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
CScanAgent::ScanComplete- Scan completion received.
ScanAgent 5/27/2014 1:43:35 PM
3648 (0x0E40)
I have verified there are no proxy settings on any of these devices by running "Netsh winhttp show proxy"
Current WinHTTP proxy settings:
Direct access (no proxy server).
Firewall is OFF on both clients and servers. There are no WU GPO settings applied.
Anyone have any clues on where to look next? I have been scouring the internet for a couple of days now and seems that all roads with this type of error leads back to a proxy issue, but since no proxy's are in play here, hasn't been of much help. Still
digging through stuff but if anyone has any pointers on where to look next it would much appreciated!
Thanks,Found this Technet article: http://social.technet.microsoft.com/Forums/ru-RU/a1c81d16-d5d0-4367-bae6-3338aab0633f/client-updates-failing-windowsupdatelog-0x80244004?forum=configmanagersecurity
I ran a Wireshark trace and received the exact same error on my client. I have sent this over to the client to take a closer look. Fingers crossed that this is the issue as it should be a simple fix. *fingers crossed* -
I am trying to update office via the SCCM 2012 R2 OSD task sequence. I know offline updating only updates the core components in the WIM and I'm trying to figure out how to add office updates as well. I am aware of using powershell to try and kick off
a WU scan as seen here:
http://myitforum.com/myitforumwp/2012/01/24/use-powershell-commands-to-assist-with-patching-during-sccm-image-build/
But the kicker is we don't use SCCM to update the workstations (Solo WSUS install). Is there a way to do this (maybe set the client in the TS to switch on SUP, then off again when it goes off into production) rather than have to build a new image every month?You could use the ZTI_WindowsUpdates.wsf script from MDT.
http://scriptimus.wordpress.com/2012/03/22/mdt-2012-automating-updates-in-lite-touch-deployments/
How does it work?
The task sequence steps run a script called ZTIWindowsUpdate.wsf. The script uses the
Windows Update Agent API to manage the downloading and installation of updates. All audit information is written to the
ZTIWindowsUpdate.log file. If you find any unusual error codes in your log returned from the API (although I never have) you can compare the codes
here. The script will also check and update the
Windows Update Agent(WUA) as needed at the start.
In its default state, the ZTIWindowsUpdate.wsf script will connect to Microsoft Update then search for and download all available updates including Security Patches, Drivers, Browser Updates and Service Packs. This is essentially the same
as opening the GUI and selecting check for updates.
Daniel Ratliff | http://www.PotentEngineer.com -
Best practices for updating agents
We're getting ready to do our first system-wide update of agents to fix a critical bug. Our summer vacation is just ending, and teachers and students will be coming back very soon and turning on our Windows 7 computers for the first time in many weeks, although they won't all be turned on the same day. When they are turned on they will be attempting to get various updates, in particular Windows updates, but also Flash Player and Adobe Reader. I need to update the agents as quickly as possible, but I'm concerned about the possibility of the agent update conflicting with another update, especially Windows updates. Isn't it possible that Windows Update could restart a computer while the agent update is happening (or the other way around), leaving the machine in an unstable or unusable state? What are the best practices for dealing with this? I considered the possibility of deploying the agent to a dynamic workstation group whose members all have a certain file or files that indicate that they have already received the latest Windows updates. However, I can't see how to create a dynamic group based on such criteria.
So far I have only updated a few devices at a time using "Deploy System Updates to Selected Devices in the Management Zone". When those updates are done I cancel that deployment because that's the only option I can find that does anything. If you can offer general advice for a better strategy of updating agents I'd appreciate that. Specifically, how would you push an agent update to several hundred computers that will be turned on sometime over the next two weeks?
Thanks very much.Originally Posted by jcw_av
We're getting ready to do our first system-wide update of agents to fix a critical bug. Our summer vacation is just ending, and teachers and students will be coming back very soon and turning on our Windows 7 computers for the first time in many weeks, although they won't all be turned on the same day. When they are turned on they will be attempting to get various updates, in particular Windows updates, but also Flash Player and Adobe Reader. I need to update the agents as quickly as possible, but I'm concerned about the possibility of the agent update conflicting with another update, especially Windows updates. Isn't it possible that Windows Update could restart a computer while the agent update is happening (or the other way around), leaving the machine in an unstable or unusable state? What are the best practices for dealing with this? I considered the possibility of deploying the agent to a dynamic workstation group whose members all have a certain file or files that indicate that they have already received the latest Windows updates. However, I can't see how to create a dynamic group based on such criteria.
So far I have only updated a few devices at a time using "Deploy System Updates to Selected Devices in the Management Zone". When those updates are done I cancel that deployment because that's the only option I can find that does anything. If you can offer general advice for a better strategy of updating agents I'd appreciate that. Specifically, how would you push an agent update to several hundred computers that will be turned on sometime over the next two weeks?
Thanks very much.
To be honest, you have to work around your other deploys, etc. The ZCM agent isn't "aware" of other deploys going on. For example, ZPM doesn't care that you're doing Bundles at the same time (you'll get errors in the logs about the fact that only one MSI can run at a time, for example). ZPM usually recovers and picks up where it left off.
Bundles on the other hand, with System Update, are not so forgiving. Especially if you have the agents prior to 11.2.4 MU1 (cache corruption errors).
We usually:
a) Halt all software rollouts/patching as best we can
b) Our software deploys (bundles) are on event: user login Typically the system update is on Device Refresh, OR scheduled time, and are device associated.
IF possible, I'd suggest that you use WOL, system update and voila.
Or, if no WOL available, then tell your users to leave their pc turned on (doesn't have to be logged in), on X night, and setup your system updates for that night, with the auto-reboot enabled. That worked well
But otherwise the 3 components of ZCM (Bundles, ZPM, System Update) don't know/care about each other, AFAIK.
--Kevin -
Update agent in workgroup server
Hi,
I have DPM server and two client servers to backup. all servers in workgroup.
I installed the agents manually and attached the DPM server.
The DPM Server see the clients, but when I'm going to DPM console "Management -> Agents" I can see "Agent status OK" and "Agents Updates > Update available" when I click "Update available" I get an Error
message that I need to update manually, need to go from the client server to folder "C:\Program Files\Microsoft System Center 2012 R2\DPM\DPM\ProtectionAgents\RA\4.2.1205.0\amd64" on DPM server and run the installation.
when I'm doing it from the client server I get a massage that this is the same agent version, but the " Update available" massage is still shown in the DPM console.
need help for this issue
thanks,Hi,
You need to install the agent from under the "C:\Program Files\Microsoft System Center 2012 R2\DPM\DPM\Agents\RA\4.2.1xxx.0\amd64 folder. That is the location for updated agents from update rollups.
Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
This posting is provided "AS IS" with no warranties, and confers no rights. -
Windows Update Error 800B0109 after Windows Update Agent 7.6.7600.320 Installed
Hi, I have this error message when running windows update, it happened after Windows Update Agent 7.6.7600.320 installed.
Any idea how to resolve this?
Thank you.Hi,
Please make sure that your antivirus application does not scan the files in the
%windir% \SoftwareDistribution directory on any computer on which Windows Update Agent is installed.
You can also temporarily turn off the antivirus application and check the result.
Or run the following commands, and press Enter after each command:
Net stop wuauserv
cd %systemroot%
Ren SoftwareDistribution SoftwareDistribution.old
Net start wuauserv
Try to install updates again.
Yolanda Zhu
TechNet Community Support
I tried the commands as well, still prompting the same error.
Thanks -
SCCM Software Update Agent remains disabled
Dear All,
on single notebooks the Software Updates Agent remains disabled even if the Client Settings policy is set to enale the agent as in the attached images:
Even though if I set e.g. the remote tool agent as disabled, the agent becomes disabled on the same notebooks, where the SUA does not change state. Therefore a communication error is excluded.
Does anyone know where to look after more information about this issue and eventually how to solve it?
CMClient Version on all Clients: 5.00.7804.1000
OS on the Client: Win 8 or Win 8.1 U1
SCCM Version on the Server: System Center Configuration manager 2012 SP 1 5.0.7804.1500
Policy:
Best,
PictopHi t.c.rich,
Thank you for the response.
Here the log file.
<![LOG[Successfully completed scan.]LOG]!><time="12:09:30.983-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="3864" file="cwuahandler.cpp:3557">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="12:51:54.966-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="sourcemanager.cpp:1232">
<![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="12:51:55.045-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="sourcemanager.cpp:936">
<![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="12:51:55.064-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="sourcemanager.cpp:1265">
<![LOG[Scan results will include all superseded updates.]LOG]!><time="12:51:55.076-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="cwuahandler.cpp:2913">
<![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="12:51:55.076-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="cwuahandler.cpp:2916">
<![LOG[Async searching of updates using WUAgent started.]LOG]!><time="12:51:56.701-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4828" file="cwuahandler.cpp:579">
<![LOG[Async searching completed.]LOG]!><time="12:52:18.732-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="336" file="cwuahandler.cpp:2068">
<![LOG[Successfully completed scan.]LOG]!><time="12:52:19.513-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="1880" file="cwuahandler.cpp:3557">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="12:52:19.748-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="sourcemanager.cpp:1232">
<![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="12:52:19.748-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="sourcemanager.cpp:936">
<![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="sourcemanager.cpp:1265">
<![LOG[Scan results will include all superseded updates.]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:2913">
<![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:2916">
<![LOG[Async searching of updates using WUAgent started.]LOG]!><time="12:52:19.763-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:579">
<![LOG[Async searching completed.]LOG]!><time="12:52:38.998-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="4768" file="cwuahandler.cpp:2068">
<![LOG[Successfully completed scan.]LOG]!><time="12:52:39.888-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="2608" file="cwuahandler.cpp:3557">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="13:38:54.626-120" date="05-29-2014" component="WUAHandler" context="" type="1" thread="3660" file="cwuahandler.cpp:2527">
<![LOG[Removed Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="10:28:37.696-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="488" file="sourcemanager.cpp:1338">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:28:39.508-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="488" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:29:04.622-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="2368" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:42:29.805-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="3092" file="cwuahandler.cpp:2527">
<![LOG[Tried to remove an update source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) that does not exist.]LOG]!><time="10:45:25.357-120" date="10-10-2014" component="WUAHandler" context="" type="2" thread="3944" file="sourcemanager.cpp:1315">
<![LOG[Failed to Remove Update Source from WUAgent ({543A840D-5C46-4239-ADB9-17E8FC7359E5}). Error = 0x87d00691.]LOG]!><time="10:45:25.357-120" date="10-10-2014" component="WUAHandler" context="" type="3" thread="3944" file="cwuahandler.cpp:2359">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:46:37.231-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="2540" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="10:49:55.122-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="2128" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="11:31:03.370-120" date="10-10-2014" component="WUAHandler" context="" type="1" thread="1224" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="14:30:29.411-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3960" file="cwuahandler.cpp:2527">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="14:38:38.915-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="2844" file="sourcemanager.cpp:1232">
<![LOG[Unable to read existing resultant WUA policy. Error = 0x80070002.]LOG]!><time="14:38:38.915-60" date="01-27-2015" component="WUAHandler" context="" type="2" thread="2844" file="sourcemanager.cpp:920">
<![LOG[Enabling WUA Managed server policy to use server: HTTP://sccm.domain.com:8530]LOG]!><time="14:38:38.915-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="2844" file="sourcemanager.cpp:948">
<![LOG[Waiting for 2 mins for Group Policy to notify of WUA policy change...]LOG]!><time="14:38:39.165-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="2844" file="sourcemanager.cpp:954">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="14:40:06.416-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="5736" file="cwuahandler.cpp:2527">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="14:40:06.416-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="sourcemanager.cpp:1232">
<![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="14:40:06.447-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="sourcemanager.cpp:936">
<![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="14:40:06.462-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="sourcemanager.cpp:1265">
<![LOG[Scan results will include superseded updates only when they are superseded by service packs and definition updates.]LOG]!><time="14:40:06.478-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="cwuahandler.cpp:2909">
<![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="14:40:06.478-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="cwuahandler.cpp:2916">
<![LOG[Async searching of updates using WUAgent started.]LOG]!><time="14:40:06.494-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="3796" file="cwuahandler.cpp:579">
<![LOG[Async searching completed.]LOG]!><time="14:44:15.950-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="1120" file="cwuahandler.cpp:2068">
<![LOG[Successfully completed scan.]LOG]!><time="14:44:17.325-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="6180" file="cwuahandler.cpp:3557">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="15:51:02.561-60" date="01-27-2015" component="WUAHandler" context="" type="1" thread="4008" file="cwuahandler.cpp:2527">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="12:50:50.102-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="4444" file="cwuahandler.cpp:2527">
<![LOG[Its a WSUS Update Source type ({543A840D-5C46-4239-ADB9-17E8FC7359E5}), adding it.]LOG]!><time="14:00:00.167-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="sourcemanager.cpp:1232">
<![LOG[Existing WUA Managed server was already set (HTTP://sccm.domain.com:8530), skipping Group Policy registration.]LOG]!><time="14:00:00.214-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="sourcemanager.cpp:936">
<![LOG[Added Update Source ({543A840D-5C46-4239-ADB9-17E8FC7359E5}) of content type: 2]LOG]!><time="14:00:00.214-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="sourcemanager.cpp:1265">
<![LOG[Scan results will include all superseded updates.]LOG]!><time="14:00:00.229-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:2913">
<![LOG[Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')]LOG]!><time="14:00:00.229-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:2916">
<![LOG[Async searching of updates using WUAgent started.]LOG]!><time="14:00:01.995-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:579">
<![LOG[Async searching completed.]LOG]!><time="14:00:21.979-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5076" file="cwuahandler.cpp:2068">
<![LOG[Successfully completed scan.]LOG]!><time="14:00:23.354-60" date="01-29-2015" component="WUAHandler" context="" type="1" thread="5124" file="cwuahandler.cpp:3557">
<![LOG[CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundles]LOG]!><time="08:12:47.409-60" date="01-30-2015" component="WUAHandler" context="" type="1" thread="5084" file="cwuahandler.cpp:2527">
Regards,
Pictop -
Windows Update Agent rebooting systems after Software Update deployment
I have a software update deployment that is configured to install software updates on a collection of servers at 4:00 AM with a suppressed reboot. The updates get deployed and no reboot occurs as expected. Then ~8 hours later WUA starts up and the
servers get rebooted.
There is a maintenance window applied to the collection from 4:00 AM to 6:00 AM to allow the updates to install.
I've read a few forum and blog posts on this issue and have implemented some settings via GPO, but the reboots are still occurring. The settings that were applied are referenced in the link below.
https://support.microsoft.com/kb/2476479?wa=wsignin1.0
Here is a snippet from the WindowsUpdate.log:
2014-10-22 12:00:26:153 1428 8a88 AU Received AU Resume timeout
2014-10-22 12:00:26:153 1428 8a88 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
2014-10-22 12:00:26:153 1428 8a88 AU Can not perform non-interactive scan if AU is interactive-only
2014-10-22 12:02:08:512 1428 8a88 AU AU received policy change subscription event
2014-10-22 12:16:43:463 1428 8a88 AU ########### AU: Uninitializing Automatic Updates ###########
2014-10-22 12:16:43:479 1428 8a88 WuTask Uninit WU Task Manager
2014-10-22 12:16:43:697 1428 8a88 Service *********
2014-10-22 12:16:43:697 1428 8a88 Service ** END ** Service: Service exit [Exit code = 0x240001]
2014-10-22 12:16:43:697 1428 8a88 Service *************
2014-10-22 12:19:29:728 1428 e584 Misc =========== Logging initialized (build: 7.8.9200.16604, tz: -0400) ===========
2014-10-22 12:19:29:728 1428 e584 Misc = Process: C:\WINDOWS\system32\svchost.exe
2014-10-22 12:19:29:728 1428 e584 Misc = Module: c:\windows\system32\wuaueng.dll
2014-10-22 12:19:29:728 1428 e584 Service *************
2014-10-22 12:19:29:728 1428 e584 Service ** START ** Service: Service startup
2014-10-22 12:19:29:728 1428 e584 Service *********
2014-10-22 12:19:29:744 1428 e584 Agent * WU client version 7.8.9200.16604
2014-10-22 12:19:29:744 1428 e584 Agent * Base directory: C:\WINDOWS\SoftwareDistribution
2014-10-22 12:19:29:744 1428 e584 Agent * Access type: No proxy
2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv4, cNetworkInterfaces = 2.
2014-10-22 12:19:29:744 1428 e584 Agent * Network state: Connected
2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv6, cNetworkInterfaces = 2.
2014-10-22 12:19:29:744 1428 e584 Service UpdateNetworkState Ipv4, cNetworkInterfaces = 2.
2014-10-22 12:19:29:791 1428 e584 Agent *********** Agent: Initializing global settings cache ***********
2014-10-22 12:19:29:791 1428 e584 Agent * Endpoint Provider: 00000000-0000-0000-0000-000000000000
2014-10-22 12:19:29:791 1428 e584 Agent * WSUS server:
http://Internal-WSUS.Domain:8530
2014-10-22 12:19:29:791 1428 e584 Agent * WSUS status server:
http://Internal-WSUS.Domain:8530
2014-10-22 12:19:29:791 1428 e584 Agent * Target group: (Unassigned Computers)
2014-10-22 12:19:29:791 1428 e584 Agent * Windows Update access disabled: No
2014-10-22 12:19:29:791 1428 e584 Misc WARNING: Network Cost is assumed to be not supported as something failed with trying to get handles to wcmapi.dll
2014-10-22 12:19:29:806 1428 e584 WuTask WuTaskManager delay initialize completed successfully..
2014-10-22 12:19:29:822 1428 e584 Report CWERReporter::Init succeeded
2014-10-22 12:19:29:822 1428 e584 Agent *********** Agent: Initializing Windows Update Agent ***********
2014-10-22 12:19:29:822 1428 e584 DnldMgr Download manager restoring 0 downloads
2014-10-22 12:19:29:838 1428 e584 AU ########### AU: Initializing Automatic Updates ###########
2014-10-22 12:19:29:838 1428 e584 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
2014-10-22 12:19:29:838 1428 e584 AU AIR Mode is disabled
2014-10-22 12:19:29:838 1428 e584 AU # Policy Driven Provider:
http://Internal-WSUS.Domain:8530
2014-10-22 12:19:29:838 1428 e584 AU # Detection frequency: 22
2014-10-22 12:19:29:838 1428 e584 AU # Approval type: Disabled (User preference)
2014-10-22 12:19:29:838 1428 e584 AU # Auto-install minor updates: No (User preference)
2014-10-22 12:19:29:838 1428 e584 AU # ServiceTypeDefault: Service 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 Approval type: (Pre-install notify)
2014-10-22 12:19:29:838 1428 e584 AU # Will interact with non-admins (Non-admins are elevated (User preference))
2014-10-22 12:19:29:838 1428 e584 AU WARNING: Failed to get Wu Exemption info from NLM, assuming not exempt, error = 0x80240037
2014-10-22 12:19:29:853 1428 e584 AU AU finished delayed initialization
2014-10-22 12:19:29:884 1428 e584 AU #############
2014-10-22 12:19:29:884 1428 e584 AU ## START ## AU: Search for updates
2014-10-22 12:19:29:884 1428 e584 AU #########
2014-10-22 12:19:29:884 1428 e584 Agent SkipSelfUpdateCheck search flag set for serverId: 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782
2014-10-22 12:19:30:416 1428 e584 Report *********** Report: Initializing static reporting data ***********
2014-10-22 12:19:30:416 1428 e584 Report * OS Version = 6.2.9200.0.0.197008
2014-10-22 12:19:30:416 1428 e584 Report * OS Product Type = 0x00000008
2014-10-22 12:19:30:416 1428 e584 Report * Computer Brand = HP
2014-10-22 12:19:30:416 1428 e584 Report * Computer Model = ProLiant BL460c Gen8
2014-10-22 12:19:30:416 1428 e584 Report * Platform Role = 1
2014-10-22 12:19:30:416 1428 e584 Report * AlwaysOn/AlwaysConnected (AOAC) = 0
2014-10-22 12:19:30:431 1428 e584 Report * Bios Revision = I31
2014-10-22 12:19:30:431 1428 e584 Report * Bios Name = Default System BIOS
2014-10-22 12:19:30:431 1428 e584 Report * Bios Release Date = 2014-02-10T00:00:00
2014-10-22 12:19:30:431 1428 e584 Report * Bios Sku Number = 641016-B21
2014-10-22 12:19:30:431 1428 e584 Report * Bios Vendor = HP
2014-10-22 12:19:30:431 1428 e584 Report * Bios Family = ProLiant
2014-10-22 12:19:30:431 1428 e584 Report * Bios Major Release = 255
2014-10-22 12:19:30:431 1428 e584 Report * Bios Minor Release = 255
2014-10-22 12:19:30:431 1428 e584 Report * Locale ID = 1033
2014-10-22 12:19:30:431 1428 e584 AU <<## SUBMITTED ## AU: Search for updates [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:30:431 1428 dae0 Agent *************
2014-10-22 12:19:30:431 1428 dae0 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-10-22 12:19:30:431 1428 dae0 Agent *********
2014-10-22 12:19:30:431 1428 dae0 Agent * Online = No; Ignore download priority = No
2014-10-22 12:19:30:431 1428 dae0 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-10-22 12:19:30:431 1428 dae0 Agent * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
2014-10-22 12:19:30:431 1428 dae0 Agent * Search Scope = {Machine & All Users}
2014-10-22 12:19:30:431 1428 dae0 Agent * Caller SID for Applicability: S-1-5-18
2014-10-22 12:19:30:494 1428 dae0 Agent * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
2014-10-22 12:19:30:494 1428 dae0 Agent *********
2014-10-22 12:19:30:494 1428 dae0 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-10-22 12:19:30:494 1428 dae0 Agent *************
2014-10-22 12:19:30:509 1428 d158 AU >>## RESUMED ## AU: Search for updates [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:30:509 1428 d158 AU # 0 updates detected
2014-10-22 12:19:30:509 1428 d158 AU #########
2014-10-22 12:19:30:509 1428 d158 AU ## END ## AU: Search for updates [CallId = {2787252C-D4B8-46B5-BB42-0C616042113C} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:30:509 1428 d158 AU #############
2014-10-22 12:19:30:509 1428 d158 AU All AU searches complete.
2014-10-22 12:19:30:525 1428 e584 AU #############
2014-10-22 12:19:30:525 1428 e584 AU ## START ## AU: Search for updates
2014-10-22 12:19:30:525 1428 e584 AU #########
2014-10-22 12:19:30:525 1428 e584 AU Additional Service {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} with Approval type {Pre-install notify} added to AU services list
2014-10-22 12:19:30:525 1428 e584 Agent SkipSelfUpdateCheck search flag set for serverId: 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782
2014-10-22 12:19:30:525 1428 e584 AU <<## SUBMITTED ## AU: Search for updates [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:30:525 1428 dae0 Agent *************
2014-10-22 12:19:30:525 1428 dae0 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-10-22 12:19:30:525 1428 dae0 Agent *********
2014-10-22 12:19:30:525 1428 dae0 Agent * Online = Yes; Ignore download priority = No
2014-10-22 12:19:30:525 1428 dae0 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2014-10-22 12:19:30:525 1428 dae0 Agent * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
2014-10-22 12:19:30:525 1428 dae0 Agent * Search Scope = {Machine & All Users}
2014-10-22 12:19:30:525 1428 dae0 Agent * Caller SID for Applicability: S-1-5-18
2014-10-22 12:19:30:525 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\wuredir.cab:
2014-10-22 12:19:30:541 1428 dae0 Misc Microsoft signed: Yes
2014-10-22 12:19:30:541 1428 dae0 Misc Infrastructure signed: Yes
2014-10-22 12:19:30:556 1428 dae0 EP Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: "http://fe2.ws.microsoft.com/w81/2/redir/v2-storeauth.cab"
2014-10-22 12:19:30:588 1428 dae0 Agent Checking for updated auth cab for service 117cab2d-82b1-4b5a-a08c-4d62dbee7782 at
http://fe2.ws.microsoft.com/w81/2/redir/v2-storeauth.cab
2014-10-22 12:19:30:588 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\117cab2d-82b1-4b5a-a08c-4d62dbee7782.cab:
2014-10-22 12:19:30:603 1428 dae0 Misc Microsoft signed: Yes
2014-10-22 12:19:30:603 1428 dae0 Misc Infrastructure signed: Yes
2014-10-22 12:19:30:775 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\AuthCabs\Downloaded\117cab2d-82b1-4b5a-a08c-4d62dbee7782.cab:
2014-10-22 12:19:30:791 1428 dae0 Misc Microsoft signed: Yes
2014-10-22 12:19:30:791 1428 dae0 Misc Infrastructure signed: Yes
2014-10-22 12:19:30:791 1428 dae0 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\WuRedir\117CAB2D-82B1-4B5A-A08C-4D62DBEE7782\wuredir.cab:
2014-10-22 12:19:30:806 1428 dae0 Misc Microsoft signed: Yes
2014-10-22 12:19:30:806 1428 dae0 Misc Infrastructure signed: Yes
2014-10-22 12:19:30:822 1428 dae0 EP Got 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 redir Client/Server URL: "https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx"
2014-10-22 12:19:30:978 1428 dae0 PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-10-22 12:19:30:978 1428 dae0 PT + ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}, Server URL =
https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx
2014-10-22 12:19:31:025 1428 dae0 Agent * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
2014-10-22 12:19:31:025 1428 dae0 Agent *********
2014-10-22 12:19:31:025 1428 dae0 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2014-10-22 12:19:31:025 1428 dae0 Agent *************
2014-10-22 12:19:31:025 1428 d158 AU >>## RESUMED ## AU: Search for updates [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:31:025 1428 d158 AU # 0 updates detected
2014-10-22 12:19:31:025 1428 d158 AU #########
2014-10-22 12:19:31:025 1428 d158 AU ## END ## AU: Search for updates [CallId = {A3E41A4C-E9CB-4172-B6B0-99D556FB9102} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
2014-10-22 12:19:31:025 1428 d158 AU #############
2014-10-22 12:19:31:025 1428 d158 AU All AU searches complete.
2014-10-22 12:19:31:025 1428 d158 AU AU setting next detection timeout to 2014-10-23 14:19:28
2014-10-22 12:19:36:025 1428 e214 Report REPORT EVENT: {E04012FD-8FFD-4259-96D5-A5A34127F0A0} 2014-10-22 12:19:31:025-0400 1 147 [AGENT_DETECTION_FINISHED] 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software
Synchronization Windows Update Client successfully detected 0 updates.
2014-10-22 12:19:36:025 1428 e214 Report CWERReporter finishing event handling. (00000000)
2014-10-22 12:29:29:914 1428 e584 AU AU invoking RebootSystem (OnRebootNow)
2014-10-22 12:29:30:055 1428 e584 AU Allowing auto firmware installs at next shutdown
2014-10-22 12:29:30:102 1428 e584 Misc WARNING: SUS Client is rebooting system.
2014-10-22 12:29:30:102 1428 e584 AU AU invoking RebootSystem (OnRebootRetry)
2014-10-22 12:29:30:367 1428 e584 Shutdwn Checking to see whether install at shutdown is appropriate
2014-10-22 12:29:30:367 1428 e584 Shutdwn user declined update at shutdown
2014-10-22 12:29:30:367 1428 e584 AU AU initiates service shutdown
2014-10-22 12:29:30:367 1428 e584 AU ########### AU: Uninitializing Automatic Updates ###########
2014-10-22 12:29:30:399 1428 e584 WuTask Uninit WU Task Manager
2014-10-22 12:29:30:445 1428 e584 Agent Sending shutdown notification to client
2014-10-22 12:29:30:445 5788 8084 COMAPI WARNING: Received service shutdown/self-update notification.
2014-10-22 12:29:30:461 1428 e584 Report CWERReporter finishing event handling. (00000000)
2014-10-22 12:29:30:539 1428 e584 Service *********
2014-10-22 12:29:30:539 1428 e584 Service ** END ** Service: Service exit [Exit code = 0x240001]
2014-10-22 12:29:30:539 1428 e584 Service *************
Any assistance is appreciated.
-TimHi,
Any update?
Best Regards,
Joyce
We
are trying to better understand customer views on social support experience, so your participation in this
interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place. -
80246002 error after installing Windows Update Agent 7.6.7600.320
This problem prevents Windows Update from being able to search, download, and install updates.
I am experiencing this issue on machines running Server 2008 R2 and Windows 7 Enterprise (I imagine this an issue with Windows Update and not the OS so this is probably affecting other OS' as well).
This problem is becoming widespread quickly.
The proposed fix (method 1) in the article below did not resolve the problem:
http://support.microsoft.com/kb/958056/en-us
Note: Method 2 is not viable when applying more than one update at a time especially when you are updating multiple machines.
Several others are posting similar problems:
http://windowsitpro.com/windows-update/tracking-error-80246002-windows-update-problem
http://forums.techguy.org/windows-7/1132320-windows-update-problems-4.html
This is preventing scheduled server maintenance from being performed.
Could this be a targeted attack? Happening at the end of the week before a long holiday weekend is not leaving me with a very good feeling...
I would hope that fixing this issue would be a very high priority.
BTW - There is no "Windows Update Issue" forum category that I could find - If there is, sorry for posting in the wrong area.
Cheers,
JeffMy fix that worked...
Reviewed the operational log for the WindowsUpdateClient (buried in the Event viewer here:
Application and Services Logs -> Microsoft -> Windows -> WindowsUpdateClient -> Operational
After review, I noticed that event 30 "Windows Updates established connectivity" was no longer occurring and that event 42 "There has been a change in the health of Windows Update" was the only thing after the error (Event 25 "Windows Update failed
to check for updates with error 0x80246002")
Even though the machine was restarted after applying the "Windows Update Agent 7.6.7600.320" patch and I had tried restarting the Windows Update service, the service appears to be hung.
Solution:
1.) restart the Windows update service
2.) monitor the operational log for the WindowsUpdateClient (refreshing every 5-10 seconds)
3.) verify that event 30 happens (you should see event 38 after restarting the service followed by (2) event 42, then event 30)
4.) Once event 30 happens go to the Windows update GUI and run the "Check for updates" - yay!
5.) You can go back into the operational log and see event 26 "Windows Update successfully found x updates" followed by an event 40 for each update found.
What is really strange is that I checked the first machine that experienced the problem and it magically fixed itself.
It seems like this may have been caused by DDOS attack on the source for windows updates that the Windows Update service connects to. Or the source location was having maintenance performed.
Regardless, in my case, this was not a problem with the OS or the patch but the inability for the Windows Update Service to establish connectivity.
Hope that helps somebody :)
Cheers,
Jeff -
How can I disable the HP Updates Agent from running?
HP pavilion D4100Y
Windows XP SP2 or 3 (not sure)
No error message
No recent changes
Problem: The program "Updates from HP Agent" runs frequently and on no particular schedule, certainly not one I chose. It takes over my computer for hours and uses most of the CPU, fluctuating from 13% to 87% to 1 etc.3% to 6%, etc. The computer hangs and I cannot use it for anything else. On the HP Updates screen, I set the updates to "NEVER" but that didn't work. The programs still run. On the Windows Task Manager window the program is called "Updates from HP Agent".
I cannot find anything about this problem in the support database.
How can I disable the HP Updates Agent from running?
This question was solved.
View Solution.Select your start button and in the search box type "msconfig" then select msconfig.exe under programs.
Look under the "Services" and "Boot" tabs. Uncheck HP update agent, select "Apply" and close.
I work for HP
Maybe you are looking for
-
I have drafted response to a message I received. I need a copy of the draft to show my associate, but my printer will only print the portion of the draft that can be seen on the screen at one time. I have not previously encountered this problem. What
-
How to launch many instances of Sun Java ME Platform SDK 3.0 emulator ?
Hi all, I want to launch two instances of the emulator , how to achieve that ? Thank you very much indeed
-
Reguarding input help .
Hi All, In my webdynpro ABAP screen iam have one input field , i attached a search help for that input field, and it is working fine , but the problem was when i enter any values into that input field manually with out taking the input help it is ta
-
Auto create folders for projects
Hi, wondering if anyone has made oracle files create new users work folders and sub directories based on a new project being entered into PA? if so, please share set up. --thanks
-
Work flow settings in Production
Dear all, i had developed a workflow in development client . but i want to transport that to production. 1) i need to do the settings in SWU3. as production has status not modifiable i need to transport that . but in my dev settings i had given clien