Why is KB2884678 Endpoint Protection Client Update Expired?
Hi,
KB2884678 Update for System Center Endpoint Protection 2012 suddenly expired in my SCCM Software Update Library. This was just released 10/9/2013. After testing and planned deployment, I was able to install this to the majority of my clients
and servers. However, now it is expired and I am not done yet.
Why did this update suddenly expired on SCCM? Is there something going on? I don't see a replacement either.
Thanks! Although it's a bit confusing because it says it superseded KB2865173 and not mentions 2884678. But you are right. This must be the replacement because 2884678 brings the client to version 4.3 while 2907566 brings
the client to 4.4.
So I guess, do you know by any chance if installing Cumulative Update 3 will upgrade my clients to 4.4 or still 4.3?
Similar Messages
-
We upgraded SCCM SP1 to CU5. We got one primary site, on which we had no problems with running the CU setup. After the upgrade we pushed the new administrator console and client.
SP1 CU5 - console update -> Updated on all administrator users (50 computers)
SP1 CU5- x64 and x86 client update -> Updated on pilot group (50 computers)
No problems so far.
We are having troubles updating the Endpoint Protection Client version. This was V4.1.522.0 before the upgrade. When we enroll a new computer, it receives the new V4.5.216.0, which is the last version.
But we can't update our older clients. We try to deploy the software update (Update for Forefront Endpoint Protection 2010 Client - 4.5.216.0 (KB2952678)) but it doesn't install. After 20 minutes, if I look in the Deployment logs, it says the installation
was successfull; but it isn't, it's still the old version.
Strange thing is, we can upgrade to an inbetween version (Update for Forefront Endpoint Protection 2010 Client - 4.3.215.0 (KB2864366)). Which installs on a test client.
If I look to the cache files of the new EP Client update, and use the UpdateInstall.exe manually, the update does install. Then I see in the logfile EndpointProtectionAgent.log it still refers to the version 4.1.522.0.
EP 4.5.216.0 is installed, version is higher than expected installer version 4.1.522.0. EndpointProtectionAgent 13/01/2015 14:54:00 7808 (0x1E80)
Re-apply EP AM policy. EndpointProtectionAgent 13/01/2015 14:54:00 7808 (0x1E80)
Apply AM Policy. EndpointProtectionAgent 13/01/2015 14:54:00 7808 (0x1E80)
Create Process Command line: "c:\Program Files\Microsoft Security Client\\ConfigSecurityPolicy.exe" "C:\Windows\CCM\EPAMPolicy.xml". EndpointProtectionAgent 13/01/2015 14:54:00 7808 (0x1E80)
Applied the C:\Windows\CCM\EPAMPolicy.xml with ConfigSecurityPolicy.exe successfully. EndpointProtectionAgent 13/01/2015 14:54:02 7808 (0x1E80)
Save new policy state 1 to registry SOFTWARE\Microsoft\CCM\EPAgent\PolicyApplicationState EndpointProtectionAgent 13/01/2015 14:54:02 7808 (0x1E80)
State 1 and ErrorCode 0 and ErrorMsg and PolicyName Antimalware Policy and GroupResolveResultHash D277339FA77A9017801399D96266BAD42DE74F38 is NOT changed. EndpointProtectionAgent 13/01/2015 14:54:02 7808 (0x1E80)
Skip sending state message due to same state message already exists. EndpointProtectionAgent 13/01/2015 14:54:02 7808 (0x1E80)
Firewall provider is installed. EndpointProtectionAgent 13/01/2015 14:54:02 7808 (0x1E80)
Installed firewall provider meet the requirements. EndpointProtectionAgent 13/01/2015 14:54:02 7808 (0x1E80)
This is the WindowsUpdate.log when I try to push the new EP client.
2015-01-14 11:24:13:651 7416 1c44 Handler :::::::::
2015-01-14 11:24:13:651 7416 1c44 Handler : Updates to install = 1
2015-01-14 11:24:21:716 7416 1c44 Handler : WARNING: Command line install completed. Return code = 0x8004ff25, Result = Failed, Reboot required = false
2015-01-14 11:24:21:716 7416 1c44 Handler : WARNING: Exit code = 0x8024200B
2015-01-14 11:24:21:716 7416 1c44 Handler :::::::::
2015-01-14 11:24:21:716 7416 1c44 Handler :: END :: Handler: Command Line Install
2015-01-14 11:24:21:732 7416 1c44 Handler :::::::::::::
2015-01-14 11:24:21:794 1096 c18 Agent *********
2015-01-14 11:24:21:794 1096 edc AU Can not perform non-interactive scan if AU is interactive-only
2015-01-14 11:24:21:794 1096 c18 Agent ** END ** Agent: Installing updates [CallerId = CcmExec]
2015-01-14 11:24:21:794 1096 c18 Agent *************
2015-01-14 11:24:21:794 2296 fac COMAPI >>-- RESUMED -- COMAPI: Install [ClientId = CcmExec]
2015-01-14 11:24:21:794 2296 fac COMAPI - Install call complete (succeeded = 0, succeeded with errors = 0, failed = 1, unaccounted = 0)
2015-01-14 11:24:21:794 2296 fac COMAPI - Reboot required = No
2015-01-14 11:24:21:794 2296 fac COMAPI - WARNING: Exit code = 0x00000000; Call error code = 0x80240022
2015-01-14 11:24:21:794 2296 fac COMAPI ---------
2015-01-14 11:24:21:794 2296 fac COMAPI -- END -- COMAPI: Install [ClientId = CcmExec]
2015-01-14 11:24:21:794 2296 fac COMAPI -------------
2015-01-14 11:24:21:794 1096 1620 AU Can not perform non-interactive scan if AU is interactive-only
2015-01-14 11:24:26:739 1096 1424 Report REPORT EVENT: {ED287668-4BEF-46FD-BB57-CA17680E5D3B} 2015-01-14 11:24:21:732+0100 1 182 101 {A90C3005-7B59-4268-8B11-12D9BE5C8EA0} 201 80070643 CcmExec Failure Content Install Installation Failure: Windows failed to install the following update with error 0x80070643: Update for System Center Endpoint Protection 2012 Client - 4.5.216.0 (KB2952678).
2015-01-14 11:24:27:207 1096 1424 Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
2015-01-14 11:24:27:207 1096 1424 Report WER Report sent: 7.5.7601.17514 0x80070643 A90C3005-7B59-4268-8B11-12D9BE5C8EA0 Install 101 Managed
2015-01-14 11:24:27:207 1096 1424 Report CWERReporter finishing event handling. (00000000)
Thanks in advance!Hello,
According to
kb2952678:
To apply this update, you must have one of the following installed:
System Center 2012 R2 Configuration Manager Cumulative Update 4 for System Center 2012
Configuration Manager Service Pack
Service Pack 2 for System Center Configuration Manager 2007 and Update Rollup 1 for
Forefront Endpoint Protection 2010
Do you have Update Rollup 1 for Forefront Endpoint Protection 2010?
Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected] -
Deploying SCCM EndPoint Protection Client with updates?
Am using SCCM 2012 r2 and need to get the EndPoint Protection Client built int o my image.
If I deploy it post-imaging the laptop, how do I get the latest definitions?
Because it shows up with a red icon in the system tray and I have to go in and manually update the definitions after I install it.
Is there a task that could be done in an OSD to update the definitions?
Otherwise only way I can think of is preinstall and update and get the full scan done before capturing an image of my system to deploy to other systems.Hi,
If you use Endpoint Protection on all computer including the latest definitions in your Build and Capture saves time.
Otherwise ,the command line in windows works fine ,trigger an update of SCEP at the end of the task sequence:
"%Program Files%\Microsoft Security Client\mpcmdrun.exe" -SignatureUpdate
Here are some great articles for you reference:
Operating System Deployment and Endpoint Protection Client Installation
http://blogs.technet.com/b/configmgrteam/archive/2012/04/12/operating-system-deployment-and-endpoint-protection-client-installation.aspx
How to Configure Definition Updates for Endpoint Protection in Configuration Manager
http://technet.microsoft.com/en-us/library/jj822983.aspx
We
are trying to better understand customer views on social support experience, so your participation in this
interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place. -
Endpoint Protection Client - definitions couldn't be updated
Am on SCCM 2012 SP2 and have EndPoint protection client deployed to computers during the Task Sequence, and they get the update.
The next day I will try an update from the client's GUI and will get the error "Virus and spyware definitions couldn't be updated".
In the antimalway policy applied to the collection the device is a member of, I indeed have its definition update source set to "Updates from UNC file shares", then in the server path for the UNC, it is set to "\\server.domain.com\D$\sources\Packages\Apps\Microsoft\EP_Definitions\Updates\x86"
which is where the "mpam-fe.exe" and "nis_full/exe" files are.
I have no maintenance windows set on the device collection that this antimalware policy is applied to.Hi, I just wanted to clarify, I only have the "UNC" path as the option for the source of updates.
I have also verified that in the registry in hklm policies Microsoft AntiMalware that the UNC path is indeed there and I can manually access the path from Start > Run.
I've tried running the Endpoint definitions update manually as an Administrator, and with the Windows Update service in every combo of state I could try, and still nothing (not that I want Endpoint getting updates from the internet anyways).
Not sure what we're looking for in the windowsupdate.log but here are the last few lines before the time I tried running the update. The error from definition update doesn't appear to add anything to this log file.
2014-11-19 18:50:01:854
1012 10a0
Service *************
2014-11-19 18:54:12:693
2068 1398
Misc =========== Logging initialized (build: 7.5.7601.17514, tz: -0600) ===========
2014-11-19 18:54:12:693
2068 1398
Misc = Process: C:\WINDOWS\CCM\CcmExec.exe
2014-11-19 18:54:12:693
2068 1398
Misc = Module: c:\Windows\system32\wuapi.dll
2014-11-19 18:54:12:693
2068 1398
COMAPI FATAL: Unable to connect to the service (hr=80070422)
2014-11-19 18:54:12:693
2068 1398
COMAPI WARNING: Unable to establish connection to the service. (hr=80070422)
2014-11-19 18:54:33:507
2068 1098
COMAPI FATAL: Unable to connect to the service (hr=80070422)
2014-11-19 18:54:33:507
2068 1098
COMAPI WARNING: Unable to establish connection to the service. (hr=80070422) -
Best practice to run Microsoft Endpoint Protection client in VDI environment
We are using Citrix XenDesktop VDI environment. Symantec Endpoint Protection client (VDI performance optimised) has been installed on the “streamed to the clients” virtual machine image. Basically, all the files (in golden image) have been “tattooed” with
Symantec signature. Now, when the new VM starts, Symantec scan engine simply ignores “tattooed” files and also randomise scan times. This is a rough explanations but I hope you’ve got the idea.
We are switching from Symantec to Microsoft Endpoint Protection and I’m looking for any information and documentation in regards best practice for running Microsoft Endpoint Protection clients in VDI environment.
Thanks in advance.I see this post is a bt old but the organization I'm with has a very large VDI deployment using VMware. We also are using SCEP 2012 for the AV.
Did you find out what you were looking for or did you elect to take a different direction?
We install SCEP 2012 into the base image and manage the settings using GPO and the updates for defs are through the normal route.
Our biggest challenge is getting alert message from the client.
Thanks -
Endpoint Protection Definition Update Source
I need to determine where an Endpoint Protection Client is getting updates from, whether it's the SCCM server, WSUS, or Microsoft's Windows Update. Is there a log file somewhere that I could use to determine that information?
Vincent SpragueHave a look in C:Windows\Windowsupdate.log.
-
Log file for manual download Endpoint Protection Definition Updates
Hi,
I am downloading manually endpoint protection definition updates from SCCM 2012 R2, which log file I have to check for download progress.
Regards,
Manzoor AhmedIf you are downloading updates manually you will need to have an alternate source other than ConfigMgr for definition updates.
https://support.microsoft.com/en-us/kb/2831244?wa=wsignin1.0
Here is a list of the logs for SCEP.
http://chadstech.net/scep-2012-client-log-files/
The logs depend on which sources you have set for updates, if you have updates coming from windows update or WSUS then you could look at WindowsUpdate.log -
Endpoint Protection Client Activity Log
Hello
I'd like to know how long SCCM 2012 keep the Endpoint protection client activity logs (logs of scan,detection, quarantine..etc) and if i can change it?
thanxHI,
Endpoint Protection history data is deleted after 365 days, it can be controlled in the Site Maintenance task "Endpoint Protection is Delete Aged Endpoint Protection Health Status History Data"
There is also a setting for "Delete Aged Threat Data" which is set to 30 days. It depends on which level of details you are after but it sounds like you should increase the "Delete Aged Threat Data"
Regards,
Jörgen
-- My System Center blog ccmexec.com -- Twitter
@ccmexec -
Locally check how Endpoint Protection client gets updates
Hi,
I'm in the middle of a large deployment of SCEP (ahem) System Center 2012 Endpoint Protection, and I've come across an interesting question. Is it possible to determine the method the local SCEP client used to obtain it's most recent definitions update?
The background here is that our clients are set to obtain updates from the SCCM server, and only from the Internet as a last resort after 12 hours of failure. However, during one recent deployment, the local team reported a spike in their Internet traffic
and believe several hundred SCEP clients updated via the Internet. Is it possible to verify this locally from log files on the computer or some other method?
This is an issue for some of our locations where Internet bandwidth is at a premium, but we have good internal WAN links.
Kind regards,
MattHi,
We could configure Definition Update sources under Antimalware Policy.
How to Configure Definition Updates for Endpoint Protection in Configuration Manager
Best Regards,
Joyce Li
We
are trying to better understand customer views on social support experience, so your participation in this
interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place. -
Endpoint Protection clients no getting updates from SCCM 2012 in new Secondary Site
I recently stood up a secondary site behind a PCI firewall to manage PCI in-scope systems. All of my boundaries are properly configured and there are no overlaps. I am able to push packages to these clients and the clients are reporting as healthy however
I am not able to get updates to the SCEP clients. There is no internet access from these systems so I have to rely on updates from SCCM. From what I can see in the WindowsUpdate log it is only trying to go to Microsoft for the definitions. Here is the Log:
2014-04-30 11:05:09:739
828 da8
Misc WARNING: Send failed with hr = 80072ee2.
2014-04-30 11:05:09:739
828 da8
Misc WARNING: Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <None>
2014-04-30 11:05:09:739
828 da8
Misc WARNING: Send request failed, hr:0x80072ee2
2014-04-30 11:05:09:739
828 da8
Misc WARNING: WinHttp: SendRequestUsingProxy failed for <HTTPS://sls.update.microsoft.com/SLS/{9482F4B4-E343-43B6-B170-9A65BC822C77}/x64/6.3.9600.0/0?CH=41&L=en-US&P=&PT=0x7&WUA=7.9.9600.16422>.
error 0x80072ee2
2014-04-30 11:05:09:739
828 da8
Misc WARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed. error 0x80072ee2
2014-04-30 11:05:09:739
828 da8
Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80072ee2
2014-04-30 11:05:09:739
828 da8
Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072ee2
2014-04-30 11:05:09:739
828 da8
SLS FATAL: GetResponse failed with hresult 0x80072ee2...
2014-04-30 11:05:09:739
828 da8
EP FATAL: EP: CSLSEndpointProvider::GetWUClientDataAndInitParser - failed to get SLS data, error = 0x80072EE2
2014-04-30 11:05:09:739
828 da8
EP FATAL: EP: CSLSEndpointProvider::GetEndpointFromSLS - Failed to get client data and init parser, error = 0x80072EE2
2014-04-30 11:05:09:739
828 da8
EP FATAL: Failed to obtain 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL, error = 0x80072EE2
2014-04-30 11:05:09:739
828 da8
Agent WARNING: Failed to obtain the authorization cab URL for service 7971f918-a847-4430-9279-4a52d1efe18d, hr=0
2014-04-30 11:05:09:739
828 da8
Agent FATAL: Caller <NULL> failed to opt in to service 7971f918-a847-4430-9279-4a52d1efe18d, hr=0X80072EE2
2014-04-30 11:05:09:739
828 da8
SLS Retrieving SLS response from server...
2014-04-30 11:05:09:739
828 da8
SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{9482F4B4-E343-43B6-B170-9A65BC822C77}/x64/6.3.9600.0/0?CH=41&L=en-US&P=&PT=0x7&WUA=7.9.9600.16422
2014-04-30 11:05:30:742
828 da8
Misc WARNING: Send failed with hr = 80072ee2.
2014-04-30 11:05:30:742
828 da8
Misc WARNING: Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <None>
2014-04-30 11:05:30:742
828 da8
Misc WARNING: Send request failed, hr:0x80072ee2
2014-04-30 11:05:30:742
828 da8
Misc WARNING: WinHttp: SendRequestUsingProxy failed for <HTTPS://sls.update.microsoft.com/SLS/{9482F4B4-E343-43B6-B170-9A65BC822C77}/x64/6.3.9600.0/0?CH=41&L=en-US&P=&PT=0x7&WUA=7.9.9600.16422>.
error 0x80072ee2
2014-04-30 11:05:30:742
828 da8
Misc WARNING: WinHttp: SendRequestToServerForFileInformation MakeRequest failed. error 0x80072ee2
2014-04-30 11:05:30:742
828 da8
Misc WARNING: WinHttp: SendRequestToServerForFileInformation failed with 0x80072ee2
2014-04-30 11:05:30:742
828 da8
Misc WARNING: WinHttp: ShouldFileBeDownloaded failed with 0x80072ee2
2014-04-30 11:05:30:742
828 da8
SLS FATAL: GetResponse failed with hresult 0x80072ee2...
2014-04-30 11:05:30:742
828 da8
EP FATAL: EP: CSLSEndpointProvider::GetWUClientDataAndInitParser - failed to get SLS data, error = 0x80072EE2
2014-04-30 11:05:30:742
828 da8
EP FATAL: EP: CSLSEndpointProvider::GetSecondaryServicesEnabledState - Failed to get client data and init parser, error = 0x80072EE2
2014-04-30 11:05:30:742
828 da8
Agent * WARNING: Online service registration/service ID resolution failed, hr=0x80248014
2014-04-30 11:05:30:742
828 da8
Agent * WARNING: Exit code = 0x80248014
2014-04-30 11:05:30:742
828 da8
Agent *********
2014-04-30 11:05:30:742
828 da8
Agent ** END ** Agent: Finding updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB) Id = 9]
2014-04-30 11:05:30:742
828 da8
Agent *************
2014-04-30 11:05:30:742
828 da8
Agent WARNING: WU client failed Searching for update with error 0x80248014
2014-04-30 11:05:30:742
828 da8
IdleTmr WU operation (CSearchCall::Init ID 9, operation # 99) stopped; does use network; is not at background priority
2014-04-30 11:05:30:742
828 da8
IdleTmr Decremented PDC RefCount for Network to 0
2014-04-30 11:05:30:742
828 da8
IdleTmr Decremented idle timer priority operation counter to 0
2014-04-30 11:05:30:743
576 12c0
COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-04-30 11:05:30:743
576 12c0
COMAPI - Updates found = 0
2014-04-30 11:05:30:743
576 12c0
COMAPI - WARNING: Exit code = 0x00000000, Result code = 0x80248014
2014-04-30 11:05:30:743
576 12c0
COMAPI ---------
2014-04-30 11:05:30:743
576 12c0
COMAPI -- END -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-04-30 11:05:30:743
576 12c0
COMAPI -------------
2014-04-30 11:05:30:743
576 1254
COMAPI WARNING: Operation failed due to earlier error, hr=80248014
2014-04-30 11:05:30:743
576 1254
COMAPI FATAL: Unable to complete asynchronous search. (hr=80248014)
The log is from a Server 2012 R2 Client. The only thing I was able to find was this Article which did not resolve my issue. Anyone else encounter anything similar? Any help would be appreciated.
Regards, Evan Mills - Systems AdministratorEvery two hours is too aggressive for the ADR. Definitions are only released 2-3 times a day so every 8 hours is what most consider best practice. Is your WSUS sync occurring every two hours as well? If not, then the ADR wouldn't have anything new to pick
up anyway. It's best to set the WSUS sync for every 8 hours and then set the ADR to run after any successful WSUS sync.
So the EP definitions are caching but not installing? What does the WUAHandler.log show? One of my machines shows the following which indicates a successful installation from the ConfigMgr delivered update:
1. Update (Missing): Definition Update for Microsoft Endpoint Protection - KB2461484 (Definition 1.173.933.0) (0a156122-d4f8-4215-9e63-8f0f1e32c9c6, 200) WUAHandler 4/30/2014 6:49:33 AM 11080 (0x2B48)
Async installation of updates started. WUAHandler 4/30/2014 6:49:34 AM 11080 (0x2B48)
Update 1 (0a156122-d4f8-4215-9e63-8f0f1e32c9c6) finished installing (0x00000000), Reboot Required? No WUAHandler 4/30/2014 6:50:23 AM 8664 (0x21D8)
Async install completed. WUAHandler 4/30/2014 6:50:23 AM 8664 (0x21D8)
Installation of updates completed. WUAHandler 4/30/2014 6:50:23 AM 11032 (0x2B18)
It sounds like if you set "Check for Endpoint Protection definitions at a specific interval" to 0 then it would prevent the WindowsUpdate.log activity you're seeing when the EP client tries to reach out for updates. -
Endpoint Protection Signature Updates taking up Terabytes of Internet Data
I have my antimalware policy set up as below. I've been looking a web traffic reports on our firewalls and I can see that as of mid-December a lot of clients are going to the internet for their EP definition updates. In January alone client machines used
up 44 TB of data going to download.windowsupdate.com for updates.
I don't really understand why as my policy says not to even use Microsoft Update as a source at all.
What I've noticed on the firewall reports is that Monday resulted in literally 100 times more traffic than Wednesday which led to me thinking it might having something to do with the "If configuration manager is used as a source for definition updates
...." setting. This setting has a default value of 72 hours so if a client gets an update at 8 am on Friday morning then is turned off on Friday afternoon for the weekend and doesn't get turned on until 9 am on Monday morning this would mean it hasn't
had an update in 73 hours.
What happens at this point? I looks like the client goes to download.windowsupdate.com even when the policy says not to. It also looks like it doesn't first check for updates from Config Manager before it does this.
Another thing that doesn't make much sense is that this only started happening mid-December and I had been using SCCM for EP updates for nearly two months by that time.
Any ideas?
Hibs Ya Bass!There is no value in that registry key.
HHowever I have noticed that my ADRs have the below setting. I'm not sure what will happen with this setting enabled when I have no fallback locations configured.
Here are some logs of a typical PC going to the internet for updates - remember not all PCs are doing this.
From the mplogxxxx.log below you can see the EP client starting up at 23:50 UTC with version 1.67.1843.0 signatures installed. This version is out of date.
**************************END RTP Perf Log*************************
2014-03-16T23:50:33.339Z Verifying license file...
2014-03-16T23:50:33.339Z verified!
2014-03-16T23:50:33.339Z Product supports installmode: 0
2014-03-16T23:50:33.620Z Auto purger task is scheduled to run in 600000(ms) from now with period 86400000(ms)
Product Version: 4.4.304.0
Service Version: 4.4.304.0
Engine Version: 1.1.10302.0
AS Signature Version: 1.167.1843.0
AV Signature Version: 1.167.1843.0
2014-03-16T23:51:24.971Z Process scan (poststartupscan) started.
2014-03-16T23:51:26.572Z Process scan (poststartupscan) completed.
2014-03-16T23:53:05.128Z IWscAVStatus::UpdateStatus() succceeded writing instance with state (1) and up-to-date state(1)
2014-03-16T23:53:05.128Z IWscASStatus::UpdateStatus() succceeded writing instance with state (1) and up-to-date state(1)
2014-03-16T23:57:58.214Z Task(SpyNetService -RestrictPrivileges -AccessKey 613C3C1F-F85A-BCED-39AF-C0B481FC03E0) launched
2014-03-17T00:00:31.917Z Task(Scan -ScheduleJob -RestrictPrivileges) is scheduled to run in 604800000(ms) from now with period 190246545(ms)
2014-03-17T00:00:31.917Z Task(SignatureUpdate -ScheduleJob -RestrictPrivileges) is scheduled to run in 86400000(ms) from now with period 1454570(ms)
2014-03-17T00:00:31.918Z Task(Scan -ScheduleJob -RestrictPrivileges -ScanType 2) is scheduled to run in 86400000(ms) from now with period 65506808(ms)
2014-03-17T00:00:32.197Z AutoPurgeWorker triggered with dwWork=0x3
2014-03-17T00:00:32.197Z Product supports installmode: 0
==========================================================================
A few minutes later at 23:55 (07:53 local time) the below happens in the WindowsUpdate.log where you can clearly see the client downloading the latest signatures from download.windowsupsate.com (i've removed some of the rows where the WU engine goes through
all the updates to get under the 60,000 character limit)
================================================================
2014-03-17 07:53:03:403 452 1398 Misc =========== Logging initialized (build: 7.6.7600.256, tz: +0800) ===========
2014-03-17 07:53:03:465 452 1398 Misc = Process: C:\windows\system32\svchost.exe
2014-03-17 07:53:03:480 452 1398 Misc = Module: c:\windows\system32\wuaueng.dll
2014-03-17 07:53:03:403 452 1398 Service *************
2014-03-17 07:53:03:480 452 1398 Service ** START ** Service: Service startup
2014-03-17 07:53:03:480 452 1398 Service *********
2014-03-17 07:53:04:351 452 1398 Agent * WU client version 7.6.7600.256
2014-03-17 07:53:04:351 452 1398 Agent * Base directory: C:\windows\SoftwareDistribution
2014-03-17 07:53:04:351 452 1398 Agent * Access type: No proxy
2014-03-17 07:53:04:366 452 1398 Agent * Network state: Connected
2014-03-17 07:53:17:688 452 bf4 Report CWERReporter::Init succeeded
2014-03-17 07:53:17:688 452 bf4 Agent *********** Agent: Initializing Windows Update Agent ***********
2014-03-17 07:53:17:688 452 bf4 Agent *********** Agent: Initializing global settings cache ***********
2014-03-17 07:53:17:688 452 bf4 Agent * WSUS server: HTTP://mySiteServer.domain.GLOBAL:8530
2014-03-17 07:53:17:688 452 bf4 Agent * WSUS status server: HTTP://mySiteServer.domain.GLOBAL:8530
2014-03-17 07:53:17:688 452 bf4 Agent * Target group: (Unassigned Computers)
2014-03-17 07:53:17:688 452 bf4 Agent * Windows Update access disabled: No
2014-03-17 07:53:17:719 452 bf4 DnldMgr Download manager restoring 0 downloads
2014-03-17 07:53:18:045 452 1398 Report *********** Report: Initializing static reporting data ***********
2014-03-17 07:53:18:045 452 1398 Report * OS Version = 6.1.7601.1.0.65792
2014-03-17 07:53:18:045 452 1398 Report * OS Product Type = 0x00000004
2014-03-17 07:53:18:061 452 1398 Report * Computer Brand = Hewlett-Packard
2014-03-17 07:53:18:061 452 1398 Report * Computer Model = HP Z210 Workstation
2014-03-17 07:53:18:061 452 1398 Report * Bios Revision = J51 v01.20
2014-03-17 07:53:18:061 452 1398 Report * Bios Name = Default System BIOS
2014-03-17 07:53:18:061 452 1398 Report * Bios Release Date = 2011-09-16T00:00:00
2014-03-17 07:53:18:061 452 1398 Report * Locale ID = 3081
2014-03-17 07:53:23:144 452 9fc Report CWERReporter finishing event handling. (00000000)
2014-03-17 07:53:23:362 4672 a50 Misc =========== Logging initialized (build: 7.6.7600.256, tz: +0800) ===========
2014-03-17 07:53:23:362 4672 a50 Misc = Process: C:\windows\CCM\CcmExec.exe
2014-03-17 07:53:23:362 4672 a50 Misc = Module: C:\Windows\system32\wuapi.dll
2014-03-17 07:53:23:362 4672 a50 COMAPI -------------
2014-03-17 07:53:23:362 4672 a50 COMAPI -- START -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:53:23:362 4672 a50 COMAPI ---------
2014-03-17 07:53:23:470 452 9fc Agent *************
2014-03-17 07:53:23:470 452 9fc Agent ** START ** Agent: Finding updates [CallerId = CcmExec]
2014-03-17 07:53:23:470 452 9fc Agent *********
2014-03-17 07:53:23:470 4672 a50 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:53:23:470 452 9fc Agent * Include potentially superseded updates
2014-03-17 07:53:23:470 452 9fc Agent * Online = No; Ignore download priority = Yes
2014-03-17 07:53:23:470 452 9fc Agent * Criteria = "((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E6CF1350-C01B-414D-A61F-263D14D133B4'))"
2014-03-17 07:53:23:470 452 9fc Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-03-17 07:53:23:470 452 9fc Agent * Search Scope = {Machine}
2014-03-17 07:53:50:191 452 1398 AU ########### AU: Initializing Automatic Updates ###########
2014-03-17 07:53:50:378 452 1398 AU AU setting next sqm report timeout to 2014-03-16 23:53:50
2014-03-17 07:53:50:378 452 1398 AU # AU disabled through Policy
2014-03-17 07:53:50:378 452 1398 AU # Will interact with non-admins (Non-admins are elevated (User preference))
2014-03-17 07:53:50:409 452 1398 AU Initializing featured updates
2014-03-17 07:53:50:409 452 1398 AU Found 0 cached featured updates
2014-03-17 07:53:50:409 452 1398 AU Successfully wrote event for AU health state:0
2014-03-17 07:53:50:409 452 1398 AU Successfully wrote event for AU health state:0
2014-03-17 07:53:50:409 452 1398 AU AU finished delayed initialization
2014-03-17 07:53:50:409 452 1398 AU AU setting next sqm report timeout to 2014-03-17 23:53:50
2014-03-17 07:55:40:569 452 9fc Agent *************
2014-03-17 07:55:40:591 452 9fc Report CWERReporter finishing event handling. (00000000)
2014-03-17 07:55:40:592 4672 e6c COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:55:40:936 4672 e6c COMAPI - Updates found = 96
2014-03-17 07:55:40:936 4672 e6c COMAPI ---------
2014-03-17 07:55:40:936 4672 e6c COMAPI -- END -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:55:40:936 4672 e6c COMAPI -------------
2014-03-17 07:56:38:889 4672 1534 COMAPI -------------
2014-03-17 07:56:38:889 4672 1534 COMAPI -- START -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:56:38:889 4672 1534 COMAPI ---------
2014-03-17 07:56:38:891 452 9fc Agent *************
2014-03-17 07:56:38:891 452 9fc Agent ** START ** Agent: Finding updates [CallerId = CcmExec]
2014-03-17 07:56:38:891 452 9fc Agent *********
2014-03-17 07:56:38:891 4672 1534 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:56:38:891 452 9fc Agent * Include potentially superseded updates
2014-03-17 07:56:38:891 452 9fc Agent * Online = No; Ignore download priority = Yes
2014-03-17 07:56:38:891 452 9fc Agent * Criteria = "((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E6CF1350-C01B-414D-A61F-263D14D133B4'))"
2014-03-17 07:56:38:891 452 9fc Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-03-17 07:56:38:891 452 9fc Agent * Search Scope = {Machine}
279C58FA-1C7C-41B2-81F5-F9D92DD1D8E6}.200 to search result
2014-03-17 07:56:46:433 452 9fc Agent * Added update {B1D0B8FF-1023-438F-BE07-CD893F229A68}.200 to search result
2014-03-17 07:56:46:462 452 9fc Agent * Found 96 updates and 10 categories in search; evaluated appl. rules of 1952 out of 3516 deployed entities
2014-03-17 07:56:46:463 452 9fc Agent *********
2014-03-17 07:56:46:463 452 9fc Agent ** END ** Agent: Finding updates [CallerId = CcmExec]
2014-03-17 07:56:46:463 452 9fc Agent *************
2014-03-17 07:56:46:488 4672 a34 COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:56:46:515 4672 a34 COMAPI - Updates found = 96
2014-03-17 07:56:46:515 4672 a34 COMAPI ---------
2014-03-17 07:56:46:515 4672 a34 COMAPI -- END -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:56:46:515 4672 a34 COMAPI -------------
2014-03-17 07:59:28:666 4672 1ba0 COMAPI -------------
2014-03-17 07:59:28:666 4672 1ba0 COMAPI -- START -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:59:28:666 4672 1ba0 COMAPI ---------
2014-03-17 07:59:28:668 4672 1ba0 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:59:28:668 452 9fc Agent *************
2014-03-17 07:59:28:668 452 9fc Agent ** START ** Agent: Finding updates [CallerId = CcmExec]
2014-03-17 07:59:28:668 452 9fc Agent *********
2014-03-17 07:59:28:668 452 9fc Agent * Include potentially superseded updates
2014-03-17 07:59:28:668 452 9fc Agent * Online = Yes; Ignore download priority = Yes
2014-03-17 07:59:28:668 452 9fc Agent * Criteria = "((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'A38C835C-2950-4E87-86CC-6911A52C34A3'))"
2014-03-17 07:59:28:668 452 9fc Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-03-17 07:59:28:668 452 9fc Agent * Search Scope = {Machine}
2014-03-17 07:59:28:755 452 9fc PT WARNING: Cached cookie has expired or new PID is available
2014-03-17 07:59:28:755 452 9fc PT Initializing simple targeting cookie, clientId = 553c311c-66c6-4896-a549-521f549398a5, target group = , DNS name = mySiteServer.domain.global
2014-03-17 07:59:28:755 452 9fc PT Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/SimpleAuthWebService/SimpleAuth.asmx
2014-03-17 07:59:29:227 452 9fc PT +++++++++++ PT: Starting category scan +++++++++++
2014-03-17 07:59:29:227 452 9fc PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
2014-03-17 07:59:29:406 452 9fc PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-03-17 07:59:29:406 452 9fc PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
2014-03-17 07:59:30:089 452 9fc PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2014-03-17 07:59:30:089 452 9fc PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
2014-03-17 07:59:55:387 4672 1534 COMAPI ---------
2014-03-17 07:59:55:388 4672 1534 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 07:59:55:388 452 9fc Agent *************
2014-03-17 07:59:55:388 452 9fc Agent ** START ** Agent: Finding updates [CallerId = CcmExec]
2014-03-17 07:59:55:388 452 9fc Agent *********
2014-03-17 07:59:55:388 452 9fc Agent * Include potentially superseded updates
2014-03-17 07:59:55:388 452 9fc Agent * Online = Yes; Ignore download priority = Yes
2014-03-17 07:59:55:388 452 9fc Agent * Criteria = "((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E0789628-CE08-4437-BE74-2495B842F43B'))"
2014-03-17 07:59:55:389 452 9fc Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-03-17 07:59:55:389 452 9fc Agent * Search Scope = {Machine}
2014-03-17 07:59:55:433 452 9fc PT +++++++++++ PT: Starting category scan +++++++++++
2014-03-17 07:59:55:433 452 9fc PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
2014-03-17 08:00:02:360 452 9fc PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-03-17 08:00:02:360 452 9fc PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
2014-03-17 08:00:16:100 452 9fc Agent WARNING: Failed to evaluate Installed rule, updateId = {189A8F50-0C3A-4FDF-8BC2-BC23A3EB11FB}.101, hr = 80242013
2014-03-17 08:00:18:951 452 9fc PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2014-03-17 08:00:18:951 452 9fc PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://mySiteServer.domain.GLOBAL:8530/ClientWebService/client.asmx
2014-03-17 08:00:19:974 452 1398 AU Can not perform non-interactive scan if AU is interactive-only
2014-03-17 08:00:19:979 452 9fc Agent *************
2014-03-17 08:00:20:008 452 9fc Report REPORT EVENT: {B2A79652-BABC-46DE-B505-B6CB6D5CD9A8} 2014-03-17 08:00:19:978+0800 1
147 101 {00000000-0000-0000-0000-000000000000} 0 0 CcmExec Success Software Synchronization Windows Update
Client successfully detected 12 updates.
2014-03-17 08:00:20:008 452 9fc Report CWERReporter finishing event handling. (00000000)
2014-03-17 08:00:20:008 4672 1534 COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 08:00:20:013 4672 1534 COMAPI - Updates found = 12
2014-03-17 08:00:20:013 4672 1534 COMAPI ---------
2014-03-17 08:00:20:013 4672 1534 COMAPI -- END -- COMAPI: Search [ClientId = CcmExec]
2014-03-17 08:00:20:013 4672 1534 COMAPI -------------
2014-03-17 08:00:24:973 452 9fc Report CWERReporter finishing event handling. (00000000)
2014-03-17 08:24:46:620 5620 1890 Misc =========== Logging initialized (build: 7.6.7600.256, tz: +0800) ===========
2014-03-17 08:24:46:620 5620 1890 Misc = Process: c:\Program Files\Microsoft Security Client\MpCmdRun.exe
2014-03-17 08:24:46:620 5620 1890 Misc = Module: C:\Windows\system32\wuapi.dll
2014-03-17 08:24:46:620 5620 1890 COMAPI -------------
2014-03-17 08:24:46:620 5620 1890 COMAPI -- START -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:46:620 5620 1890 COMAPI ---------
2014-03-17 08:24:46:623 5620 1890 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:46:623 452 1a78 Agent *************
2014-03-17 08:24:46:623 452 1a78 Agent ** START ** Agent: Finding updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:46:623 452 1a78 Agent *********
2014-03-17 08:24:46:623 452 1a78 Agent * Online = Yes; Ignore download priority = No
2014-03-17 08:24:46:623 452 1a78 Agent * Criteria = "(IsInstalled = 0 and IsHidden = 0 and CategoryIDs contains 'a38c835c-2950-4e87-86cc-6911a52c34a3' and
CategoryIDs contains 'e0789628-ce08-4437-be74-2495b842f43b')"
2014-03-17 08:24:46:623 452 1a78 Agent * ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service
2014-03-17 08:24:46:623 452 1a78 Agent * Search Scope = {Machine}
2014-03-17 08:24:46:657 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\muv4wuredir.cab:
2014-03-17 08:24:46:706 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:48:018 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\muv4wuredir.cab:
2014-03-17 08:24:48:025 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:48:073 452 1a78 Agent Checking for updated auth cab for service 7971f918-a847-4430-9279-4a52d1efe18d at http://ds.download.windowsupdate.com/v10/1/microsoftupdate/redir/muauth.cab
2014-03-17 08:24:48:073 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\AuthCabs\authcab.cab:
2014-03-17 08:24:48:083 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:48:644 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\AuthCabs\authcab.cab:
2014-03-17 08:24:48:650 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:48:755 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
2014-03-17 08:24:48:762 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:49:139 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
2014-03-17 08:24:49:146 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:49:156 452 1a78 PT WARNING: Cached cookie has expired or new PID is available
2014-03-17 08:24:51:859 452 1a78 PT +++++++++++ PT: Starting category scan +++++++++++
2014-03-17 08:24:51:860 452 1a78 PT + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://update.microsoft.com/v6/ClientWebService/client.asmx
2014-03-17 08:24:52:293 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
2014-03-17 08:24:52:296 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:52:570 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
2014-03-17 08:24:52:577 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:52:584 452 1a78 PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-03-17 08:24:52:584 452 1a78 PT + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://update.microsoft.com/v6/ClientWebService/client.asmx
2014-03-17 08:24:52:584 452 1a78 PT WARNING: Cached cookie has expired or new PID is available
2014-03-17 08:24:54:237 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
2014-03-17 08:24:54:241 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:54:851 452 1a78 Misc Validating signature for C:\windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muredir.cab:
2014-03-17 08:24:54:857 452 1a78 Misc Microsoft signed: Yes
2014-03-17 08:24:54:864 452 1a78 PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2014-03-17 08:24:54:864 452 1a78 PT + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL = https://update.microsoft.com/v6/ClientWebService/client.asmx
2014-03-17 08:24:55:403 452 1398 AU Can not perform non-interactive scan if AU is interactive-only
2014-03-17 08:24:55:405 452 1a78 Agent Update {59B2BB4D-839D-4719-8905-48902D4F9E0B}.200 is pruned out due to potential supersedence
2014-03-17 08:24:55:405 452 1a78 Agent Update {759CD48D-010A-42E7-84DE-AC43603E653D}.200 is pruned out due to potential supersedence
2014-03-17 08:24:55:405 452 1a78 Agent Update {B31982D9-2558-4A53-8EC7-9FF0E865698C}.200 is pruned out due to potential supersedence
2014-03-17 08:24:55:406 452 1a78 Agent Update {DB9D9C73-2729-4248-9314-663B427AF113}.200 is pruned out due to potential supersedence
2014-03-17 08:24:55:406 452 1a78 Agent Update {7AF502C1-C821-414B-9FD3-47F52F3FD523}.200 is pruned out due to potential supersedence
2014-03-17 08:24:55:406 452 1a78 Agent * Added update {33FBE82E-BE96-48C4-9C34-F6AEC8569DC7}.200 to search result
2014-03-17 08:24:55:406 452 1a78 Agent * Found 1 updates and 4 categories in search; evaluated appl. rules of 61 out of 76 deployed entities
2014-03-17 08:24:55:413 452 1a78 Agent *********
2014-03-17 08:24:55:413 452 1a78 Agent ** END ** Agent: Finding updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:55:413 452 1a78 Agent *************
2014-03-17 08:24:55:414 5620 1518 COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:55:416 5620 1518 COMAPI - Updates found = 1
2014-03-17 08:24:55:416 5620 1518 COMAPI ---------
2014-03-17 08:24:55:416 5620 1518 COMAPI -- END -- COMAPI: Search [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:55:416 5620 1518 COMAPI -------------
2014-03-17 08:24:55:419 5620 b4c COMAPI -------------
2014-03-17 08:24:55:419 5620 b4c COMAPI -- START -- COMAPI: Download [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:55:419 5620 b4c COMAPI ---------
2014-03-17 08:24:55:419 5620 b4c COMAPI - Forced: No; Download priority: 2
2014-03-17 08:24:55:419 5620 b4c COMAPI - Updates in request: 1
2014-03-17 08:24:55:419 5620 b4c COMAPI - ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service
2014-03-17 08:24:55:422 5620 b4c COMAPI <<-- SUBMITTED -- COMAPI: Download [ClientId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:55:422 452 1a78 DnldMgr *************
2014-03-17 08:24:55:422 452 1a78 DnldMgr ** START ** DnldMgr: Downloading updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:55:422 452 1a78 DnldMgr *********
2014-03-17 08:24:55:422 452 1a78 DnldMgr * Call ID = {E0013492-D13F-43AB-896F-8521DE916FCD}
2014-03-17 08:24:55:422 452 1a78 DnldMgr * Priority = 2, Interactive = 1, Owner is system = 1, Explicit proxy = 1, Proxy session id = -1, ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}
2014-03-17 08:24:55:422 452 1a78 DnldMgr * Updates to download = 1
2014-03-17 08:24:55:422 452 1a78 Agent * Title = Definition Update for Microsoft Endpoint Protection - KB2461484 (Definition 1.167.2113.0)
2014-03-17 08:24:55:422 452 1a78 Agent * UpdateId = {33FBE82E-BE96-48C4-9C34-F6AEC8569DC7}.200
2014-03-17 08:24:55:422 452 1a78 Agent * Bundles 3 updates:
2014-03-17 08:24:55:422 452 1a78 Agent * {7E4CD222-2348-4617-A8FD-4608CA0F5D9C}.200
2014-03-17 08:24:55:422 452 1a78 Agent * {85F7798B-FE1C-4AAB-8B5C-313B2ACB1778}.200
2014-03-17 08:24:55:422 452 1a78 Agent * {F7095866-6910-4D42-B4BE-AA4ECE02D6CA}.200
2014-03-17 08:24:55:441 452 1a78 DnldMgr *********** DnldMgr: New download job [UpdateId = {85F7798B-FE1C-4AAB-8B5C-313B2ACB1778}.200] ***********
2014-03-17 08:24:55:492 452 1a78 DnldMgr * BITS job initialized, JobId = {774F570F-FF72-408E-B8F9-1A9EC2A9DFEC}
2014-03-17 08:24:55:492 452 1a78 DnldMgr BITS job {774F570F-FF72-408E-B8F9-1A9EC2A9DFEC} using proxy = nzpr01.domain.co.nz:8080;proxy.domain.co.nz:8080, bypass = <NULL>
2014-03-17 08:24:55:539 452 1a78 DnldMgr * Downloading from http://download.windowsupdate.com/msdownload/update/software/defu/2014/03/nis_delta_patch_35110c44392d4ed2952852248b7d4e98730d59d7.exe
to C:\windows\SoftwareDistribution\Download\5d16f20387cc485e8ab3f76cf00d482d\35110c44392d4ed2952852248b7d4e98730d59d7 (full file).
2014-03-17 08:24:55:617 452 1a78 DnldMgr *********** DnldMgr: New download job [UpdateId = {F7095866-6910-4D42-B4BE-AA4ECE02D6CA}.200] ***********
2014-03-17 08:24:55:676 452 1a78 DnldMgr * BITS job initialized, JobId = {34C6823B-B255-429F-ABB3-31D850C69994}
2014-03-17 08:24:55:676 452 1a78 DnldMgr BITS job {34C6823B-B255-429F-ABB3-31D850C69994} using proxy = nzpr01.domain.co.nz:8080;proxy.domain.co.nz:8080, bypass = <NULL>
2014-03-17 08:24:55:792 452 1a78 DnldMgr * Downloading from http://download.windowsupdate.com/msdownload/update/software/defu/2014/03/am_delta_4561a4006e1295d251371592cbebc2c18adcca43.exe
to C:\windows\SoftwareDistribution\Download\8439bb6ce5944930522a2c27c57de50e\4561a4006e1295d251371592cbebc2c18adcca43 (full file).
2014-03-17 08:24:55:943 452 1a78 Agent *********
2014-03-17 08:24:55:943 452 1a78 Agent ** END ** Agent: Downloading updates [CallerId = System Center Endpoint Protection (DDEFDD14-250E-4DC8-A0B3-9D667EC5D8EB)]
2014-03-17 08:24:55:943 452 1a78 Agent *************
2014-03-17 08:25:00:411 452 1a78 Report REPORT EVENT: {4215F4AF-AAF5-4BB5-BE2C-BB09A9BA6176} 2014-03-17 08:24:55:412+0800 1
147 101 {00000000-0000-0000-0000-000000000000} 0 0 System Center Endpoint Protecti Success Software Synchronization
Windows Update Client successfully detected 1 updates.
2014-03-17 08:25:00:411 452 1a78 Report CWERReporter finishing event handling. (00000000)
2014-03-17 08:25:17:443 452 134c DnldMgr BITS job {774F570F-FF72-408E-B8F9-1A9EC2A9DFEC} completed successfully
2014-03-17 08:25:17:486 452 134c Misc Validating signature for C:\windows\SoftwareDistribution\Download\5d16f20387cc485e8ab3f76cf00d482d\35110c44392d4ed2952852248b7d4e98730d59d7:
2014-03-17 08:25:17:496 452 134c Misc Microsoft signed: Yes
2014-03-17 08:25:17:499 452 134c DnldMgr Download job bytes total = 76056, bytes transferred = 76056
2014-03-17 08:25:17:500 452 134c DnldMgr *********** DnldMgr: New download job [UpdateId = {85F7798B-FE1C-4AAB-8B5C-313B2ACB1778}.200] ***********
2014-03-17 08:25:17:501 452 134c DnldMgr * All files for update were already downloaded and are valid.
2014-03-17 08:25:22:501 452 1a78 Report CWERReporter finishing event handling. (00000000)
Hibs Ya Bass! -
Endpoint Protection Client not running run scheduled scan
Hi,
We are running SCCM 2012 R2 CU1 on our site system and clients, having upgraded from SCCM 2012 sp1 12 months ago.
A few of our clients will not run a scheduled scan, even though it displays the Scan date and time in the client properties.
Someome did create a new EP policy and pointed the clients at it, but that didn't fix this problem.
The AV engine and AV definitions are upto date and the real time monitor is running.
In the SCCM console, Active Clients at Risk, the client has Endpoint Protection Enabled showing as Disabled, nothing in the Endpoint Protection Engine Version, nothing for Last Full Scan Start Time, Endpoint Protection Pending Full Scan - No.
The MPLog-xxxx-xxx.log shows:
Signature updated on 02-11-2015 05:57:13
Product Version: 4.7.205.0
Service Version: 4.7.205.0
Engine Version: 1.1.11302.0
AS Signature Version: 1.191.4588.0
AV Signature Version: 1.191.4588.0
2015-02-11T05:57:15.492Z IWscAVStatus::UpdateStatus() succceeded writing instance with state (1) and up-to-date state(1)
2015-02-11T05:57:15.492Z IWscASStatus::UpdateStatus() succceeded writing instance with state (1) and up-to-date state(1)
2015-02-11T05:57:40.982Z Process scan (postsignatureupdatescan) started.
2015-02-11T05:57:50.420Z Process scan (postsignatureupdatescan) completed.
2015-02-11T06:06:47.173Z AutoPurgeWorker triggered with dwWork=0x3
2015-02-11T06:06:47.173Z Product supports installmode: 0
2015-02-11T06:06:47.173Z Task(Scan -ScheduleJob -RestrictPrivileges) is scheduled to run in 604800000(ms) from now with period 21957080(ms)
2015-02-11T06:06:47.173Z Task(SignatureUpdate -ScheduleJob -RestrictPrivileges) is scheduled to run in 28800000(ms) from now with period 28800000(ms)
2015-02-11T06:06:47.173Z Task(Scan -ScheduleJob -RestrictPrivileges -ScanType 2) is scheduled to run in 86400000(ms) from now with period 70114864(ms)
2015-02-11T06:06:47.844Z Detection State: Finished(0) Failed(0) CriticalFailed(0) Additional Actions(0)
The EndpointProtectionAgent.log shows:
Endpoint is triggered by message. EndpointProtectionAgent 11/02/2015 12:12:00 2692 (0x0A84)
File C:\WINDOWS\ccmsetup\SCEPInstall.exe version is 4.5.216.0. EndpointProtectionAgent 11/02/2015 12:12:00 2692 (0x0A84)
EP version 4.7.205.0 is already installed. EndpointProtectionAgent 11/02/2015 12:12:00 2692 (0x0A84)
EP 4.7.205.0 is installed, version is higher than expected installer version 4.5.216.0. EndpointProtectionAgent 11/02/2015 12:12:00 2692 (0x0A84)
Re-apply EP AM policy. EndpointProtectionAgent 11/02/2015 12:12:00 2692 (0x0A84)
Apply AM Policy. EndpointProtectionAgent 11/02/2015 12:12:00 2692 (0x0A84)
Create Process Command line: "c:\Program Files\Microsoft Security Client\\ConfigSecurityPolicy.exe" "C:\WINDOWS\CCM\EPAMPolicy.xml". EndpointProtectionAgent 11/02/2015 12:12:00 2692 (0x0A84)
Applied the C:\WINDOWS\CCM\EPAMPolicy.xml with ConfigSecurityPolicy.exe successfully. EndpointProtectionAgent 11/02/2015 12:12:01 2692 (0x0A84)
Save new policy state 1 to registry SOFTWARE\Microsoft\CCM\EPAgent\PolicyApplicationState EndpointProtectionAgent 11/02/2015 12:12:01 2692 (0x0A84)
State 1 and ErrorCode 0 and ErrorMsg and PolicyName Default Client Antimalware Policy
SCEP Standard Desktop EP Policy and GroupResolveResultHash 5E75089B490B85DD66BBA85BC91E15A5EA853B9C is NOT changed. EndpointProtectionAgent 11/02/2015 12:12:01 2692 (0x0A84)
Skip sending state message due to same state message already exists. EndpointProtectionAgent 11/02/2015 12:12:01 2692 (0x0A84)
Firewall provider is installed. EndpointProtectionAgent 11/02/2015 12:12:01 2692 (0x0A84)
Installed firewall provider meet the requirements. EndpointProtectionAgent 11/02/2015 12:12:01 2692 (0x0A84)
Could anyone provide any pointers on why the scheduled scan wont work?
JazHi,
Please verify if any GPO applied and overwrite the setting, you can check registry key:
http://blogs.technet.com/b/mspfe/archive/2013/11/13/system-center-configuration-manager-2012-scep-policy-behavior.aspx
Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected] -
Forefront Endpoint Protection Client filling OS drive with scan and definition files.
I have installed FEP on our client servers, one of server filling C: drive space with scan files (.bin.xx) and with definitions. Why its not clearing like other servers? Please suggest!
We haven't using it through SCCM, we have only FEP client which download updates directly from Internet.
Thanks in advance.Hi,
Please check the logs below to see if there is any error.
%allusersprofile%\Microsoft\Microsoft Antimalware\Support—Log files specific for the antimalware service
%allusersprofile%\Microsoft\Microsoft Security Client\Support—Log files specific for the SCEP client software
%windir%\WindowsUpdate.log—Windows Update log files, which include information about definition updates
%windir%\CCM\Logs\EndpointProtectionagent.log – Shows Endpoint version and policies applied
%windir%\temp\MpCmdRun.log – Activity when performing scans and signature updates
%windir%\temp\MpSigStub.log – Update progress for signature and Engine updates
Reference:http://kickthatcomputer.wordpress.com/2014/03/04/endpoint-protection-log-locations/
Note: Microsoft provides third-party contact
information to help you find technical support. This contact information may change without notice. Microsoft does not guarantee the accuracy of this third-party contact information.
Best Regards,
Joyce -
SCCM 2012 Endpoint Protection initial update not downloaded
Hi,
I'm new to SCCM 2012. I recently started deploying the Endpoint Protection to all of clients (Windos 7 and XP Pro).
I've noticed that some clients have not been updating their initial definitions after the Endpoint Protection Software is installed.
Since they are not updating their detonation the client remains unprotected with the status icon in red.
The odd thing is that some of our computers do the initial update just fine while others are effected.
Also if I click update manually then the update goes through no issue, but with 100+ clients not updated its not something I want to do manually.
The clients are set to receive auto updates via a auto deployment rule.
Also the antimalware policy is set to do updates as well in this order:
Config Mgr
WSUS
Microsoft Malware Protection Center
Microsoft Update
Has anyone seen this before?
If I need to upload any specific logs just let me know.
Many ThanksDo you have Software update configured (and working) thru ConfigMgr or using a standalone WSUS?
Kent Agerlund | My blogs: blog.coretech.dk/kea and
SCUG.dk/ | Twitter:
@Agerlund | Linkedin: Kent Agerlund |
Mastering ConfigMgr 2012 The Fundamentals -
Endpoint Protection not updating
Hi all,
Not sure if this is the right forum but I couldn't see one for Endpoint Protection
I've been having some troubles updating EP on 2 of my 40 of so machines for a while and I can't work it out. Basically they aren't seeing that EP updates are available to install for them.
I've uninstalled EP and the CM client. They re-installed fine. The 2 machines are getting the same policies as the others. I've deleted the Software Distribution directory, reset BITS, deleted the qr*.dat files.
When I initiate a Software Updates scan from the Configuration Mgr client this is what appears in my WindowsUpdate.log
2013-05-13 09:18:15:205 5704 19b8 COMAPI -------------
2013-05-13 09:18:15:205 5704 19b8 COMAPI -- START -- COMAPI: Search [ClientId = CcmExec]
2013-05-13 09:18:15:205 5704 19b8 COMAPI ---------
2013-05-13 09:18:15:210 948 a04 Agent *************
2013-05-13 09:18:15:210 5704 19b8 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = CcmExec]
2013-05-13 09:18:15:210 948 a04 Agent ** START ** Agent: Finding updates [CallerId = CcmExec]
2013-05-13 09:18:15:210 948 a04 Agent *********
2013-05-13 09:18:15:210 948 a04 Agent * Include potentially superseded updates
2013-05-13 09:18:15:210 948 a04 Agent * Online = Yes; Ignore download priority = Yes
2013-05-13 09:18:15:210 948 a04 Agent * Criteria = "(DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')"
2013-05-13 09:18:15:210 948 a04 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2013-05-13 09:18:15:210 948 a04 Agent * Search Scope = {Machine}
2013-05-13 09:18:15:538 948 a04 PT +++++++++++ PT: Synchronizing server updates +++++++++++
2013-05-13 09:18:15:538 948 a04 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL =
HTTP://%FQDN%8530/ClientWebService/client.asmx
2013-05-13 09:19:16:523 948 a04 Misc WARNING: SendRequest failed with hr = 80072ee2. Proxy List used: <%PROXYIP%> Bypass List used : <(null)> Auth Schemes used : <>
2013-05-13 09:19:16:523 948 a04 PT + Last proxy send request failed with hr = 0x80072EE2, HTTP status code = 0
2013-05-13 09:19:16:523 948 a04 PT + Caller provided proxy = No
2013-05-13 09:19:16:523 948 a04 PT + Proxy list used = %PROXYIP%
2013-05-13 09:19:16:523 948 a04 PT + Bypass list used = <NULL>
2013-05-13 09:19:16:523 948 a04 PT + Caller provided credentials = No
2013-05-13 09:19:16:523 948 a04 PT + Impersonate flags = 0
2013-05-13 09:19:16:523 948 a04 PT + Possible authorization schemes used =
2013-05-13 09:19:16:523 948 a04 PT WARNING: GetConfig failure, error = 0x80072EE2, soap client error = 5, soap error code = 0, HTTP status code = 200
2013-05-13 09:19:16:524 948 a04 PT WARNING: PTError: 0x80072ee2
2013-05-13 09:19:16:524 948 a04 PT WARNING: GetConfig_WithRecovery failed: 0x80072ee2
2013-05-13 09:19:16:524 948 a04 PT WARNING: RefreshConfig failed: 0x80072ee2
2013-05-13 09:19:16:524 948 a04 PT WARNING: RefreshPTState failed: 0x80072ee2
2013-05-13 09:19:16:524 948 a04 PT WARNING: Sync of Updates: 0x80072ee2
2013-05-13 09:19:16:524 948 a04 PT WARNING: SyncServerUpdatesInternal failed: 0x80072ee2
2013-05-13 09:19:16:524 948 a04 Agent * WARNING: Failed to synchronize, error = 0x80072EE2
2013-05-13 09:19:16:525 948 a04 Agent * WARNING: Exit code = 0x80072EE2
2013-05-13 09:19:16:525 948 a04 Agent *********
2013-05-13 09:19:16:525 948 a04 Agent ** END ** Agent: Finding updates [CallerId = CcmExec]
2013-05-13 09:19:16:525 948 a04 Agent *************
2013-05-13 09:19:16:525 948 a04 Agent WARNING: WU client failed Searching for update with error 0x80072ee2
2013-05-13 09:19:16:526 5704 19b8 COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = CcmExec]
2013-05-13 09:19:16:527 5704 19b8 COMAPI - Updates found = 0
2013-05-13 09:19:16:527 5704 19b8 COMAPI - WARNING: Exit code = 0x00000000, Result code = 0x80072EE2
2013-05-13 09:19:16:527 5704 19b8 COMAPI ---------
2013-05-13 09:19:16:527 5704 19b8 COMAPI -- END -- COMAPI: Search [ClientId = CcmExec]
2013-05-13 09:19:16:527 5704 19b8 COMAPI -------------
2013-05-13 09:19:16:527 5704 19b8 COMAPI WARNING: Operation failed due to earlier error, hr=80072EE2
2013-05-13 09:19:16:527 5704 19b8 COMAPI FATAL: Unable to complete asynchronous search. (hr=80072EE2)
2013-05-13 09:19:21:526 948 a04 Report REPORT EVENT: {4F1FD932-6FB2-4909-BB14-B58ECB839A4B} 2013-05-13 09:19:16:524+1000 1 148 101 {00000000-0000-0000-0000-000000000000} 0 80072ee2 CcmExec Failure Software
Synchronization Windows Update Client failed to detect with error 0x80072ee2.
2013-05-13 09:19:21:543 948 a04 Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
2013-05-13 09:19:21:543 948 a04 Report WER Report sent: 7.6.7600.256 0x80072ee2 00000000-0000-0000-0000-000000000000 Scan 101 Managed
2013-05-13 09:19:21:543 948 a04 Report CWERReporter finishing event handling. (00000000)
From my research this indicates to me that these computers are trying to access the internet to perform their updates. They should be going to Config Mgr as specified in the policy and then WSUS (MS Updates is not selected in my policy). These
machines do not have internet access. The machines that are updating correctly also don't have internet access
Below is the WUAHandler.log
Its a WSUS Update Source type ({E6405AF2-4712-4848-8E46-A6AFF1872B0A}), adding it. WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
Existing WUA Managed server was already set (%FQDN%:8530), skipping Group Policy registration. WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
Added Update Source ({E6405AF2-4712-4848-8E46-A6AFF1872B0A}) of content type: 2 WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
Scan results will include superseded updates only when they are superseded by service packs and definition updates. WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver') WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
Async searching of updates using WUAgent started. WUAHandler 13/05/2013 9:18:15 AM 6584 (0x19B8)
Async searching completed. WUAHandler 13/05/2013 9:19:16 AM 5152 (0x1420)
OnSearchComplete - Failed to end search job. Error = 0x80072ee2. WUAHandler 13/05/2013 9:19:16 AM 6584 (0x19B8)
Scan failed with error = 0x80072ee2. WUAHandler 13/05/2013 9:19:16 AM 6584 (0x19B8)
Any help would be awesome
ThanksThanks for the reply.
It shouldn't be a proxy issue as the computers aren't configured to use a proxy. Nothing is ticked in IE settings about connecting to the Internet and the netsh winhttp show proxy gives me a direct connection
Nothing in bypass list as well
I check these settings on a machine that is working and the settings are the same
I looked in the scanagent.log and got this
- -Processing Scan Job TTL invalidity request ScanAgent 16/05/2013 3:02:17 PM 4376 (0x1118)
Message received: '<?xml version='1.0' ?> <UpdateSourceMessage MessageType='ScanByUpdateSource'>
<ForceScan>TRUE</ForceScan>
<UpdateSourceIDs>
<ID>{E6405AF2-4712-4848-8E46-A6AFF1872B0A} </ID>
</UpdateSourceIDs>
</UpdateSourceMessage>'
ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
*****ScanByUpdateSource request received with ForceReScan=2, ScanOptions=0x0000000a, WSUSLocationTimeout = 604800 ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
Sources are not current ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): - - - - - -Locations requested for ScanJobID={9B789A83-3229-4658-99E4-0FD797B48AB0} (LocationRequestID={5D090B44-18AC-4153-AEB4-55CE285A7CD1}), will process the scan request once locations are available. ScanAgent 16/05/2013
3:02:19 PM 5348 (0x14E4)
*****WSUSLocationUpdate received for location request guid={5D090B44-18AC-4153-AEB4-55CE285A7CD1} ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
Sources are not current ScanAgent 16/05/2013 3:02:19 PM 3680 (0x0E60)
ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): CScanJob::OnScanComplete -Scan Failed with Error=0x80244019 ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): CScanJob::ScheduleScanRetry- ScanRetry Timer task successfully scheduled. Will wake up in next 1800 seconds ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): CScanJob::OnScanComplete - Scan Retry successfully scheduled ScanAgent 16/05/2013 3:02:19 PM 5348 (0x14E4)
ScanJob({9B789A83-3229-4658-99E4-0FD797B48AB0}): CScanJobManager::OnScanComplete- Scan has failed, scan request will be pending for scan retry cycle. ScanAgent 16/05/2013 3:02:20 PM 5348 (0x14E4)
CScanAgent::ScanCompleteCallback - failed at OnScanComplete with error=0x87d00631 ScanAgent 16/05/2013 3:02:20 PM 5348 (0x14E4)
Doesn't make any sense to me
I can use IE to hit the wsus/sccm server (roles installed on same machine). It will prompt me to download or save the *.cab files as well.
Maybe you are looking for
-
Help needed in EBS cloning.
Hi, Today i am doing cloning from TARGET A to TARGET B. in both locations DB name and ebs instance name is same only the difference is hostname. i am using DB hot backup and followed below method to clone and DB tier clone went fine. While cloning ap
-
Solaris 10 on T1000 : Calculations VERY SLOW
We bought a T1000 for Web server application. We have to resize online some images using Imagemagick. The resizing is very very slow (on an e450 - 250MHz sparc II... 1 sec, on the T1000...nearly 2 minutes!!) Any idea for an optimization ? Kind regard
-
How did you learn flash?
I have never created a website before and I want to know if Flash will help me accomplish my goal. I am having a devil of a time locating tutorials and books that can help me learn what I need to know in Flash CS3. Most of what I find is for Flash 8.
-
Call BDC that stop's at dynpro screen from web dynpro
hey , i have a bdc that stop's at dynpro screen to show some data . i created a WDP application and wrapped it in a transaction so the users can run it via SAP and not from sap portal . is it possible to run the BDC from WDP and show this screen ? th
-
Error Using the VB Outline API
Recently, I wrote a VB 6.0 application to perform a simple task in order to accomodate difficulties with Hyperion Planning. The application initializes the API, opens the outline, deletes a few members, restructures, and exits.Following is my functio