WSUS downstream replication
Here is my issue.
We have WSUS (version 3.2.7600.226) setup on Windows server 2003 x86 and planned to migrate to the new WSUS on windows server 2012 R2 box and once done then retired the 2003 server.
The way it was done was to create separate wsus on server 2012 and then make it a downstream server. Now the groups are replicated to the downstream server, however it is not pulling the computers. Event log showed the following errors Event ID 13051 no
client computers have ever contacted the server. Not sure what the issue is. synchronization also fail with error message An HTTP error occurred.
WebException: Unable to connect to the remote server ---> System.Net.Sockets.SocketException: No connection could be made because the target machine actively refused it 192.168.x.x:8530
at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context)
at System.Net.HttpWebRequest.GetRequestStream()
at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetAuthConfig()
at Microsoft.UpdateServices.ServerSync.ServerSyncLib.InternetGetServerAuthConfig(ServerSyncProxy proxy, WebServiceCommunicationHelper webServiceHelper)
at Microsoft.UpdateServices.ServerSync.ServerSyncLib.Authenticate(AuthorizationManager authorizationManager, Boolean checkExpiration, ServerSyncProxy proxy, Cookie cookie, WebServiceCommunicationHelper webServiceHelper)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.SyncConfigUpdatesFromUSS()
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)
I've asked security team to check firewall.
Also once this is resolved can we make it standalone server and remove the upstream server ?
If not What will be the easiest and best way to migrate WSUS from server 2003 to server 2012 ?
It was a firewall issue. I was able to communicate with the upstream server.
Now the next part. So I reconfigure my downstream server (server2) as an upstream server and synchronize with microsoft. I configured the clients to communicate with the new wsus server. After applying gpo and everything the clients are still not showing
up. I checked the Windowsupdate.log on client computer and I'm getting the following errors
2014-11-04 09:52:03:065
1836 45e0
PT +++++++++++ PT: Synchronizing server updates +++++++++++
2014-11-04 09:52:03:065
1836 45e0
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://server2.domain.org/ClientWebService/client.asmx
2014-11-04 09:52:03:065
1836 45e0
EP Got WSUS SimpleTargeting URL: "http://server2.domain.org"
2014-11-04 09:52:03:065
1836 45e0
IdleTmr WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie) started; operation # 85; does use network; is at background priority
2014-11-04 09:52:03:065
1836 45e0
PT Initializing simple targeting cookie, clientId = 8d9331e5-3fbf-4a44-bd40-26e3cc2dea3a, target group = Testing, DNS name = machine1.domain.org
2014-11-04 09:52:03:065
1836 45e0
PT Server URL = http://server2.domain.org/SimpleAuthWebService/SimpleAuth.asmx
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Nws Failure: errorCode=0x803d000d
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: There was an error communicating with the endpoint at 'http://server2.domain.org/SimpleAuthWebService/SimpleAuth.asmx'.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: The server returned HTTP status code '404 (0x194)' with text 'Not Found'.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: The requested resource was not found.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: MapToSusHResult mapped Nws error 0x803d000d to 0x80244019
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Web service call failed with hr = 80244019.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Current service auth scheme='None'.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Proxy List used: '(null)', Bypass List used: '(null)', Last Proxy used: '(null)', Last auth Schemes used: 'None'.
2014-11-04 09:52:04:037
1836 45e0
WS FATAL: OnCallFailure failed with hr=0X80244019
2014-11-04 09:52:04:037
1836 45e0
WS FATAL: NwsCallWithRetries<Functor>( Functor(_clientId, _targetGroupName, _dnsName, &_result)) failed with hr=0x80244019
2014-11-04 09:52:04:037
1836 45e0
IdleTmr WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie, operation # 85) stopped; does use network; is at background priority
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: Failed to initialize Simple Targeting Cookie: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: PopulateAuthCookies failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: RefreshCookie failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: RefreshPTState failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT + SyncUpdates round trips: 0
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: Sync of Updates: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: SyncServerUpdatesInternal failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
Agent * WARNING: Failed to synchronize, error = 0x80244019
2014-11-04 09:52:04:038
1836 45e0
Agent * WARNING: Exit code = 0x80244019
2014-11-04 09:52:04:038
1836 45e0
Agent *********
2014-11-04 09:52:04:038
1836 45e0
Agent ** END ** Agent: Finding updates [CallerId = Windows Update Command Line Id = 1]
2014-11-04 09:52:04:038
1836 45e0
Agent *************
2014-11-04 09:52:04:038
1836 45e0
Agent WARNING: WU client failed Searching for update with error 0x80244019
I'm not sure why is it not able to communicate. Any help will be appreciated.
Similar Messages
-
WSUS Downstream server not synchronizing - SQL Timeout
I'm running into problems synching a downstream WSUS server with the parent server. The first few times that the server synch'd it ran fine, then it just stopped working. The Windows Firewall is disabled and there is no proxy. I've checked all the permissions
for IIS and all required services are running. I've also tried an IISRESET, uninstall WSUS, re-installed, ran wsusutil.exe reset and checkhealth, rebooted many times. Ran the DB Cleanup Wizard on both servers. Any help woul be appreciated.
WSUS Parent Server: Windows Server 2003 R2 SP2
WSUS Downstream Server: Windows Server 2003 R2 SP2
WSUS Failed Error Message:
SqlException: Timeout expired. The timeout period elapsed prior to completion of the operation or the server is not responding.
at System.Data.SqlClient.SqlConnection.OnError(SqlException exception, Boolean breakConnection)
at System.Data.SqlClient.SqlInternalConnection.OnError(SqlException exception, Boolean breakConnection)
at System.Data.SqlClient.TdsParser.ThrowExceptionAndWarning(TdsParserStateObject stateObj)
at System.Data.SqlClient.TdsParser.Run(RunBehavior runBehavior, SqlCommand cmdHandler, SqlDataReader dataStream, BulkCopySimpleResultSet bulkCopyHandler, TdsParserStateObject stateObj)
at System.Data.SqlClient.SqlDataReader.ReadInternal(Boolean setTimeout)
at System.Data.SqlClient.SqlDataReader.Read()
at Microsoft.UpdateServices.DatabaseAccess.DBConnection.ReadOneRow()
at Microsoft.UpdateServices.Internal.DataAccess.HideUpdatesForReplicaSync(String xmlUpdateIds)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ProcessHiddenUpdates(Guid[] hiddenUpdates)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ReplicaSync()
at Microsoft.UpdateServic
Thank YouSure, here are the log files. Thank you!
UPSTREAM SERVER:
Running... GetConfiguration
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Update Services\Server\Setup
Version:3
InstallLanguage:ENU
ProxyPassword:
SmtpUserPassword:
VersionString:3.2.7600.226
ConfigurationSource:0
ServicePackLevel:2
TargetDir:C:\Program Files\Update Services\
InstallType:1
EnableRemoting:1
WsusAdministratorsSid:S-1-5-21-163115894-1154025269-1635805901-1010
WSUSReportersSid:S-1-5-21-163115894-1154025269-1635805901-1009
SqlServerName:WSUSDAL\MICROSOFT##SSEE
SqlAuthenticationMode:WindowsAuthentication
SqlDatabaseName:SUSDB
SqlUserName:
SqlEncryptedPassword:
SqlInstanceIsRemote:0
wYukonInstalled:1
ContentDir:E:\WSUS
PortNumber:8530
IISTargetWebSiteIndex:625045861
IISTargetWebSiteCreated:True
IISUninstallConfigFilePath:C:\Program Files\Update Services\setup\UninstallSettings.xml
IISPreviousInstallRevision:
IISInstallRevision:3.2.7600.226
IIsDynamicCompression:0
EncryptionParam:System.Byte[]
EncryptionKey:System.Byte[]
<NewDataSet>
<Table>
<ConfigurationID>1</ConfigurationID>
<LastConfigChange>2010-05-30T21:19:36.8700000-05:00</LastConfigChange>
<DssAnonymousTargeting>false</DssAnonymousTargeting>
<IsRegistrationRequired>true</IsRegistrationRequired>
<MaxDeltaSyncPeriod>30</MaxDeltaSyncPeriod>
<ReportingServiceUrl>https://stats.update.microsoft.com</ReportingServiceUrl>
<ServerID>c48b3181-a77e-4a88-8986-3dd6bf07c291</ServerID>
<AnonymousCookieExpirationTime>10080</AnonymousCookieExpirationTime>
<SimpleTargetingCookieExpirationTime>60</SimpleTargetingCookieExpirationTime>
<MaximumServerCookieExpirationTime>10080</MaximumServerCookieExpirationTime>
<DssTargetingCookieExpirationTime>240</DssTargetingCookieExpirationTime>
<EncryptionKey>dE3WZ7GGMBOpG/ftJuzo7lDLHBFVT7VR</EncryptionKey>
<ServerTargeting>false</ServerTargeting>
<SyncToMU>true</SyncToMU>
<UpstreamServerName>SUSDal</UpstreamServerName>
<ServerPortNumber>8530</ServerPortNumber>
<UpstreamServerUseSSL>false</UpstreamServerUseSSL>
<UseProxy>false</UseProxy>
<ProxyName />
<ProxyServerPort>80</ProxyServerPort>
<AnonymousProxyAccess>true</AnonymousProxyAccess>
<ProxyUserName />
<HostOnMu>false</HostOnMu>
<LocalContentCacheLocation>e:\WSUS\WsusContent\</LocalContentCacheLocation>
<ServerSupportsAllLanguages>false</ServerSupportsAllLanguages>
<LogLevel>0</LogLevel>
<LogPath />
<SubscriptionFailureNumberOfRetries>3</SubscriptionFailureNumberOfRetries>
<SubscriptionFailureWaitBetweenRetriesTime>15</SubscriptionFailureWaitBetweenRetriesTime>
<DispatchManagerPollingInterval>5</DispatchManagerPollingInterval>
<StateMachineTransitionLoggingEnabled>false</StateMachineTransitionLoggingEnabled>
<StateMachineTransitionErrorCaptureLength>600</StateMachineTransitionErrorCaptureLength>
<MaxSimultaneousFileDownloads>10</MaxSimultaneousFileDownloads>
<MUUrl>https://www.update.microsoft.com/v6</MUUrl>
<EventLogFloodProtectTime>10</EventLogFloodProtectTime>
<HandshakeAnchor>13270510,2010-06-02 21:12:31.056</HandshakeAnchor>
<StatsDotNetWebServiceUri>http://localhost</StatsDotNetWebServiceUri>
<QueueFlushTimeInMS>3000</QueueFlushTimeInMS>
<QueueFlushCount>100</QueueFlushCount>
<QueueRejectCount>500</QueueRejectCount>
<SleepTimeAfterErrorInMS>30000</SleepTimeAfterErrorInMS>
<LogDestinations>0</LogDestinations>
<AutoRefreshDeployments>true</AutoRefreshDeployments>
<RedirectorChangeNumber>0</RedirectorChangeNumber>
<ImportLocalPath />
<UseCookieValidation>true</UseCookieValidation>
<AutoPurgeClientEventAgeThreshold>15</AutoPurgeClientEventAgeThreshold>
<AutoPurgeServerEventAgeThreshold>90</AutoPurgeServerEventAgeThreshold>
<AutoPurgeDetectionPeriod>12</AutoPurgeDetectionPeriod>
<DoReportingDataValidation>true</DoReportingDataValidation>
<DoReportingSummarization>true</DoReportingSummarization>
<MaxNumberOfIdsToRequestDataFromUss>100</MaxNumberOfIdsToRequestDataFromUss>
<MaxCoreUpdatesPerRequest>30</MaxCoreUpdatesPerRequest>
<MaxExtendedUpdatesPerRequest>50</MaxExtendedUpdatesPerRequest>
<DownloadRegulationUrl />
<AllowProxyCredentialsOverNonSsl>false</AllowProxyCredentialsOverNonSsl>
<LazySync>true</LazySync>
<DownloadExpressPackages>false</DownloadExpressPackages>
<DoServerSyncCompression>true</DoServerSyncCompression>
<ProxyUserDomain />
<BitsHealthScanningInterval>3600000</BitsHealthScanningInterval>
<BitsDownloadPriorityForeground>false</BitsDownloadPriorityForeground>
<MaxXmlPerRequest>5242880</MaxXmlPerRequest>
<MaxXmlPerRequestInServerSync>2000000</MaxXmlPerRequestInServerSync>
<MaxTargetComputers>30000</MaxTargetComputers>
<MaxEventInstances>2000000</MaxEventInstances>
<LogRolloverFileSizeInBytes>0</LogRolloverFileSizeInBytes>
<WUSInstallType>0</WUSInstallType>
<ReplicaMode>false</ReplicaMode>
<AutoDeployMandatory>true</AutoDeployMandatory>
<DeploymentChangeDeferral>30</DeploymentChangeDeferral>
<RevisionDeletionTimeThreshold>30</RevisionDeletionTimeThreshold>
<RevisionDeletionSizeThreshold>1024</RevisionDeletionSizeThreshold>
<CollectClientInventory>false</CollectClientInventory>
<DoDetailedRollup>true</DoDetailedRollup>
<RollupResetGuid>83340a0d-4624-4cb9-bc30-db197c999bc8</RollupResetGuid>
<UssSupportsAllLanguages>false</UssSupportsAllLanguages>
<GetContentFromMU>false</GetContentFromMU>
<HmDetectIntervalInSeconds>600</HmDetectIntervalInSeconds>
<HmRefreshIntervalInSeconds>21600</HmRefreshIntervalInSeconds>
<HmCoreDiskSpaceGreenMegabytes>500</HmCoreDiskSpaceGreenMegabytes>
<HmCoreDiskSpaceRedMegabytes>200</HmCoreDiskSpaceRedMegabytes>
<HmCoreCatalogSyncIntervalInDays>1</HmCoreCatalogSyncIntervalInDays>
<HmClientsInstallUpdatesGreenPercent>10</HmClientsInstallUpdatesGreenPercent>
<HmClientsInstallUpdatesRedPercent>25</HmClientsInstallUpdatesRedPercent>
<HmClientsInventoryGreenPercent>2</HmClientsInventoryGreenPercent>
<HmClientsInventoryRedPercent>5</HmClientsInventoryRedPercent>
<HmClientsInventoryScanDiffInHours>30</HmClientsInventoryScanDiffInHours>
<HmClientsSilentGreenPercent>10</HmClientsSilentGreenPercent>
<HmClientsSilentRedPercent>25</HmClientsSilentRedPercent>
<HmClientsSilentDays>30</HmClientsSilentDays>
<DssRollupChunkSize>5000</DssRollupChunkSize>
<MURollupOptin>False</MURollupOptin>
<AutoRefreshDeploymentsDeclineExpired>true</AutoRefreshDeploymentsDeclineExpired>
<ServerString>Default</ServerString>
<HmCoreFlags>-1</HmCoreFlags>
<HmClientsFlags>-1</HmClientsFlags>
<HmDatabaseFlags>-1</HmDatabaseFlags>
<HmWebServicesFlags>-1</HmWebServicesFlags>
<ClientReportingLevel>2</ClientReportingLevel>
<LocalPublishingMaxCabSize>384</LocalPublishingMaxCabSize>
<DownloadRegulationWebServiceUrl />
<LoadOdfLocally>false</LoadOdfLocally>
<OdfFilePath />
<HmClientsTooManyGreenPercent>80</HmClientsTooManyGreenPercent>
<HmClientsTooManyRedPercent>90</HmClientsTooManyRedPercent>
<ComputerDeletionTimeThreshold>30</ComputerDeletionTimeThreshold>
<ConfigurationChangeNumber>137118</ConfigurationChangeNumber>
<UseSeparateProxyForSsl>false</UseSeparateProxyForSsl>
<SslProxyName />
<SslProxyServerPort>443</SslProxyServerPort>
<ServerSupportsAllAvailableLanguages>false</ServerSupportsAllAvailableLanguages>
</Table>
</NewDataSet>
DOWNSTREAM SERVER:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Update Services\Server\Setup
Version:3
InstallLanguage:ENU
ProxyPassword:
SmtpUserPassword:
VersionString:3.2.7600.226
ConfigurationSource:0
ServicePackLevel:2
TargetDir:C:\Program Files\Update Services\
InstallType:1
EnableRemoting:1
WsusAdministratorsSid:S-1-5-21-2105027866-1443240842-1445603992-20366
WSUSReportersSid:S-1-5-21-2105027866-1443240842-1445603992-19384
SqlServerName:SUSFTW\MICROSOFT##SSEE
SqlAuthenticationMode:WindowsAuthentication
SqlDatabaseName:SUSDB
SqlUserName:
SqlEncryptedPassword:
SqlInstanceIsRemote:0
wYukonInstalled:1
ContentDir:D:\WSUS
PortNumber:8530
IISTargetWebSiteIndex:602037408
IISTargetWebSiteCreated:True
IISUninstallConfigFilePath:C:\Program Files\Update Services\setup\UninstallSettings.xml
IISPreviousInstallRevision:
IISInstallRevision:3.2.7600.226
IIsDynamicCompression:-1
EncryptionParam:System.Byte[]
EncryptionKey:System.Byte[]
<NewDataSet>
<Table>
<ConfigurationID>1</ConfigurationID>
<LastConfigChange>2010-06-02T00:00:35.0200000-05:00</LastConfigChange>
<DssAnonymousTargeting>false</DssAnonymousTargeting>
<IsRegistrationRequired>true</IsRegistrationRequired>
<MaxDeltaSyncPeriod>30</MaxDeltaSyncPeriod>
<ReportingServiceUrl>https://stats.update.microsoft.com</ReportingServiceUrl>
<ServerID>dac8845b-855c-4899-ab19-8bf7a750514f</ServerID>
<AnonymousCookieExpirationTime>10080</AnonymousCookieExpirationTime>
<SimpleTargetingCookieExpirationTime>60</SimpleTargetingCookieExpirationTime>
<MaximumServerCookieExpirationTime>10080</MaximumServerCookieExpirationTime>
<DssTargetingCookieExpirationTime>240</DssTargetingCookieExpirationTime>
<EncryptionKey>VoxRFFCoICrJYoTjr5WL1aOzfX1CSL9m</EncryptionKey>
<ServerTargeting>true</ServerTargeting>
<SyncToMU>false</SyncToMU>
<UpstreamServerName>WSUSDAL</UpstreamServerName>
<ServerPortNumber>8530</ServerPortNumber>
<UpstreamServerUseSSL>false</UpstreamServerUseSSL>
<UseProxy>false</UseProxy>
<ProxyName />
<ProxyServerPort>80</ProxyServerPort>
<AnonymousProxyAccess>true</AnonymousProxyAccess>
<ProxyUserName />
<HostOnMu>false</HostOnMu>
<LocalContentCacheLocation>d:\WSUS\WsusContent\</LocalContentCacheLocation>
<ServerSupportsAllLanguages>false</ServerSupportsAllLanguages>
<LogLevel>0</LogLevel>
<LogPath />
<SubscriptionFailureNumberOfRetries>3</SubscriptionFailureNumberOfRetries>
<SubscriptionFailureWaitBetweenRetriesTime>15</SubscriptionFailureWaitBetweenRetriesTime>
<DispatchManagerPollingInterval>5</DispatchManagerPollingInterval>
<StateMachineTransitionLoggingEnabled>false</StateMachineTransitionLoggingEnabled>
<StateMachineTransitionErrorCaptureLength>600</StateMachineTransitionErrorCaptureLength>
<MaxSimultaneousFileDownloads>10</MaxSimultaneousFileDownloads>
<MUUrl>https://www.update.microsoft.com/v6</MUUrl>
<EventLogFloodProtectTime>10</EventLogFloodProtectTime>
<HandshakeAnchor>136861,2010-06-02 00:00:34.112</HandshakeAnchor>
<StatsDotNetWebServiceUri>http://localhost</StatsDotNetWebServiceUri>
<QueueFlushTimeInMS>3000</QueueFlushTimeInMS>
<QueueFlushCount>100</QueueFlushCount>
<QueueRejectCount>500</QueueRejectCount>
<SleepTimeAfterErrorInMS>30000</SleepTimeAfterErrorInMS>
<LogDestinations>0</LogDestinations>
<AutoRefreshDeployments>true</AutoRefreshDeployments>
<RedirectorChangeNumber>0</RedirectorChangeNumber>
<ImportLocalPath />
<UseCookieValidation>true</UseCookieValidation>
<AutoPurgeClientEventAgeThreshold>15</AutoPurgeClientEventAgeThreshold>
<AutoPurgeServerEventAgeThreshold>90</AutoPurgeServerEventAgeThreshold>
<AutoPurgeDetectionPeriod>12</AutoPurgeDetectionPeriod>
<DoReportingDataValidation>true</DoReportingDataValidation>
<DoReportingSummarization>true</DoReportingSummarization>
<MaxNumberOfIdsToRequestDataFromUss>100</MaxNumberOfIdsToRequestDataFromUss>
<MaxCoreUpdatesPerRequest>30</MaxCoreUpdatesPerRequest>
<MaxExtendedUpdatesPerRequest>50</MaxExtendedUpdatesPerRequest>
<DownloadRegulationUrl />
<AllowProxyCredentialsOverNonSsl>false</AllowProxyCredentialsOverNonSsl>
<LazySync>true</LazySync>
<DownloadExpressPackages>false</DownloadExpressPackages>
<DoServerSyncCompression>true</DoServerSyncCompression>
<ProxyUserDomain />
<BitsHealthScanningInterval>3600000</BitsHealthScanningInterval>
<BitsDownloadPriorityForeground>false</BitsDownloadPriorityForeground>
<MaxXmlPerRequest>5242880</MaxXmlPerRequest>
<MaxXmlPerRequestInServerSync>2000000</MaxXmlPerRequestInServerSync>
<MaxTargetComputers>30000</MaxTargetComputers>
<MaxEventInstances>2000000</MaxEventInstances>
<LogRolloverFileSizeInBytes>0</LogRolloverFileSizeInBytes>
<WUSInstallType>0</WUSInstallType>
<ReplicaMode>true</ReplicaMode>
<AutoDeployMandatory>true</AutoDeployMandatory>
<DeploymentChangeDeferral>30</DeploymentChangeDeferral>
<RevisionDeletionTimeThreshold>30</RevisionDeletionTimeThreshold>
<RevisionDeletionSizeThreshold>1024</RevisionDeletionSizeThreshold>
<CollectClientInventory>false</CollectClientInventory>
<DoDetailedRollup>true</DoDetailedRollup>
<RollupResetGuid>83340a0d-4624-4cb9-bc30-db197c999bc8</RollupResetGuid>
<UssSupportsAllLanguages>false</UssSupportsAllLanguages>
<GetContentFromMU>false</GetContentFromMU>
<HmDetectIntervalInSeconds>600</HmDetectIntervalInSeconds>
<HmRefreshIntervalInSeconds>21600</HmRefreshIntervalInSeconds>
<HmCoreDiskSpaceGreenMegabytes>500</HmCoreDiskSpaceGreenMegabytes>
<HmCoreDiskSpaceRedMegabytes>200</HmCoreDiskSpaceRedMegabytes>
<HmCoreCatalogSyncIntervalInDays>1</HmCoreCatalogSyncIntervalInDays>
<HmClientsInstallUpdatesGreenPercent>10</HmClientsInstallUpdatesGreenPercent>
<HmClientsInstallUpdatesRedPercent>25</HmClientsInstallUpdatesRedPercent>
<HmClientsInventoryGreenPercent>2</HmClientsInventoryGreenPercent>
<HmClientsInventoryRedPercent>5</HmClientsInventoryRedPercent>
<HmClientsInventoryScanDiffInHours>30</HmClientsInventoryScanDiffInHours>
<HmClientsSilentGreenPercent>10</HmClientsSilentGreenPercent>
<HmClientsSilentRedPercent>25</HmClientsSilentRedPercent>
<HmClientsSilentDays>30</HmClientsSilentDays>
<DssRollupChunkSize>5000</DssRollupChunkSize>
<MURollupOptin>False</MURollupOptin>
<AutoRefreshDeploymentsDeclineExpired>true</AutoRefreshDeploymentsDeclineExpired>
<ServerString>Default</ServerString>
<HmCoreFlags>-1</HmCoreFlags>
<HmClientsFlags>-1</HmClientsFlags>
<HmDatabaseFlags>-1</HmDatabaseFlags>
<HmWebServicesFlags>-1</HmWebServicesFlags>
<ClientReportingLevel>2</ClientReportingLevel>
<LocalPublishingMaxCabSize>384</LocalPublishingMaxCabSize>
<DownloadRegulationWebServiceUrl />
<LoadOdfLocally>false</LoadOdfLocally>
<OdfFilePath />
<HmClientsTooManyGreenPercent>80</HmClientsTooManyGreenPercent>
<HmClientsTooManyRedPercent>90</HmClientsTooManyRedPercent>
<ComputerDeletionTimeThreshold>30</ComputerDeletionTimeThreshold>
<ConfigurationChangeNumber>76409</ConfigurationChangeNumber>
<UseSeparateProxyForSsl>false</UseSeparateProxyForSsl>
<SslProxyName />
<SslProxyServerPort>443</SslProxyServerPort>
<ServerSupportsAllAvailableLanguages>false</ServerSupportsAllAvailableLanguages>
</Table>
</NewDataSet> -
Downstream replication problem
I configured a downstream replication. Then I got "WAITING FOR DICTIONARY REDO"
And I made a log switch in source db by 'alter system archive log current'. After that the 'waiting' message is gone but 'loading' is started. but 'LOADING (step 46 of 46)' is constant. its not changing. What can I don now?
thanx.FYI, Oracle Support have confirmed the target needs to be at an equal (10.2.0.5.0) or greater release level.
cheers,
Ron -
Wsus downstream server not showing up
OS: Windows 2003
WSUS: 3.0 SP1
Architecture: 3-tier WSUS, Level 1 approve/decline updates and sync with microsoft update websites; Level 2 is replica of Level 1; Level 3 is downstream servers of Level2 and configed into autonomous mode.
We have a 3-tier WSUS infrastructure in test mode. The WSUS.Level1 server gets updates directly from Microsoft Updates. WSUS.Level2 server is a replica server of Level 1 server, i.e., upstream server is WSUS.Level1. There are more than 20 other Level 3 WSUS servers use WSUS.Level2 as the upstream servers. Level 3 servers are setup as autonomous mode at this moment.
The Level 3 servers were created from an image that were sealed and syspreped before restoring the Image.
Microsoft Updates Server -> WSUS.Level1 -> WSUS.Level2 -> 20 other WSUS Level 3 servers
Q1: there are only three Level 3 servers showing up in the Level 2 WSUS downstream server list (should be more as we have 20 WSUS level 3 servers). When I tried to manually sync from any Level 3 server, it will show up in the Level 2 WSUS downstream server list. However, it will replace one of the three servers that is already listed. Always 3 downstream servers showing up in Level2, always! Any idea why this happensThe Level 3 servers were created from an image that were sealed and syspreped before restoring the Image.
Q1: there are only three Level 3 servers showing up in the Level 2 WSUS downstream server list (should be more as we have 20 WSUS level 3 servers). When I tried to manually sync from any Level 3 server, it will show up in the Level 2 WSUS downstream server list. However, it will replace one of the three servers that is already listed. Always 3 downstream servers showing up in Level2, always! Any idea why this happens
<sigh>....
SYSPREP is not an appropriate tool to be used for imaging machines with *APPLICATIONS* installed, particularly if those applications use GUIDs to uniquely identify the machines, as WSUS downstream servers do.
So, ironically, only two threads earlier I answered this very identical scenario . . .
In theory, you should be able to do this to 'reset' these GUIDs...
1. Synchronize the downstream server so that it shows up in the console of the upstream server.
2. Set the downstream server synchronization schedule to MANUAL.
3. Modify the Options | Update Source and Proxy Server | Update Source page to make this an upstream server.
4. Delete the server from the Downstream Servers node of the upstream server's console.
5. Modify the Options | Update Source and Proxy Server | Update Source page to make this a downstream server again.
6. Initiate a synchronization.
You won't see any difference after performing these steps on the first server.
When you'll know this is working is if the second server shows up in the console after Step #6.
Repeat Steps #1 through #6 for the other three servers.
Lawrence Garvin, M.S., MCITP:EA, MCDBA, MCSA
Principal/CTO, Onsite Technology Solutions, Houston, Texas
Microsoft MVP - Software Distribution (2005-2010)
My MVP Profile: http://mvp.support.microsoft.com/profile/Lawrence.Garvin
My Blog: http://onsitechsolutions.spaces.live.com -
Computers not appearing in WSUS downstream replica server
Hello guys,
I need your advice on the setup of the replica servers. I currently installed a WSUS replica downstream server on one of our locations for the clients/servers in the same place to get the updates locally.
Now we are on Server 2012, on this box has WDS service working and I have decided to setup a WSUS replica here. So added WSUS role & SSL is enabled, so ports 8531 & 8530 are allowing traffic on the replica server. Now synching works fine with the
upstream server as far as updates & computer GROUPS were synch fine. Now the issue, is the computers are not showing up in the computer groups for the replica server in contrast with the upstream which has the computers. What could be the reason?
I have configured already the GPO for the clients intended to get updates for the replica, client side targeting & "Specify a MS intranet location..." is configured with the REPLICA servername:port. Am I missing anything? Please help..
Thank you, MonHi Mon Laq,
Please check your upstream and downstream server have any event occur, the client which not reporting must have error log.
Check if name resolution is working for parent server from this replica server, GPO were not applied correctly, please to confirm the sync between the upstream
and downstream server is working properly,
The following similar thread solution you can refer first.
Clients not installing updates from Downstream WSUS Server
http://social.technet.microsoft.com/Forums/windowsserver/en-US/3399a578-ddb0-4a66-9594-f3caa490e48d/clients-not-installing-updates-from-downstream-wsus-server
I’m glad to be of help to you!
We
are trying to better understand customer views on social support experience, so your participation in this
interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place. -
WSUS downstream Server synchroziation failed
Hi All,
I have upgraded my downstream server to Windows Server 2012 R2. After upgrade my WSUS server is not synchronization with my upstream WSUS server. I am getting the below error while running the synchronization.
IOException: Unable to read data from the transport connection: An existing connection was forcibly closed by the remote host. ---> System.Net.Sockets.SocketException: An existing connection was forcibly closed by the remote host
at System.Net.ConnectStream.Read(Byte[] buffer, Int32 offset, Int32 size)
at Microsoft.UpdateServices.ServerSync.ServerSyncCompressionProxy.GetWebResponse(WebRequest webRequest)
at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetRevisionIdList(Cookie cookie, ServerSyncFilter filter)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.WebserviceGetRevisionIdList(ServerSyncFilter filter, Boolean isConfigData)
at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)
Nirmal Singh IT AdministratorHow did you do the upgrade, was it in-place, or a new machine? And did you migrate the WSUS role or just deploy a new instance?
Are there any firewalls in place?
Do you have other downstream servers connecting to the upstream, if so are those connecting ok?
Do you have any clients connecting to the upstream?
What are the build numbers on both servers?
Are there any errors in the IIS log? -
WSUS Downstream server not downloading updates
I have a windows 2012R2 wsus server setup running wsus and getting updates fine from Microsoft Updates. We will call this server A in this example.
I have a downstream server that is windows 2012r2 and has wsus installed. We can call this server B. It is configured to use "Update Source" and point to A to get its updates. SSL is not being used.
Server B says it syncs fine with no errors. However, when i look in the content folder I see the folders (0A, 2A, 2F etc..) but they do not contain any files. When i run wsusutil checkhealth the following error comes up in event viewer.
The WSUS content directory is not accessible. System.Net.WebException: The remote server returned an error: (404) Not Found. at System.Net.HttpWebRequest.GetResponse() at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType
type, HealthEventLogger logger)
Any SuggesitonsWhen i run wsusutil checkhealth the following error comes up in event viewer.
The WSUS content directory is not accessible. System.Net.WebException:
The remote server returned an error: (404) Not Found. at System.Net.HttpWebRequest.GetResponse() at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType type, HealthEventLogger logger)
Any Suggesitons
Looks like the content store, specifically the /Content v-dir in IIS, is not configured correctly.
If so, it's also possible that the upstream server is not downloading content correctly from Microsoft. And if the downstream server cannot get to /Content, neither can any of the clients of the upstream server.
Start by inspecting the ApplicationEventLog on the upstream server for any evidence of download failures. If they don't exist, then this could simply be an issue with IIS. Verify that the /Content v-dir is configured to point to the correct location of the
~\WSUSContent folder.
Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
SolarWinds Head Geek
Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
http://www.solarwinds.com/gotmicrosoft
The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds. -
We have recently upgraded our WSUS server to Windows 2012 R2. Now none of the PCs reporting their status to the WSUS server and not getting updates at all. The PCs are contacting the Server but not reporting their status. Stopped the Firewall on Client and
Server. BITS and windows updates services are running.
Record the system time of the Windows 7 client.
Reboot the Windows 7 client.
Run this command from a command prompt: wuauclt /resetauthorization /detectnow.
Wait =30= minutes.
Performed the above steps. Please see the updates logs from a client.
2015-03-16 12:48:44:617
1040 15a4
Shutdwn user declined update at shutdown
2015-03-16 12:48:44:617
1040 15a4
AU Successfully wrote event for AU health state:0
2015-03-16 12:48:44:618
1040 15a4
AU AU initiates service shutdown
2015-03-16 12:48:44:649
1040 15a4
AU ########### AU: Uninitializing Automatic Updates ###########
2015-03-16 12:48:46:506
1040 15a4
Report CWERReporter finishing event handling. (00000000)
2015-03-16 12:48:46:584
1040 15a4
Service *********
2015-03-16 12:48:46:584
1040 15a4
Service ** END ** Service: Service exit [Exit code = 0x240001]
2015-03-16 12:48:46:584
1040 15a4
Service *************
2015-03-16 12:54:23:139
1024 1060
Misc =========== Logging initialized (build: 7.6.7600.320, tz: -0400) ===========
2015-03-16 12:54:23:214
1024 1060
Misc = Process: C:\Windows\system32\svchost.exe
2015-03-16 12:54:23:264
1024 1060
Misc = Module: c:\windows\system32\wuaueng.dll
2015-03-16 12:54:23:139
1024 1060
Service *************
2015-03-16 12:54:23:264
1024 1060
Service ** START ** Service: Service startup
2015-03-16 12:54:23:265
1024 1060
Service *********
2015-03-16 12:54:24:262
1024 1060
Agent * WU client version 7.6.7600.320
2015-03-16 12:54:24:263
1024 1060
Agent * Base directory: C:\Windows\SoftwareDistribution
2015-03-16 12:54:24:272
1024 1060
Agent * Access type: No proxy
2015-03-16 12:54:24:532
1024 1060
Agent * Network state: Connected
2015-03-16 12:55:17:235
1024 1060
Report CWERReporter::Init succeeded
2015-03-16 12:55:17:235
1024 1060
Agent *********** Agent: Initializing Windows Update Agent ***********
2015-03-16 12:55:17:235
1024 1060
Agent * Prerequisite roots succeeded.
2015-03-16 12:55:17:235
1024 1060
Agent *********** Agent: Initializing global settings cache ***********
2015-03-16 12:55:17:235
1024 1060
Agent * WSUS server: http://ewd-srv-01.resultstel.net:8530
2015-03-16 12:55:17:235
1024 1060
Agent * WSUS status server: http://ewd-srv-01.resultstel.net:8530
2015-03-16 12:55:17:235
1024 1060
Agent * Target group: Eastwood
2015-03-16 12:55:17:235
1024 1060
Agent * Windows Update access disabled: No
2015-03-16 12:55:17:247
1024 1060
DnldMgr Download manager restoring 0 downloads
2015-03-16 12:55:17:248
1024 1060
AU ########### AU: Initializing Automatic Updates ###########
2015-03-16 12:55:17:249
1024 1060
AU # WSUS server: http://ewd-srv-01.resultstel.net:8530
2015-03-16 12:55:17:249
1024 1060
AU # Detection frequency: 22
2015-03-16 12:55:17:249
1024 1060
AU # Target group: Eastwood
2015-03-16 12:55:17:249
1024 1060
AU # Approval type: Scheduled (Policy)
2015-03-16 12:55:17:249
1024 1060
AU # Scheduled install day/time: Every day at 3:00
2015-03-16 12:55:17:249
1024 1060
AU # Auto-install minor updates: Yes (Policy)
2015-03-16 12:55:17:249
1024 1060
AU # Will interact with non-admins (Non-admins are elevated (User preference))
2015-03-16 12:55:17:249
1024 1060
AU # Will display featured software notifications (User preference)
2015-03-16 12:55:17:259
1024 1060
Agent Switching to hardware-verified ClientId.
2015-03-16 12:55:17:260
1024 1060
AU Setting AU scheduled install time to 2015-03-17 07:00:00
2015-03-16 12:55:17:402
1024 1060
Report *********** Report: Initializing static reporting data ***********
2015-03-16 12:55:17:402
1024 1060
Report * OS Version = 6.1.7601.1.0.65792
2015-03-16 12:55:17:402
1024 1060
Report * OS Product Type = 0x00000030
2015-03-16 12:55:17:600
1024 1060
Report WARNING: Failed to load reporting information from WMI with hr = 80041002.
2015-03-16 12:55:17:601
1024 1060
Report * Locale ID = 1033
2015-03-16 12:55:17:654
1024 1060
AU Successfully wrote event for AU health state:0
2015-03-16 12:55:17:655
1024 1060
AU Initializing featured updates
2015-03-16 12:55:17:655
1024 1060
AU Found 0 cached featured updates
2015-03-16 12:55:17:655
1024 1060
AU Successfully wrote event for AU health state:0
2015-03-16 12:55:17:656
1024 1060
AU Successfully wrote event for AU health state:0
2015-03-16 12:55:17:656
1024 1060
AU AU finished delayed initialization
2015-03-16 12:55:23:261
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 12:55:41:121
1024 1074
AU Triggering AU detection through DetectNow API
2015-03-16 12:55:41:122
1024 1074
AU Triggering Online detection (non-interactive)
2015-03-16 12:55:41:193
1024 1060
AU #############
2015-03-16 12:55:41:193
1024 1060
AU ## START ## AU: Search for updates
2015-03-16 12:55:41:193
1024 1060
AU #########
2015-03-16 12:55:41:218
1024 1060
AU <<## SUBMITTED ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
2015-03-16 12:55:41:218
1024 1194
Agent *************
2015-03-16 12:55:41:218
1024 1194
Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2015-03-16 12:55:41:218
1024 1194
Agent *********
2015-03-16 12:55:41:218
1024 1194
Agent * Online = Yes; Ignore download priority = No
2015-03-16 12:55:41:218
1024 1194
Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0
and DeploymentAction='Uninstallation' and RebootRequired=1"
2015-03-16 12:55:41:218
1024 1194
Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2015-03-16 12:55:41:218
1024 1194
Agent * Search Scope = {Machine}
2015-03-16 12:55:41:218
1024 1194
Setup Checking for agent SelfUpdate
2015-03-16 12:55:41:219
1024 1194
Setup Client version: Core: 7.6.7600.320 Aux: 7.6.7600.320
2015-03-16 12:55:45:440
1024 1194
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2015-03-16 12:55:45:893
1024 1194
Misc Microsoft signed: NA
2015-03-16 12:55:45:897
1024 1194
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPD98D.tmp with dwProvFlags 0x00000080:
2015-03-16 12:55:45:979
1024 1194
Misc Microsoft signed: NA
2015-03-16 12:55:46:014
1024 1194
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2015-03-16 12:55:46:019
1024 1194
Misc Microsoft signed: NA
2015-03-16 12:55:46:050
1024 1194
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2015-03-16 12:55:46:055
1024 1194
Misc Microsoft signed: NA
2015-03-16 12:55:46:093
1024 1194
Setup Determining whether a new setup handler needs to be downloaded
2015-03-16 12:55:46:093
1024 1194
Setup SelfUpdate handler is not found. It will be downloaded
2015-03-16 12:55:46:093
1024 1194
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.320"
2015-03-16 12:55:52:237
1024 1194
Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
2015-03-16 12:55:52:237
1024 1194
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320"
2015-03-16 12:55:53:377
1024 1194
Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
2015-03-16 12:55:53:502
1024 1194
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320"
2015-03-16 12:55:56:705
1024 1194
Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
2015-03-16 12:55:56:896
1024 1194
Setup SelfUpdate check completed. SelfUpdate is NOT required.
2015-03-16 12:56:01:618
1024 1060
AU AU received policy change subscription event
2015-03-16 13:00:00:824
1024 1194
PT +++++++++++ PT: Synchronizing server updates +++++++++++
2015-03-16 13:00:00:824
1024 1194
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ewd-srv-01.resultstel.net:8530/ClientWebService/client.asmx
2015-03-16 13:00:01:001
1024 1194
PT WARNING: PTError: 0x80041002
2015-03-16 13:00:01:001
1024 1194
PT Initializing simple targeting cookie, clientId = f86ac648-7394-46eb-8f40-eb605f77d86b, target group = Eastwood, DNS name = ewd-wc-420-235.resultstel.net
2015-03-16 13:00:01:001
1024 1194
PT Server URL = http://ewd-srv-01.resultstel.net:8530/SimpleAuthWebService/SimpleAuth.asmx
2015-03-16 13:00:01:833
1024 1194
Agent WARNING: Failed to evaluate Installed rule, updateId = {F92A18E7-8784-4828-89C9-F80085A422A7}.202, hr = 80041002
2015-03-16 13:00:02:004
1024 1194
Agent WARNING: Failed to evaluate Installed rule, updateId = {C735DBB1-06B4-49F2-815F-97976B4B86A4}.102, hr = 80041002
2015-03-16 13:00:08:676
1024 1194
Agent WARNING: Failed to evaluate Installed rule, updateId = {6A8FE277-1048-48B1-803B-4580C15BBDF1}.100, hr = 80041002
2015-03-16 13:07:37:795
1024 1194
PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2015-03-16 13:07:37:795
1024 1194
PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ewd-srv-01.resultstel.net:8530/ClientWebService/client.asmx
2015-03-16 13:07:37:988
1024 1194
PT WARNING: PTError: 0x80041002
2015-03-16 13:07:41:893
1024 1194
PT WARNING: GetExtendedUpdateInfo failure, error = 0x8024400E, soap client error = 7, soap error code = 400, HTTP status code = 200
2015-03-16 13:07:41:893
1024 1194
PT WARNING: SOAP Fault: 0x000190
2015-03-16 13:07:41:893
1024 1194
PT WARNING: faultstring:Fault occurred
2015-03-16 13:07:41:893
1024 1194
PT WARNING: ErrorCode:InternalServerError(5)
2015-03-16 13:07:41:893
1024 1194
PT WARNING: Message:(null)
2015-03-16 13:07:41:893
1024 1194
PT WARNING: Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetExtendedUpdateInfo"
2015-03-16 13:07:41:893
1024 1194
PT WARNING: ID:4cd69d60-d69b-4591-88ad-5687cdda3265
2015-03-16 13:07:41:893
1024 1194
PT WARNING: PTError: 0x8024400e
2015-03-16 13:07:41:893
1024 1194
PT WARNING: GetExtendedUpdateInfo_WithRecovery: 0x8024400e
2015-03-16 13:07:41:893
1024 1194
PT WARNING: Sync of Extended Info: 0x8024400e
2015-03-16 13:07:41:893
1024 1194
PT WARNING: SyncServerUpdatesInternal failed : 0x8024400e
2015-03-16 13:07:41:914
1024 1194
Agent * WARNING: Exit code = 0x8024400E
2015-03-16 13:07:41:914
1024 1194
Agent *********
2015-03-16 13:07:41:914
1024 1194
Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2015-03-16 13:07:41:914
1024 1194
Agent *************
2015-03-16 13:07:41:914
1024 1194
Agent WARNING: WU client failed Searching for update with error 0x8024400e
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:929
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:930
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:41:930
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:07:42:021
1024 14f4
AU >>## RESUMED ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
2015-03-16 13:07:42:021
1024 14f4
AU # WARNING: Search callback failed, result = 0x8024400E
2015-03-16 13:07:42:021
1024 14f4
AU # WARNING: Failed to find updates with error code 8024400E
2015-03-16 13:07:42:021
1024 14f4
AU #########
2015-03-16 13:07:42:021
1024 14f4
AU ## END ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
2015-03-16 13:07:42:021
1024 14f4
AU #############
2015-03-16 13:07:42:021
1024 14f4
AU Successfully wrote event for AU health state:0
2015-03-16 13:07:42:021
1024 14f4
AU AU setting next detection timeout to 2015-03-16 22:07:42
2015-03-16 13:07:42:022
1024 14f4
AU Setting AU scheduled install time to 2015-03-17 07:00:00
2015-03-16 13:07:42:022
1024 14f4
AU Successfully wrote event for AU health state:0
2015-03-16 13:07:42:022
1024 14f4
AU Successfully wrote event for AU health state:0
2015-03-16 13:07:46:919
1024 1194
Report REPORT EVENT: {CB48FD20-D762-4E5E-8CCA-5C27F3CFA04A}
2015-03-16 13:07:41:913-0400 1
148 101
{00000000-0000-0000-0000-000000000000}
0 8024400e
AutomaticUpdates Failure
Software Synchronization Windows Update Client failed to detect with error 0x8024400e.
2015-03-16 13:07:47:022
1024 1194
Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
2015-03-16 13:07:47:022
1024 1194
Report WER Report sent: 7.6.7600.320 0x8024400e 00000000-0000-0000-0000-000000000000 Scan 101 Managed
2015-03-16 13:07:47:022
1024 1194
Report CWERReporter finishing event handling. (00000000)
2015-03-16 13:14:23:923
1024 1194
PT WARNING: PTError: 0x80041002
2015-03-16 13:14:23:923
1024 1194
Report Uploading 1 events using cached cookie, reporting URL = http://ewd-srv-01.resultstel.net:8530/ReportingWebService/ReportingWebService.asmxDon thank you for the reply.
But I do have the same issue on the other PCs as well on which WMI is good. And also i pointed the above PC to my primary WSUS server which is running windows 2003 and it reported successfully and downloaded the approved updates.
please see the below logs from the same PC after pointing to our wsus running on win2003.
2015-03-17 14:41:08:507
1020 f1c
Inv # Talking to WSUS server = http://atl-wsus-1:8530
2015-03-17 14:41:08:508
1020 f1c
Inv # Downloading Rule file from = http://atl-wsus-1:8530/Inventory/InventoryRules.cab
2015-03-17 14:41:08:508
1020 53c
AU #########
2015-03-17 14:41:08:508
1020 53c
AU ## END ## AU: Search for updates [CallId = {54490DE2-CF7B-4017-A553-6C8C1532E621}]
2015-03-17 14:41:08:508
1020 53c
AU #############
2015-03-17 14:41:08:510
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:510
1020 53c
AU Featured notifications is disabled.
2015-03-17 14:41:08:510
1020 53c
AU AU setting next detection timeout to 2015-03-18 16:13:54
2015-03-17 14:41:08:510
1020 53c
AU Setting AU scheduled install time to 2015-03-18 07:00:00
2015-03-17 14:41:08:510
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {6C2547EE-DC7B-4080-8884-A040572C5EC4}.204, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approving update for download, updateId = {673027F3-841E-4215-88BE-A0BFB456B2B1}.207, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
2015-03-17 14:41:08:510
1020 53c
AU Auto-approved 5 update(s) for download (NOT for Ux)
2015-03-17 14:41:08:510
1020 53c
AU #############
2015-03-17 14:41:08:511
1020 53c
AU ## START ## AU: Download updates
2015-03-17 14:41:08:511
1020 53c
AU #########
2015-03-17 14:41:08:511
1020 53c
AU # Approved updates = 5
2015-03-17 14:41:08:512
1020 53c
AU AU initiated download, updateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202, callId = {F3389077-03F0-4625-83EF-CAAEBA8ED147}
2015-03-17 14:41:08:513
1020 53c
AU AU initiated download, updateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203, callId = {B94BF4E5-5709-4D22-924A-5C5B8D4712C9}
2015-03-17 14:41:08:514
1020 53c
AU AU initiated download, updateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203, callId = {D330B2E0-CA38-4ED9-894A-36717C01F09A}
2015-03-17 14:41:08:515
1020 53c
AU AU initiated download, updateId = {6C2547EE-DC7B-4080-8884-A040572C5EC4}.204, callId = {B6B35AC2-9BC1-4CFA-8421-D666C79464AD}
2015-03-17 14:41:08:516
1020 53c
AU AU initiated download, updateId = {673027F3-841E-4215-88BE-A0BFB456B2B1}.207, callId = {F0D00A6F-36BC-4680-9BE4-4005742A2C93}
2015-03-17 14:41:08:516
1020 53c
AU Setting AU scheduled install time to 2015-03-18 07:00:00
2015-03-17 14:41:08:516
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:516
1020 53c
AU AU setting pending client directive to 'Download Progress'
2015-03-17 14:41:08:518
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:518
1020 53c
AU # Pending download calls = 5
2015-03-17 14:41:08:518
1020 53c
AU <<## SUBMITTED ## AU: Download updates
2015-03-17 14:41:08:520
1020 53c
AU Successfully wrote event for AU health state:0
2015-03-17 14:41:08:964
1020 f1c
Misc Validating signature for C:\Windows\SoftwareDistribution\Inventory\InventoryRule\InventoryRules.cab with dwProvFlags 0x00000080:
2015-03-17 14:41:08:976
1020 f1c
Misc Microsoft signed: NA
2015-03-17 14:41:08:993
1020 f1c
Inv # Inventory Rule id = 8226C3A1-70D4-4848-B441-1555AC820A23, version = 1.0
2015-03-17 14:41:09:022
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:086
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:118
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:150
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:182
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:214
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:246
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:278
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:310
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:342
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:374
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:406
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:438
1020 f1c
Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
2015-03-17 14:41:09:471
1020 f1c
PT WARNING: PTError: 0x80041002
2015-03-17 14:41:10:590
1020 f1c
Inv #########
2015-03-17 14:41:10:590
1020 f1c
Inv ## END ## Inv: Inventory Collection
2015-03-17 14:41:10:590
1020 f1c
Inv #############
2015-03-17 14:41:10:592
1020 f1c
DnldMgr *************
2015-03-17 14:41:10:592
1020 f1c
DnldMgr ** START ** DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:10:592
1020 f1c
DnldMgr *********
2015-03-17 14:41:10:592
1020 f1c
DnldMgr * Call ID = {F3389077-03F0-4625-83EF-CAAEBA8ED147}
2015-03-17 14:41:10:592
1020 f1c
DnldMgr * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2015-03-17 14:41:10:592
1020 f1c
DnldMgr * Updates to download = 1
2015-03-17 14:41:10:592
1020 f1c
Agent * Title = Security Update for Windows 7 (KB3029944)
2015-03-17 14:41:10:592
1020 f1c
Agent * UpdateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202
2015-03-17 14:41:10:592
1020 f1c
Agent * Bundles 1 updates:
2015-03-17 14:41:10:592
1020 f1c
Agent * {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202
2015-03-17 14:41:10:598
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202] ***********
2015-03-17 14:41:10:599
1020 f1c
DnldMgr * Queueing update for download handler request generation.
2015-03-17 14:41:10:599
1020 f1c
DnldMgr Generating download request for update {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202
2015-03-17 14:41:13:863
1020 f1c
Handler Generating request for CBS update CF9A0A9F-EA32-4B84-8B11-647F8DE3432C in sandbox C:\Windows\SoftwareDistribution\Download\4fa5441bcc144c4a7917304858841f6b
2015-03-17 14:41:13:863
1020 f1c
Handler Selected payload type is ptExpress
2015-03-17 14:41:13:863
1020 f1c
Handler Detected download state is dsStart
2015-03-17 14:41:13:863
1020 f1c
Handler Adding windows6.1-kb3029944-x86-express.cab (entire file) to request list.
2015-03-17 14:41:13:864
1020 f1c
Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
2015-03-17 14:41:13:864
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202] ***********
2015-03-17 14:41:16:436
1020 f1c
DnldMgr * BITS job initialized, JobId = {675985CD-3133-4157-9D02-06CC33C29C49}
2015-03-17 14:41:16:473
1020 f1c
DnldMgr * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/01/windows6.1-kb3029944-x86-express_0c21886fd0931285b2d3a29773d3673c947f60b3.cab to C:\Windows\SoftwareDistribution\Download\4fa5441bcc144c4a7917304858841f6b\windows6.1-kb3029944-x86-express.cab
(full file).
2015-03-17 14:41:16:644
1020 f1c
Agent *********
2015-03-17 14:41:16:644
1020 f1c
Agent ** END ** Agent: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:16:644
1020 f1c
Agent *************
2015-03-17 14:41:16:645
1020 f1c
DnldMgr *************
2015-03-17 14:41:16:645
1020 f1c
DnldMgr ** START ** DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:16:645
1020 f1c
DnldMgr *********
2015-03-17 14:41:16:645
1020 f1c
DnldMgr * Call ID = {B94BF4E5-5709-4D22-924A-5C5B8D4712C9}
2015-03-17 14:41:16:645
1020 f1c
DnldMgr * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2015-03-17 14:41:16:645
1020 f1c
DnldMgr * Updates to download = 1
2015-03-17 14:41:16:645
1020 f1c
Agent * Title = Security Update for Windows 7 (KB3004361)
2015-03-17 14:41:16:645
1020 f1c
Agent * UpdateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203
2015-03-17 14:41:16:645
1020 f1c
Agent * Bundles 1 updates:
2015-03-17 14:41:16:645
1020 f1c
Agent * {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203
2015-03-17 14:41:16:648
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203] ***********
2015-03-17 14:41:16:649
1020 f1c
DnldMgr * Queueing update for download handler request generation.
2015-03-17 14:41:16:649
1020 f1c
DnldMgr Generating download request for update {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203
2015-03-17 14:41:16:678
1020 f1c
Handler Generating request for CBS update 151B27A0-4EA8-428F-BE06-C90A3CF0C2CA in sandbox C:\Windows\SoftwareDistribution\Download\963019da42f4a0388fdc4337be401b25
2015-03-17 14:41:16:678
1020 f1c
Handler Selected payload type is ptExpress
2015-03-17 14:41:16:678
1020 f1c
Handler Detected download state is dsStart
2015-03-17 14:41:16:678
1020 f1c
Handler Adding windows6.1-kb3004361-x86-express.cab (entire file) to request list.
2015-03-17 14:41:16:687
1020 f1c
Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
2015-03-17 14:41:16:687
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203] ***********
2015-03-17 14:41:16:732
1020 f1c
DnldMgr * BITS job initialized, JobId = {27F85F04-0E56-4BFA-93E3-4D6BCB3ECB4F}
2015-03-17 14:41:16:758
1020 f1c
DnldMgr * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2014/12/windows6.1-kb3004361-x86-express_47f37958063afd2521ca42de8904b55d1aa85b89.cab to C:\Windows\SoftwareDistribution\Download\963019da42f4a0388fdc4337be401b25\windows6.1-kb3004361-x86-express.cab
(full file).
2015-03-17 14:41:16:809
1020 f1c
Agent *********
2015-03-17 14:41:16:809
1020 f1c
Agent ** END ** Agent: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:16:809
1020 f1c
Agent *************
2015-03-17 14:41:16:811
1020 f1c
DnldMgr *************
2015-03-17 14:41:16:811
1020 f1c
DnldMgr ** START ** DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
2015-03-17 14:41:16:811
1020 f1c
DnldMgr *********
2015-03-17 14:41:16:811
1020 f1c
DnldMgr * Call ID = {D330B2E0-CA38-4ED9-894A-36717C01F09A}
2015-03-17 14:41:16:811
1020 f1c
DnldMgr * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2015-03-17 14:41:16:811
1020 f1c
DnldMgr * Updates to download = 1
2015-03-17 14:41:16:811
1020 f1c
Agent * Title = Security Update for Windows 7 (KB3031432)
2015-03-17 14:41:16:811
1020 f1c
Agent * UpdateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203
2015-03-17 14:41:16:811
1020 f1c
Agent * Bundles 1 updates:
2015-03-17 14:41:16:811
1020 f1c
Agent * {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203
2015-03-17 14:41:16:814
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203] ***********
2015-03-17 14:41:16:815
1020 f1c
DnldMgr * Queueing update for download handler request generation.
2015-03-17 14:41:16:815
1020 f1c
DnldMgr Generating download request for update {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203
2015-03-17 14:41:16:843
1020 f1c
Handler Generating request for CBS update EE556F37-7EAC-42B3-BD29-653F98E6E364 in sandbox C:\Windows\SoftwareDistribution\Download\7db602a9c625e53b175ecb83170441ba
2015-03-17 14:41:16:843
1020 f1c
Handler Selected payload type is ptExpress
2015-03-17 14:41:16:843
1020 f1c
Handler Detected download state is dsStart
2015-03-17 14:41:16:843
1020 f1c
Handler Adding windows6.1-kb3031432-x86-express.cab (entire file) to request list.
2015-03-17 14:41:16:844
1020 f1c
Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0
2015-03-17 14:41:16:845
1020 f1c
DnldMgr *********** DnldMgr: New download job [UpdateId = {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203] ***********
2015-03-17 14:41:16:881
1020 f1c
DnldMgr * BITS job initialized, JobId = {6C5B3B60-DB8B-4B6F-9E40-D99CA43B366D}
2015-03-17 14:41:16:906
1020 f1c
DnldMgr * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/01/windows6.1-kb3031432-x86-express_fb5326e90facfe6de39cf44fc4ed5ec630968ba5.cab to C:\Windows\SoftwareDistribution\Download\7db602a9c625e53b175ecb83170441ba\windows6.1-kb3031432-x86-express.cab
(full file). -
Can I use the same database for two WSUS servers?
Hi Folks,
Our HQ WSUS database is on a dedicated SQL Server 2008 in HQ. We are planning to set up a replica WSUS server in a branch office (centralized management mode). But we want to check the WSUS reports (e.g. computer/update status) only from the HQ instead
of each branch. I have two questions.
I should not install the SQL Server in Branch, and specify the HQ SQL Server as the Branch WSUS server database, right? In this case, I can check WSUS reports of both HQ and Branch from HQ, right?
Can I use a specific update source (e.g. Microsoft Update or other WSUS upsteam servers) for Branch WSUS server instead of HQ WSUS server even it's a replica WSUS server?
Thanks,
高麻雀Regarding to "If the branch office server is intended to be a replica server, then it must be configured with the HQ WSUS server as the update source", does it mean my branch WSUS server is only able to get the patches from my HQ WSUS server?
That is the fundamental premise of a downstream replica server.
Isn't it able to get the patches from Microsoft Update or other WSUS servers?
Well, here we may have a terminology challenge... so let me take a step back and answer this way:
A WSUS server obtains *updates* via the process of synchronization. Updates can be synchronized from one of two sources: Microsoft, or an Upstream WSUS Server.
Additionally, updates have a concept of APPROVAL. Approvals can be obtained from an Upstream WSUS Server when the server is configured as a REPLICA server; otherwise, Approvals are created at each individual WSUS server.
Finally, updates have FILES. Files can be obtained from Microsoft or the Upstream WSUS server, and this configuration option is absolutely independent of where the updates and/or approvals come from.
Please note: All of this is exhaustively documented and discussed in the
WSUS Deployment Guide. I would highly recommend reading it cover-to-cover.
In this case, there will a a lot of bandwith cost on the leased line which is only 2Mbps and intended for critical business like VDI/ERP applications.
A few thoughts here...
First a 2Mb/sec link is more than adequate to support a WSUS server downloading update files from an Upstream WSUS Server.
Second, using BITS you can configure when those files are transferred as well as how much of that 2Mb/sec is made available to the WSUS downstream server.
Third... Patch Management IS a critical business function. Do not let it be treated as a step-child or the VDI/ERP functionally will be irrelevant.
"after installing the replica server in the branch office, on the upstream server enable the option for Reporting Rollup", will the report information (computer/update status) be recorded in the HQ SQL Server?
The detail reporting data for the clients of the downstream replica servers is physically stored in the upstream server's database.
Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
SolarWinds Head Geek
Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
http://www.solarwinds.com/gotmicrosoft
The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds. -
Multiple sources with single downstream capture
Is it possible to have multiple source machines all send their redo logs to a single downstream capture DB that will collect LCRs and queue the LCRs for all the source machines?
Yes, that's wht downstream replication is all about. read the 11G manual if you want to know how to do that.
-
WSUS 3.0 SP2 troubles after installing KB2938066 (0xC000000D)
Hi everyone,
I ran into a problem in our WSUS environment after installing the latest hotfix KB2938066.
We have WS2008R2 SP1 (fully patched) for WSUS-Upstream server and couple of the same servers for WSUS-Downstream.
Previous functional version of WSUS was 3.2.7600.256.
After installing KB2938066 (v3.2.7600.274) the WU/MU clients updated, but on some machines, mostly on servers with WS2008R2 SP1 (RADIUS and Domain Controllers), they now have problems installing updates.
The error I see in '0xC000000D', which is something peculiar and not well searchable on the internet.
Here is part of the WindowsUpdate log.
I would appreciate any advice. Thx, John.
Agent *************
Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
Agent *********
Agent * Online = Yes; Ignore download priority = No
Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1
and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
Agent * Search Scope = {Machine}
Setup Checking for agent SelfUpdate
Setup Client version: Core: 7.6.7600.320 Aux: 7.6.7600.320
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
Misc Microsoft signed: NA
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPC435.tmp with dwProvFlags 0x00000080:
Misc FATAL: Error: 0xc000000d when verifying trust for C:\Windows\SoftwareDistribution\SelfUpdate\TMPC435.tmp
Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\TMPC435.tmp are not trusted: Error 0xc000000d
Setup FATAL: Ident cab verification failed with error 0XC000000D
Setup WARNING: SelfUpdate check failed to download package information, error = 0xC000000D
Setup FATAL: SelfUpdate check failed, err = 0xC000000D
Agent * WARNING: Skipping scan, self-update check returned 0xC000000D
Agent * WARNING: Exit code = 0xC000000D
Agent *********
Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
Agent *************
Agent WARNING: WU client failed Searching for update with error 0xc000000d
AU >>## RESUMED ## AU: Search for updates [CallId = {9CD5DB56-3B59-4481-90D0-FD1E34D65233}]
AU # WARNING: Search callback failed, result = 0xC000000D
AU # WARNING: Failed to find updates with error code C000000D
AU #########
AU ## END ## AU: Search for updates [CallId = {9CD5DB56-3B59-4481-90D0-FD1E34D65233}]
AU #############
Here is the WER file, which appeared in the application event log as information:
Version=1
EventType=WindowsUpdateFailure
EventTime=130498849873184095
Consent=1
ReportIdentifier=73f3eedf-0bf6-11e4-8540-005056960b89
Response.type=4
Sig[0].Name=ClientVersion
Sig[0].Value=7.6.7600.320
Sig[1].Name=Win32HResult
Sig[1].Value=c000000d
Sig[2].Name=UpdateId
Sig[2].Value=D67661EB-2423-451D-BF5D-13199E37DF28
Sig[3].Name=Scenario
Sig[3].Value=Scan
Sig[4].Name=SourceId
Sig[4].Value=101
Sig[5].Name=Environment
Sig[5].Value=Managed
DynamicSig[1].Name=OS Version
DynamicSig[1].Value=6.1.7601.2.1.0.274.10
DynamicSig[2].Name=Locale ID
DynamicSig[2].Value=1033
FriendlyEventName=Windows Update installation problem
ConsentKey=WindowsUpdateFailure
AppName=Host Process for Windows Services
AppPath=C:\Windows\System32\svchost.exe
ReportDescription=A Windows update did not install properly. Sending the following information to Microsoft can help improve the software.Hello everyone,
We have the same problem with 3 workstations (out of 120)
They are the only PCs that have an electronic signature software installed.
I uninstalled the software on one of them and it reconnects to wsus immediately
The software used is Entrust Entelligence Security Provider for Windows (like your Visual Studio example above)
Sorry but no CAPI2 logs for the moment
Excerpt of the windows update log with the software installed
Checking for agent SelfUpdate
2014-07-31 11:21:22:306
648 1208
Setup Client version: Core: 7.6.7600.320 Aux: 7.6.7600.320
2014-07-31 11:21:24:630
648 1208
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2014-07-31 11:21:36:034
648 1208
Misc Microsoft signed: NA
2014-07-31 11:21:36:049
648 1208
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP4F80.tmp with dwProvFlags 0x00000080:
2014-07-31 11:21:43:334
648 1208
Misc FATAL: Error: 0xc000000d when verifying trust for C:\Windows\SoftwareDistribution\SelfUpdate\TMP4F80.tmp
2014-07-31 11:21:43:334
648 1208
Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\TMP4F80.tmp are not trusted: Error 0xc000000d
2014-07-31 11:21:43:334
648 1208
Setup FATAL: Ident cab verification failed with error 0XC000000D
2014-07-31 11:21:43:334
648 1208
Setup WARNING: SelfUpdate check failed to download package information, error = 0xC000000D
2014-07-31 11:21:43:334
648 1208
Setup FATAL: SelfUpdate check failed, err = 0xC000000D
2014-07-31 11:21:43:334
648 1208
Agent * WARNING: Skipping scan, self-update check returned 0xC000000D
2014-07-31 11:21:43:334
648 1208
Agent * WARNING: Exit code = 0xC000000D
Excerpt of the log when the software is uninstalled
Checking for agent SelfUpdate
2014-08-11 13:55:54:999
648 278
Setup Client version: Core: 7.6.7600.320 Aux: 7.6.7600.320
2014-08-11 13:55:57:307
648 278
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2014-08-11 13:55:57:338
648 278
Misc Microsoft signed: NA
2014-08-11 13:55:57:338
648 278
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP9388.tmp with dwProvFlags 0x00000080:
2014-08-11 13:55:57:354
648 278
Misc Microsoft signed: NA
2014-08-11 13:55:57:354
648 278
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2014-08-11 13:55:57:354
648 278
Misc Microsoft signed: NA
2014-08-11 13:55:57:354
648 278
Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2014-08-11 13:55:57:354
648 278
Misc Microsoft signed: NA
2014-08-11 13:55:57:369
648 278
Setup Determining whether a new setup handler needs to be downloaded
2014-08-11 13:55:57:369
648 278
Setup SelfUpdate handler is not found. It will be downloaded
2014-08-11 13:55:57:369
648 278
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2014-08-11 13:55:57:369
648 278
Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2014-08-11 13:55:57:369
648 278
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2014-08-11 13:55:57:385
648 278
Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2014-08-11 13:55:57:385
648 278
Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2014-08-11 13:55:57:400
648 278
Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
2014-08-11 13:55:57:400
648 278
Setup SelfUpdate check completed. SelfUpdate is NOT required.
The problem is definitely around third-parties software
Thanks
Joce -
WSUS Replica server version limitations.
Hello, I am trying to find which WSUS upstream server versions can stream to which WSUS downstream server versions. Can WSUS 6.3 stream to WSUS 2.0? Etc.
Hi Lucas,
2.0 is no longer supported, but 3.0 SP2, 6.2 (2012) & 6.3 (2012R2) can inter-operate providing kb2734608 is installed first on the WSUS 3.0 SP2 servers.
https://social.technet.microsoft.com/Forums/en-US/35ed689a-8b78-424e-802d-9e335e07fcfe/wsus-6-upstream-server-will-support-wsus-3-sp2-downstream-server-or-not?forum=winserverwsus
If you find the answer of assistance please "Vote as Helpful"and/or "Mark as Answer" where applicable. This helps others to find solutions for there issues, and recognises contributions made to the community :) -
We have a WSUS server in the main office (Windows Server 2008 R2 Standard).
We have a branch office with Windows 7 Professional clients and Windows Server 2008 R2 Standard and Enterprise servers, which means these computers are using BITS 4.0 (http://msdn.microsoft.com/en-us/library/bb968799(VS.85).aspx).
To save on disk space, we prefer not to set up a WSUS downstream replica server in the branch office if we can use BITS 4.0 with BranchCache.
Researching WSUS and BITS Versions and Peer Caching and BranchCache and Windows Editions has been confusing. Some questions…
These pages in the BITS section of MSDN all say: “Starting with Windows 7, the BITS 3.0 peer caching model is deprecated. If BITS 4.0 is installed, the BITS 3.0 peer caching model is unavailable.” However, these pages also say: “BITS (4.0) uses
the Windows BranchCache for peer caching,” and “Starting with Background Intelligent Transfer Service (BITS) 4.0, the BITS service was extended to allow subnet-level peer caching for downloaded URL data by using Windows BranchCache.”
http://msdn.microsoft.com/en-us/library/aa362708(v=vs.85).aspx
http://msdn.microsoft.com/en-us/library/aa964314(v=vs.85).aspx
http://msdn.microsoft.com/en-us/library/aa964240(v=vs.85).aspx
And this page says: “(BITS 4.0 New Feature) Peer caching now uses Windows BranchCache. This new peer caching model replaces the model used for BITS version 3.0.”
http://msdn.microsoft.com/en-us/library/aa363167(VS.85).aspx
Okay, fine. BITS 3.0 peer caching is unavailable for Win7/2008 R2, but BITS 4.0 “peer caching” does work by using BranchCache. Got it. So, do we understand correctly that the various “peer caching” group policy settings under Computer Configuration – Policies
– Administrative Templates – Network – Background Intelligent Transfer Service have
no effect at all for BITS 4.0 clients?
http://msdn.microsoft.com/en-us/library/aa362844(v=vs.85).aspx
Next, the link at the end of this paragraph says: “Windows BranchCache must be enabled on the client through a group policy or local configuration settings.” Okay, fine. We followed the instructions at the second link to enable BranchCache for our
Windows 7 clients. Interestingly, the description in the Turn on BranchCache group policy setting (under Computer Configuration – Policies – Administrative Templates – Network – BranchCache) says: “For this policy setting to take effect, you must install
the BranchCache feature on the client computer.” However, it seems that the BranchCache feature is
already installed by default (although not enabled) on Windows 7, because there’s no option to add BranchCache in Control Panel – Programs and Features – Turn Windows features on or off, and there’s already a BranchCache service on
Windows 7. So, does this statement actually not apply to Windows 7 (and only Windows Server 2008 R2)?
http://msdn.microsoft.com/en-us/library/aa964314(v=vs.85).aspx
http://technet.microsoft.com/en-us/library/dd637820.aspx
Next, the link below says: “The Windows BranchCache feature is an optional component that must be installed on the server,” and “The server must also enable the Windows BranchCache feature though group policy.” Okay, fine. We followed the
instructions at the second link to enable it for our Windows Server 2008 R2 servers. However, we would like one of our servers in the branch office to be the “Hosted Cache” server, and the remaining Win7/2008 R2 computers to just be “clients” that use the
Hosted Cache server (for the WSUS updates). So, in this case, does only the
Configuring a Web server or a BITS application server to use BranchCache section at this link apply to our Hosted Cache server, meaning no other steps are necessary beyond just installing the BranchCache feature? Or, do we have to go through the
Configuring a file server to use BranchCache section?
Likewise, does the Computer Configuration – Policies - Administrative Templates – Network - Lanman Server - Hash Publication for BranchCache group policy setting apply to us if we’re just looking to use BranchCache for WSUS updates and nothing else?
http://msdn.microsoft.com/en-us/library/aa964314(v=vs.85).aspx
http://technet.microsoft.com/en-us/library/dd637785.aspx
In doing more research I believe that, for Hosted Cache mode, the BranchCache feature must be installed on
both the WSUS server at the main site and on a server at the branch office. Is this correct?
Next, we want to configure the BranchCache Hosted Cache mode group policy setting. However, this setting says: “This address must match the Fully Qualified Domain Name (FQDN) of the server specified in the certificate for the BranchCache server's certificate,”
and “the certificate root for the BranchCache server's certificate must be in the client computer's trusted root store.” Since our BranchCache clients will only be using BITS for WSUS updates (via HTTP), is it still necessary to install a certificate
on the Hosted Cache server? (If Yes, that's too bad, because it really complicates BranchCache deployments, especially when all of the computers are within your Active Directory domain).
Next, there’s the Configure BranchCache for network files group policy setting. Since this setting uses SMB, we’re assuming this does not apply to BranchCache used by BITS clients, and so we don't need to configure it. Is this correct?
So, in Summary: We just want to use BITS with BranchCache for the computers in our branch office to access WSUS updates on a local server that’s acting as a BranchCache Hosted Cache server. And we’d prefer not to have to deal with certificates to make this
happen, if possible.
Sorry for the long post, but there’s just no clear, one-stop place that informs us how to configure all of this.
Oh, and is all of the above completely irrelevant
for us since this TechNet page says BranchCache requires the
Enterprise Editions of Windows 7 and Windows Server 2008 R2? I sure hope not… :o)
http://social.technet.microsoft.com/wiki/contents/articles/2342.branchcache-settings-for-windows-server-2008-r2-windows-7-enterprise-and-windows-7-ultimate.aspx
-Taylorbox
NOTE: I’ve already read these posts:
http://www.windowsnetworking.com/articles-tutorials/windows-7/Introduction-BranchCache-Part1.html
http://www.windowsnetworking.com/articles-tutorials/windows-7/Deploying-Hosted-Mode-BranchCache-Server-Part2.html
http://www.windowsnetworking.com/articles-tutorials/windows-7/Deploying-Hosted-Mode-BranchCache-Server-Part3.htmlFirst, I'm curious as to why you think that a BranchCache server would consume any less disk space than a WSUS replica server?
Because whereas our WSUS server stores all approved updates long-term, the BranchCache server would only store the updates needed for the branch office's computers, and
short-term.
Hmm.. this is not a benefit of branch-cache, it's merely a manifestation of an improperly maintained WSUS server.
The WSUS has over 100GB of updates.
Which is about TEN TIMES what should be held on a well-maintained WSUS server. :-)
The BranchCache server should use less than 5GB since it would keep only the most recent updates
Thus, BranchCache would contain about 50% IN CACHE of what a WSUS Replica Server would contain ON DISK.
This TechNet page says: "BITS uses the following Group Policies to enable and configure the peer caching," but then it says: "BITS 4.0: The BITS 3.0 Group Policies are deprecated.
Yeah, I did a double-take first time I saw that too... what it means is that those settings, originally used in BITS 3.0 have been deprecated, and now, with BITS 4.0 and BrancheCache you need to use the BITS 4.0 settings.
BrancheCache functionality is only available in the Enterprise and Ultimate editions of Windows 7.
A hosted cache server must be Enterprise or DataCenter editions; the functionality is not available in Standard Edition.
Evidently for Windows 8 Professional, BranchCache
is available for BITS (not SMB), but that's not true for Windows 7 Professional
This is a manifestation of the change in SKUs availabe in those two products. There is no Windows 8 Ultimate, only Professional and Enterprise, and there's no longer an Enterprise Edition of the Server OS.
In this case, when Microsoft removed the BITS 3.0 peer caching functionality with BITS 4.0 and replaced it with BranchCache, they effectively required you to use the Enterprise editions of Win7/2008 R2
Yes. BranchCache is a feature designed for Enterprise-scale organizations with Remote offices. The presumption, and a reasonable one at that, is that such organizations have volume licensing, and with volume licensing, desktops will be installed with Enterprise
Edition.
The requirement of WS2008R2 Enterprise Edition is a bit more onerous, but it's nothing new. Microsoft has always made notable feature distinctions between Standard and Enterprise Editions.
What's really significant now, though, is that Windows Server 2012 does not have an "Enterprise Edition". There's Standard Edition and Datacenter Edition, and ALL features are in BOTH editions ... so something to consider here if I've not yet convinced you
that the simplicity of a replica WSUS server is a better choice than the complexity of implementing BranchCache -- consider deploying WS2012 instead of WS2008R2.
Lawrence Garvin, M.S., MCITP:EA, MCDBA, MCSA
SolarWinds Head Geek
Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2013)
My MVP Profile:
http://mvp.support.microsoft.com/profile/Lawrence.Garvin
http://www.solarwinds.com/gotmicrosoft
The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds. -
Adding a Software Update Point to an existing WSUS install.
I'm looking into migrating my existing WSUS server to SCCM but I have a couple issues that I need clarification on.
I would like to configure SCCM to synchronize directly with Microsoft Updates in place of WSUS but I'm not sure how I would transition from it. With my current WSUS installed on the same server as my SCCM Primary Site, would I have to remove then reinstall
WSUS so the Software Update Point can use WSUS properly?
I also have two additional SCCM locations acting primarily as Distribution Points. I have no secondary sites. Would these two DPs replace the two WSUS downstream servers I have running? I am fully updated to the R2 version of SCCM2012 for reference. Thank
you.Removing and reinstalling WSUS (including the database) would be the best option. WSUS is only used for scanning purposes; the updates will be downloaded from DPs - so those DPs will somehow replace downstream servers.
Torsten Meringer | http://www.mssccmfaq.de -
Data are not being applied at destination side
Hi all,
I have implemented real time streams replication(not archive log based downstream replication).
source:9.2.0.8.0
destination:10.2.0.2.0
Capture and propagation is working fine. DBlinks are also fine. Apply process is running , but data are not being applied in destination side.
The trc file shows this:
Dump file /dev1/visdb10/10.2.0/admin/VIS_wbsebdev1/bdump/vis_p001_14628.trc
Oracle Database 10g Enterprise Edition Release 10.2.0.2.0 - Production
With the Partitioning, OLAP and Data Mining options
ORACLE_HOME = /dev1/visdb10/10.2.0
System name: Linux
Node name: wbsebdev1
Release: 2.4.21-32.ELsmp
Version: #1 SMP Fri Apr 15 21:17:59 EDT 2005
Machine: i686
Instance name: VIS
Redo thread mounted by this instance: 1
Oracle process number: 21
Unix process pid: 14628, image: oracle@wbsebdev1 (P001)
*** SERVICE NAME:(SYS$USERS) 2008-05-29 11:39:26.957
*** SESSION ID:(388.16) 2008-05-29 11:39:26.957
The Alertlog file shows at the end this:
Thu May 29 11:19:06 2008
Streams APPLY A001 with pid=16, OS id=9531 stopped
Thu May 29 11:21:25 2008
Incremental checkpoint up to RBA [0x746.d359.0], current log tail at RBA [0x746.d471.0]
Thu May 29 11:39:26 2008
Streams APPLY A001 started with pid=18, OS id=14624
Streams Apply Reader started P000 with pid=20 OS id=14626
Streams Apply Server started P001 with pid=21 OS id=14628
Thu May 29 11:41:33 2008
Incremental checkpoint up to RBA [0x746.11565.0], current log tail at RBA [0x746.121b9.0]
Pls help.
Thanking You,
Nitesh.Problem solved.
Maybe you are looking for
-
How to view my call log from a month ago
I have a few numbers that I need from last month and I want to view my call log history from December how do I do that?
-
CS3 Version Cue not loading in Bridge
I'm trying to access a version cue server in bridge, but there is no button to access version cue in bridge. i know there is supposed to be a button in the favorites panel, but its not there, and there is no way to 'check it' in preferences. its chec
-
Volume setting for other programs lowers to inaudible levels when ever I use flash.
Whenever I play a flash file/video/etc in firefox 3.6.4, the volume of other programs such as itunes and ventrillo go down to like 1%. How do I stop this from happening? == URL of affected sites == http://www.youtube.com
-
Dreamweaver CC (2014.1) Un-workably slow
I've uninstalled and I'm now reverted back to CS6 - this works perfectly. I'm on an iMac Mac OSX 10.7.5 Intel Core i7 8Gig RAM Why is CC so slow. (2014 and 2014.1) 1. creating a new doc and trying to type any line of code (code view, or split) is slo
-
Air Port Extreme connection problems
I have a Macbook Pro and a 1st gen. Ipod connected to the Internet using an Air Port Extreme. At this time I cannot use two devices at once to access the Internet, only one or the other. What should I do to adjust settings on my Airport?