WSUS downstream replication

Here is my issue.
We have WSUS (version 3.2.7600.226) setup on Windows server 2003 x86 and planned to migrate to the new WSUS on windows server 2012 R2 box and once done then retired the 2003 server. 
The way it was done was to create separate wsus on server 2012 and then make it a downstream server. Now the groups are replicated to the downstream server, however it is not pulling the computers. Event log showed the following errors Event ID 13051 no
client computers have ever contacted the server. Not sure what the issue is. synchronization also fail with error message An HTTP error occurred. 
WebException: Unable to connect to the remote server ---> System.Net.Sockets.SocketException: No connection could be made because the target machine actively refused it 192.168.x.x:8530
at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context)
   at System.Net.HttpWebRequest.GetRequestStream()
   at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
   at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetAuthConfig()
   at Microsoft.UpdateServices.ServerSync.ServerSyncLib.InternetGetServerAuthConfig(ServerSyncProxy proxy, WebServiceCommunicationHelper webServiceHelper)
   at Microsoft.UpdateServices.ServerSync.ServerSyncLib.Authenticate(AuthorizationManager authorizationManager, Boolean checkExpiration, ServerSyncProxy proxy, Cookie cookie, WebServiceCommunicationHelper webServiceHelper)
   at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.SyncConfigUpdatesFromUSS()
   at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)
I've asked security team to check firewall. 
Also once this is resolved can we make it standalone server and remove the upstream server ? 
If not What will be the easiest and best way to migrate WSUS from server 2003 to server 2012 ?

It was a firewall issue. I was able to communicate with the upstream server.
Now the next part. So I reconfigure my downstream server (server2) as an upstream server and synchronize with microsoft. I configured the clients to communicate with the new wsus server. After applying gpo and everything the clients are still not showing
up. I checked the Windowsupdate.log on client computer and I'm getting the following errors 
2014-11-04 09:52:03:065
1836 45e0
PT +++++++++++  PT: Synchronizing server updates  +++++++++++
2014-11-04 09:52:03:065
1836 45e0
PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://server2.domain.org/ClientWebService/client.asmx
2014-11-04 09:52:03:065
1836 45e0
EP Got WSUS SimpleTargeting URL: "http://server2.domain.org"
2014-11-04 09:52:03:065
1836 45e0
IdleTmr WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie) started; operation # 85; does use network; is at background priority
2014-11-04 09:52:03:065
1836 45e0
PT Initializing simple targeting cookie, clientId = 8d9331e5-3fbf-4a44-bd40-26e3cc2dea3a, target group =  Testing, DNS name = machine1.domain.org
2014-11-04 09:52:03:065
1836 45e0
PT  Server URL = http://server2.domain.org/SimpleAuthWebService/SimpleAuth.asmx
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Nws Failure: errorCode=0x803d000d
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: There was an error communicating with the endpoint at 'http://server2.domain.org/SimpleAuthWebService/SimpleAuth.asmx'.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: The server returned HTTP status code '404 (0x194)' with text 'Not Found'.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: The requested resource was not found.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: MapToSusHResult mapped Nws error 0x803d000d to 0x80244019
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Web service call failed with hr = 80244019.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Current service auth scheme='None'.
2014-11-04 09:52:04:037
1836 45e0
WS WARNING: Proxy List used: '(null)', Bypass List used: '(null)', Last Proxy used: '(null)', Last auth Schemes used: 'None'.
2014-11-04 09:52:04:037
1836 45e0
WS FATAL: OnCallFailure failed with hr=0X80244019
2014-11-04 09:52:04:037
1836 45e0
WS FATAL: NwsCallWithRetries<Functor>( Functor(_clientId, _targetGroupName, _dnsName, &_result)) failed with hr=0x80244019
2014-11-04 09:52:04:037
1836 45e0
IdleTmr WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie, operation # 85) stopped; does use network; is at background priority
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: Failed to initialize Simple Targeting Cookie: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: PopulateAuthCookies failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: RefreshCookie failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: RefreshPTState failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT  + SyncUpdates round trips: 0
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: Sync of Updates: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
PT WARNING: SyncServerUpdatesInternal failed: 0x80244019
2014-11-04 09:52:04:037
1836 45e0
Agent  * WARNING: Failed to synchronize, error = 0x80244019
2014-11-04 09:52:04:038
1836 45e0
Agent  * WARNING: Exit code = 0x80244019
2014-11-04 09:52:04:038
1836 45e0
Agent *********
2014-11-04 09:52:04:038
1836 45e0
Agent **  END  **  Agent: Finding updates [CallerId = Windows Update Command Line  Id = 1]
2014-11-04 09:52:04:038
1836 45e0
Agent *************
2014-11-04 09:52:04:038
1836 45e0
Agent WARNING: WU client failed Searching for update with error 0x80244019
I'm not sure why is it not able to communicate. Any help will be appreciated. 

Similar Messages

  • WSUS Downstream server not synchronizing - SQL Timeout

    I'm running into problems synching a downstream WSUS server with the parent server. The first few times that the server synch'd it ran fine, then it just stopped working. The Windows Firewall is disabled and there is no proxy. I've checked all the permissions
    for IIS and all required services are running. I've also tried an IISRESET, uninstall WSUS, re-installed, ran wsusutil.exe reset and checkhealth, rebooted many times. Ran the DB Cleanup Wizard on both servers. Any help woul be appreciated.
    WSUS Parent Server: Windows Server 2003 R2 SP2
    WSUS Downstream Server: Windows Server 2003 R2 SP2
    WSUS Failed Error Message:
    SqlException: Timeout expired.  The timeout period elapsed prior to completion of the operation or the server is not responding.
    at System.Data.SqlClient.SqlConnection.OnError(SqlException exception, Boolean breakConnection)
       at System.Data.SqlClient.SqlInternalConnection.OnError(SqlException exception, Boolean breakConnection)
       at System.Data.SqlClient.TdsParser.ThrowExceptionAndWarning(TdsParserStateObject stateObj)
       at System.Data.SqlClient.TdsParser.Run(RunBehavior runBehavior, SqlCommand cmdHandler, SqlDataReader dataStream, BulkCopySimpleResultSet bulkCopyHandler, TdsParserStateObject stateObj)
       at System.Data.SqlClient.SqlDataReader.ReadInternal(Boolean setTimeout)
       at System.Data.SqlClient.SqlDataReader.Read()
       at Microsoft.UpdateServices.DatabaseAccess.DBConnection.ReadOneRow()
       at Microsoft.UpdateServices.Internal.DataAccess.HideUpdatesForReplicaSync(String xmlUpdateIds)
       at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ProcessHiddenUpdates(Guid[] hiddenUpdates)
       at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ReplicaSync()
       at Microsoft.UpdateServic
    Thank You

    Sure, here are the log files. Thank you!
    UPSTREAM SERVER:
    Running... GetConfiguration
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Update Services\Server\Setup
     Version:3
     InstallLanguage:ENU
     ProxyPassword:
     SmtpUserPassword:
     VersionString:3.2.7600.226
     ConfigurationSource:0
     ServicePackLevel:2
     TargetDir:C:\Program Files\Update Services\
     InstallType:1
     EnableRemoting:1
     WsusAdministratorsSid:S-1-5-21-163115894-1154025269-1635805901-1010
     WSUSReportersSid:S-1-5-21-163115894-1154025269-1635805901-1009
     SqlServerName:WSUSDAL\MICROSOFT##SSEE
     SqlAuthenticationMode:WindowsAuthentication
     SqlDatabaseName:SUSDB
     SqlUserName:
     SqlEncryptedPassword:
     SqlInstanceIsRemote:0
     wYukonInstalled:1
     ContentDir:E:\WSUS
     PortNumber:8530
     IISTargetWebSiteIndex:625045861
     IISTargetWebSiteCreated:True
     IISUninstallConfigFilePath:C:\Program Files\Update Services\setup\UninstallSettings.xml
     IISPreviousInstallRevision:
     IISInstallRevision:3.2.7600.226
     IIsDynamicCompression:0
     EncryptionParam:System.Byte[]
     EncryptionKey:System.Byte[]
    <NewDataSet>
      <Table>
        <ConfigurationID>1</ConfigurationID>
        <LastConfigChange>2010-05-30T21:19:36.8700000-05:00</LastConfigChange>
        <DssAnonymousTargeting>false</DssAnonymousTargeting>
        <IsRegistrationRequired>true</IsRegistrationRequired>
        <MaxDeltaSyncPeriod>30</MaxDeltaSyncPeriod>
        <ReportingServiceUrl>https://stats.update.microsoft.com</ReportingServiceUrl>
        <ServerID>c48b3181-a77e-4a88-8986-3dd6bf07c291</ServerID>
        <AnonymousCookieExpirationTime>10080</AnonymousCookieExpirationTime>
        <SimpleTargetingCookieExpirationTime>60</SimpleTargetingCookieExpirationTime>
        <MaximumServerCookieExpirationTime>10080</MaximumServerCookieExpirationTime>
        <DssTargetingCookieExpirationTime>240</DssTargetingCookieExpirationTime>
        <EncryptionKey>dE3WZ7GGMBOpG/ftJuzo7lDLHBFVT7VR</EncryptionKey>
        <ServerTargeting>false</ServerTargeting>
        <SyncToMU>true</SyncToMU>
        <UpstreamServerName>SUSDal</UpstreamServerName>
        <ServerPortNumber>8530</ServerPortNumber>
        <UpstreamServerUseSSL>false</UpstreamServerUseSSL>
        <UseProxy>false</UseProxy>
        <ProxyName />
        <ProxyServerPort>80</ProxyServerPort>
        <AnonymousProxyAccess>true</AnonymousProxyAccess>
        <ProxyUserName />
        <HostOnMu>false</HostOnMu>
        <LocalContentCacheLocation>e:\WSUS\WsusContent\</LocalContentCacheLocation>
        <ServerSupportsAllLanguages>false</ServerSupportsAllLanguages>
        <LogLevel>0</LogLevel>
        <LogPath />
        <SubscriptionFailureNumberOfRetries>3</SubscriptionFailureNumberOfRetries>
        <SubscriptionFailureWaitBetweenRetriesTime>15</SubscriptionFailureWaitBetweenRetriesTime>
        <DispatchManagerPollingInterval>5</DispatchManagerPollingInterval>
        <StateMachineTransitionLoggingEnabled>false</StateMachineTransitionLoggingEnabled>
        <StateMachineTransitionErrorCaptureLength>600</StateMachineTransitionErrorCaptureLength>
        <MaxSimultaneousFileDownloads>10</MaxSimultaneousFileDownloads>
        <MUUrl>https://www.update.microsoft.com/v6</MUUrl>
        <EventLogFloodProtectTime>10</EventLogFloodProtectTime>
        <HandshakeAnchor>13270510,2010-06-02 21:12:31.056</HandshakeAnchor>
        <StatsDotNetWebServiceUri>http://localhost</StatsDotNetWebServiceUri>
        <QueueFlushTimeInMS>3000</QueueFlushTimeInMS>
        <QueueFlushCount>100</QueueFlushCount>
        <QueueRejectCount>500</QueueRejectCount>
        <SleepTimeAfterErrorInMS>30000</SleepTimeAfterErrorInMS>
        <LogDestinations>0</LogDestinations>
        <AutoRefreshDeployments>true</AutoRefreshDeployments>
        <RedirectorChangeNumber>0</RedirectorChangeNumber>
        <ImportLocalPath />
        <UseCookieValidation>true</UseCookieValidation>
        <AutoPurgeClientEventAgeThreshold>15</AutoPurgeClientEventAgeThreshold>
        <AutoPurgeServerEventAgeThreshold>90</AutoPurgeServerEventAgeThreshold>
        <AutoPurgeDetectionPeriod>12</AutoPurgeDetectionPeriod>
        <DoReportingDataValidation>true</DoReportingDataValidation>
        <DoReportingSummarization>true</DoReportingSummarization>
        <MaxNumberOfIdsToRequestDataFromUss>100</MaxNumberOfIdsToRequestDataFromUss>
        <MaxCoreUpdatesPerRequest>30</MaxCoreUpdatesPerRequest>
        <MaxExtendedUpdatesPerRequest>50</MaxExtendedUpdatesPerRequest>
        <DownloadRegulationUrl />
        <AllowProxyCredentialsOverNonSsl>false</AllowProxyCredentialsOverNonSsl>
        <LazySync>true</LazySync>
        <DownloadExpressPackages>false</DownloadExpressPackages>
        <DoServerSyncCompression>true</DoServerSyncCompression>
        <ProxyUserDomain />
        <BitsHealthScanningInterval>3600000</BitsHealthScanningInterval>
        <BitsDownloadPriorityForeground>false</BitsDownloadPriorityForeground>
        <MaxXmlPerRequest>5242880</MaxXmlPerRequest>
        <MaxXmlPerRequestInServerSync>2000000</MaxXmlPerRequestInServerSync>
        <MaxTargetComputers>30000</MaxTargetComputers>
        <MaxEventInstances>2000000</MaxEventInstances>
        <LogRolloverFileSizeInBytes>0</LogRolloverFileSizeInBytes>
        <WUSInstallType>0</WUSInstallType>
        <ReplicaMode>false</ReplicaMode>
        <AutoDeployMandatory>true</AutoDeployMandatory>
        <DeploymentChangeDeferral>30</DeploymentChangeDeferral>
        <RevisionDeletionTimeThreshold>30</RevisionDeletionTimeThreshold>
        <RevisionDeletionSizeThreshold>1024</RevisionDeletionSizeThreshold>
        <CollectClientInventory>false</CollectClientInventory>
        <DoDetailedRollup>true</DoDetailedRollup>
        <RollupResetGuid>83340a0d-4624-4cb9-bc30-db197c999bc8</RollupResetGuid>
        <UssSupportsAllLanguages>false</UssSupportsAllLanguages>
        <GetContentFromMU>false</GetContentFromMU>
        <HmDetectIntervalInSeconds>600</HmDetectIntervalInSeconds>
        <HmRefreshIntervalInSeconds>21600</HmRefreshIntervalInSeconds>
        <HmCoreDiskSpaceGreenMegabytes>500</HmCoreDiskSpaceGreenMegabytes>
        <HmCoreDiskSpaceRedMegabytes>200</HmCoreDiskSpaceRedMegabytes>
        <HmCoreCatalogSyncIntervalInDays>1</HmCoreCatalogSyncIntervalInDays>
        <HmClientsInstallUpdatesGreenPercent>10</HmClientsInstallUpdatesGreenPercent>
        <HmClientsInstallUpdatesRedPercent>25</HmClientsInstallUpdatesRedPercent>
        <HmClientsInventoryGreenPercent>2</HmClientsInventoryGreenPercent>
        <HmClientsInventoryRedPercent>5</HmClientsInventoryRedPercent>
        <HmClientsInventoryScanDiffInHours>30</HmClientsInventoryScanDiffInHours>
        <HmClientsSilentGreenPercent>10</HmClientsSilentGreenPercent>
        <HmClientsSilentRedPercent>25</HmClientsSilentRedPercent>
        <HmClientsSilentDays>30</HmClientsSilentDays>
        <DssRollupChunkSize>5000</DssRollupChunkSize>
        <MURollupOptin>False</MURollupOptin>
        <AutoRefreshDeploymentsDeclineExpired>true</AutoRefreshDeploymentsDeclineExpired>
        <ServerString>Default</ServerString>
        <HmCoreFlags>-1</HmCoreFlags>
        <HmClientsFlags>-1</HmClientsFlags>
        <HmDatabaseFlags>-1</HmDatabaseFlags>
        <HmWebServicesFlags>-1</HmWebServicesFlags>
        <ClientReportingLevel>2</ClientReportingLevel>
        <LocalPublishingMaxCabSize>384</LocalPublishingMaxCabSize>
        <DownloadRegulationWebServiceUrl />
        <LoadOdfLocally>false</LoadOdfLocally>
        <OdfFilePath />
        <HmClientsTooManyGreenPercent>80</HmClientsTooManyGreenPercent>
        <HmClientsTooManyRedPercent>90</HmClientsTooManyRedPercent>
        <ComputerDeletionTimeThreshold>30</ComputerDeletionTimeThreshold>
        <ConfigurationChangeNumber>137118</ConfigurationChangeNumber>
        <UseSeparateProxyForSsl>false</UseSeparateProxyForSsl>
        <SslProxyName />
        <SslProxyServerPort>443</SslProxyServerPort>
        <ServerSupportsAllAvailableLanguages>false</ServerSupportsAllAvailableLanguages>
      </Table>
    </NewDataSet>
    DOWNSTREAM SERVER:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Update Services\Server\Setup
     Version:3
     InstallLanguage:ENU
     ProxyPassword:
     SmtpUserPassword:
     VersionString:3.2.7600.226
     ConfigurationSource:0
     ServicePackLevel:2
     TargetDir:C:\Program Files\Update Services\
     InstallType:1
     EnableRemoting:1
     WsusAdministratorsSid:S-1-5-21-2105027866-1443240842-1445603992-20366
     WSUSReportersSid:S-1-5-21-2105027866-1443240842-1445603992-19384
     SqlServerName:SUSFTW\MICROSOFT##SSEE
     SqlAuthenticationMode:WindowsAuthentication
     SqlDatabaseName:SUSDB
     SqlUserName:
     SqlEncryptedPassword:
     SqlInstanceIsRemote:0
     wYukonInstalled:1
     ContentDir:D:\WSUS
     PortNumber:8530
     IISTargetWebSiteIndex:602037408
     IISTargetWebSiteCreated:True
     IISUninstallConfigFilePath:C:\Program Files\Update Services\setup\UninstallSettings.xml
     IISPreviousInstallRevision:
     IISInstallRevision:3.2.7600.226
     IIsDynamicCompression:-1
     EncryptionParam:System.Byte[]
     EncryptionKey:System.Byte[]
    <NewDataSet>
      <Table>
        <ConfigurationID>1</ConfigurationID>
        <LastConfigChange>2010-06-02T00:00:35.0200000-05:00</LastConfigChange>
        <DssAnonymousTargeting>false</DssAnonymousTargeting>
        <IsRegistrationRequired>true</IsRegistrationRequired>
        <MaxDeltaSyncPeriod>30</MaxDeltaSyncPeriod>
        <ReportingServiceUrl>https://stats.update.microsoft.com</ReportingServiceUrl>
        <ServerID>dac8845b-855c-4899-ab19-8bf7a750514f</ServerID>
        <AnonymousCookieExpirationTime>10080</AnonymousCookieExpirationTime>
        <SimpleTargetingCookieExpirationTime>60</SimpleTargetingCookieExpirationTime>
        <MaximumServerCookieExpirationTime>10080</MaximumServerCookieExpirationTime>
        <DssTargetingCookieExpirationTime>240</DssTargetingCookieExpirationTime>
        <EncryptionKey>VoxRFFCoICrJYoTjr5WL1aOzfX1CSL9m</EncryptionKey>
        <ServerTargeting>true</ServerTargeting>
        <SyncToMU>false</SyncToMU>
        <UpstreamServerName>WSUSDAL</UpstreamServerName>
        <ServerPortNumber>8530</ServerPortNumber>
        <UpstreamServerUseSSL>false</UpstreamServerUseSSL>
        <UseProxy>false</UseProxy>
        <ProxyName />
        <ProxyServerPort>80</ProxyServerPort>
        <AnonymousProxyAccess>true</AnonymousProxyAccess>
        <ProxyUserName />
        <HostOnMu>false</HostOnMu>
        <LocalContentCacheLocation>d:\WSUS\WsusContent\</LocalContentCacheLocation>
        <ServerSupportsAllLanguages>false</ServerSupportsAllLanguages>
        <LogLevel>0</LogLevel>
        <LogPath />
        <SubscriptionFailureNumberOfRetries>3</SubscriptionFailureNumberOfRetries>
        <SubscriptionFailureWaitBetweenRetriesTime>15</SubscriptionFailureWaitBetweenRetriesTime>
        <DispatchManagerPollingInterval>5</DispatchManagerPollingInterval>
        <StateMachineTransitionLoggingEnabled>false</StateMachineTransitionLoggingEnabled>
        <StateMachineTransitionErrorCaptureLength>600</StateMachineTransitionErrorCaptureLength>
        <MaxSimultaneousFileDownloads>10</MaxSimultaneousFileDownloads>
        <MUUrl>https://www.update.microsoft.com/v6</MUUrl>
        <EventLogFloodProtectTime>10</EventLogFloodProtectTime>
        <HandshakeAnchor>136861,2010-06-02 00:00:34.112</HandshakeAnchor>
        <StatsDotNetWebServiceUri>http://localhost</StatsDotNetWebServiceUri>
        <QueueFlushTimeInMS>3000</QueueFlushTimeInMS>
        <QueueFlushCount>100</QueueFlushCount>
        <QueueRejectCount>500</QueueRejectCount>
        <SleepTimeAfterErrorInMS>30000</SleepTimeAfterErrorInMS>
        <LogDestinations>0</LogDestinations>
        <AutoRefreshDeployments>true</AutoRefreshDeployments>
        <RedirectorChangeNumber>0</RedirectorChangeNumber>
        <ImportLocalPath />
        <UseCookieValidation>true</UseCookieValidation>
        <AutoPurgeClientEventAgeThreshold>15</AutoPurgeClientEventAgeThreshold>
        <AutoPurgeServerEventAgeThreshold>90</AutoPurgeServerEventAgeThreshold>
        <AutoPurgeDetectionPeriod>12</AutoPurgeDetectionPeriod>
        <DoReportingDataValidation>true</DoReportingDataValidation>
        <DoReportingSummarization>true</DoReportingSummarization>
        <MaxNumberOfIdsToRequestDataFromUss>100</MaxNumberOfIdsToRequestDataFromUss>
        <MaxCoreUpdatesPerRequest>30</MaxCoreUpdatesPerRequest>
        <MaxExtendedUpdatesPerRequest>50</MaxExtendedUpdatesPerRequest>
        <DownloadRegulationUrl />
        <AllowProxyCredentialsOverNonSsl>false</AllowProxyCredentialsOverNonSsl>
        <LazySync>true</LazySync>
        <DownloadExpressPackages>false</DownloadExpressPackages>
        <DoServerSyncCompression>true</DoServerSyncCompression>
        <ProxyUserDomain />
        <BitsHealthScanningInterval>3600000</BitsHealthScanningInterval>
        <BitsDownloadPriorityForeground>false</BitsDownloadPriorityForeground>
        <MaxXmlPerRequest>5242880</MaxXmlPerRequest>
        <MaxXmlPerRequestInServerSync>2000000</MaxXmlPerRequestInServerSync>
        <MaxTargetComputers>30000</MaxTargetComputers>
        <MaxEventInstances>2000000</MaxEventInstances>
        <LogRolloverFileSizeInBytes>0</LogRolloverFileSizeInBytes>
        <WUSInstallType>0</WUSInstallType>
        <ReplicaMode>true</ReplicaMode>
        <AutoDeployMandatory>true</AutoDeployMandatory>
        <DeploymentChangeDeferral>30</DeploymentChangeDeferral>
        <RevisionDeletionTimeThreshold>30</RevisionDeletionTimeThreshold>
        <RevisionDeletionSizeThreshold>1024</RevisionDeletionSizeThreshold>
        <CollectClientInventory>false</CollectClientInventory>
        <DoDetailedRollup>true</DoDetailedRollup>
        <RollupResetGuid>83340a0d-4624-4cb9-bc30-db197c999bc8</RollupResetGuid>
        <UssSupportsAllLanguages>false</UssSupportsAllLanguages>
        <GetContentFromMU>false</GetContentFromMU>
        <HmDetectIntervalInSeconds>600</HmDetectIntervalInSeconds>
        <HmRefreshIntervalInSeconds>21600</HmRefreshIntervalInSeconds>
        <HmCoreDiskSpaceGreenMegabytes>500</HmCoreDiskSpaceGreenMegabytes>
        <HmCoreDiskSpaceRedMegabytes>200</HmCoreDiskSpaceRedMegabytes>
        <HmCoreCatalogSyncIntervalInDays>1</HmCoreCatalogSyncIntervalInDays>
        <HmClientsInstallUpdatesGreenPercent>10</HmClientsInstallUpdatesGreenPercent>
        <HmClientsInstallUpdatesRedPercent>25</HmClientsInstallUpdatesRedPercent>
        <HmClientsInventoryGreenPercent>2</HmClientsInventoryGreenPercent>
        <HmClientsInventoryRedPercent>5</HmClientsInventoryRedPercent>
        <HmClientsInventoryScanDiffInHours>30</HmClientsInventoryScanDiffInHours>
        <HmClientsSilentGreenPercent>10</HmClientsSilentGreenPercent>
        <HmClientsSilentRedPercent>25</HmClientsSilentRedPercent>
        <HmClientsSilentDays>30</HmClientsSilentDays>
        <DssRollupChunkSize>5000</DssRollupChunkSize>
        <MURollupOptin>False</MURollupOptin>
        <AutoRefreshDeploymentsDeclineExpired>true</AutoRefreshDeploymentsDeclineExpired>
        <ServerString>Default</ServerString>
        <HmCoreFlags>-1</HmCoreFlags>
        <HmClientsFlags>-1</HmClientsFlags>
        <HmDatabaseFlags>-1</HmDatabaseFlags>
        <HmWebServicesFlags>-1</HmWebServicesFlags>
        <ClientReportingLevel>2</ClientReportingLevel>
        <LocalPublishingMaxCabSize>384</LocalPublishingMaxCabSize>
        <DownloadRegulationWebServiceUrl />
        <LoadOdfLocally>false</LoadOdfLocally>
        <OdfFilePath />
        <HmClientsTooManyGreenPercent>80</HmClientsTooManyGreenPercent>
        <HmClientsTooManyRedPercent>90</HmClientsTooManyRedPercent>
        <ComputerDeletionTimeThreshold>30</ComputerDeletionTimeThreshold>
        <ConfigurationChangeNumber>76409</ConfigurationChangeNumber>
        <UseSeparateProxyForSsl>false</UseSeparateProxyForSsl>
        <SslProxyName />
        <SslProxyServerPort>443</SslProxyServerPort>
        <ServerSupportsAllAvailableLanguages>false</ServerSupportsAllAvailableLanguages>
      </Table>
    </NewDataSet>

  • Downstream replication problem

    I configured a downstream replication. Then I got "WAITING FOR DICTIONARY REDO"
    And I made a log switch in source db by 'alter system archive log current'. After that the 'waiting' message is gone but 'loading' is started. but 'LOADING (step 46 of 46)' is constant. its not changing. What can I don now?
    thanx.

    FYI, Oracle Support have confirmed the target needs to be at an equal (10.2.0.5.0) or greater release level.
    cheers,
    Ron

  • Wsus downstream server not showing up

    OS: Windows 2003
    WSUS: 3.0 SP1
    Architecture: 3-tier WSUS, Level 1 approve/decline updates and sync with microsoft update websites; Level 2 is replica of Level 1; Level 3 is downstream servers of Level2 and configed into autonomous mode.
    We have a 3-tier WSUS infrastructure in test mode. The WSUS.Level1 server gets updates directly from Microsoft Updates. WSUS.Level2 server is a replica server of Level 1 server, i.e., upstream server is WSUS.Level1.  There are more than 20 other Level 3 WSUS servers use WSUS.Level2 as the upstream servers. Level 3 servers are setup as autonomous mode at this moment.
    The Level 3 servers were created from an image that were sealed and syspreped before restoring the Image.
    Microsoft Updates Server -> WSUS.Level1 -> WSUS.Level2 -> 20 other WSUS Level 3 servers
    Q1: there are only three Level 3 servers showing up in the Level 2 WSUS downstream server list (should be more as we have 20 WSUS level 3 servers). When I tried to manually sync from any Level 3  server, it will show up in the Level 2 WSUS downstream server list. However, it will replace one of the three servers that is already listed. Always 3 downstream servers showing up in Level2,  always! Any idea why this happens

    The Level 3 servers were created from an image that were sealed and syspreped before restoring the Image.
    Q1: there are only three Level 3 servers showing up in the Level 2 WSUS downstream server list (should be more as we have 20 WSUS level 3 servers). When I tried to manually sync from any Level 3  server, it will show up in the Level 2 WSUS downstream server list. However, it will replace one of the three servers that is already listed. Always 3 downstream servers showing up in Level2,  always! Any idea why this happens
    <sigh>....
    SYSPREP is not an appropriate tool to be used for imaging machines with *APPLICATIONS* installed, particularly if those applications use GUIDs to uniquely identify the machines, as WSUS downstream servers do.
    So, ironically, only two threads earlier I answered this very identical scenario . . .
    In theory, you should be able to do this to 'reset' these GUIDs...
    1. Synchronize the downstream server so that it shows up in the console of the upstream server.
    2. Set the downstream server synchronization schedule to MANUAL.
    3. Modify the Options | Update Source and Proxy Server | Update Source page to make this an upstream server.
    4. Delete the server from the Downstream Servers node of the upstream server's console.
    5. Modify the Options | Update Source and Proxy Server | Update Source page to make this a downstream server again.
    6. Initiate a synchronization.
    You won't see any difference after performing these steps on the first server.
    When you'll know this is working is if the second server shows up in the console after Step #6.
    Repeat Steps #1 through #6 for the other three servers.
    Lawrence Garvin, M.S., MCITP:EA, MCDBA, MCSA
    Principal/CTO, Onsite Technology Solutions, Houston, Texas
    Microsoft MVP - Software Distribution (2005-2010)
    My MVP Profile: http://mvp.support.microsoft.com/profile/Lawrence.Garvin
    My Blog: http://onsitechsolutions.spaces.live.com

  • Computers not appearing in WSUS downstream replica server

    Hello guys,
    I need your advice on the setup of the replica servers. I currently installed a WSUS replica downstream server on one of our locations for the clients/servers in the same place to get the updates locally.
    Now we are on Server 2012, on this box has WDS service working and I have decided to setup a WSUS replica here. So added WSUS role & SSL is enabled, so ports 8531 & 8530 are allowing traffic on the replica server. Now synching works fine with the
    upstream server as far as updates & computer GROUPS were synch fine. Now the issue, is the computers are not showing up in the computer groups for the replica server in contrast with the upstream which has the computers. What could  be the reason?
    I have configured already the GPO for the clients intended to get updates for the replica, client side targeting & "Specify a MS intranet location..." is configured with the REPLICA servername:port. Am I missing anything? Please help..
    Thank you, Mon

    Hi Mon Laq,
    Please check your upstream and downstream server have any event occur, the client which not reporting must have error log.
     Check if name resolution is working for parent server from this replica server, GPO were not applied correctly, please to confirm the sync between the upstream
    and downstream server is working properly,
    The following similar thread solution you can refer first.
    Clients not installing updates from Downstream WSUS Server
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/3399a578-ddb0-4a66-9594-f3caa490e48d/clients-not-installing-updates-from-downstream-wsus-server
    I’m glad to be of help to you!
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • WSUS downstream Server synchroziation failed

    Hi All,
    I have upgraded my downstream server to Windows Server 2012 R2. After upgrade my WSUS server is not synchronization with my upstream WSUS server. I am getting the below error while running the synchronization.
    IOException: Unable to read data from the transport connection: An existing connection was forcibly closed by the remote host. ---> System.Net.Sockets.SocketException: An existing connection was forcibly closed by the remote host
    at System.Net.ConnectStream.Read(Byte[] buffer, Int32 offset, Int32 size)
       at Microsoft.UpdateServices.ServerSync.ServerSyncCompressionProxy.GetWebResponse(WebRequest webRequest)
       at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
       at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetRevisionIdList(Cookie cookie, ServerSyncFilter filter)
       at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.WebserviceGetRevisionIdList(ServerSyncFilter filter, Boolean isConfigData)
       at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)
    Nirmal Singh IT Administrator

    How did you do the upgrade, was it in-place, or a new machine? And did you migrate the WSUS role or just deploy a new instance?
    Are there any firewalls in place?
    Do you have other downstream servers connecting to the upstream, if so are those connecting ok?
    Do you have any clients connecting to the upstream?
    What are the build numbers on both servers?
    Are there any errors in the IIS log?

  • WSUS Downstream server not downloading updates

    I have a windows 2012R2 wsus server setup running wsus and getting updates fine from Microsoft Updates.  We will call this server A in this example.
    I have a downstream server that is windows 2012r2 and has wsus installed.  We can call this server B.  It is configured to use "Update Source" and point to A to get its updates.  SSL is not being used.
    Server B says it syncs fine with no errors.  However, when i look in the content folder I see the folders (0A, 2A, 2F etc..)  but they do not contain any files.  When i run wsusutil checkhealth the following error comes up in event viewer.
    The WSUS content directory is not accessible. System.Net.WebException: The remote server returned an error: (404) Not Found. at System.Net.HttpWebRequest.GetResponse() at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType
    type, HealthEventLogger logger)
    Any Suggesitons

    When i run wsusutil checkhealth the following error comes up in event viewer.   
    The WSUS content directory is not accessible. System.Net.WebException:
    The remote server returned an error: (404) Not Found. at System.Net.HttpWebRequest.GetResponse() at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType type, HealthEventLogger logger)
    Any Suggesitons
    Looks like the content store, specifically the /Content v-dir in IIS, is not configured correctly.
    If so, it's also possible that the upstream server is not downloading content correctly from Microsoft. And if the downstream server cannot get to /Content, neither can any of the clients of the upstream server.
    Start by inspecting the ApplicationEventLog on the upstream server for any evidence of download failures. If they don't exist, then this could simply be an issue with IIS. Verify that the /Content v-dir is configured to point to the correct location of the
    ~\WSUSContent folder.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Windows 7 clients not Reporting Status to WSUS (downstream server) server running Windows 2012 R2

    We have recently upgraded our WSUS server to Windows 2012 R2. Now none of the PCs reporting their status to the WSUS server and not getting updates at all. The PCs are contacting the Server but not reporting their status. Stopped the Firewall on Client and
    Server. BITS and windows updates services are running. 
    Record the system time of the Windows 7 client.
    Reboot the Windows 7 client.
    Run this command from a command prompt: wuauclt /resetauthorization /detectnow.
    Wait =30= minutes.
    Performed the above steps. Please see the updates logs from a client.
    2015-03-16 12:48:44:617
    1040 15a4
    Shutdwn user declined update at shutdown
    2015-03-16 12:48:44:617
    1040 15a4
    AU Successfully wrote event for AU health state:0
    2015-03-16 12:48:44:618
    1040 15a4
    AU AU initiates service shutdown
    2015-03-16 12:48:44:649
    1040 15a4
    AU ###########  AU: Uninitializing Automatic Updates  ###########
    2015-03-16 12:48:46:506
    1040 15a4
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 12:48:46:584
    1040 15a4
    Service *********
    2015-03-16 12:48:46:584
    1040 15a4
    Service **  END  **  Service: Service exit [Exit code = 0x240001]
    2015-03-16 12:48:46:584
    1040 15a4
    Service *************
    2015-03-16 12:54:23:139
    1024 1060
    Misc ===========  Logging initialized (build: 7.6.7600.320, tz: -0400)  ===========
    2015-03-16 12:54:23:214
    1024 1060
    Misc  = Process: C:\Windows\system32\svchost.exe
    2015-03-16 12:54:23:264
    1024 1060
    Misc  = Module: c:\windows\system32\wuaueng.dll
    2015-03-16 12:54:23:139
    1024 1060
    Service *************
    2015-03-16 12:54:23:264
    1024 1060
    Service ** START **  Service: Service startup
    2015-03-16 12:54:23:265
    1024 1060
    Service *********
    2015-03-16 12:54:24:262
    1024 1060
    Agent  * WU client version 7.6.7600.320
    2015-03-16 12:54:24:263
    1024 1060
    Agent  * Base directory: C:\Windows\SoftwareDistribution
    2015-03-16 12:54:24:272
    1024 1060
    Agent  * Access type: No proxy
    2015-03-16 12:54:24:532
    1024 1060
    Agent  * Network state: Connected
    2015-03-16 12:55:17:235
    1024 1060
    Report CWERReporter::Init succeeded
    2015-03-16 12:55:17:235
    1024 1060
    Agent ***********  Agent: Initializing Windows Update Agent  ***********
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * Prerequisite roots succeeded.
    2015-03-16 12:55:17:235
    1024 1060
    Agent ***********  Agent: Initializing global settings cache  ***********
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * WSUS server: http://ewd-srv-01.resultstel.net:8530
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * WSUS status server: http://ewd-srv-01.resultstel.net:8530
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * Target group: Eastwood
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * Windows Update access disabled: No
    2015-03-16 12:55:17:247
    1024 1060
    DnldMgr Download manager restoring 0 downloads
    2015-03-16 12:55:17:248
    1024 1060
    AU ###########  AU: Initializing Automatic Updates  ###########
    2015-03-16 12:55:17:249
    1024 1060
    AU  # WSUS server: http://ewd-srv-01.resultstel.net:8530
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Detection frequency: 22
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Target group: Eastwood
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Approval type: Scheduled (Policy)
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Scheduled install day/time: Every day at 3:00
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Auto-install minor updates: Yes (Policy)
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Will interact with non-admins (Non-admins are elevated (User preference))
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Will display featured software notifications (User preference)
    2015-03-16 12:55:17:259
    1024 1060
    Agent Switching to hardware-verified ClientId.
    2015-03-16 12:55:17:260
    1024 1060
    AU Setting AU scheduled install time to 2015-03-17 07:00:00
    2015-03-16 12:55:17:402
    1024 1060
    Report ***********  Report: Initializing static reporting data  ***********
    2015-03-16 12:55:17:402
    1024 1060
    Report  * OS Version = 6.1.7601.1.0.65792
    2015-03-16 12:55:17:402
    1024 1060
    Report  * OS Product Type = 0x00000030
    2015-03-16 12:55:17:600
    1024 1060
    Report WARNING: Failed to load reporting information from WMI with hr = 80041002.
    2015-03-16 12:55:17:601
    1024 1060
    Report  * Locale ID = 1033
    2015-03-16 12:55:17:654
    1024 1060
    AU Successfully wrote event for AU health state:0
    2015-03-16 12:55:17:655
    1024 1060
    AU Initializing featured updates
    2015-03-16 12:55:17:655
    1024 1060
    AU Found 0 cached featured updates
    2015-03-16 12:55:17:655
    1024 1060
    AU Successfully wrote event for AU health state:0
    2015-03-16 12:55:17:656
    1024 1060
    AU Successfully wrote event for AU health state:0
    2015-03-16 12:55:17:656
    1024 1060
    AU AU finished delayed initialization
    2015-03-16 12:55:23:261
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 12:55:41:121
    1024 1074
    AU Triggering AU detection through DetectNow API
    2015-03-16 12:55:41:122
    1024 1074
    AU Triggering Online detection (non-interactive)
    2015-03-16 12:55:41:193
    1024 1060
    AU #############
    2015-03-16 12:55:41:193
    1024 1060
    AU ## START ##  AU: Search for updates
    2015-03-16 12:55:41:193
    1024 1060
    AU #########
    2015-03-16 12:55:41:218
    1024 1060
    AU <<## SUBMITTED ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
    2015-03-16 12:55:41:218
    1024 1194
    Agent *************
    2015-03-16 12:55:41:218
    1024 1194
    Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-03-16 12:55:41:218
    1024 1194
    Agent *********
    2015-03-16 12:55:41:218
    1024 1194
    Agent  * Online = Yes; Ignore download priority = No
    2015-03-16 12:55:41:218
    1024 1194
    Agent  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0
    and DeploymentAction='Uninstallation' and RebootRequired=1"
    2015-03-16 12:55:41:218
    1024 1194
    Agent  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2015-03-16 12:55:41:218
    1024 1194
    Agent  * Search Scope = {Machine}
    2015-03-16 12:55:41:218
    1024 1194
    Setup Checking for agent SelfUpdate
    2015-03-16 12:55:41:219
    1024 1194
    Setup Client version: Core: 7.6.7600.320  Aux: 7.6.7600.320
    2015-03-16 12:55:45:440
    1024 1194
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2015-03-16 12:55:45:893
    1024 1194
    Misc Microsoft signed: NA
    2015-03-16 12:55:45:897
    1024 1194
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPD98D.tmp with dwProvFlags 0x00000080:
    2015-03-16 12:55:45:979
    1024 1194
    Misc Microsoft signed: NA
    2015-03-16 12:55:46:014
    1024 1194
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2015-03-16 12:55:46:019
    1024 1194
    Misc Microsoft signed: NA
    2015-03-16 12:55:46:050
    1024 1194
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2015-03-16 12:55:46:055
    1024 1194
    Misc Microsoft signed: NA
    2015-03-16 12:55:46:093
    1024 1194
    Setup Determining whether a new setup handler needs to be downloaded
    2015-03-16 12:55:46:093
    1024 1194
    Setup SelfUpdate handler is not found.  It will be downloaded
    2015-03-16 12:55:46:093
    1024 1194
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.320"
    2015-03-16 12:55:52:237
    1024 1194
    Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
    2015-03-16 12:55:52:237
    1024 1194
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320"
    2015-03-16 12:55:53:377
    1024 1194
    Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
    2015-03-16 12:55:53:502
    1024 1194
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320"
    2015-03-16 12:55:56:705
    1024 1194
    Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
    2015-03-16 12:55:56:896
    1024 1194
    Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2015-03-16 12:56:01:618
    1024 1060
    AU AU received policy change subscription event
    2015-03-16 13:00:00:824
    1024 1194
    PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2015-03-16 13:00:00:824
    1024 1194
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ewd-srv-01.resultstel.net:8530/ClientWebService/client.asmx
    2015-03-16 13:00:01:001
    1024 1194
    PT WARNING: PTError: 0x80041002
    2015-03-16 13:00:01:001
    1024 1194
    PT Initializing simple targeting cookie, clientId = f86ac648-7394-46eb-8f40-eb605f77d86b, target group = Eastwood, DNS name = ewd-wc-420-235.resultstel.net
    2015-03-16 13:00:01:001
    1024 1194
    PT  Server URL = http://ewd-srv-01.resultstel.net:8530/SimpleAuthWebService/SimpleAuth.asmx
    2015-03-16 13:00:01:833
    1024 1194
    Agent WARNING: Failed to evaluate Installed rule, updateId = {F92A18E7-8784-4828-89C9-F80085A422A7}.202, hr = 80041002
    2015-03-16 13:00:02:004
    1024 1194
    Agent WARNING: Failed to evaluate Installed rule, updateId = {C735DBB1-06B4-49F2-815F-97976B4B86A4}.102, hr = 80041002
    2015-03-16 13:00:08:676
    1024 1194
    Agent WARNING: Failed to evaluate Installed rule, updateId = {6A8FE277-1048-48B1-803B-4580C15BBDF1}.100, hr = 80041002
    2015-03-16 13:07:37:795
    1024 1194
    PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2015-03-16 13:07:37:795
    1024 1194
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ewd-srv-01.resultstel.net:8530/ClientWebService/client.asmx
    2015-03-16 13:07:37:988
    1024 1194
    PT WARNING: PTError: 0x80041002
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: GetExtendedUpdateInfo failure, error = 0x8024400E, soap client error = 7, soap error code = 400, HTTP status code = 200
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: SOAP Fault: 0x000190
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     faultstring:Fault occurred
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     ErrorCode:InternalServerError(5)
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     Message:(null)
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetExtendedUpdateInfo"
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     ID:4cd69d60-d69b-4591-88ad-5687cdda3265
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: PTError: 0x8024400e
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: GetExtendedUpdateInfo_WithRecovery: 0x8024400e
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: Sync of Extended Info: 0x8024400e
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: SyncServerUpdatesInternal failed : 0x8024400e
    2015-03-16 13:07:41:914
    1024 1194
    Agent  * WARNING: Exit code = 0x8024400E
    2015-03-16 13:07:41:914
    1024 1194
    Agent *********
    2015-03-16 13:07:41:914
    1024 1194
    Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-03-16 13:07:41:914
    1024 1194
    Agent *************
    2015-03-16 13:07:41:914
    1024 1194
    Agent WARNING: WU client failed Searching for update with error 0x8024400e
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:930
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:930
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:42:021
    1024 14f4
    AU >>##  RESUMED  ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
    2015-03-16 13:07:42:021
    1024 14f4
    AU  # WARNING: Search callback failed, result = 0x8024400E
    2015-03-16 13:07:42:021
    1024 14f4
    AU  # WARNING: Failed to find updates with error code 8024400E
    2015-03-16 13:07:42:021
    1024 14f4
    AU #########
    2015-03-16 13:07:42:021
    1024 14f4
    AU ##  END  ##  AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
    2015-03-16 13:07:42:021
    1024 14f4
    AU #############
    2015-03-16 13:07:42:021
    1024 14f4
    AU Successfully wrote event for AU health state:0
    2015-03-16 13:07:42:021
    1024 14f4
    AU AU setting next detection timeout to 2015-03-16 22:07:42
    2015-03-16 13:07:42:022
    1024 14f4
    AU Setting AU scheduled install time to 2015-03-17 07:00:00
    2015-03-16 13:07:42:022
    1024 14f4
    AU Successfully wrote event for AU health state:0
    2015-03-16 13:07:42:022
    1024 14f4
    AU Successfully wrote event for AU health state:0
    2015-03-16 13:07:46:919
    1024 1194
    Report REPORT EVENT: {CB48FD20-D762-4E5E-8CCA-5C27F3CFA04A}
    2015-03-16 13:07:41:913-0400 1
    148 101
    {00000000-0000-0000-0000-000000000000}
    0 8024400e
    AutomaticUpdates Failure
    Software Synchronization Windows Update Client failed to detect with error 0x8024400e.
    2015-03-16 13:07:47:022
    1024 1194
    Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2015-03-16 13:07:47:022
    1024 1194
    Report WER Report sent: 7.6.7600.320 0x8024400e 00000000-0000-0000-0000-000000000000 Scan 101 Managed
    2015-03-16 13:07:47:022
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:14:23:923
    1024 1194
    PT WARNING: PTError: 0x80041002
    2015-03-16 13:14:23:923
    1024 1194
    Report Uploading 1 events using cached cookie, reporting URL = http://ewd-srv-01.resultstel.net:8530/ReportingWebService/ReportingWebService.asmx

    Don thank you for the reply.
    But I do have the same issue on the other PCs as well on which WMI is good. And also i pointed the above PC to my primary WSUS server which is running windows 2003 and it reported successfully and downloaded the approved updates.
    please see the below logs from the same PC after pointing to our wsus running on win2003.
    2015-03-17 14:41:08:507
    1020 f1c
    Inv   # Talking to WSUS server = http://atl-wsus-1:8530
    2015-03-17 14:41:08:508
    1020 f1c
    Inv   # Downloading Rule file from = http://atl-wsus-1:8530/Inventory/InventoryRules.cab
    2015-03-17 14:41:08:508
    1020 53c
    AU #########
    2015-03-17 14:41:08:508
    1020 53c
    AU ##  END  ##  AU: Search for updates [CallId = {54490DE2-CF7B-4017-A553-6C8C1532E621}]
    2015-03-17 14:41:08:508
    1020 53c
    AU #############
    2015-03-17 14:41:08:510
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:510
    1020 53c
    AU Featured notifications is disabled.
    2015-03-17 14:41:08:510
    1020 53c
    AU AU setting next detection timeout to 2015-03-18 16:13:54
    2015-03-17 14:41:08:510
    1020 53c
    AU Setting AU scheduled install time to 2015-03-18 07:00:00
    2015-03-17 14:41:08:510
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {6C2547EE-DC7B-4080-8884-A040572C5EC4}.204, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {673027F3-841E-4215-88BE-A0BFB456B2B1}.207, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approved 5 update(s) for download (NOT for Ux)
    2015-03-17 14:41:08:510
    1020 53c
    AU #############
    2015-03-17 14:41:08:511
    1020 53c
    AU ## START ##  AU: Download updates
    2015-03-17 14:41:08:511
    1020 53c
    AU #########
    2015-03-17 14:41:08:511
    1020 53c
    AU   # Approved updates = 5
    2015-03-17 14:41:08:512
    1020 53c
    AU AU initiated download, updateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202, callId = {F3389077-03F0-4625-83EF-CAAEBA8ED147}
    2015-03-17 14:41:08:513
    1020 53c
    AU AU initiated download, updateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203, callId = {B94BF4E5-5709-4D22-924A-5C5B8D4712C9}
    2015-03-17 14:41:08:514
    1020 53c
    AU AU initiated download, updateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203, callId = {D330B2E0-CA38-4ED9-894A-36717C01F09A}
    2015-03-17 14:41:08:515
    1020 53c
    AU AU initiated download, updateId = {6C2547EE-DC7B-4080-8884-A040572C5EC4}.204, callId = {B6B35AC2-9BC1-4CFA-8421-D666C79464AD}
    2015-03-17 14:41:08:516
    1020 53c
    AU AU initiated download, updateId = {673027F3-841E-4215-88BE-A0BFB456B2B1}.207, callId = {F0D00A6F-36BC-4680-9BE4-4005742A2C93}
    2015-03-17 14:41:08:516
    1020 53c
    AU Setting AU scheduled install time to 2015-03-18 07:00:00
    2015-03-17 14:41:08:516
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:516
    1020 53c
    AU AU setting pending client directive to 'Download Progress'
    2015-03-17 14:41:08:518
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:518
    1020 53c
    AU   # Pending download calls = 5
    2015-03-17 14:41:08:518
    1020 53c
    AU <<## SUBMITTED ## AU: Download updates
    2015-03-17 14:41:08:520
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:964
    1020 f1c
    Misc Validating signature for C:\Windows\SoftwareDistribution\Inventory\InventoryRule\InventoryRules.cab with dwProvFlags 0x00000080:
    2015-03-17 14:41:08:976
    1020 f1c
    Misc  Microsoft signed: NA
    2015-03-17 14:41:08:993
    1020 f1c
    Inv   # Inventory Rule id = 8226C3A1-70D4-4848-B441-1555AC820A23, version = 1.0
    2015-03-17 14:41:09:022
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:086
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:118
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:150
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:182
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:214
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:246
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:278
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:310
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:342
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:374
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:406
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:438
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:471
    1020 f1c
    PT WARNING: PTError: 0x80041002
    2015-03-17 14:41:10:590
    1020 f1c
    Inv #########
    2015-03-17 14:41:10:590
    1020 f1c
    Inv ##  END  ##  Inv: Inventory Collection
    2015-03-17 14:41:10:590
    1020 f1c
    Inv #############
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr *************
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr ** START **  DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr *********
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr   * Call ID = {F3389077-03F0-4625-83EF-CAAEBA8ED147}
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr   * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr   * Updates to download = 1
    2015-03-17 14:41:10:592
    1020 f1c
    Agent   *   Title = Security Update for Windows 7 (KB3029944)
    2015-03-17 14:41:10:592
    1020 f1c
    Agent   *   UpdateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202
    2015-03-17 14:41:10:592
    1020 f1c
    Agent   *     Bundles 1 updates:
    2015-03-17 14:41:10:592
    1020 f1c
    Agent   *       {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202
    2015-03-17 14:41:10:598
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202]  ***********
    2015-03-17 14:41:10:599
    1020 f1c
    DnldMgr   * Queueing update for download handler request generation.
    2015-03-17 14:41:10:599
    1020 f1c
    DnldMgr Generating download request for update {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202
    2015-03-17 14:41:13:863
    1020 f1c
    Handler Generating request for CBS update CF9A0A9F-EA32-4B84-8B11-647F8DE3432C in sandbox C:\Windows\SoftwareDistribution\Download\4fa5441bcc144c4a7917304858841f6b
    2015-03-17 14:41:13:863
    1020 f1c
    Handler Selected payload type is ptExpress
    2015-03-17 14:41:13:863
    1020 f1c
    Handler Detected download state is dsStart
    2015-03-17 14:41:13:863
    1020 f1c
    Handler Adding windows6.1-kb3029944-x86-express.cab (entire file) to request list.
    2015-03-17 14:41:13:864
    1020 f1c
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 
    2015-03-17 14:41:13:864
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202]  ***********
    2015-03-17 14:41:16:436
    1020 f1c
    DnldMgr   * BITS job initialized, JobId = {675985CD-3133-4157-9D02-06CC33C29C49}
    2015-03-17 14:41:16:473
    1020 f1c
    DnldMgr   * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/01/windows6.1-kb3029944-x86-express_0c21886fd0931285b2d3a29773d3673c947f60b3.cab to C:\Windows\SoftwareDistribution\Download\4fa5441bcc144c4a7917304858841f6b\windows6.1-kb3029944-x86-express.cab
    (full file).
    2015-03-17 14:41:16:644
    1020 f1c
    Agent *********
    2015-03-17 14:41:16:644
    1020 f1c
    Agent **  END  **  Agent: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:16:644
    1020 f1c
    Agent *************
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr *************
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr ** START **  DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr *********
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr   * Call ID = {B94BF4E5-5709-4D22-924A-5C5B8D4712C9}
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr   * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr   * Updates to download = 1
    2015-03-17 14:41:16:645
    1020 f1c
    Agent   *   Title = Security Update for Windows 7 (KB3004361)
    2015-03-17 14:41:16:645
    1020 f1c
    Agent   *   UpdateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203
    2015-03-17 14:41:16:645
    1020 f1c
    Agent   *     Bundles 1 updates:
    2015-03-17 14:41:16:645
    1020 f1c
    Agent   *       {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203
    2015-03-17 14:41:16:648
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203]  ***********
    2015-03-17 14:41:16:649
    1020 f1c
    DnldMgr   * Queueing update for download handler request generation.
    2015-03-17 14:41:16:649
    1020 f1c
    DnldMgr Generating download request for update {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203
    2015-03-17 14:41:16:678
    1020 f1c
    Handler Generating request for CBS update 151B27A0-4EA8-428F-BE06-C90A3CF0C2CA in sandbox C:\Windows\SoftwareDistribution\Download\963019da42f4a0388fdc4337be401b25
    2015-03-17 14:41:16:678
    1020 f1c
    Handler Selected payload type is ptExpress
    2015-03-17 14:41:16:678
    1020 f1c
    Handler Detected download state is dsStart
    2015-03-17 14:41:16:678
    1020 f1c
    Handler Adding windows6.1-kb3004361-x86-express.cab (entire file) to request list.
    2015-03-17 14:41:16:687
    1020 f1c
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 
    2015-03-17 14:41:16:687
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203]  ***********
    2015-03-17 14:41:16:732
    1020 f1c
    DnldMgr   * BITS job initialized, JobId = {27F85F04-0E56-4BFA-93E3-4D6BCB3ECB4F}
    2015-03-17 14:41:16:758
    1020 f1c
    DnldMgr   * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2014/12/windows6.1-kb3004361-x86-express_47f37958063afd2521ca42de8904b55d1aa85b89.cab to C:\Windows\SoftwareDistribution\Download\963019da42f4a0388fdc4337be401b25\windows6.1-kb3004361-x86-express.cab
    (full file).
    2015-03-17 14:41:16:809
    1020 f1c
    Agent *********
    2015-03-17 14:41:16:809
    1020 f1c
    Agent **  END  **  Agent: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:16:809
    1020 f1c
    Agent *************
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr *************
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr ** START **  DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr *********
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr   * Call ID = {D330B2E0-CA38-4ED9-894A-36717C01F09A}
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr   * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr   * Updates to download = 1
    2015-03-17 14:41:16:811
    1020 f1c
    Agent   *   Title = Security Update for Windows 7 (KB3031432)
    2015-03-17 14:41:16:811
    1020 f1c
    Agent   *   UpdateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203
    2015-03-17 14:41:16:811
    1020 f1c
    Agent   *     Bundles 1 updates:
    2015-03-17 14:41:16:811
    1020 f1c
    Agent   *       {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203
    2015-03-17 14:41:16:814
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203]  ***********
    2015-03-17 14:41:16:815
    1020 f1c
    DnldMgr   * Queueing update for download handler request generation.
    2015-03-17 14:41:16:815
    1020 f1c
    DnldMgr Generating download request for update {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203
    2015-03-17 14:41:16:843
    1020 f1c
    Handler Generating request for CBS update EE556F37-7EAC-42B3-BD29-653F98E6E364 in sandbox C:\Windows\SoftwareDistribution\Download\7db602a9c625e53b175ecb83170441ba
    2015-03-17 14:41:16:843
    1020 f1c
    Handler Selected payload type is ptExpress
    2015-03-17 14:41:16:843
    1020 f1c
    Handler Detected download state is dsStart
    2015-03-17 14:41:16:843
    1020 f1c
    Handler Adding windows6.1-kb3031432-x86-express.cab (entire file) to request list.
    2015-03-17 14:41:16:844
    1020 f1c
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 
    2015-03-17 14:41:16:845
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203]  ***********
    2015-03-17 14:41:16:881
    1020 f1c
    DnldMgr   * BITS job initialized, JobId = {6C5B3B60-DB8B-4B6F-9E40-D99CA43B366D}
    2015-03-17 14:41:16:906
    1020 f1c
    DnldMgr   * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/01/windows6.1-kb3031432-x86-express_fb5326e90facfe6de39cf44fc4ed5ec630968ba5.cab to C:\Windows\SoftwareDistribution\Download\7db602a9c625e53b175ecb83170441ba\windows6.1-kb3031432-x86-express.cab
    (full file).

  • Can I use the same database for two WSUS servers?

    Hi Folks,
    Our HQ WSUS database is on a dedicated SQL Server 2008 in HQ. We are planning to set up a replica WSUS server in a branch office (centralized management mode). But we want to check the WSUS reports (e.g. computer/update status) only from the HQ instead
    of each branch. I have two questions.
    I should not install the SQL Server in Branch, and specify the HQ SQL Server as the Branch WSUS server database, right? In this case, I can check WSUS reports of both HQ and Branch from HQ, right?
    Can I use a specific update source (e.g. Microsoft Update or other WSUS upsteam servers) for Branch WSUS server instead of HQ WSUS server even it's a replica WSUS server?
    Thanks,
    高麻雀

    Regarding to "If the branch office server is intended to be a replica server, then it must be configured with the HQ WSUS server as the update source", does it mean my branch WSUS server is only able to get the patches from my HQ WSUS server?
    That is the fundamental premise of a downstream replica server.
    Isn't it able to get the patches from Microsoft Update or other WSUS servers?
    Well, here we may have a terminology challenge... so let me take a step back and answer this way:
    A WSUS server obtains *updates* via the process of synchronization. Updates can be synchronized from one of two sources: Microsoft, or an Upstream WSUS Server.
    Additionally, updates have a concept of APPROVAL. Approvals can be obtained from an Upstream WSUS Server when the server is configured as a REPLICA server; otherwise, Approvals are created at each individual WSUS server.
    Finally, updates have FILES. Files can be obtained from Microsoft or the Upstream WSUS server, and this configuration option is absolutely independent of where the updates and/or approvals come from.
    Please note: All of this is exhaustively documented and discussed in the
    WSUS Deployment Guide. I would highly recommend reading it cover-to-cover.
    In this case, there will a a lot of bandwith cost on the leased line which is only 2Mbps and intended for critical business like VDI/ERP applications.
    A few thoughts here...
    First a 2Mb/sec link is more than adequate to support a WSUS server downloading update files from an Upstream WSUS Server.
    Second, using BITS you can configure when those files are transferred as well as how much of that 2Mb/sec is made available to the WSUS downstream server.
    Third... Patch Management IS a critical business function. Do not let it be treated as a step-child or the VDI/ERP functionally will be irrelevant.
    "after installing the replica server in the branch office, on the upstream server enable the option for Reporting Rollup", will the report information (computer/update status) be recorded in the HQ SQL Server?
    The detail reporting data for the clients of the downstream replica servers is physically stored in the upstream server's database.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Multiple sources with single downstream capture

    Is it possible to have multiple source machines all send their redo logs to a single downstream capture DB that will collect LCRs and queue the LCRs for all the source machines?

    Yes, that's wht downstream replication is all about. read the 11G manual if you want to know how to do that.

  • WSUS 3.0 SP2 troubles after installing KB2938066 (0xC000000D)

    Hi everyone,
    I ran into a problem in our WSUS environment after installing the latest hotfix KB2938066.
    We have WS2008R2 SP1 (fully patched) for WSUS-Upstream server and couple of the same servers for WSUS-Downstream.
    Previous functional version of WSUS was 3.2.7600.256.
    After installing KB2938066 (v3.2.7600.274) the WU/MU clients updated, but on some machines, mostly on servers with WS2008R2 SP1 (RADIUS and Domain Controllers), they now have problems installing updates.
    The error I see in '0xC000000D', which is something peculiar and not well searchable on the internet.
    Here is part of the WindowsUpdate log.
    I would appreciate any advice. Thx, John.
    Agent *************
    Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
    Agent *********
    Agent * Online = Yes; Ignore download priority = No
    Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1
    and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    Agent * Search Scope = {Machine}
    Setup Checking for agent SelfUpdate
    Setup Client version: Core: 7.6.7600.320 Aux: 7.6.7600.320
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    Misc Microsoft signed: NA
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPC435.tmp with dwProvFlags 0x00000080:
    Misc FATAL: Error: 0xc000000d when verifying trust for C:\Windows\SoftwareDistribution\SelfUpdate\TMPC435.tmp
    Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\TMPC435.tmp are not trusted: Error 0xc000000d
    Setup FATAL: Ident cab verification failed with error 0XC000000D
    Setup WARNING: SelfUpdate check failed to download package information, error = 0xC000000D
    Setup FATAL: SelfUpdate check failed, err = 0xC000000D
    Agent * WARNING: Skipping scan, self-update check returned 0xC000000D
    Agent * WARNING: Exit code = 0xC000000D
    Agent *********
    Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
    Agent *************
    Agent WARNING: WU client failed Searching for update with error 0xc000000d
    AU >>## RESUMED ## AU: Search for updates [CallId = {9CD5DB56-3B59-4481-90D0-FD1E34D65233}]
    AU # WARNING: Search callback failed, result = 0xC000000D
    AU # WARNING: Failed to find updates with error code C000000D
    AU #########
    AU ## END ## AU: Search for updates [CallId = {9CD5DB56-3B59-4481-90D0-FD1E34D65233}]
    AU #############
    Here is the WER file, which appeared in the application event log as information:
    Version=1
    EventType=WindowsUpdateFailure
    EventTime=130498849873184095
    Consent=1
    ReportIdentifier=73f3eedf-0bf6-11e4-8540-005056960b89
    Response.type=4
    Sig[0].Name=ClientVersion
    Sig[0].Value=7.6.7600.320
    Sig[1].Name=Win32HResult
    Sig[1].Value=c000000d
    Sig[2].Name=UpdateId
    Sig[2].Value=D67661EB-2423-451D-BF5D-13199E37DF28
    Sig[3].Name=Scenario
    Sig[3].Value=Scan
    Sig[4].Name=SourceId
    Sig[4].Value=101
    Sig[5].Name=Environment
    Sig[5].Value=Managed
    DynamicSig[1].Name=OS Version
    DynamicSig[1].Value=6.1.7601.2.1.0.274.10
    DynamicSig[2].Name=Locale ID
    DynamicSig[2].Value=1033
    FriendlyEventName=Windows Update installation problem
    ConsentKey=WindowsUpdateFailure
    AppName=Host Process for Windows Services
    AppPath=C:\Windows\System32\svchost.exe
    ReportDescription=A Windows update did not install properly. Sending the following information to Microsoft can help improve the software.

    Hello everyone,
    We have the same problem with 3 workstations (out of 120)
    They are the only PCs that have an electronic signature software installed.
    I uninstalled the software on one of them and it reconnects to wsus immediately
    The software used is Entrust Entelligence Security Provider for Windows (like your Visual Studio example above)
    Sorry but no CAPI2 logs for the moment
    Excerpt of the windows update log with the software installed
    Checking for agent SelfUpdate
    2014-07-31 11:21:22:306
    648 1208
    Setup Client version: Core: 7.6.7600.320  Aux: 7.6.7600.320
    2014-07-31 11:21:24:630
    648 1208
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2014-07-31 11:21:36:034
    648 1208
    Misc Microsoft signed: NA
    2014-07-31 11:21:36:049
    648 1208
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP4F80.tmp with dwProvFlags 0x00000080:
    2014-07-31 11:21:43:334
    648 1208
    Misc FATAL: Error: 0xc000000d when verifying trust for C:\Windows\SoftwareDistribution\SelfUpdate\TMP4F80.tmp
    2014-07-31 11:21:43:334
    648 1208
    Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\TMP4F80.tmp are not trusted: Error 0xc000000d
    2014-07-31 11:21:43:334
    648 1208
    Setup FATAL: Ident cab verification failed with error 0XC000000D
    2014-07-31 11:21:43:334
    648 1208
    Setup WARNING: SelfUpdate check failed to download package information, error = 0xC000000D
    2014-07-31 11:21:43:334
    648 1208
    Setup FATAL: SelfUpdate check failed, err = 0xC000000D
    2014-07-31 11:21:43:334
    648 1208
    Agent  * WARNING: Skipping scan, self-update check returned 0xC000000D
    2014-07-31 11:21:43:334
    648 1208
    Agent  * WARNING: Exit code = 0xC000000D
    Excerpt of the log when the software is uninstalled
    Checking for agent SelfUpdate
    2014-08-11 13:55:54:999
    648 278
    Setup Client version: Core: 7.6.7600.320  Aux: 7.6.7600.320
    2014-08-11 13:55:57:307
    648 278
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2014-08-11 13:55:57:338
    648 278
    Misc Microsoft signed: NA
    2014-08-11 13:55:57:338
    648 278
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP9388.tmp with dwProvFlags 0x00000080:
    2014-08-11 13:55:57:354
    648 278
    Misc Microsoft signed: NA
    2014-08-11 13:55:57:354
    648 278
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2014-08-11 13:55:57:354
    648 278
    Misc Microsoft signed: NA
    2014-08-11 13:55:57:354
    648 278
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2014-08-11 13:55:57:354
    648 278
    Misc Microsoft signed: NA
    2014-08-11 13:55:57:369
    648 278
    Setup Determining whether a new setup handler needs to be downloaded
    2014-08-11 13:55:57:369
    648 278
    Setup SelfUpdate handler is not found.  It will be downloaded
    2014-08-11 13:55:57:369
    648 278
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
    2014-08-11 13:55:57:369
    648 278
    Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
    2014-08-11 13:55:57:369
    648 278
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2014-08-11 13:55:57:385
    648 278
    Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
    2014-08-11 13:55:57:385
    648 278
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2014-08-11 13:55:57:400
    648 278
    Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
    2014-08-11 13:55:57:400
    648 278
    Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    The problem is definitely around third-parties software 
    Thanks
    Joce

  • WSUS Replica server version limitations.

    Hello, I am trying to find which WSUS upstream server versions can stream to which WSUS downstream server versions.  Can WSUS 6.3 stream to WSUS 2.0?  Etc.

    Hi Lucas,
    2.0 is no longer supported, but 3.0 SP2, 6.2 (2012) & 6.3 (2012R2) can inter-operate providing kb2734608 is installed first on the WSUS 3.0 SP2 servers.
    https://social.technet.microsoft.com/Forums/en-US/35ed689a-8b78-424e-802d-9e335e07fcfe/wsus-6-upstream-server-will-support-wsus-3-sp2-downstream-server-or-not?forum=winserverwsus
    If you find the answer of assistance please "Vote as Helpful"and/or "Mark as Answer" where applicable. This helps others to find solutions for there issues, and recognises contributions made to the community :)

  • WSUS + BITS Versions + Peer Caching + BranchCache + Windows Editions = HEADACHE!

    We have a WSUS server in the main office (Windows Server 2008 R2 Standard).
    We have a branch office with Windows 7 Professional clients and Windows Server 2008 R2 Standard and Enterprise servers, which means these computers are using BITS 4.0 (http://msdn.microsoft.com/en-us/library/bb968799(VS.85).aspx).
    To save on disk space, we prefer not to set up a WSUS downstream replica server in the branch office if we can use BITS 4.0 with BranchCache.
    Researching WSUS and BITS Versions and Peer Caching and BranchCache and Windows Editions has been confusing. Some questions…
    These pages in the BITS section of MSDN all say: “Starting with Windows 7, the BITS 3.0 peer caching model is deprecated. If BITS 4.0 is installed, the BITS 3.0 peer caching model is unavailable.” However, these pages also say: “BITS (4.0) uses
    the Windows BranchCache for peer caching,” and “Starting with Background Intelligent Transfer Service (BITS) 4.0, the BITS service was extended to allow subnet-level peer caching for downloaded URL data by using Windows BranchCache.”
       http://msdn.microsoft.com/en-us/library/aa362708(v=vs.85).aspx
       http://msdn.microsoft.com/en-us/library/aa964314(v=vs.85).aspx
       http://msdn.microsoft.com/en-us/library/aa964240(v=vs.85).aspx
    And this page says: “(BITS 4.0 New Feature) Peer caching now uses Windows BranchCache. This new peer caching model replaces the model used for BITS version 3.0.”
       http://msdn.microsoft.com/en-us/library/aa363167(VS.85).aspx
    Okay, fine. BITS 3.0 peer caching is unavailable for Win7/2008 R2, but BITS 4.0 “peer caching” does work by using BranchCache. Got it. So, do we understand correctly that the various “peer caching” group policy settings under Computer Configuration – Policies
    – Administrative Templates – Network – Background Intelligent Transfer Service have
    no effect at all for BITS 4.0 clients?
    http://msdn.microsoft.com/en-us/library/aa362844(v=vs.85).aspx
    Next, the link at the end of this paragraph says: “Windows BranchCache must be enabled on the client through a group policy or local configuration settings.” Okay, fine. We followed the instructions at the second link to enable BranchCache for our
    Windows 7 clients. Interestingly, the description in the Turn on BranchCache group policy setting (under Computer Configuration – Policies – Administrative Templates – Network – BranchCache) says: “For this policy setting to take effect, you must install
    the BranchCache feature on the client computer.” However, it seems that the BranchCache feature is
    already installed by default (although not enabled) on Windows 7, because there’s no option to add BranchCache in Control Panel – Programs and Features – Turn Windows features on or off, and there’s already a BranchCache service on
    Windows 7. So, does this statement actually not apply to Windows 7 (and only Windows Server 2008 R2)?
       http://msdn.microsoft.com/en-us/library/aa964314(v=vs.85).aspx
       http://technet.microsoft.com/en-us/library/dd637820.aspx
    Next, the link below says: “The Windows BranchCache feature is an optional component that must be installed on the server,” and “The server must also enable the Windows BranchCache feature though group policy.” Okay, fine. We followed the
    instructions at the second link to enable it for our Windows Server 2008 R2 servers. However, we would like one of our servers in the branch office to be the “Hosted Cache” server, and the remaining Win7/2008 R2 computers to just be “clients” that use the
    Hosted Cache server (for the WSUS updates). So, in this case, does only the
    Configuring a Web server or a BITS application server to use BranchCache section at this link apply to our Hosted Cache server, meaning no other steps are necessary beyond just installing the BranchCache feature? Or, do we have to go through the
    Configuring a file server to use BranchCache section?
    Likewise, does the Computer Configuration – Policies - Administrative Templates – Network - Lanman Server - Hash Publication for BranchCache group policy setting apply to us if we’re just looking to use BranchCache for WSUS updates and nothing else?
       http://msdn.microsoft.com/en-us/library/aa964314(v=vs.85).aspx
       http://technet.microsoft.com/en-us/library/dd637785.aspx
    In doing more research I believe that, for Hosted Cache mode, the BranchCache feature must be installed on
    both the WSUS server at the main site and on a server at the branch office. Is this correct?
    Next, we want to configure the BranchCache Hosted Cache mode group policy setting. However, this setting says: “This address must match the Fully Qualified Domain Name (FQDN) of the server specified in the certificate for the BranchCache server's certificate,”
    and “the certificate root for the BranchCache server's certificate must be in the client computer's trusted root store.” Since our BranchCache clients will only be using BITS for WSUS updates (via HTTP), is it still necessary to install a certificate
    on the Hosted Cache server? (If Yes, that's too bad, because it really complicates BranchCache deployments, especially when all of the computers are within your Active Directory domain).
    Next, there’s the Configure BranchCache for network files group policy setting. Since this setting uses SMB, we’re assuming this does not apply to BranchCache used by BITS clients, and so we don't need to configure it. Is this correct?
    So, in Summary: We just want to use BITS with BranchCache for the computers in our branch office to access WSUS updates on a local server that’s acting as a BranchCache Hosted Cache server. And we’d prefer not to have to deal with certificates to make this
    happen, if possible.
    Sorry for the long post, but there’s just no clear, one-stop place that informs us how to configure all of this.
    Oh, and is all of the above completely irrelevant
    for us since this TechNet page says BranchCache requires the
    Enterprise Editions of Windows 7 and Windows Server 2008 R2? I sure hope not…   :o)
       http://social.technet.microsoft.com/wiki/contents/articles/2342.branchcache-settings-for-windows-server-2008-r2-windows-7-enterprise-and-windows-7-ultimate.aspx
    -Taylorbox
    NOTE: I’ve already read these posts:
       http://www.windowsnetworking.com/articles-tutorials/windows-7/Introduction-BranchCache-Part1.html
       http://www.windowsnetworking.com/articles-tutorials/windows-7/Deploying-Hosted-Mode-BranchCache-Server-Part2.html
       http://www.windowsnetworking.com/articles-tutorials/windows-7/Deploying-Hosted-Mode-BranchCache-Server-Part3.html

    First, I'm curious as to why you think that a BranchCache server would consume any less disk space than a WSUS replica server?
    Because whereas our WSUS server stores all approved updates long-term, the BranchCache server would only store the updates needed for the branch office's computers, and
    short-term.
    Hmm.. this is not a benefit of branch-cache, it's merely a manifestation of an improperly maintained WSUS server.
    The WSUS has over 100GB of updates.
    Which is about TEN TIMES what should be held on a well-maintained WSUS server. :-)
    The BranchCache server should use less than 5GB since it would keep only the most recent updates
    Thus, BranchCache would contain about 50% IN CACHE of what a WSUS Replica Server would contain ON DISK.
    This TechNet page says: "BITS uses the following Group Policies to enable and configure the peer caching," but then it says: "BITS 4.0:  The BITS 3.0 Group Policies are deprecated.
    Yeah, I did a double-take first time I saw that too... what it means is that those settings, originally used in BITS 3.0 have been deprecated, and now, with BITS 4.0 and BrancheCache you need to use the BITS 4.0 settings.
    BrancheCache functionality is only available in the Enterprise and Ultimate editions of Windows 7.
    A hosted cache server must be Enterprise or DataCenter editions; the functionality is not available in Standard Edition.
    Evidently for Windows 8 Professional, BranchCache
    is available for BITS (not SMB), but that's not true for Windows 7 Professional
    This is a manifestation of the change in SKUs availabe in those two products. There is no Windows 8 Ultimate, only Professional and Enterprise, and there's no longer an Enterprise Edition of the Server OS.
    In this case, when Microsoft removed the BITS 3.0 peer caching functionality with BITS 4.0 and replaced it with BranchCache, they effectively required you to use the Enterprise editions of Win7/2008 R2
    Yes. BranchCache is a feature designed for Enterprise-scale organizations with Remote offices. The presumption, and a reasonable one at that, is that such organizations have volume licensing, and with volume licensing, desktops will be installed with Enterprise
    Edition.
    The requirement of WS2008R2 Enterprise Edition is a bit more onerous, but it's nothing new. Microsoft has always made notable feature distinctions between Standard and Enterprise Editions.
    What's really significant now, though, is that Windows Server 2012 does not have an "Enterprise Edition". There's Standard Edition and Datacenter Edition, and ALL features are in BOTH editions ... so something to consider here if I've not yet convinced you
    that the simplicity of a replica WSUS server is a better choice than the complexity of implementing BranchCache -- consider deploying WS2012 instead of WS2008R2.
    Lawrence Garvin, M.S., MCITP:EA, MCDBA, MCSA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2013)
    My MVP Profile:
    http://mvp.support.microsoft.com/profile/Lawrence.Garvin
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Adding a Software Update Point to an existing WSUS install.

    I'm looking into migrating my existing WSUS server to SCCM but I have a couple issues that I need clarification on.
    I would like to configure SCCM to synchronize directly with Microsoft Updates in place of WSUS but I'm not sure how I would transition from it. With my current WSUS installed on the same server as my SCCM Primary Site, would I have to remove then reinstall
    WSUS so the Software Update Point can use WSUS properly?
    I also have two additional SCCM locations acting primarily as Distribution Points. I have no secondary sites. Would these two DPs replace the two WSUS downstream servers I have running? I am fully updated to the R2 version of SCCM2012 for reference. Thank
    you.

    Removing and reinstalling WSUS (including the database) would be the best option. WSUS is only used for scanning purposes; the updates will be downloaded from DPs - so those DPs will somehow replace downstream servers.
    Torsten Meringer | http://www.mssccmfaq.de

  • Data are not being applied at destination side

    Hi all,
    I have implemented real time streams replication(not archive log based downstream replication).
    source:9.2.0.8.0
    destination:10.2.0.2.0
    Capture and propagation is working fine. DBlinks are also fine. Apply process is running , but data are not being applied in destination side.
    The trc file shows this:
    Dump file /dev1/visdb10/10.2.0/admin/VIS_wbsebdev1/bdump/vis_p001_14628.trc
    Oracle Database 10g Enterprise Edition Release 10.2.0.2.0 - Production
    With the Partitioning, OLAP and Data Mining options
    ORACLE_HOME = /dev1/visdb10/10.2.0
    System name: Linux
    Node name: wbsebdev1
    Release: 2.4.21-32.ELsmp
    Version: #1 SMP Fri Apr 15 21:17:59 EDT 2005
    Machine: i686
    Instance name: VIS
    Redo thread mounted by this instance: 1
    Oracle process number: 21
    Unix process pid: 14628, image: oracle@wbsebdev1 (P001)
    *** SERVICE NAME:(SYS$USERS) 2008-05-29 11:39:26.957
    *** SESSION ID:(388.16) 2008-05-29 11:39:26.957
    The Alertlog file shows at the end this:
    Thu May 29 11:19:06 2008
    Streams APPLY A001 with pid=16, OS id=9531 stopped
    Thu May 29 11:21:25 2008
    Incremental checkpoint up to RBA [0x746.d359.0], current log tail at RBA [0x746.d471.0]
    Thu May 29 11:39:26 2008
    Streams APPLY A001 started with pid=18, OS id=14624
    Streams Apply Reader started P000 with pid=20 OS id=14626
    Streams Apply Server started P001 with pid=21 OS id=14628
    Thu May 29 11:41:33 2008
    Incremental checkpoint up to RBA [0x746.11565.0], current log tail at RBA [0x746.121b9.0]
    Pls help.
    Thanking You,
    Nitesh.

    Problem solved.

Maybe you are looking for

  • How to view my call log from a month ago

    I have a few numbers that I need from last month and I want to view my call log history from December how do I do that?

  • CS3 Version Cue not loading in Bridge

    I'm trying to access a version cue server in bridge, but there is no button to access version cue in bridge. i know there is supposed to be a button in the favorites panel, but its not there, and there is no way to 'check it' in preferences. its chec

  • Volume setting for other programs lowers to inaudible levels when ever I use flash.

    Whenever I play a flash file/video/etc in firefox 3.6.4, the volume of other programs such as itunes and ventrillo go down to like 1%. How do I stop this from happening? == URL of affected sites == http://www.youtube.com

  • Dreamweaver CC (2014.1) Un-workably slow

    I've uninstalled and I'm now reverted back to CS6 - this works perfectly. I'm on an iMac Mac OSX 10.7.5 Intel Core i7 8Gig RAM Why is CC so slow. (2014 and 2014.1) 1. creating a new doc and trying to type any line of code (code view, or split) is slo

  • Air Port Extreme connection problems

    I have a Macbook Pro and a 1st gen. Ipod connected to the Internet using an Air Port Extreme.  At this time I cannot use two devices at once to access the Internet, only one or the other.  What should I do to adjust settings on my Airport?