WSUS downstream Server synchroziation failed

Hi All,
I have upgraded my downstream server to Windows Server 2012 R2. After upgrade my WSUS server is not synchronization with my upstream WSUS server. I am getting the below error while running the synchronization.
IOException: Unable to read data from the transport connection: An existing connection was forcibly closed by the remote host. ---> System.Net.Sockets.SocketException: An existing connection was forcibly closed by the remote host
at System.Net.ConnectStream.Read(Byte[] buffer, Int32 offset, Int32 size)
   at Microsoft.UpdateServices.ServerSync.ServerSyncCompressionProxy.GetWebResponse(WebRequest webRequest)
   at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
   at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetRevisionIdList(Cookie cookie, ServerSyncFilter filter)
   at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.WebserviceGetRevisionIdList(ServerSyncFilter filter, Boolean isConfigData)
   at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)
Nirmal Singh IT Administrator

How did you do the upgrade, was it in-place, or a new machine? And did you migrate the WSUS role or just deploy a new instance?
Are there any firewalls in place?
Do you have other downstream servers connecting to the upstream, if so are those connecting ok?
Do you have any clients connecting to the upstream?
What are the build numbers on both servers?
Are there any errors in the IIS log?

Similar Messages

  • WSUS Downstream server not synchronizing - SQL Timeout

    I'm running into problems synching a downstream WSUS server with the parent server. The first few times that the server synch'd it ran fine, then it just stopped working. The Windows Firewall is disabled and there is no proxy. I've checked all the permissions
    for IIS and all required services are running. I've also tried an IISRESET, uninstall WSUS, re-installed, ran wsusutil.exe reset and checkhealth, rebooted many times. Ran the DB Cleanup Wizard on both servers. Any help woul be appreciated.
    WSUS Parent Server: Windows Server 2003 R2 SP2
    WSUS Downstream Server: Windows Server 2003 R2 SP2
    WSUS Failed Error Message:
    SqlException: Timeout expired.  The timeout period elapsed prior to completion of the operation or the server is not responding.
    at System.Data.SqlClient.SqlConnection.OnError(SqlException exception, Boolean breakConnection)
       at System.Data.SqlClient.SqlInternalConnection.OnError(SqlException exception, Boolean breakConnection)
       at System.Data.SqlClient.TdsParser.ThrowExceptionAndWarning(TdsParserStateObject stateObj)
       at System.Data.SqlClient.TdsParser.Run(RunBehavior runBehavior, SqlCommand cmdHandler, SqlDataReader dataStream, BulkCopySimpleResultSet bulkCopyHandler, TdsParserStateObject stateObj)
       at System.Data.SqlClient.SqlDataReader.ReadInternal(Boolean setTimeout)
       at System.Data.SqlClient.SqlDataReader.Read()
       at Microsoft.UpdateServices.DatabaseAccess.DBConnection.ReadOneRow()
       at Microsoft.UpdateServices.Internal.DataAccess.HideUpdatesForReplicaSync(String xmlUpdateIds)
       at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ProcessHiddenUpdates(Guid[] hiddenUpdates)
       at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ReplicaSync()
       at Microsoft.UpdateServic
    Thank You

    Sure, here are the log files. Thank you!
    UPSTREAM SERVER:
    Running... GetConfiguration
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Update Services\Server\Setup
     Version:3
     InstallLanguage:ENU
     ProxyPassword:
     SmtpUserPassword:
     VersionString:3.2.7600.226
     ConfigurationSource:0
     ServicePackLevel:2
     TargetDir:C:\Program Files\Update Services\
     InstallType:1
     EnableRemoting:1
     WsusAdministratorsSid:S-1-5-21-163115894-1154025269-1635805901-1010
     WSUSReportersSid:S-1-5-21-163115894-1154025269-1635805901-1009
     SqlServerName:WSUSDAL\MICROSOFT##SSEE
     SqlAuthenticationMode:WindowsAuthentication
     SqlDatabaseName:SUSDB
     SqlUserName:
     SqlEncryptedPassword:
     SqlInstanceIsRemote:0
     wYukonInstalled:1
     ContentDir:E:\WSUS
     PortNumber:8530
     IISTargetWebSiteIndex:625045861
     IISTargetWebSiteCreated:True
     IISUninstallConfigFilePath:C:\Program Files\Update Services\setup\UninstallSettings.xml
     IISPreviousInstallRevision:
     IISInstallRevision:3.2.7600.226
     IIsDynamicCompression:0
     EncryptionParam:System.Byte[]
     EncryptionKey:System.Byte[]
    <NewDataSet>
      <Table>
        <ConfigurationID>1</ConfigurationID>
        <LastConfigChange>2010-05-30T21:19:36.8700000-05:00</LastConfigChange>
        <DssAnonymousTargeting>false</DssAnonymousTargeting>
        <IsRegistrationRequired>true</IsRegistrationRequired>
        <MaxDeltaSyncPeriod>30</MaxDeltaSyncPeriod>
        <ReportingServiceUrl>https://stats.update.microsoft.com</ReportingServiceUrl>
        <ServerID>c48b3181-a77e-4a88-8986-3dd6bf07c291</ServerID>
        <AnonymousCookieExpirationTime>10080</AnonymousCookieExpirationTime>
        <SimpleTargetingCookieExpirationTime>60</SimpleTargetingCookieExpirationTime>
        <MaximumServerCookieExpirationTime>10080</MaximumServerCookieExpirationTime>
        <DssTargetingCookieExpirationTime>240</DssTargetingCookieExpirationTime>
        <EncryptionKey>dE3WZ7GGMBOpG/ftJuzo7lDLHBFVT7VR</EncryptionKey>
        <ServerTargeting>false</ServerTargeting>
        <SyncToMU>true</SyncToMU>
        <UpstreamServerName>SUSDal</UpstreamServerName>
        <ServerPortNumber>8530</ServerPortNumber>
        <UpstreamServerUseSSL>false</UpstreamServerUseSSL>
        <UseProxy>false</UseProxy>
        <ProxyName />
        <ProxyServerPort>80</ProxyServerPort>
        <AnonymousProxyAccess>true</AnonymousProxyAccess>
        <ProxyUserName />
        <HostOnMu>false</HostOnMu>
        <LocalContentCacheLocation>e:\WSUS\WsusContent\</LocalContentCacheLocation>
        <ServerSupportsAllLanguages>false</ServerSupportsAllLanguages>
        <LogLevel>0</LogLevel>
        <LogPath />
        <SubscriptionFailureNumberOfRetries>3</SubscriptionFailureNumberOfRetries>
        <SubscriptionFailureWaitBetweenRetriesTime>15</SubscriptionFailureWaitBetweenRetriesTime>
        <DispatchManagerPollingInterval>5</DispatchManagerPollingInterval>
        <StateMachineTransitionLoggingEnabled>false</StateMachineTransitionLoggingEnabled>
        <StateMachineTransitionErrorCaptureLength>600</StateMachineTransitionErrorCaptureLength>
        <MaxSimultaneousFileDownloads>10</MaxSimultaneousFileDownloads>
        <MUUrl>https://www.update.microsoft.com/v6</MUUrl>
        <EventLogFloodProtectTime>10</EventLogFloodProtectTime>
        <HandshakeAnchor>13270510,2010-06-02 21:12:31.056</HandshakeAnchor>
        <StatsDotNetWebServiceUri>http://localhost</StatsDotNetWebServiceUri>
        <QueueFlushTimeInMS>3000</QueueFlushTimeInMS>
        <QueueFlushCount>100</QueueFlushCount>
        <QueueRejectCount>500</QueueRejectCount>
        <SleepTimeAfterErrorInMS>30000</SleepTimeAfterErrorInMS>
        <LogDestinations>0</LogDestinations>
        <AutoRefreshDeployments>true</AutoRefreshDeployments>
        <RedirectorChangeNumber>0</RedirectorChangeNumber>
        <ImportLocalPath />
        <UseCookieValidation>true</UseCookieValidation>
        <AutoPurgeClientEventAgeThreshold>15</AutoPurgeClientEventAgeThreshold>
        <AutoPurgeServerEventAgeThreshold>90</AutoPurgeServerEventAgeThreshold>
        <AutoPurgeDetectionPeriod>12</AutoPurgeDetectionPeriod>
        <DoReportingDataValidation>true</DoReportingDataValidation>
        <DoReportingSummarization>true</DoReportingSummarization>
        <MaxNumberOfIdsToRequestDataFromUss>100</MaxNumberOfIdsToRequestDataFromUss>
        <MaxCoreUpdatesPerRequest>30</MaxCoreUpdatesPerRequest>
        <MaxExtendedUpdatesPerRequest>50</MaxExtendedUpdatesPerRequest>
        <DownloadRegulationUrl />
        <AllowProxyCredentialsOverNonSsl>false</AllowProxyCredentialsOverNonSsl>
        <LazySync>true</LazySync>
        <DownloadExpressPackages>false</DownloadExpressPackages>
        <DoServerSyncCompression>true</DoServerSyncCompression>
        <ProxyUserDomain />
        <BitsHealthScanningInterval>3600000</BitsHealthScanningInterval>
        <BitsDownloadPriorityForeground>false</BitsDownloadPriorityForeground>
        <MaxXmlPerRequest>5242880</MaxXmlPerRequest>
        <MaxXmlPerRequestInServerSync>2000000</MaxXmlPerRequestInServerSync>
        <MaxTargetComputers>30000</MaxTargetComputers>
        <MaxEventInstances>2000000</MaxEventInstances>
        <LogRolloverFileSizeInBytes>0</LogRolloverFileSizeInBytes>
        <WUSInstallType>0</WUSInstallType>
        <ReplicaMode>false</ReplicaMode>
        <AutoDeployMandatory>true</AutoDeployMandatory>
        <DeploymentChangeDeferral>30</DeploymentChangeDeferral>
        <RevisionDeletionTimeThreshold>30</RevisionDeletionTimeThreshold>
        <RevisionDeletionSizeThreshold>1024</RevisionDeletionSizeThreshold>
        <CollectClientInventory>false</CollectClientInventory>
        <DoDetailedRollup>true</DoDetailedRollup>
        <RollupResetGuid>83340a0d-4624-4cb9-bc30-db197c999bc8</RollupResetGuid>
        <UssSupportsAllLanguages>false</UssSupportsAllLanguages>
        <GetContentFromMU>false</GetContentFromMU>
        <HmDetectIntervalInSeconds>600</HmDetectIntervalInSeconds>
        <HmRefreshIntervalInSeconds>21600</HmRefreshIntervalInSeconds>
        <HmCoreDiskSpaceGreenMegabytes>500</HmCoreDiskSpaceGreenMegabytes>
        <HmCoreDiskSpaceRedMegabytes>200</HmCoreDiskSpaceRedMegabytes>
        <HmCoreCatalogSyncIntervalInDays>1</HmCoreCatalogSyncIntervalInDays>
        <HmClientsInstallUpdatesGreenPercent>10</HmClientsInstallUpdatesGreenPercent>
        <HmClientsInstallUpdatesRedPercent>25</HmClientsInstallUpdatesRedPercent>
        <HmClientsInventoryGreenPercent>2</HmClientsInventoryGreenPercent>
        <HmClientsInventoryRedPercent>5</HmClientsInventoryRedPercent>
        <HmClientsInventoryScanDiffInHours>30</HmClientsInventoryScanDiffInHours>
        <HmClientsSilentGreenPercent>10</HmClientsSilentGreenPercent>
        <HmClientsSilentRedPercent>25</HmClientsSilentRedPercent>
        <HmClientsSilentDays>30</HmClientsSilentDays>
        <DssRollupChunkSize>5000</DssRollupChunkSize>
        <MURollupOptin>False</MURollupOptin>
        <AutoRefreshDeploymentsDeclineExpired>true</AutoRefreshDeploymentsDeclineExpired>
        <ServerString>Default</ServerString>
        <HmCoreFlags>-1</HmCoreFlags>
        <HmClientsFlags>-1</HmClientsFlags>
        <HmDatabaseFlags>-1</HmDatabaseFlags>
        <HmWebServicesFlags>-1</HmWebServicesFlags>
        <ClientReportingLevel>2</ClientReportingLevel>
        <LocalPublishingMaxCabSize>384</LocalPublishingMaxCabSize>
        <DownloadRegulationWebServiceUrl />
        <LoadOdfLocally>false</LoadOdfLocally>
        <OdfFilePath />
        <HmClientsTooManyGreenPercent>80</HmClientsTooManyGreenPercent>
        <HmClientsTooManyRedPercent>90</HmClientsTooManyRedPercent>
        <ComputerDeletionTimeThreshold>30</ComputerDeletionTimeThreshold>
        <ConfigurationChangeNumber>137118</ConfigurationChangeNumber>
        <UseSeparateProxyForSsl>false</UseSeparateProxyForSsl>
        <SslProxyName />
        <SslProxyServerPort>443</SslProxyServerPort>
        <ServerSupportsAllAvailableLanguages>false</ServerSupportsAllAvailableLanguages>
      </Table>
    </NewDataSet>
    DOWNSTREAM SERVER:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Update Services\Server\Setup
     Version:3
     InstallLanguage:ENU
     ProxyPassword:
     SmtpUserPassword:
     VersionString:3.2.7600.226
     ConfigurationSource:0
     ServicePackLevel:2
     TargetDir:C:\Program Files\Update Services\
     InstallType:1
     EnableRemoting:1
     WsusAdministratorsSid:S-1-5-21-2105027866-1443240842-1445603992-20366
     WSUSReportersSid:S-1-5-21-2105027866-1443240842-1445603992-19384
     SqlServerName:SUSFTW\MICROSOFT##SSEE
     SqlAuthenticationMode:WindowsAuthentication
     SqlDatabaseName:SUSDB
     SqlUserName:
     SqlEncryptedPassword:
     SqlInstanceIsRemote:0
     wYukonInstalled:1
     ContentDir:D:\WSUS
     PortNumber:8530
     IISTargetWebSiteIndex:602037408
     IISTargetWebSiteCreated:True
     IISUninstallConfigFilePath:C:\Program Files\Update Services\setup\UninstallSettings.xml
     IISPreviousInstallRevision:
     IISInstallRevision:3.2.7600.226
     IIsDynamicCompression:-1
     EncryptionParam:System.Byte[]
     EncryptionKey:System.Byte[]
    <NewDataSet>
      <Table>
        <ConfigurationID>1</ConfigurationID>
        <LastConfigChange>2010-06-02T00:00:35.0200000-05:00</LastConfigChange>
        <DssAnonymousTargeting>false</DssAnonymousTargeting>
        <IsRegistrationRequired>true</IsRegistrationRequired>
        <MaxDeltaSyncPeriod>30</MaxDeltaSyncPeriod>
        <ReportingServiceUrl>https://stats.update.microsoft.com</ReportingServiceUrl>
        <ServerID>dac8845b-855c-4899-ab19-8bf7a750514f</ServerID>
        <AnonymousCookieExpirationTime>10080</AnonymousCookieExpirationTime>
        <SimpleTargetingCookieExpirationTime>60</SimpleTargetingCookieExpirationTime>
        <MaximumServerCookieExpirationTime>10080</MaximumServerCookieExpirationTime>
        <DssTargetingCookieExpirationTime>240</DssTargetingCookieExpirationTime>
        <EncryptionKey>VoxRFFCoICrJYoTjr5WL1aOzfX1CSL9m</EncryptionKey>
        <ServerTargeting>true</ServerTargeting>
        <SyncToMU>false</SyncToMU>
        <UpstreamServerName>WSUSDAL</UpstreamServerName>
        <ServerPortNumber>8530</ServerPortNumber>
        <UpstreamServerUseSSL>false</UpstreamServerUseSSL>
        <UseProxy>false</UseProxy>
        <ProxyName />
        <ProxyServerPort>80</ProxyServerPort>
        <AnonymousProxyAccess>true</AnonymousProxyAccess>
        <ProxyUserName />
        <HostOnMu>false</HostOnMu>
        <LocalContentCacheLocation>d:\WSUS\WsusContent\</LocalContentCacheLocation>
        <ServerSupportsAllLanguages>false</ServerSupportsAllLanguages>
        <LogLevel>0</LogLevel>
        <LogPath />
        <SubscriptionFailureNumberOfRetries>3</SubscriptionFailureNumberOfRetries>
        <SubscriptionFailureWaitBetweenRetriesTime>15</SubscriptionFailureWaitBetweenRetriesTime>
        <DispatchManagerPollingInterval>5</DispatchManagerPollingInterval>
        <StateMachineTransitionLoggingEnabled>false</StateMachineTransitionLoggingEnabled>
        <StateMachineTransitionErrorCaptureLength>600</StateMachineTransitionErrorCaptureLength>
        <MaxSimultaneousFileDownloads>10</MaxSimultaneousFileDownloads>
        <MUUrl>https://www.update.microsoft.com/v6</MUUrl>
        <EventLogFloodProtectTime>10</EventLogFloodProtectTime>
        <HandshakeAnchor>136861,2010-06-02 00:00:34.112</HandshakeAnchor>
        <StatsDotNetWebServiceUri>http://localhost</StatsDotNetWebServiceUri>
        <QueueFlushTimeInMS>3000</QueueFlushTimeInMS>
        <QueueFlushCount>100</QueueFlushCount>
        <QueueRejectCount>500</QueueRejectCount>
        <SleepTimeAfterErrorInMS>30000</SleepTimeAfterErrorInMS>
        <LogDestinations>0</LogDestinations>
        <AutoRefreshDeployments>true</AutoRefreshDeployments>
        <RedirectorChangeNumber>0</RedirectorChangeNumber>
        <ImportLocalPath />
        <UseCookieValidation>true</UseCookieValidation>
        <AutoPurgeClientEventAgeThreshold>15</AutoPurgeClientEventAgeThreshold>
        <AutoPurgeServerEventAgeThreshold>90</AutoPurgeServerEventAgeThreshold>
        <AutoPurgeDetectionPeriod>12</AutoPurgeDetectionPeriod>
        <DoReportingDataValidation>true</DoReportingDataValidation>
        <DoReportingSummarization>true</DoReportingSummarization>
        <MaxNumberOfIdsToRequestDataFromUss>100</MaxNumberOfIdsToRequestDataFromUss>
        <MaxCoreUpdatesPerRequest>30</MaxCoreUpdatesPerRequest>
        <MaxExtendedUpdatesPerRequest>50</MaxExtendedUpdatesPerRequest>
        <DownloadRegulationUrl />
        <AllowProxyCredentialsOverNonSsl>false</AllowProxyCredentialsOverNonSsl>
        <LazySync>true</LazySync>
        <DownloadExpressPackages>false</DownloadExpressPackages>
        <DoServerSyncCompression>true</DoServerSyncCompression>
        <ProxyUserDomain />
        <BitsHealthScanningInterval>3600000</BitsHealthScanningInterval>
        <BitsDownloadPriorityForeground>false</BitsDownloadPriorityForeground>
        <MaxXmlPerRequest>5242880</MaxXmlPerRequest>
        <MaxXmlPerRequestInServerSync>2000000</MaxXmlPerRequestInServerSync>
        <MaxTargetComputers>30000</MaxTargetComputers>
        <MaxEventInstances>2000000</MaxEventInstances>
        <LogRolloverFileSizeInBytes>0</LogRolloverFileSizeInBytes>
        <WUSInstallType>0</WUSInstallType>
        <ReplicaMode>true</ReplicaMode>
        <AutoDeployMandatory>true</AutoDeployMandatory>
        <DeploymentChangeDeferral>30</DeploymentChangeDeferral>
        <RevisionDeletionTimeThreshold>30</RevisionDeletionTimeThreshold>
        <RevisionDeletionSizeThreshold>1024</RevisionDeletionSizeThreshold>
        <CollectClientInventory>false</CollectClientInventory>
        <DoDetailedRollup>true</DoDetailedRollup>
        <RollupResetGuid>83340a0d-4624-4cb9-bc30-db197c999bc8</RollupResetGuid>
        <UssSupportsAllLanguages>false</UssSupportsAllLanguages>
        <GetContentFromMU>false</GetContentFromMU>
        <HmDetectIntervalInSeconds>600</HmDetectIntervalInSeconds>
        <HmRefreshIntervalInSeconds>21600</HmRefreshIntervalInSeconds>
        <HmCoreDiskSpaceGreenMegabytes>500</HmCoreDiskSpaceGreenMegabytes>
        <HmCoreDiskSpaceRedMegabytes>200</HmCoreDiskSpaceRedMegabytes>
        <HmCoreCatalogSyncIntervalInDays>1</HmCoreCatalogSyncIntervalInDays>
        <HmClientsInstallUpdatesGreenPercent>10</HmClientsInstallUpdatesGreenPercent>
        <HmClientsInstallUpdatesRedPercent>25</HmClientsInstallUpdatesRedPercent>
        <HmClientsInventoryGreenPercent>2</HmClientsInventoryGreenPercent>
        <HmClientsInventoryRedPercent>5</HmClientsInventoryRedPercent>
        <HmClientsInventoryScanDiffInHours>30</HmClientsInventoryScanDiffInHours>
        <HmClientsSilentGreenPercent>10</HmClientsSilentGreenPercent>
        <HmClientsSilentRedPercent>25</HmClientsSilentRedPercent>
        <HmClientsSilentDays>30</HmClientsSilentDays>
        <DssRollupChunkSize>5000</DssRollupChunkSize>
        <MURollupOptin>False</MURollupOptin>
        <AutoRefreshDeploymentsDeclineExpired>true</AutoRefreshDeploymentsDeclineExpired>
        <ServerString>Default</ServerString>
        <HmCoreFlags>-1</HmCoreFlags>
        <HmClientsFlags>-1</HmClientsFlags>
        <HmDatabaseFlags>-1</HmDatabaseFlags>
        <HmWebServicesFlags>-1</HmWebServicesFlags>
        <ClientReportingLevel>2</ClientReportingLevel>
        <LocalPublishingMaxCabSize>384</LocalPublishingMaxCabSize>
        <DownloadRegulationWebServiceUrl />
        <LoadOdfLocally>false</LoadOdfLocally>
        <OdfFilePath />
        <HmClientsTooManyGreenPercent>80</HmClientsTooManyGreenPercent>
        <HmClientsTooManyRedPercent>90</HmClientsTooManyRedPercent>
        <ComputerDeletionTimeThreshold>30</ComputerDeletionTimeThreshold>
        <ConfigurationChangeNumber>76409</ConfigurationChangeNumber>
        <UseSeparateProxyForSsl>false</UseSeparateProxyForSsl>
        <SslProxyName />
        <SslProxyServerPort>443</SslProxyServerPort>
        <ServerSupportsAllAvailableLanguages>false</ServerSupportsAllAvailableLanguages>
      </Table>
    </NewDataSet>

  • Wsus downstream server not showing up

    OS: Windows 2003
    WSUS: 3.0 SP1
    Architecture: 3-tier WSUS, Level 1 approve/decline updates and sync with microsoft update websites; Level 2 is replica of Level 1; Level 3 is downstream servers of Level2 and configed into autonomous mode.
    We have a 3-tier WSUS infrastructure in test mode. The WSUS.Level1 server gets updates directly from Microsoft Updates. WSUS.Level2 server is a replica server of Level 1 server, i.e., upstream server is WSUS.Level1.  There are more than 20 other Level 3 WSUS servers use WSUS.Level2 as the upstream servers. Level 3 servers are setup as autonomous mode at this moment.
    The Level 3 servers were created from an image that were sealed and syspreped before restoring the Image.
    Microsoft Updates Server -> WSUS.Level1 -> WSUS.Level2 -> 20 other WSUS Level 3 servers
    Q1: there are only three Level 3 servers showing up in the Level 2 WSUS downstream server list (should be more as we have 20 WSUS level 3 servers). When I tried to manually sync from any Level 3  server, it will show up in the Level 2 WSUS downstream server list. However, it will replace one of the three servers that is already listed. Always 3 downstream servers showing up in Level2,  always! Any idea why this happens

    The Level 3 servers were created from an image that were sealed and syspreped before restoring the Image.
    Q1: there are only three Level 3 servers showing up in the Level 2 WSUS downstream server list (should be more as we have 20 WSUS level 3 servers). When I tried to manually sync from any Level 3  server, it will show up in the Level 2 WSUS downstream server list. However, it will replace one of the three servers that is already listed. Always 3 downstream servers showing up in Level2,  always! Any idea why this happens
    <sigh>....
    SYSPREP is not an appropriate tool to be used for imaging machines with *APPLICATIONS* installed, particularly if those applications use GUIDs to uniquely identify the machines, as WSUS downstream servers do.
    So, ironically, only two threads earlier I answered this very identical scenario . . .
    In theory, you should be able to do this to 'reset' these GUIDs...
    1. Synchronize the downstream server so that it shows up in the console of the upstream server.
    2. Set the downstream server synchronization schedule to MANUAL.
    3. Modify the Options | Update Source and Proxy Server | Update Source page to make this an upstream server.
    4. Delete the server from the Downstream Servers node of the upstream server's console.
    5. Modify the Options | Update Source and Proxy Server | Update Source page to make this a downstream server again.
    6. Initiate a synchronization.
    You won't see any difference after performing these steps on the first server.
    When you'll know this is working is if the second server shows up in the console after Step #6.
    Repeat Steps #1 through #6 for the other three servers.
    Lawrence Garvin, M.S., MCITP:EA, MCDBA, MCSA
    Principal/CTO, Onsite Technology Solutions, Houston, Texas
    Microsoft MVP - Software Distribution (2005-2010)
    My MVP Profile: http://mvp.support.microsoft.com/profile/Lawrence.Garvin
    My Blog: http://onsitechsolutions.spaces.live.com

  • Windows 7 clients not Reporting Status to WSUS (downstream server) server running Windows 2012 R2

    We have recently upgraded our WSUS server to Windows 2012 R2. Now none of the PCs reporting their status to the WSUS server and not getting updates at all. The PCs are contacting the Server but not reporting their status. Stopped the Firewall on Client and
    Server. BITS and windows updates services are running. 
    Record the system time of the Windows 7 client.
    Reboot the Windows 7 client.
    Run this command from a command prompt: wuauclt /resetauthorization /detectnow.
    Wait =30= minutes.
    Performed the above steps. Please see the updates logs from a client.
    2015-03-16 12:48:44:617
    1040 15a4
    Shutdwn user declined update at shutdown
    2015-03-16 12:48:44:617
    1040 15a4
    AU Successfully wrote event for AU health state:0
    2015-03-16 12:48:44:618
    1040 15a4
    AU AU initiates service shutdown
    2015-03-16 12:48:44:649
    1040 15a4
    AU ###########  AU: Uninitializing Automatic Updates  ###########
    2015-03-16 12:48:46:506
    1040 15a4
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 12:48:46:584
    1040 15a4
    Service *********
    2015-03-16 12:48:46:584
    1040 15a4
    Service **  END  **  Service: Service exit [Exit code = 0x240001]
    2015-03-16 12:48:46:584
    1040 15a4
    Service *************
    2015-03-16 12:54:23:139
    1024 1060
    Misc ===========  Logging initialized (build: 7.6.7600.320, tz: -0400)  ===========
    2015-03-16 12:54:23:214
    1024 1060
    Misc  = Process: C:\Windows\system32\svchost.exe
    2015-03-16 12:54:23:264
    1024 1060
    Misc  = Module: c:\windows\system32\wuaueng.dll
    2015-03-16 12:54:23:139
    1024 1060
    Service *************
    2015-03-16 12:54:23:264
    1024 1060
    Service ** START **  Service: Service startup
    2015-03-16 12:54:23:265
    1024 1060
    Service *********
    2015-03-16 12:54:24:262
    1024 1060
    Agent  * WU client version 7.6.7600.320
    2015-03-16 12:54:24:263
    1024 1060
    Agent  * Base directory: C:\Windows\SoftwareDistribution
    2015-03-16 12:54:24:272
    1024 1060
    Agent  * Access type: No proxy
    2015-03-16 12:54:24:532
    1024 1060
    Agent  * Network state: Connected
    2015-03-16 12:55:17:235
    1024 1060
    Report CWERReporter::Init succeeded
    2015-03-16 12:55:17:235
    1024 1060
    Agent ***********  Agent: Initializing Windows Update Agent  ***********
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * Prerequisite roots succeeded.
    2015-03-16 12:55:17:235
    1024 1060
    Agent ***********  Agent: Initializing global settings cache  ***********
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * WSUS server: http://ewd-srv-01.resultstel.net:8530
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * WSUS status server: http://ewd-srv-01.resultstel.net:8530
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * Target group: Eastwood
    2015-03-16 12:55:17:235
    1024 1060
    Agent  * Windows Update access disabled: No
    2015-03-16 12:55:17:247
    1024 1060
    DnldMgr Download manager restoring 0 downloads
    2015-03-16 12:55:17:248
    1024 1060
    AU ###########  AU: Initializing Automatic Updates  ###########
    2015-03-16 12:55:17:249
    1024 1060
    AU  # WSUS server: http://ewd-srv-01.resultstel.net:8530
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Detection frequency: 22
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Target group: Eastwood
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Approval type: Scheduled (Policy)
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Scheduled install day/time: Every day at 3:00
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Auto-install minor updates: Yes (Policy)
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Will interact with non-admins (Non-admins are elevated (User preference))
    2015-03-16 12:55:17:249
    1024 1060
    AU  # Will display featured software notifications (User preference)
    2015-03-16 12:55:17:259
    1024 1060
    Agent Switching to hardware-verified ClientId.
    2015-03-16 12:55:17:260
    1024 1060
    AU Setting AU scheduled install time to 2015-03-17 07:00:00
    2015-03-16 12:55:17:402
    1024 1060
    Report ***********  Report: Initializing static reporting data  ***********
    2015-03-16 12:55:17:402
    1024 1060
    Report  * OS Version = 6.1.7601.1.0.65792
    2015-03-16 12:55:17:402
    1024 1060
    Report  * OS Product Type = 0x00000030
    2015-03-16 12:55:17:600
    1024 1060
    Report WARNING: Failed to load reporting information from WMI with hr = 80041002.
    2015-03-16 12:55:17:601
    1024 1060
    Report  * Locale ID = 1033
    2015-03-16 12:55:17:654
    1024 1060
    AU Successfully wrote event for AU health state:0
    2015-03-16 12:55:17:655
    1024 1060
    AU Initializing featured updates
    2015-03-16 12:55:17:655
    1024 1060
    AU Found 0 cached featured updates
    2015-03-16 12:55:17:655
    1024 1060
    AU Successfully wrote event for AU health state:0
    2015-03-16 12:55:17:656
    1024 1060
    AU Successfully wrote event for AU health state:0
    2015-03-16 12:55:17:656
    1024 1060
    AU AU finished delayed initialization
    2015-03-16 12:55:23:261
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 12:55:41:121
    1024 1074
    AU Triggering AU detection through DetectNow API
    2015-03-16 12:55:41:122
    1024 1074
    AU Triggering Online detection (non-interactive)
    2015-03-16 12:55:41:193
    1024 1060
    AU #############
    2015-03-16 12:55:41:193
    1024 1060
    AU ## START ##  AU: Search for updates
    2015-03-16 12:55:41:193
    1024 1060
    AU #########
    2015-03-16 12:55:41:218
    1024 1060
    AU <<## SUBMITTED ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
    2015-03-16 12:55:41:218
    1024 1194
    Agent *************
    2015-03-16 12:55:41:218
    1024 1194
    Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-03-16 12:55:41:218
    1024 1194
    Agent *********
    2015-03-16 12:55:41:218
    1024 1194
    Agent  * Online = Yes; Ignore download priority = No
    2015-03-16 12:55:41:218
    1024 1194
    Agent  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0
    and DeploymentAction='Uninstallation' and RebootRequired=1"
    2015-03-16 12:55:41:218
    1024 1194
    Agent  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2015-03-16 12:55:41:218
    1024 1194
    Agent  * Search Scope = {Machine}
    2015-03-16 12:55:41:218
    1024 1194
    Setup Checking for agent SelfUpdate
    2015-03-16 12:55:41:219
    1024 1194
    Setup Client version: Core: 7.6.7600.320  Aux: 7.6.7600.320
    2015-03-16 12:55:45:440
    1024 1194
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2015-03-16 12:55:45:893
    1024 1194
    Misc Microsoft signed: NA
    2015-03-16 12:55:45:897
    1024 1194
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPD98D.tmp with dwProvFlags 0x00000080:
    2015-03-16 12:55:45:979
    1024 1194
    Misc Microsoft signed: NA
    2015-03-16 12:55:46:014
    1024 1194
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2015-03-16 12:55:46:019
    1024 1194
    Misc Microsoft signed: NA
    2015-03-16 12:55:46:050
    1024 1194
    Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2015-03-16 12:55:46:055
    1024 1194
    Misc Microsoft signed: NA
    2015-03-16 12:55:46:093
    1024 1194
    Setup Determining whether a new setup handler needs to be downloaded
    2015-03-16 12:55:46:093
    1024 1194
    Setup SelfUpdate handler is not found.  It will be downloaded
    2015-03-16 12:55:46:093
    1024 1194
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.320"
    2015-03-16 12:55:52:237
    1024 1194
    Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
    2015-03-16 12:55:52:237
    1024 1194
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320"
    2015-03-16 12:55:53:377
    1024 1194
    Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
    2015-03-16 12:55:53:502
    1024 1194
    Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320"
    2015-03-16 12:55:56:705
    1024 1194
    Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.320" is already installed.
    2015-03-16 12:55:56:896
    1024 1194
    Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2015-03-16 12:56:01:618
    1024 1060
    AU AU received policy change subscription event
    2015-03-16 13:00:00:824
    1024 1194
    PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2015-03-16 13:00:00:824
    1024 1194
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ewd-srv-01.resultstel.net:8530/ClientWebService/client.asmx
    2015-03-16 13:00:01:001
    1024 1194
    PT WARNING: PTError: 0x80041002
    2015-03-16 13:00:01:001
    1024 1194
    PT Initializing simple targeting cookie, clientId = f86ac648-7394-46eb-8f40-eb605f77d86b, target group = Eastwood, DNS name = ewd-wc-420-235.resultstel.net
    2015-03-16 13:00:01:001
    1024 1194
    PT  Server URL = http://ewd-srv-01.resultstel.net:8530/SimpleAuthWebService/SimpleAuth.asmx
    2015-03-16 13:00:01:833
    1024 1194
    Agent WARNING: Failed to evaluate Installed rule, updateId = {F92A18E7-8784-4828-89C9-F80085A422A7}.202, hr = 80041002
    2015-03-16 13:00:02:004
    1024 1194
    Agent WARNING: Failed to evaluate Installed rule, updateId = {C735DBB1-06B4-49F2-815F-97976B4B86A4}.102, hr = 80041002
    2015-03-16 13:00:08:676
    1024 1194
    Agent WARNING: Failed to evaluate Installed rule, updateId = {6A8FE277-1048-48B1-803B-4580C15BBDF1}.100, hr = 80041002
    2015-03-16 13:07:37:795
    1024 1194
    PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2015-03-16 13:07:37:795
    1024 1194
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://ewd-srv-01.resultstel.net:8530/ClientWebService/client.asmx
    2015-03-16 13:07:37:988
    1024 1194
    PT WARNING: PTError: 0x80041002
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: GetExtendedUpdateInfo failure, error = 0x8024400E, soap client error = 7, soap error code = 400, HTTP status code = 200
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: SOAP Fault: 0x000190
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     faultstring:Fault occurred
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     ErrorCode:InternalServerError(5)
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     Message:(null)
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetExtendedUpdateInfo"
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING:     ID:4cd69d60-d69b-4591-88ad-5687cdda3265
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: PTError: 0x8024400e
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: GetExtendedUpdateInfo_WithRecovery: 0x8024400e
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: Sync of Extended Info: 0x8024400e
    2015-03-16 13:07:41:893
    1024 1194
    PT WARNING: SyncServerUpdatesInternal failed : 0x8024400e
    2015-03-16 13:07:41:914
    1024 1194
    Agent  * WARNING: Exit code = 0x8024400E
    2015-03-16 13:07:41:914
    1024 1194
    Agent *********
    2015-03-16 13:07:41:914
    1024 1194
    Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-03-16 13:07:41:914
    1024 1194
    Agent *************
    2015-03-16 13:07:41:914
    1024 1194
    Agent WARNING: WU client failed Searching for update with error 0x8024400e
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:929
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:930
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:41:930
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:07:42:021
    1024 14f4
    AU >>##  RESUMED  ## AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
    2015-03-16 13:07:42:021
    1024 14f4
    AU  # WARNING: Search callback failed, result = 0x8024400E
    2015-03-16 13:07:42:021
    1024 14f4
    AU  # WARNING: Failed to find updates with error code 8024400E
    2015-03-16 13:07:42:021
    1024 14f4
    AU #########
    2015-03-16 13:07:42:021
    1024 14f4
    AU ##  END  ##  AU: Search for updates [CallId = {6382DEFC-F99E-4A2A-B104-48CF9BE2D760}]
    2015-03-16 13:07:42:021
    1024 14f4
    AU #############
    2015-03-16 13:07:42:021
    1024 14f4
    AU Successfully wrote event for AU health state:0
    2015-03-16 13:07:42:021
    1024 14f4
    AU AU setting next detection timeout to 2015-03-16 22:07:42
    2015-03-16 13:07:42:022
    1024 14f4
    AU Setting AU scheduled install time to 2015-03-17 07:00:00
    2015-03-16 13:07:42:022
    1024 14f4
    AU Successfully wrote event for AU health state:0
    2015-03-16 13:07:42:022
    1024 14f4
    AU Successfully wrote event for AU health state:0
    2015-03-16 13:07:46:919
    1024 1194
    Report REPORT EVENT: {CB48FD20-D762-4E5E-8CCA-5C27F3CFA04A}
    2015-03-16 13:07:41:913-0400 1
    148 101
    {00000000-0000-0000-0000-000000000000}
    0 8024400e
    AutomaticUpdates Failure
    Software Synchronization Windows Update Client failed to detect with error 0x8024400e.
    2015-03-16 13:07:47:022
    1024 1194
    Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2015-03-16 13:07:47:022
    1024 1194
    Report WER Report sent: 7.6.7600.320 0x8024400e 00000000-0000-0000-0000-000000000000 Scan 101 Managed
    2015-03-16 13:07:47:022
    1024 1194
    Report CWERReporter finishing event handling. (00000000)
    2015-03-16 13:14:23:923
    1024 1194
    PT WARNING: PTError: 0x80041002
    2015-03-16 13:14:23:923
    1024 1194
    Report Uploading 1 events using cached cookie, reporting URL = http://ewd-srv-01.resultstel.net:8530/ReportingWebService/ReportingWebService.asmx

    Don thank you for the reply.
    But I do have the same issue on the other PCs as well on which WMI is good. And also i pointed the above PC to my primary WSUS server which is running windows 2003 and it reported successfully and downloaded the approved updates.
    please see the below logs from the same PC after pointing to our wsus running on win2003.
    2015-03-17 14:41:08:507
    1020 f1c
    Inv   # Talking to WSUS server = http://atl-wsus-1:8530
    2015-03-17 14:41:08:508
    1020 f1c
    Inv   # Downloading Rule file from = http://atl-wsus-1:8530/Inventory/InventoryRules.cab
    2015-03-17 14:41:08:508
    1020 53c
    AU #########
    2015-03-17 14:41:08:508
    1020 53c
    AU ##  END  ##  AU: Search for updates [CallId = {54490DE2-CF7B-4017-A553-6C8C1532E621}]
    2015-03-17 14:41:08:508
    1020 53c
    AU #############
    2015-03-17 14:41:08:510
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:510
    1020 53c
    AU Featured notifications is disabled.
    2015-03-17 14:41:08:510
    1020 53c
    AU AU setting next detection timeout to 2015-03-18 16:13:54
    2015-03-17 14:41:08:510
    1020 53c
    AU Setting AU scheduled install time to 2015-03-18 07:00:00
    2015-03-17 14:41:08:510
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {6C2547EE-DC7B-4080-8884-A040572C5EC4}.204, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approving update for download, updateId = {673027F3-841E-4215-88BE-A0BFB456B2B1}.207, ForUx=0, IsOwnerUx=0, HasDeadline=0, IsMinor=0
    2015-03-17 14:41:08:510
    1020 53c
    AU Auto-approved 5 update(s) for download (NOT for Ux)
    2015-03-17 14:41:08:510
    1020 53c
    AU #############
    2015-03-17 14:41:08:511
    1020 53c
    AU ## START ##  AU: Download updates
    2015-03-17 14:41:08:511
    1020 53c
    AU #########
    2015-03-17 14:41:08:511
    1020 53c
    AU   # Approved updates = 5
    2015-03-17 14:41:08:512
    1020 53c
    AU AU initiated download, updateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202, callId = {F3389077-03F0-4625-83EF-CAAEBA8ED147}
    2015-03-17 14:41:08:513
    1020 53c
    AU AU initiated download, updateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203, callId = {B94BF4E5-5709-4D22-924A-5C5B8D4712C9}
    2015-03-17 14:41:08:514
    1020 53c
    AU AU initiated download, updateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203, callId = {D330B2E0-CA38-4ED9-894A-36717C01F09A}
    2015-03-17 14:41:08:515
    1020 53c
    AU AU initiated download, updateId = {6C2547EE-DC7B-4080-8884-A040572C5EC4}.204, callId = {B6B35AC2-9BC1-4CFA-8421-D666C79464AD}
    2015-03-17 14:41:08:516
    1020 53c
    AU AU initiated download, updateId = {673027F3-841E-4215-88BE-A0BFB456B2B1}.207, callId = {F0D00A6F-36BC-4680-9BE4-4005742A2C93}
    2015-03-17 14:41:08:516
    1020 53c
    AU Setting AU scheduled install time to 2015-03-18 07:00:00
    2015-03-17 14:41:08:516
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:516
    1020 53c
    AU AU setting pending client directive to 'Download Progress'
    2015-03-17 14:41:08:518
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:518
    1020 53c
    AU   # Pending download calls = 5
    2015-03-17 14:41:08:518
    1020 53c
    AU <<## SUBMITTED ## AU: Download updates
    2015-03-17 14:41:08:520
    1020 53c
    AU Successfully wrote event for AU health state:0
    2015-03-17 14:41:08:964
    1020 f1c
    Misc Validating signature for C:\Windows\SoftwareDistribution\Inventory\InventoryRule\InventoryRules.cab with dwProvFlags 0x00000080:
    2015-03-17 14:41:08:976
    1020 f1c
    Misc  Microsoft signed: NA
    2015-03-17 14:41:08:993
    1020 f1c
    Inv   # Inventory Rule id = 8226C3A1-70D4-4848-B441-1555AC820A23, version = 1.0
    2015-03-17 14:41:09:022
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:086
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:118
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:150
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:182
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:214
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:246
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:278
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:310
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:342
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:374
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:406
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:438
    1020 f1c
    Inv WARNING: Inventory: Failed to connect to the root\cimv2 namespace 0x80041002
    2015-03-17 14:41:09:471
    1020 f1c
    PT WARNING: PTError: 0x80041002
    2015-03-17 14:41:10:590
    1020 f1c
    Inv #########
    2015-03-17 14:41:10:590
    1020 f1c
    Inv ##  END  ##  Inv: Inventory Collection
    2015-03-17 14:41:10:590
    1020 f1c
    Inv #############
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr *************
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr ** START **  DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr *********
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr   * Call ID = {F3389077-03F0-4625-83EF-CAAEBA8ED147}
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr   * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2015-03-17 14:41:10:592
    1020 f1c
    DnldMgr   * Updates to download = 1
    2015-03-17 14:41:10:592
    1020 f1c
    Agent   *   Title = Security Update for Windows 7 (KB3029944)
    2015-03-17 14:41:10:592
    1020 f1c
    Agent   *   UpdateId = {58406504-5709-46CA-BB54-3FE9628545AA}.202
    2015-03-17 14:41:10:592
    1020 f1c
    Agent   *     Bundles 1 updates:
    2015-03-17 14:41:10:592
    1020 f1c
    Agent   *       {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202
    2015-03-17 14:41:10:598
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202]  ***********
    2015-03-17 14:41:10:599
    1020 f1c
    DnldMgr   * Queueing update for download handler request generation.
    2015-03-17 14:41:10:599
    1020 f1c
    DnldMgr Generating download request for update {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202
    2015-03-17 14:41:13:863
    1020 f1c
    Handler Generating request for CBS update CF9A0A9F-EA32-4B84-8B11-647F8DE3432C in sandbox C:\Windows\SoftwareDistribution\Download\4fa5441bcc144c4a7917304858841f6b
    2015-03-17 14:41:13:863
    1020 f1c
    Handler Selected payload type is ptExpress
    2015-03-17 14:41:13:863
    1020 f1c
    Handler Detected download state is dsStart
    2015-03-17 14:41:13:863
    1020 f1c
    Handler Adding windows6.1-kb3029944-x86-express.cab (entire file) to request list.
    2015-03-17 14:41:13:864
    1020 f1c
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 
    2015-03-17 14:41:13:864
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {CF9A0A9F-EA32-4B84-8B11-647F8DE3432C}.202]  ***********
    2015-03-17 14:41:16:436
    1020 f1c
    DnldMgr   * BITS job initialized, JobId = {675985CD-3133-4157-9D02-06CC33C29C49}
    2015-03-17 14:41:16:473
    1020 f1c
    DnldMgr   * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/01/windows6.1-kb3029944-x86-express_0c21886fd0931285b2d3a29773d3673c947f60b3.cab to C:\Windows\SoftwareDistribution\Download\4fa5441bcc144c4a7917304858841f6b\windows6.1-kb3029944-x86-express.cab
    (full file).
    2015-03-17 14:41:16:644
    1020 f1c
    Agent *********
    2015-03-17 14:41:16:644
    1020 f1c
    Agent **  END  **  Agent: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:16:644
    1020 f1c
    Agent *************
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr *************
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr ** START **  DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr *********
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr   * Call ID = {B94BF4E5-5709-4D22-924A-5C5B8D4712C9}
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr   * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2015-03-17 14:41:16:645
    1020 f1c
    DnldMgr   * Updates to download = 1
    2015-03-17 14:41:16:645
    1020 f1c
    Agent   *   Title = Security Update for Windows 7 (KB3004361)
    2015-03-17 14:41:16:645
    1020 f1c
    Agent   *   UpdateId = {B9D0F709-E6A7-4383-AFB3-E35FB9CB0AAA}.203
    2015-03-17 14:41:16:645
    1020 f1c
    Agent   *     Bundles 1 updates:
    2015-03-17 14:41:16:645
    1020 f1c
    Agent   *       {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203
    2015-03-17 14:41:16:648
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203]  ***********
    2015-03-17 14:41:16:649
    1020 f1c
    DnldMgr   * Queueing update for download handler request generation.
    2015-03-17 14:41:16:649
    1020 f1c
    DnldMgr Generating download request for update {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203
    2015-03-17 14:41:16:678
    1020 f1c
    Handler Generating request for CBS update 151B27A0-4EA8-428F-BE06-C90A3CF0C2CA in sandbox C:\Windows\SoftwareDistribution\Download\963019da42f4a0388fdc4337be401b25
    2015-03-17 14:41:16:678
    1020 f1c
    Handler Selected payload type is ptExpress
    2015-03-17 14:41:16:678
    1020 f1c
    Handler Detected download state is dsStart
    2015-03-17 14:41:16:678
    1020 f1c
    Handler Adding windows6.1-kb3004361-x86-express.cab (entire file) to request list.
    2015-03-17 14:41:16:687
    1020 f1c
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 
    2015-03-17 14:41:16:687
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {151B27A0-4EA8-428F-BE06-C90A3CF0C2CA}.203]  ***********
    2015-03-17 14:41:16:732
    1020 f1c
    DnldMgr   * BITS job initialized, JobId = {27F85F04-0E56-4BFA-93E3-4D6BCB3ECB4F}
    2015-03-17 14:41:16:758
    1020 f1c
    DnldMgr   * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2014/12/windows6.1-kb3004361-x86-express_47f37958063afd2521ca42de8904b55d1aa85b89.cab to C:\Windows\SoftwareDistribution\Download\963019da42f4a0388fdc4337be401b25\windows6.1-kb3004361-x86-express.cab
    (full file).
    2015-03-17 14:41:16:809
    1020 f1c
    Agent *********
    2015-03-17 14:41:16:809
    1020 f1c
    Agent **  END  **  Agent: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:16:809
    1020 f1c
    Agent *************
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr *************
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr ** START **  DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr *********
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr   * Call ID = {D330B2E0-CA38-4ED9-894A-36717C01F09A}
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr   * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2015-03-17 14:41:16:811
    1020 f1c
    DnldMgr   * Updates to download = 1
    2015-03-17 14:41:16:811
    1020 f1c
    Agent   *   Title = Security Update for Windows 7 (KB3031432)
    2015-03-17 14:41:16:811
    1020 f1c
    Agent   *   UpdateId = {2CA8E6E8-FC4A-4974-A208-18CDF1D01D86}.203
    2015-03-17 14:41:16:811
    1020 f1c
    Agent   *     Bundles 1 updates:
    2015-03-17 14:41:16:811
    1020 f1c
    Agent   *       {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203
    2015-03-17 14:41:16:814
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203]  ***********
    2015-03-17 14:41:16:815
    1020 f1c
    DnldMgr   * Queueing update for download handler request generation.
    2015-03-17 14:41:16:815
    1020 f1c
    DnldMgr Generating download request for update {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203
    2015-03-17 14:41:16:843
    1020 f1c
    Handler Generating request for CBS update EE556F37-7EAC-42B3-BD29-653F98E6E364 in sandbox C:\Windows\SoftwareDistribution\Download\7db602a9c625e53b175ecb83170441ba
    2015-03-17 14:41:16:843
    1020 f1c
    Handler Selected payload type is ptExpress
    2015-03-17 14:41:16:843
    1020 f1c
    Handler Detected download state is dsStart
    2015-03-17 14:41:16:843
    1020 f1c
    Handler Adding windows6.1-kb3031432-x86-express.cab (entire file) to request list.
    2015-03-17 14:41:16:844
    1020 f1c
    Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 
    2015-03-17 14:41:16:845
    1020 f1c
    DnldMgr ***********  DnldMgr: New download job [UpdateId = {EE556F37-7EAC-42B3-BD29-653F98E6E364}.203]  ***********
    2015-03-17 14:41:16:881
    1020 f1c
    DnldMgr   * BITS job initialized, JobId = {6C5B3B60-DB8B-4B6F-9E40-D99CA43B366D}
    2015-03-17 14:41:16:906
    1020 f1c
    DnldMgr   * Downloading from http://wsus.ds.download.windowsupdate.com/c/msdownload/update/software/secu/2015/01/windows6.1-kb3031432-x86-express_fb5326e90facfe6de39cf44fc4ed5ec630968ba5.cab to C:\Windows\SoftwareDistribution\Download\7db602a9c625e53b175ecb83170441ba\windows6.1-kb3031432-x86-express.cab
    (full file).

  • WSUS on server 2012 fails to open

    I successfully installed WSUS role on server 2012 R2 and pointed its database to SQL 2012 during installation. I was prompted to specify the instance name, but since the sql is installed on the same server I entered the server name as was able to verify
    the connection. Database was successfully created in SQL, but when I try to open WSUS console, it opens up but does not connect to its service.
    Came across someone else's post with a similar problem, but using wsusutil.exe postinstall SQL_INSTANCE_NAME=<database server name> fails.
    http://blogs.technet.com/b/reshard_sharps_blog/archive/2013/08/18/wsus-post-deployment-configuration-fails.aspx
    I didn't specify  CONTENT_DIR=C:\Wsus as I don't want to store updates locally until additional storage becomes available.
    PS C:\Program Files\Update Services\tools> .\WsusUtil.exe postinstall SQL_INSTANCE_NAME=W2012\mssqlserver
    Log file is located at C:\Users\Administrator\AppData\Local\Temp\2\tmpC758.tmp
    Post install is starting Fatal Error: A network-related or instance-specific error occurred while establishing a connection to SQL Server. The server was not found or was not accessible. Verify that the instance name is correct and that SQL Server is configured
    to allow remote connections. (provider: SQL Network Interfaces, error: 25 - Connection string is not valid)

    2014-03-31 16:40:46  Importing SQLServer.xml...
    2014-03-31 16:40:46  Importing WindowsXP64BitEditionVersion2003.xml...
    2014-03-31 16:40:46  Importing DefinitionUpdateSusXml.xml...
    2014-03-31 16:40:46  Importing ClientServicingApiDetectoid.xml...
    2014-03-31 16:40:46  Importing default detectoids succeeded.
    2014-03-31 16:40:48  Synchronization in progress. Please cancel synchronization and rerun postinstall again. Exception: System.Net.WebException: The request failed with HTTP status 503: Service Unavailable.
       at System.Web.Services.Protocols.SoapHttpClientProtocol.ReadResponse(SoapClientMessage message, WebResponse response, Stream responseStream, Boolean asyncCall)
       at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
       at Microsoft.UpdateServices.Internal.ApiRemoting.GetServerVersion()
       at Microsoft.UpdateServices.Internal.DatabaseAccess.AdminDataAccessProxy.GetServerVersion()
       at Microsoft.UpdateServices.Internal.BaseApi.UpdateServer.CreateUpdateServer(String serverName, Boolean useSecureConnection, Int32 portNumber)
       at Microsoft.UpdateServices.Internal.BaseApi.UpdateServer..ctor(Boolean bypassApiRemoting)
       at Microsoft.UpdateServices.Setup.StartServer.StartServer.FixSubscriptionCategories()
    2014-03-31 16:40:48  StartServer encountered errors. Exception=Synchronization in progress. Please cancel synchronization and run postinstall again.
    2014-03-31 16:40:48  Microsoft.UpdateServices.Administration.CommandException: Failed to start and configure the WSUS service
       at Microsoft.UpdateServices.Administration.PostInstall.Run()
       at Microsoft.UpdateServices.Administration.PostInstall.Execute(String[] arguments)

  • WSUS Downstream server not downloading updates

    I have a windows 2012R2 wsus server setup running wsus and getting updates fine from Microsoft Updates.  We will call this server A in this example.
    I have a downstream server that is windows 2012r2 and has wsus installed.  We can call this server B.  It is configured to use "Update Source" and point to A to get its updates.  SSL is not being used.
    Server B says it syncs fine with no errors.  However, when i look in the content folder I see the folders (0A, 2A, 2F etc..)  but they do not contain any files.  When i run wsusutil checkhealth the following error comes up in event viewer.
    The WSUS content directory is not accessible. System.Net.WebException: The remote server returned an error: (404) Not Found. at System.Net.HttpWebRequest.GetResponse() at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType
    type, HealthEventLogger logger)
    Any Suggesitons

    When i run wsusutil checkhealth the following error comes up in event viewer.   
    The WSUS content directory is not accessible. System.Net.WebException:
    The remote server returned an error: (404) Not Found. at System.Net.HttpWebRequest.GetResponse() at Microsoft.UpdateServices.Internal.HealthMonitoring.HmtWebServices.CheckContentDirWebAccess(EventLoggingType type, HealthEventLogger logger)
    Any Suggesitons
    Looks like the content store, specifically the /Content v-dir in IIS, is not configured correctly.
    If so, it's also possible that the upstream server is not downloading content correctly from Microsoft. And if the downstream server cannot get to /Content, neither can any of the clients of the upstream server.
    Start by inspecting the ApplicationEventLog on the upstream server for any evidence of download failures. If they don't exist, then this could simply be an issue with IIS. Verify that the /Content v-dir is configured to point to the correct location of the
    ~\WSUSContent folder.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • WSUS Replica server version limitations.

    Hello, I am trying to find which WSUS upstream server versions can stream to which WSUS downstream server versions.  Can WSUS 6.3 stream to WSUS 2.0?  Etc.

    Hi Lucas,
    2.0 is no longer supported, but 3.0 SP2, 6.2 (2012) & 6.3 (2012R2) can inter-operate providing kb2734608 is installed first on the WSUS 3.0 SP2 servers.
    https://social.technet.microsoft.com/Forums/en-US/35ed689a-8b78-424e-802d-9e335e07fcfe/wsus-6-upstream-server-will-support-wsus-3-sp2-downstream-server-or-not?forum=winserverwsus
    If you find the answer of assistance please "Vote as Helpful"and/or "Mark as Answer" where applicable. This helps others to find solutions for there issues, and recognises contributions made to the community :)

  • Computers not appearing in WSUS downstream replica server

    Hello guys,
    I need your advice on the setup of the replica servers. I currently installed a WSUS replica downstream server on one of our locations for the clients/servers in the same place to get the updates locally.
    Now we are on Server 2012, on this box has WDS service working and I have decided to setup a WSUS replica here. So added WSUS role & SSL is enabled, so ports 8531 & 8530 are allowing traffic on the replica server. Now synching works fine with the
    upstream server as far as updates & computer GROUPS were synch fine. Now the issue, is the computers are not showing up in the computer groups for the replica server in contrast with the upstream which has the computers. What could  be the reason?
    I have configured already the GPO for the clients intended to get updates for the replica, client side targeting & "Specify a MS intranet location..." is configured with the REPLICA servername:port. Am I missing anything? Please help..
    Thank you, Mon

    Hi Mon Laq,
    Please check your upstream and downstream server have any event occur, the client which not reporting must have error log.
     Check if name resolution is working for parent server from this replica server, GPO were not applied correctly, please to confirm the sync between the upstream
    and downstream server is working properly,
    The following similar thread solution you can refer first.
    Clients not installing updates from Downstream WSUS Server
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/3399a578-ddb0-4a66-9594-f3caa490e48d/clients-not-installing-updates-from-downstream-wsus-server
    I’m glad to be of help to you!
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • WSUS 4 Server as downstream server in a WSUS 3 Infrastructur

    Hi,
    we will migrate the Infrasctructur on a remote location to Windows Server 2012. The Master WSUS Server is a WSUS3 installed on Windows Server 2008.
    It is possible to connect a WSUS4 downstream Server to a WSUS3 upstream Server? The clients in the remote lokation will connect the WSUS4 downstream Server....
    Regards, Michael

    Hello Michael,
    I think this answer from Lawrence could helps you : http://social.technet.microsoft.com/Forums/windowsserver/en-US/8aad057d-fd9b-4e22-8808-33118deefc01/wsus-server-2008-downstream-to-a-2012-server
    Indeed if a fix exists to have downstream in 2008R2 connect to 2012, it should be working on the other side.
    So first of all, try to patch both server and give us some feedback.
    Regards,
    TiGrOu.

  • WSUS 6 upstream server will support WSUS 3 SP2 downstream server or not

    In our company WSUS upstream server operating system is windows 2012 r2. I would like to know can we install downstream server in windows 2008 r2 (WSUS 3.0 sp2) it will download approved patches from upstream server.
    WSUS 6 upstream server will support WSUS 3.0 SP2 downstream or not? 

    No post-installation instruction in the KB article.
    Then you should READ the article again. Let me help:
    How to apply this update
    We recommend that you synchronize all WSUS servers after you apply this update. If you have a hierarchy of WSUS servers, apply this update, and then synchronize your servers from the top of the hierarchy on down. To synchronize your servers in this manner,
    follow these steps:
    Note Before computers that are running Windows 8 or Windows Server 2012 can be updated by WSUS 3.2 servers, you must complete these steps.
    Start the process with WSUS 3.0 SP2 that synchronizes with Microsoft Update.
    Apply this update.
    Start a synchronization.
    Wait for the synchronization to succeed.
    Repeat steps 2 through 4 for each WSUS 3.0 SP2 server that synchronizes to the server that you just updated.
    Known issues with this update
    If you have Windows 8 or Windows Server 2012 clients that synchronized with WSUS 3SP2 before you applied this update, wait for the update to be applied to the WSUS servers, and then follow these steps:
    On the affected client, open cmd.exe in elevated mode
    Type the following commands. Make sure that you press Enter after you type each command:
    Net stop wuauserv
    rd /s %windir%\softwaredistribution\
    Net start wuauserv
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

  • Can a WSUS 3.0 sp2 server be a downstream server of WSUS 2012 R2?

    Can a WSUS 3.0 sp2 server be a downstream server of WSUS 2012 R2?

    Am 17.04.2014 schrieb silverandblackaholic2:
    Can a WSUS 3.0 sp2 server be a downstream server of WSUS 2012 R2?
    Yes, you ca. But if you install WSUS on a W2008R2 have a look at the
    Version from your WSUS 3.0 SP2.
    WSUS 3.0 (SP2):     Build 3.2.7600.226
    WSUS 3.0 (SP2) + KB2720211:     Build 3.2.7600.251
    WSUS 3.0 (SP2) + KB2734608:     Build 3.2.7600.256
    WSUS 3.0 (SP2) + KB2828185:     Build 3.2.7600.262
    The Version you will find on the Startpage from WSUS:
    http://www.wsus.de/images/wsus-version.png
    Servus
    Winfried
    Gruppenrichtlinien
    WSUS Package Publisher
    HowTos zum WSUS Package Publisher
    NNTP-Bridge für MS-Foren

  • WSUS - Parent server will not purge computers from the unassigned group after being moved on the downstream servers.

    I need some help please. I have read every forum I can think of and google for months and can not find a solution.
    I have 1 Primary WSUS Server and 3 Replica servers. Often times systems are placed into the unassigned group on the replica servers and then after a syncronization they will show up on the primary server in the unassigned group.
    The problem is that when I log into a replica server and move these computers to another group, they never get moved on the primary server. They will constantly remain on the primary server in the unassigned group. I know this is probably something simple that I have overlooked in the documentation, but believe me I have tried everything that I can come up with. Please help! :)

    > So when you move them into the appropriate group... this is not remembered on the server.
    It is... but only until the *client* (which believe that it is authoritative for its group memberships -- as a result of the policy configuation) tells the server otherwise. Then the server has the group membership as reported by the client machine.
    > I thought that when the client went to contact the server again and said I'm in this group (which happens to not exist on the server)
    If the *group* does not exist on the server, the client will be seen only in "All Computers". The group name reported by the client is still stored in the database as an attribute of the client, but because the console is not configured to display that group, the client computer does not appear in any group except "All Computers".
    > the server would then say, yes you are; however the admin has told me that you really belong to this other group.
    No, the server never assumes it is authoritative for anything coming from the client. The WUAgent is the authoritative source for everything in the WSUS environment (except Update Approvals <g>). If the WUAgent is not configured to use "policy-based groups", then the WUAgent will query the WSUS Server to determine which group(s) the client belongs to, and if the server is configured in Options | Computers to "Use the console... to assign groups", then it will answer with the currently stored group name(s). However, if the WUAgent is given that information via policy, then it doesn't ask for anything, it *tells* the server what the facts are, and those facts are used to update the WSUS database.
    > On the downstream server they remain in the appropriate groups after I move them.
    > Its only on the upstream server that I have this problem.
    There are several configuration parameters that could be contributing to this. We should start by verifying the correct settings for all of them.
    1. Options | Computers on the replica server is set to "Use group policy".
    2. Options | Computers on the upstream server is set to "Use group policy".
    3. The policy configured group exists on the upstream server.
    4. The policy configured group has replicated to the replica server.
    5. The policy has been properly applied to the client system.
    6. The client appears in the correct group(s) on the replica server, according to the group(s) configured in the policy.
    7. The replica server has synchronized successfully with the upstream server since the client system last *reported* to the replica.
    8. The upstream server has "Reporting Rollup" enabled.
    9. Sufficient time has passed to allow the upstream server to complete the asynchronous updating of the reporting data from the replica server.
    If all of the above is correct, and the client system still appears in "Unassigned Computers" on the upstream server, then we'll have something that needs further investigation. Most likely, though, is that one of those items enumerated is not copasetic and is interfering with the correct recording of the client system's correct group membership. Once corrected, the upstream server will properly reflect the actual group memberhips as configured in policy.
    Lawrence Garvin, M.S., MCITP:EA, MCDBA
    Principal/CTO, Onsite Technology Solutions, Houston, Texas
    Microsoft MVP - Software Distribution (2005-2009)

  • WSUS Event 10032 The server is failing to download some updates

    Hi,
    we receive this error message every 6 hours on our WSUS-server:
    Log Name:      Application
    Source:        Windows Server Update Services
    Date:          2014-02-26 09:56:26
    Event ID:      10032
    Task Category: 7
    Level:         Error
    Keywords:      Classic
    User:          N/A
    Computer:      %Computer%
    Description:
    The server is failing to download some updates.
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
        <Provider Name="Windows Server Update Services" />
        <EventID Qualifiers="0">10032</EventID>
        <Level>2</Level>
        <Task>7</Task>
        <Keywords>0x80000000000000</Keywords>
        <TimeCreated SystemTime="2014-02-26T08:56:26.000000000Z" />
        <EventRecordID>567460</EventRecordID>
        <Channel>Application</Channel>
        <Computer>%Computer%</Computer>
        <Security />
      </System>
      <EventData>
        <Data>The server is failing to download some updates.</Data>
      </EventData>
    </Event>
    The SoftwareDistribution.log shows a couple of these messages for different items:
    2014-02-24 04:43:22.509 UTC Info WsusService.15 ContentSyncAgent.WakeUpWorkerThreadProc Processing Item: be885bda-e4e2-4b3b-92f0-d4b4e31428e7, State: 6
    2014-02-24 04:43:22.525 UTC Error WsusService.15 ContentSyncAgent.VerifyCRC Could not find file 'D:\WSUSrepository\WsusContent\FB\904517558197FEC77082AEFD6885106590744CFB.cab'.
       at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyCRC(String fileLocalPath)
       at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyFile(String fileLocalPath)
       at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.WakeUpWorkerThreadProc()
       at System.Threading.ExecutionContext.runTryCode(Object userData)
       at System.Runtime.CompilerServices.RuntimeHelpers.ExecuteCodeWithGuaranteedCleanup(TryCode code, CleanupCode backoutCode, Object userData)
       at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
       at System.Threading.ThreadHelper.ThreadStart()
    2014-02-24 04:43:22.525 UTC Error WsusService.15 ContentSyncAgent.WakeUpWorkerThreadProc Importing file 904517558197FEC77082AEFD6885106590744CFB caught exception at VerifyFile: System.IO.FileNotFoundException: Could not find file 'D:\WSUSrepository\WsusContent\FB\904517558197FEC77082AEFD6885106590744CFB.cab'.
    File name: 'D:\WSUSrepository\WsusContent\FB\904517558197FEC77082AEFD6885106590744CFB.cab'
       at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyCRC(String fileLocalPath)
       at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.VerifyFile(String fileLocalPath)
       at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.WakeUpWorkerThreadProc()
       at Microsoft.UpdateServices.ServerSync.ContentSyncAgent.WakeUpWorkerThreadProc()
       at System.Threading.ExecutionContext.runTryCode(Object userData)
       at System.Runtime.CompilerServices.RuntimeHelpers.ExecuteCodeWithGuaranteedCleanup(TryCode code, CleanupCode backoutCode, Object userData)
       at System.Threading.ExecutionContext.Run(ExecutionContext executionContext, ContextCallback callback, Object state)
       at System.Threading.ThreadHelper.ThreadStart()
    2014-02-24 04:43:22.525 UTC Warning WsusService.15 ContentSyncAgent.WakeUpWorkerThreadProc Invalid file deleted: D:\WSUSrepository\WsusContent\FB\904517558197FEC77082AEFD6885106590744CFB.cab
    2014-02-24 04:43:22.525 UTC Info WsusService.15 ContentSyncAgent.ContentSyncSPFireStateMachineEvent ContentSyncAgent firing Event: FileVerificationFailed for Item: be885bda-e4e2-4b3b-92f0-d4b4e31428e7
    I already checked updates on the WSUS console and all approved updates have File status "Ready for install". The .cab-files mentioned in the SoftwareDistribution.log does not exist but i cannot see which updates failed to download.
    We also use Secunia CSI to update applications like Adobe Flash through WSUS.
    Windows Server 2008 R2
    WSUS 3.0  Version 3.2.7600.226
    Thanks
    Maik

    Hi
    Manjunath,
    i
    know this thread and has verified all settings and they are ok.
    Regards,
    Maik

  • WSUS downstream replication

    Here is my issue.
    We have WSUS (version 3.2.7600.226) setup on Windows server 2003 x86 and planned to migrate to the new WSUS on windows server 2012 R2 box and once done then retired the 2003 server. 
    The way it was done was to create separate wsus on server 2012 and then make it a downstream server. Now the groups are replicated to the downstream server, however it is not pulling the computers. Event log showed the following errors Event ID 13051 no
    client computers have ever contacted the server. Not sure what the issue is. synchronization also fail with error message An HTTP error occurred. 
    WebException: Unable to connect to the remote server ---> System.Net.Sockets.SocketException: No connection could be made because the target machine actively refused it 192.168.x.x:8530
    at System.Net.HttpWebRequest.GetRequestStream(TransportContext& context)
       at System.Net.HttpWebRequest.GetRequestStream()
       at System.Web.Services.Protocols.SoapHttpClientProtocol.Invoke(String methodName, Object[] parameters)
       at Microsoft.UpdateServices.ServerSyncWebServices.ServerSync.ServerSyncProxy.GetAuthConfig()
       at Microsoft.UpdateServices.ServerSync.ServerSyncLib.InternetGetServerAuthConfig(ServerSyncProxy proxy, WebServiceCommunicationHelper webServiceHelper)
       at Microsoft.UpdateServices.ServerSync.ServerSyncLib.Authenticate(AuthorizationManager authorizationManager, Boolean checkExpiration, ServerSyncProxy proxy, Cookie cookie, WebServiceCommunicationHelper webServiceHelper)
       at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.SyncConfigUpdatesFromUSS()
       at Microsoft.UpdateServices.ServerSync.CatalogSyncAgentCore.ExecuteSyncProtocol(Boolean allowRedirect)
    I've asked security team to check firewall. 
    Also once this is resolved can we make it standalone server and remove the upstream server ? 
    If not What will be the easiest and best way to migrate WSUS from server 2003 to server 2012 ?

    It was a firewall issue. I was able to communicate with the upstream server.
    Now the next part. So I reconfigure my downstream server (server2) as an upstream server and synchronize with microsoft. I configured the clients to communicate with the new wsus server. After applying gpo and everything the clients are still not showing
    up. I checked the Windowsupdate.log on client computer and I'm getting the following errors 
    2014-11-04 09:52:03:065
    1836 45e0
    PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-11-04 09:52:03:065
    1836 45e0
    PT  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://server2.domain.org/ClientWebService/client.asmx
    2014-11-04 09:52:03:065
    1836 45e0
    EP Got WSUS SimpleTargeting URL: "http://server2.domain.org"
    2014-11-04 09:52:03:065
    1836 45e0
    IdleTmr WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie) started; operation # 85; does use network; is at background priority
    2014-11-04 09:52:03:065
    1836 45e0
    PT Initializing simple targeting cookie, clientId = 8d9331e5-3fbf-4a44-bd40-26e3cc2dea3a, target group =  Testing, DNS name = machine1.domain.org
    2014-11-04 09:52:03:065
    1836 45e0
    PT  Server URL = http://server2.domain.org/SimpleAuthWebService/SimpleAuth.asmx
    2014-11-04 09:52:04:037
    1836 45e0
    WS WARNING: Nws Failure: errorCode=0x803d000d
    2014-11-04 09:52:04:037
    1836 45e0
    WS WARNING: There was an error communicating with the endpoint at 'http://server2.domain.org/SimpleAuthWebService/SimpleAuth.asmx'.
    2014-11-04 09:52:04:037
    1836 45e0
    WS WARNING: The server returned HTTP status code '404 (0x194)' with text 'Not Found'.
    2014-11-04 09:52:04:037
    1836 45e0
    WS WARNING: The requested resource was not found.
    2014-11-04 09:52:04:037
    1836 45e0
    WS WARNING: MapToSusHResult mapped Nws error 0x803d000d to 0x80244019
    2014-11-04 09:52:04:037
    1836 45e0
    WS WARNING: Web service call failed with hr = 80244019.
    2014-11-04 09:52:04:037
    1836 45e0
    WS WARNING: Current service auth scheme='None'.
    2014-11-04 09:52:04:037
    1836 45e0
    WS WARNING: Proxy List used: '(null)', Bypass List used: '(null)', Last Proxy used: '(null)', Last auth Schemes used: 'None'.
    2014-11-04 09:52:04:037
    1836 45e0
    WS FATAL: OnCallFailure failed with hr=0X80244019
    2014-11-04 09:52:04:037
    1836 45e0
    WS FATAL: NwsCallWithRetries<Functor>( Functor(_clientId, _targetGroupName, _dnsName, &_result)) failed with hr=0x80244019
    2014-11-04 09:52:04:037
    1836 45e0
    IdleTmr WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie, operation # 85) stopped; does use network; is at background priority
    2014-11-04 09:52:04:037
    1836 45e0
    PT WARNING: Failed to initialize Simple Targeting Cookie: 0x80244019
    2014-11-04 09:52:04:037
    1836 45e0
    PT WARNING: PopulateAuthCookies failed: 0x80244019
    2014-11-04 09:52:04:037
    1836 45e0
    PT WARNING: RefreshCookie failed: 0x80244019
    2014-11-04 09:52:04:037
    1836 45e0
    PT WARNING: RefreshPTState failed: 0x80244019
    2014-11-04 09:52:04:037
    1836 45e0
    PT  + SyncUpdates round trips: 0
    2014-11-04 09:52:04:037
    1836 45e0
    PT WARNING: Sync of Updates: 0x80244019
    2014-11-04 09:52:04:037
    1836 45e0
    PT WARNING: SyncServerUpdatesInternal failed: 0x80244019
    2014-11-04 09:52:04:037
    1836 45e0
    Agent  * WARNING: Failed to synchronize, error = 0x80244019
    2014-11-04 09:52:04:038
    1836 45e0
    Agent  * WARNING: Exit code = 0x80244019
    2014-11-04 09:52:04:038
    1836 45e0
    Agent *********
    2014-11-04 09:52:04:038
    1836 45e0
    Agent **  END  **  Agent: Finding updates [CallerId = Windows Update Command Line  Id = 1]
    2014-11-04 09:52:04:038
    1836 45e0
    Agent *************
    2014-11-04 09:52:04:038
    1836 45e0
    Agent WARNING: WU client failed Searching for update with error 0x80244019
    I'm not sure why is it not able to communicate. Any help will be appreciated. 

  • New WSUS on Server 2012 - problem with win8 clients

    Hi,
    Two weeks ago we created a new Server 2012 and installed the WSUS role from scratch on it.  Its version number is:  6.2.9200.16384.  It replaced a Server 2008 WSUS server.  After some time all the win7 clients updated and reported as
    they did on the old and replaced server.
    However all our win8 clients refuse to update against this server.  They show correctly up in WSUS server console each with 107 needed updates day after day.  We have rebooted them and done numerous wuauclt /resetauthorization /detectnow and wuauclt
    /detectnow /reportnow, but to no avail.
    I paste in some lines from a win8 client winupdate log at the end of this message if someone can figure out what I have to do to get these clients update as they did against the old wsus server.  Thanks for help on this issue.
    regards Tor
    2014-02-03    08:33:38:008     920    153c    Agent    *************
    2014-02-03    08:33:38:008     920    153c    Agent    ** START **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:38:008     920    153c    Agent    *********
    2014-02-03    08:33:38:008     920    153c    Agent      * Online = Yes; Ignore download priority = No
    2014-02-03    08:33:38:008     920    153c    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
    or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-02-03    08:33:38:008     920    153c    Agent      * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
    2014-02-03    08:33:38:008     920    153c    Agent      * Search Scope = {Machine & All Users}
    2014-02-03    08:33:38:008     920    153c    Agent      * Caller SID for Applicability: S-1-5-18
    2014-02-03    08:33:38:008     920    153c    Misc    Validating signature for C:\Windows\SoftwareDistribution\WuRedir\9482F4B4-E343-43B6-B170-9A65BC822C77\wuredir.cab:
    2014-02-03    08:33:38:008     920    1990    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {ABC7E77F-635F-4192-9B92-CBF9B1CB8AB0} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-02-03    08:33:38:008     920    1990    AU      # 0 updates detected
    2014-02-03    08:33:38:008     920    1990    AU    #########
    2014-02-03    08:33:38:008     920    1990    AU    ##  END  ##  AU: Search for updates  [CallId = {ABC7E77F-635F-4192-9B92-CBF9B1CB8AB0} ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}]
    2014-02-03    08:33:38:008     920    1990    AU    #############
    2014-02-03    08:33:38:023     920    153c    Misc     Microsoft signed: Yes
    2014-02-03    08:33:38:023     920    153c    Misc     Infrastructure signed: Yes
    2014-02-03    08:33:38:023     920    153c    EP    Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: "http://fe1.ws.microsoft.com/w8/2/redir/storeauth.cab"
    2014-02-03    08:33:38:023     920    153c    Misc    Validating signature for C:\Windows\SoftwareDistribution\WuRedir\117CAB2D-82B1-4B5A-A08C-4D62DBEE7782\wuredir.cab:
    2014-02-03    08:33:38:039     920    153c    Misc     Microsoft signed: Yes
    2014-02-03    08:33:38:039     920    153c    Misc     Infrastructure signed: Yes
    2014-02-03    08:33:38:039     920    153c    EP    Got 117CAB2D-82B1-4B5A-A08C-4D62DBEE7782 redir Client/Server URL: "https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx"
    2014-02-03    08:33:38:055     920    153c    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-02-03    08:33:38:055     920    153c    PT      + ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}, Server URL = https://fe2.ws.microsoft.com/v6/ClientWebService/client.asmx
    2014-02-03    08:33:38:055     920    153c    Agent    Reading cached app categories using lifetime 604800 seconds
    2014-02-03    08:33:38:055     920    153c    Agent    Read 0 cached app categories
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {E7FF661C-6A03-4387-A1EE-1D723B52EF60}.3 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {BFA8C8B8-EEF7-4A82-A36C-8F760F792430}.3 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {A9A0E183-0667-46D6-84E4-17CEBCEE5A22}.1 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
    2014-02-03    08:33:39:211     920    153c    Agent      * Found 13 updates and 31 categories in search; evaluated appl. rules of 69 out of 94 deployed entities
    2014-02-03    08:33:39:211     920    153c    Agent    *********
    2014-02-03    08:33:39:211     920    153c    Agent    **  END  **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:39:211     920    153c    Agent    *************
    2014-02-03    08:33:39:211     920    1a64    Report    REPORT EVENT: {0786C161-F6DC-4842-85D6-9506124654AD}    2014-02-03 08:33:38:008+0100    1  
     147 [AGENT_DETECTION_FINISHED]    101    {00000000-0000-0000-0000-000000000000}    0    0    Windows Update Command Line    Success    Software Synchronization  
     Windows Update Client successfully detected 0 updates.
    2014-02-03    08:33:39:211     920    1a64    Report    REPORT EVENT: {1E5D9728-220F-44A3-8BCC-ADE69687531D}    2014-02-03 08:33:38:008+0100    1  
     156 [AGENT_STATUS_30]    101    {00000000-0000-0000-0000-000000000000}    0    0    Windows Update Command Line    Success    Pre-Deployment Check  
     Reporting client status.
    2014-02-03    08:33:39:211     920    1a64    Report    REPORT EVENT: {57BAB7D0-685B-4D73-BDF7-82AFCE8675B0}    2014-02-03 08:33:39:211+0100    1  
     147 [AGENT_DETECTION_FINISHED]    101    {00000000-0000-0000-0000-000000000000}    0    0    Windows Update Command Line    Success    Software Synchronization  
     Windows Update Client successfully detected 13 updates.
    2014-02-03    08:33:39:211     920    1a64    Report    CWERReporter finishing event handling. (00000000)
    2014-02-03    08:33:39:227     920    153c    Agent    *************
    2014-02-03    08:33:39:227     920    153c    Agent    ** START **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:39:227     920    153c    Agent    *********
    2014-02-03    08:33:39:227     920    153c    Agent      * Online = No; Ignore download priority = No
    2014-02-03    08:33:39:227     920    153c    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
    or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-02-03    08:33:39:227     920    153c    Agent      * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
    2014-02-03    08:33:39:227     920    153c    Agent      * Search Scope = {Current User}
    2014-02-03    08:33:39:227     920    153c    Agent      * Caller SID for Applicability: S-1-5-21-4260610346-2664610402-3334891387-1155
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {A9A0E183-0667-46D6-84E4-17CEBCEE5A22}.1 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
    2014-02-03    08:33:39:258     920    153c    Agent      * Found 11 updates and 29 categories in search; evaluated appl. rules of 58 out of 94 deployed entities
    2014-02-03    08:33:39:258     920    153c    Agent    *********
    2014-02-03    08:33:39:258     920    153c    Agent    **  END  **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:39:258     920    153c    Agent    *************
    2014-02-03    08:33:39:258     920    153c    Agent    *************
    2014-02-03    08:33:39:258     920    153c    Agent    ** START **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:39:258     920    153c    Agent    *********
    2014-02-03    08:33:39:258     920    153c    Agent      * Online = No; Ignore download priority = No
    2014-02-03    08:33:39:258     920    153c    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
    or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-02-03    08:33:39:258     920    153c    Agent      * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
    2014-02-03    08:33:39:258     920    153c    Agent      * Search Scope = {Current User}
    2014-02-03    08:33:39:258     920    153c    Agent      * Caller SID for Applicability: S-1-5-21-2212025170-3189117132-1219651784-500
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {BFA8C8B8-EEF7-4A82-A36C-8F760F792430}.3 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
    2014-02-03    08:33:39:305     920    153c    Agent      * Found 11 updates and 30 categories in search; evaluated appl. rules of 60 out of 94 deployed entities
    2014-02-03    08:33:39:305     920    153c    Agent    *********
    2014-02-03    08:33:39:305     920    153c    Agent    **  END  **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:39:305     920    153c    Agent    *************
    2014-02-03    08:33:39:305     920    153c    Agent    *************
    2014-02-03    08:33:39:305     920    153c    Agent    ** START **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:39:305     920    153c    Agent    *********
    2014-02-03    08:33:39:305     920    153c    Agent      * Online = No; Ignore download priority = No
    2014-02-03    08:33:39:305     920    153c    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
    or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-02-03    08:33:39:305     920    153c    Agent      * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
    2014-02-03    08:33:39:305     920    153c    Agent      * Search Scope = {Current User}
    2014-02-03    08:33:39:305     920    153c    Agent      * Caller SID for Applicability: S-1-5-21-4260610346-2664610402-3334891387-1323
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {BFA8C8B8-EEF7-4A82-A36C-8F760F792430}.3 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
    2014-02-03    08:33:39:352     920    153c    Agent      * Found 11 updates and 30 categories in search; evaluated appl. rules of 60 out of 94 deployed entities
    2014-02-03    08:33:39:352     920    153c    Agent    *********
    2014-02-03    08:33:39:352     920    153c    Agent    **  END  **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:39:352     920    153c    Agent    *************
    2014-02-03    08:33:39:352     920    153c    Agent    *************
    2014-02-03    08:33:39:352     920    153c    Agent    ** START **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:39:352     920    153c    Agent    *********
    2014-02-03    08:33:39:352     920    153c    Agent      * Online = No; Ignore download priority = No
    2014-02-03    08:33:39:352     920    153c    Agent      * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation'
    or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-02-03    08:33:39:352     920    153c    Agent      * ServiceID = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782} Third party service
    2014-02-03    08:33:39:352     920    153c    Agent      * Search Scope = {Current User}
    2014-02-03    08:33:39:352     920    153c    Agent      * Caller SID for Applicability: S-1-5-21-4260610346-2664610402-3334891387-1282
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {E8B477DF-479E-4BCA-B8F8-2D987A509009}.2 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {BB85CCA0-88DC-4DA7-8E81-B7F7E5E73B81}.100 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {18DEF1D9-4513-467E-9D7E-E1772855BB9E}.100 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {971D9BE4-5145-4DB5-962C-CEE2EE3A2842}.3 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {CCB380C9-29F5-4305-96DD-86DE2D00438B}.2 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {455BDD67-9ED0-4DE7-94F1-3480EA942414}.12 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {ADFBFCE0-FFD4-4826-B9CF-50AE8182E3C5}.2 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {BFA8C8B8-EEF7-4A82-A36C-8F760F792430}.3 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {3F05DE38-92BC-44B6-B06B-5217E5CF12CA}.1 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {36BEF0D5-80ED-4942-8457-6F9C88546E06}.1 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Added update {A292CD86-AB4E-4388-8C7B-CFB392EDE6AC}.1 to search result
    2014-02-03    08:33:39:383     920    153c    Agent      * Found 11 updates and 30 categories in search; evaluated appl. rules of 60 out of 94 deployed entities
    2014-02-03    08:33:39:383     920    153c    Agent    *********
    2014-02-03    08:33:39:383     920    153c    Agent    **  END  **  Agent: Finding updates [CallerId = Windows Update Command Line]
    2014-02-03    08:33:39:383     920    153c    Agent    *************
    2014-02-03    08:33:39:383     920    1990    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {66AF0139-896D-4607-8660-B66D2B58EA26} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-02-03    08:33:39:383     920    1990    AU      # 12 updates detected
    2014-02-03    08:33:39:383     920    1990    AU    #########
    2014-02-03    08:33:39:383     920    1990    AU    ##  END  ##  AU: Search for updates  [CallId = {66AF0139-896D-4607-8660-B66D2B58EA26} ServiceId = {117CAB2D-82B1-4B5A-A08C-4D62DBEE7782}]
    2014-02-03    08:33:39:383     920    1990    AU    #############
    2014-02-03    08:33:39:383     920    1990    AU    All AU searches complete.
    2014-02-03    08:33:39:383     920    1990    AU    AU setting next detection timeout to 2014-02-03 10:18:51
    2014-02-03    08:33:44:211     920    1a64    Report    CWERReporter finishing event handling. (00000000)
    2014-02-03    08:41:39:472     920    1a64    EP    Got WSUS Client/Server URL: "http://elias:8530/ClientWebService/client.asmx"
    2014-02-03    08:41:39:472     920    1a64    PT    WARNING: Cached cookie has expired or new PID is available
    2014-02-03    08:41:39:472     920    1a64    EP    Got WSUS SimpleTargeting URL: "http://elias:8530"
    2014-02-03    08:41:39:472     920    1a64    PT    Initializing simple targeting cookie, clientId = c5e26849-287b-4b96-ba5d-1489d6fad2f2, target group = , DNS name = dt-ikt-tor.framnes.lan
    2014-02-03    08:41:39:472     920    1a64    PT      Server URL = http://elias:8530/SimpleAuthWebService/SimpleAuth.asmx
    2014-02-03    08:41:39:519     920    1a64    EP    Got WSUS Reporting URL: "http://elias:8530/ReportingWebService/ReportingWebService.asmx"
    2014-02-03    08:41:39:519     920    1a64    Report    Uploading 2 events using cached cookie, reporting URL = http://elias:8530/ReportingWebService/ReportingWebService.asmx
    2014-02-03    08:41:39:566     920    1a64    Report    Reporter successfully uploaded 2 events.
    2014-02-03    08:42:13:212     920    178c    Report    WARNING: CSerializationHelper:: InitSerialize failed : 0x80070002
    2014-02-03    08:43:40:450     920    178c    AU    ###########  AU: Uninitializing Automatic Updates  ###########
    2014-02-03    08:43:40:450     920    178c    WuTask    Uninit WU Task Manager
    2014-02-03    08:43:40:513     920    178c    Service    *********
    2014-02-03    08:43:40:513     920    178c    Service    **  END  **  Service: Service exit [Exit code = 0x240001]
    2014-02-03    08:43:40:513     920    178c    Service    *************

    Today I opened Control Panel / Windows Updates and first did a check for new updates (from the WSUS server).  Nothing was found and it reported Windows is Updated.   Then I clicked the link Check for updates from Microsoft via internet, and
    it found around 24 updates.
    This is confirmation of the point that I made in the previous post. The updates are *NEEDED* by this system, but the updates were not *AVAILABLE* from the assigned WSUS Server. You were able to get them from Windows Update, but that does not fix your continuing
    issue with the WSUS Server.
    but it still reported the original 108 Needed updates.
    Exactly. As previously noted, the client is functioning perfectly. The problem is NOT with the client; the problem is with the WSUS Server. The updates that this client needed were not AVAILABLE to be downloaded from the WSUS server.
    Why this is the case requires further investigation on your part, but is either because the updates are not properly approved, or the update FILES are not yet downloaded from Microsoft to the WSUS server.
    It appears that the wsus server doesn't get any information back from the client despite that it displays new Last contact and Last Status report timestamps.
    This conclusion is incorrect. The WSUS Server got every bit of information available from the client -- you've confirmed this by the number of updates reported as "Needed" by the Windows Update Agent to the WSUS Server.
    I assumed that the log would display if the updates were downloaded or not.
    It will log when the updates are actually downloaded. If there's no log entries for updates being downloaded, then they're not being downloaded. If the logfile says "Found 0 updates", then that means exactly what it says: It couldn't find any approved/available
    updates to download.
    In your case it "Found 11 updates", but now it will be impossible to diagnose that fault, because you went and got them from Windows Update.
    All Win8 versions are checked in the WSUS server's Product list so the updates should at least have been downloaded to the server.
    This is why understanding the infrastructure is so critical. Your conclusion is invalid based on the premise given, and you may be using improper terminology which only confuses the rest of us as well.
    First, selecting updates for synchronization only gets the update metadata (i.e. the detection logic) downloaded to the WSUS database.
    The Second Step in this process is to Approve those updates for one or more WSUS Target Groups that contain the appropriate client systems. Following the approval of an update, the WSUS Server downloads the INSTALLATION FILE for that update.
    Once the WUAgent sees an approved update and the installation file is available, then the WUAgent will download the file and schedule the update for installation.
    Most of the post I read about my problem is about upgrading a 2008 WSUS server to support Win8 / Server 12 clients.  When I try to run this update on my Server 12 WSUS it refuses to run (probably because it is for Server 2008).
    Yeah.. totally different issue in those posts than what you're describing here.
    What should I do to try to track down the problem?
    Well.... now that it's 11 days since the logfile was posted, and you've already updated that system, we'll first need to find another system exhibiting the same issue.
    Then I'll need to ask a number of questions to properly understand the environment, as well as what you have or have not done.
    Then, from there, we can attempt to figure out why your Windows 8 client apparently sees some updates as approved/available but is still not downloading them. We do not yet have sufficient information to even speculate on a possible cause -- there are several.
    Lawrence Garvin, M.S., MCSA, MCITP:EA, MCDBA
    SolarWinds Head Geek
    Microsoft MVP - Software Packaging, Deployment & Servicing (2005-2014)
    My MVP Profile: http://mvp.microsoft.com/en-us/mvp/Lawrence%20R%20Garvin-32101
    http://www.solarwinds.com/gotmicrosoft
    The views expressed on this post are mine and do not necessarily reflect the views of SolarWinds.

Maybe you are looking for

  • Hi. Can I use a set of backup discs I made in 2010 to restore my iTunes library with the latest version of iTunes?

    Hi I had my iTunes library on an external hard drive which has crashed. The data is unrecoverable. I've now bought a new laptop and I want to rebuild my iTunes library. I found a set of backup discs I created back in 2010 and although they don't repr

  • How to flow the xml in a document?

    pls,anyone guide me,how to flow the xml in a document? thanks, screen410099

  • Watching movies

    I have transferred my own DVDs to mp4 format to play on my ipad2. I put them on a memory stick to save the moment in the iPad. I bought a camera connection kit/USB kit but I can't get the movies to register - is this possible to do or do I have to pu

  • Property Based Allocation

    Hi all, I have a question about allocation. For example there is a property FLAG in product dimension and I have the members in this dimension. Some of them have a "X" and rest have a "Y" in property FLAG. In input schedule i want to enter data in pr

  • HT1689 can't connect to the iTunes

    when I try to download a game I can't connect to the iTunes Store at all