Answered by:
Clients connected to WSUS but not reporting since December

Question
-
The WSUS console (on Update Services 10.0.14393.2007 on Windows Server 2016) reports 371 PCs have not reported since December (Windows 7 and 10 PCs: 9 last reported 12/11-12/19, 350 last reported 12/6-12/8, some older). 7 PCs began to report again between 1/11-1/18. Returning WSUS to standalone status (instead of downstream from SCCM) may be the cause of the configuration change. All PCs appear to be contacting the WSUS server and receiving updates (as noted in the 'Last Contact' column). I would like to troubleshoot/correct the reporting on these PCs. I have compared the WindowsUpdate.log files. Can you assist? I have posted a partial WindowsUpdate.log file from a Windows 7 PC that has not reported back to WSUS since 12/19 below. Thank you for your help!
2018-01-18 07:59:36:286 332 5e0 Misc =========== Logging initialized (build: 7.6.7601.23806, tz: -0600) ===========
2018-01-18 07:59:36:363 332 5e0 Misc = Process: C:\Windows\system32\svchost.exe
2018-01-18 07:59:36:425 332 5e0 Misc = Module: c:\windows\system32\wuaueng.dll
2018-01-18 07:59:36:286 332 5e0 Service *************
2018-01-18 07:59:36:425 332 5e0 Service ** START ** Service: Service startup
2018-01-18 07:59:36:425 332 5e0 Service *********
2018-01-18 07:59:36:625 332 5e0 Agent * WU client version 7.6.7601.23806
2018-01-18 07:59:36:811 332 5e0 Agent * Base directory: C:\Windows\SoftwareDistribution
2018-01-18 07:59:36:827 332 5e0 Agent * Access type: No proxy
2018-01-18 07:59:36:827 332 5e0 Agent * Network state: Connected
2018-01-18 08:00:13:079 332 e1c Report CWERReporter::Init succeeded
2018-01-18 08:00:13:079 332 e1c Agent *********** Agent: Initializing Windows Update Agent ***********
2018-01-18 08:00:13:080 332 e1c Agent * Prerequisite roots succeeded.
2018-01-18 08:00:13:080 332 e1c Agent *********** Agent: Initializing global settings cache ***********
2018-01-18 08:00:13:080 332 e1c Agent * WSUS server: http://syscenter1:8530
2018-01-18 08:00:13:080 332 e1c Agent * WSUS status server: http://syscenter1:8530
2018-01-18 08:00:13:080 332 e1c Agent * Target group: City
2018-01-18 08:00:13:080 332 e1c Agent * Windows Update access disabled: No
2018-01-18 08:00:13:102 332 e1c Agent * Found 1 persisted download calls to restore
2018-01-18 08:00:13:145 332 e1c DnldMgr Download manager restoring 1 downloads
2018-01-18 08:00:14:279 332 e1c Agent * Successfully loaded 1 persisted download calls.
2018-01-18 08:00:19:883 332 5e0 Report *********** Report: Initializing static reporting data ***********
2018-01-18 08:00:19:883 332 5e0 Report * OS Version = 6.1.7601.1.0.65792
2018-01-18 08:00:19:883 332 5e0 Report * OS Product Type = 0x00000030
2018-01-18 08:00:19:891 332 5e0 Report * Computer Brand = Hewlett-Packard
2018-01-18 08:00:19:891 332 5e0 Report * Computer Model = HP Pro3500 Series
2018-01-18 08:00:19:894 332 5e0 Report * Bios Revision = 8.14
2018-01-18 08:00:19:894 332 5e0 Report * Bios Name = BIOS Date: 01/23/13 09:08:24 Ver: 04.06.05
2018-01-18 08:00:19:894 332 5e0 Report * Bios Release Date = 2013-01-23T00:00:00
2018-01-18 08:00:19:894 332 5e0 Report * Locale ID = 1033
2018-01-18 08:00:20:527 332 1978 DnldMgr *********** DnldMgr: Regulation Refresh [Svc: {7971F918-A847-4430-9279-4A52D1EFE18D}] ***********
2018-01-18 08:00:20:527 332 1978 DnldMgr Contacting regulation server for 2 updates.
2018-01-18 08:00:20:823 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
2018-01-18 08:00:20:970 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:20:971 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
2018-01-18 08:00:20:978 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:21:048 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\TMPF8BF.tmp with dwProvFlags 0x00000080:
2018-01-18 08:00:21:216 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:21:241 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
2018-01-18 08:00:21:245 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:21:246 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
2018-01-18 08:00:21:250 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:21:253 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\TMPF98B.tmp with dwProvFlags 0x00000080:
2018-01-18 08:00:21:258 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:21:258 332 1978 DnldMgr Regulation server path: https://fe2.update.microsoft.com/v6/UpdateRegulationService/UpdateRegulation.asmx.
2018-01-18 08:00:21:632 332 1978 DnldMgr Per-Update: 6bad3967-faba-449d-9161-ad014e2effec at rate 0
2018-01-18 08:00:21:632 332 1978 DnldMgr Per-Update: 4b5f44a0-1613-45a2-87c9-31b2fc45b1d7 at rate 0
2018-01-18 08:00:21:632 332 1978 DnldMgr * Regulation call complete. 0x00000000
2018-01-18 08:00:21:632 332 1978 DnldMgr *********** DnldMgr: New download job [UpdateId = {6BAD3967-FABA-449D-9161-AD014E2EFFEC}.203] ***********
2018-01-18 08:00:21:657 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 6BAD3967-FABA-449D-9161-AD014E2EFFEC is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
2018-01-18 08:00:21:657 332 1978 DnldMgr * Update is not allowed to download due to regulation.
2018-01-18 08:00:21:658 332 1978 DnldMgr *********** DnldMgr: New download job [UpdateId = {4B5F44A0-1613-45A2-87C9-31B2FC45B1D7}.200] ***********
2018-01-18 08:00:21:658 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 4B5F44A0-1613-45A2-87C9-31B2FC45B1D7 is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
2018-01-18 08:00:21:658 332 1978 DnldMgr * Update is not allowed to download due to regulation.
2018-01-18 08:00:21:658 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 6BAD3967-FABA-449D-9161-AD014E2EFFEC is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
2018-01-18 08:00:21:658 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 4B5F44A0-1613-45A2-87C9-31B2FC45B1D7 is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
2018-01-18 08:00:57:878 332 5e0 AU ########### AU: Initializing Automatic Updates ###########
2018-01-18 08:00:57:898 332 5e0 AU AU setting next detection timeout to 2018-01-18 14:00:57
2018-01-18 08:00:57:898 332 5e0 AU # WSUS server: http://syscenter1:8530
2018-01-18 08:00:57:898 332 5e0 AU # Detection frequency: 22
2018-01-18 08:00:57:898 332 5e0 AU # Target group: City
2018-01-18 08:00:57:898 332 5e0 AU # Approval type: Pre-install notify (Policy)
2018-01-18 08:00:57:898 332 5e0 AU # Auto-install minor updates: Yes (Policy)
2018-01-18 08:00:57:898 332 5e0 AU # Will interact with non-admins (Non-admins are elevated (Policy))
2018-01-18 08:00:57:971 332 5e0 AU # Reconnecting download for 1 updates
2018-01-18 08:00:58:005 332 5e0 AU # Reconnected 1 pending download calls
2018-01-18 08:00:58:012 332 5e0 AU Successfully wrote event for AU health state:0
2018-01-18 08:00:58:012 332 5e0 AU Initializing featured updates
2018-01-18 08:00:58:012 332 5e0 AU Found 0 cached featured updates
2018-01-18 08:00:58:012 332 5e0 AU Successfully wrote event for AU health state:0
2018-01-18 08:00:58:012 332 5e0 AU AU setting pending client directive to 'Download Progress'
2018-01-18 08:00:58:014 332 5e0 AU Successfully wrote event for AU health state:0
2018-01-18 08:00:58:014 332 5e0 AU AU finished delayed initialization
2018-01-18 08:00:58:014 332 5e0 AU #############
2018-01-18 08:00:58:014 332 5e0 AU ## START ## AU: Search for updates
2018-01-18 08:00:58:014 332 5e0 AU #########
2018-01-18 08:00:58:015 332 1978 DnldMgr *********** DnldMgr: New download job [UpdateId = {6BAD3967-FABA-449D-9161-AD014E2EFFEC}.203] ***********
2018-01-18 08:00:58:015 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 6BAD3967-FABA-449D-9161-AD014E2EFFEC is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
2018-01-18 08:00:58:015 332 1978 DnldMgr * Update is not allowed to download due to regulation.
2018-01-18 08:00:58:015 332 1978 DnldMgr *********** DnldMgr: New download job [UpdateId = {4B5F44A0-1613-45A2-87C9-31B2FC45B1D7}.200] ***********
2018-01-18 08:00:58:015 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 4B5F44A0-1613-45A2-87C9-31B2FC45B1D7 is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
2018-01-18 08:00:58:015 332 1978 DnldMgr * Update is not allowed to download due to regulation.
2018-01-18 08:00:58:015 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 6BAD3967-FABA-449D-9161-AD014E2EFFEC is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
2018-01-18 08:00:58:015 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 4B5F44A0-1613-45A2-87C9-31B2FC45B1D7 is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
2018-01-18 08:00:58:122 332 5e0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {3F086321-E8C3-4232-B593-863D907857B1}]
2018-01-18 08:00:58:122 332 1978 Agent *************
2018-01-18 08:00:58:122 332 1d3c AU AU checked download status and it changed: Downloading is paused
2018-01-18 08:00:58:122 332 1978 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-18 08:00:58:123 332 1978 Agent *********
2018-01-18 08:00:58:123 332 1978 Agent * Online = Yes; Ignore download priority = No
2018-01-18 08:00:58:123 332 1978 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2018-01-18 08:00:58:123 332 1978 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2018-01-18 08:00:58:123 332 1978 Agent * Search Scope = {Machine}
2018-01-18 08:00:58:124 332 1978 Setup Checking for agent SelfUpdate
2018-01-18 08:00:58:124 332 1978 Setup Client version: Core: 7.6.7601.23806 Aux: 7.6.7601.23806
2018-01-18 08:00:58:286 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2018-01-18 08:00:58:289 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:58:318 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP8C59.tmp with dwProvFlags 0x00000080:
2018-01-18 08:00:58:323 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:58:336 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2018-01-18 08:00:58:340 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:58:342 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2018-01-18 08:00:58:346 332 1978 Misc Microsoft signed: NA
2018-01-18 08:00:58:555 332 1978 Setup Determining whether a new setup handler needs to be downloaded
2018-01-18 08:00:58:555 332 1978 Setup SelfUpdate handler is not found. It will be downloaded
2018-01-18 08:00:58:555 332 1978 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-18 08:01:04:271 332 1978 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-18 08:01:04:271 332 1978 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-18 08:01:04:288 332 1978 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-18 08:01:04:288 332 1978 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-18 08:01:04:320 332 1978 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-18 08:01:04:320 332 1978 Setup SelfUpdate check completed. SelfUpdate is NOT required.
2018-01-18 08:01:06:179 332 1978 PT +++++++++++ PT: Synchronizing server updates +++++++++++
2018-01-18 08:01:06:179 332 1978 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-18 08:01:06:210 332 1978 PT WARNING: Cached cookie has expired or new PID is available
2018-01-18 08:01:06:210 332 1978 PT Initializing simple targeting cookie, clientId = 7cbff95a-4112-47c6-8966-1b21380f4d6b, target group = City, DNS name = mxl3320w4j.ad.champaignil.gov
2018-01-18 08:01:06:210 332 1978 PT Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
2018-01-18 08:01:12:879 332 5e0 AU No pending client directive
2018-01-18 08:02:33:958 332 1978 PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2018-01-18 08:02:33:958 332 1978 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-18 08:02:34:424 332 1978 Agent * Added update {38E83D6E-03A3-45CF-8D9D-F7BAC51CE9E2}.203 to search result
2018-01-18 08:02:34:424 332 1978 Agent * Found 1 updates and 83 categories in search; evaluated appl. rules of 1771 out of 2678 deployed entities
2018-01-18 08:02:34:498 332 1978 Agent *********
2018-01-18 08:02:34:498 332 1978 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-18 08:02:34:498 332 1978 Agent *************
2018-01-18 08:02:34:501 332 1d3c AU >>## RESUMED ## AU: Search for updates [CallId = {3F086321-E8C3-4232-B593-863D907857B1}]
2018-01-18 08:02:34:501 332 1d3c AU # 1 updates detected
2018-01-18 08:02:34:510 332 1d3c AU #########
2018-01-18 08:02:34:510 332 1d3c AU ## END ## AU: Search for updates [CallId = {3F086321-E8C3-4232-B593-863D907857B1}]
2018-01-18 08:02:34:510 332 1d3c AU #############
2018-01-18 08:02:34:510 332 1d3c AU Successfully wrote event for AU health state:0
2018-01-18 08:02:34:510 332 1d3c AU Featured notifications is disabled.
2018-01-18 08:02:34:510 332 1d3c AU AU setting next detection timeout to 2018-01-19 09:06:00
2018-01-18 08:02:34:511 332 1d3c AU Successfully wrote event for AU health state:0
2018-01-18 08:02:34:513 332 1d3c AU Successfully wrote event for AU health state:0
2018-01-18 08:02:39:490 332 1978 Report REPORT EVENT: {EF6833FD-C601-4AE2-AACF-282E84E9FA4A} 2018-01-18 08:02:34:472-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 1 updates.
2018-01-18 08:02:39:490 332 1978 Report REPORT EVENT: {D640701B-7906-47B2-809A-14042C9BCE7D} 2018-01-18 08:02:34:497-0600 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
2018-01-18 08:03:53:535 332 e1c DtaStor Default service for AU is {7971F918-A847-4430-9279-4A52D1EFE18D}
2018-01-18 08:03:53:551 332 e1c Agent AddTargetedServiceMapping: 8CC320A5-93A5-4491-8172-F4968DDE39E3 -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
2018-01-18 08:03:53:753 3236 12f8 Misc =========== Logging initialized (build: 7.6.7601.23806, tz: -0600) ===========
2018-01-18 08:03:53:753 3236 12f8 Misc = Process: C:\Windows\system32\CompatTelRunner.exe
2018-01-18 08:03:53:753 3236 12f8 Misc = Module: C:\Windows\system32\wuapi.dll
2018-01-18 08:03:53:753 3236 12f8 COMAPI -------------
2018-01-18 08:03:53:753 3236 12f8 COMAPI -- START -- COMAPI: Search [ClientId = ]
2018-01-18 08:03:53:753 3236 12f8 COMAPI ---------
2018-01-18 08:03:53:753 332 1978 Agent *************
2018-01-18 08:03:53:753 332 1978 Agent ** START ** Agent: Finding updates [CallerId = <<PROCESS>>: CompatTelRunner.exe]
2018-01-18 08:03:53:753 332 1978 Agent *********
2018-01-18 08:03:53:753 332 1978 Agent * Online = Yes; Ignore download priority = No
2018-01-18 08:03:53:753 332 1978 Agent * Criteria = "(CategoryIDs contains '405706ED-F1D7-47EA-91E1-EB8860039715' AND Type='Driver' AND VersionOverride='10.0.16299.2.0.0.256.1') OR (CategoryIDs contains '34F268B4-7E2D-40E1-8966-8BB6EA3DAD27' AND Type='Driver' AND VersionOverride='10.0.16299.2.0.0.256.1') OR (CategoryIDs contains '05EEBF61-148B-43CF-80DA-1C99AB0B8699' AND Type='Driver' AND VersionOverride='10.0.16299.2.0.0.256.1')"
2018-01-18 08:03:53:753 332 1978 Agent * ServiceID = {8CC320A5-93A5-4491-8172-F4968DDE39E3} Third party service
2018-01-18 08:03:53:753 332 1978 Agent * Search Scope = {Machine}
2018-01-18 08:03:53:753 3236 12f8 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = ]
2018-01-18 08:03:53:753 332 1978 Agent GetTargetedServiceMapping: 8CC320A5-93A5-4491-8172-F4968DDE39E3 -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
2018-01-18 08:03:53:910 332 1978 PT +++++++++++ PT: Starting category scan +++++++++++
2018-01-18 08:03:53:910 332 1978 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-18 08:03:54:285 332 1978 PT +++++++++++ PT: Synchronizing server updates +++++++++++
2018-01-18 08:03:54:285 332 1978 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-18 08:03:54:316 332 1978 Agent * Found 0 updates and 5 categories in search; evaluated appl. rules of 5 out of 5 deployed entities
2018-01-18 08:03:54:316 332 1978 Agent *********
2018-01-18 08:03:54:316 332 1978 Agent ** END ** Agent: Finding updates [CallerId = <<PROCESS>>: CompatTelRunner.exe]
2018-01-18 08:03:54:316 332 1978 Agent *************
2018-01-18 08:03:54:316 3236 16d0 COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = ]
2018-01-18 08:03:54:362 3236 16d0 COMAPI - Updates found = 0
2018-01-18 08:03:54:455 3236 16d0 COMAPI ---------
2018-01-18 08:03:54:455 3236 16d0 COMAPI -- END -- COMAPI: Search [ClientId = ]
2018-01-18 08:03:54:471 3236 16d0 COMAPI -------------
2018-01-18 08:03:54:549 332 1210 Agent WARNING: could not delete Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\Services\8cc320a5-93a5-4491-8172-f4968dde39e3 service registry key 0x80070002
2018-01-18 08:03:54:549 332 1210 Agent WARNING: Failed to delete service from the backup store, error = 0x80070002
2018-01-18 08:03:54:549 332 1210 Agent RemoveTargetedServiceMapping: 8CC320A5-93A5-4491-8172-F4968DDE39E3 -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
2018-01-18 08:03:59:306 332 1978 Report REPORT EVENT: {BFF293F8-4686-486A-9B5D-B9F525AF3B10} 2018-01-18 08:03:54:316-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 <<PROCESS>>: CompatTelRunner.ex Success Software Synchronization Windows Update Client successfully detected 0 updates.
2018-01-18 08:07:44:066 332 5e0 AU Successfully wrote event for AU health state:0
2018-01-18 08:07:44:071 332 5e0 AU Successfully wrote event for AU health state:0
2018-01-18 08:30:17:419 332 5e0 AU AU setting next sqm report timeout to 2018-01-19 14:30:17
Thursday, January 18, 2018 7:05 PM
Answers
-
Contact me through my website for support for the script. Those are significant issues and need to be resolved. Reference this post when you contact me.
Adam Marshall, MCSE: Security
http://www.adamj.org
Microsoft MVP - Windows and Devices for IT- Marked as answer by BrianPerkinson Friday, February 2, 2018 8:03 PM
Tuesday, January 23, 2018 8:18 PM -
All,
The WSUS client-server communication issue was not resolved. Thanks to Adam Marshall and Elton for their troubleshooting efforts. Adam spent tireless time narrowing down the issues on the server and IIS. After provisioning a 2nd WSUS server, normal client-server communication was observed. Client migration to the new WSUS server is nearly complete.
Brian
- Marked as answer by BrianPerkinson Thursday, February 1, 2018 8:29 PM
Thursday, February 1, 2018 8:27 PM
All replies
-
WAM it! WAM Fixes these types of issues.
Please have a look at the WSUS Automated Maintenance (WAM) system. It is an automated maintenance system for WSUS, the last system you'll ever need to maintain WSUS!
https://community.spiceworks.com/scripts/show/2998-wsus-automated-maintenance-formerly-adamj-clean-wsus
What it does:
1. Add WSUS Index Optimization to the database to increase the speed of many database operations in WSUS by approximately 1000-1500 times faster.
2. Remove all Drivers from the WSUS Database (Default; Optional).
3. Shrink your WSUSContent folder's size by declining multiple types of updates including by default any superseded updates, preview updates, expired updates, Itanium updates, and beta updates. Optional extras: Language Packs, IE7, IE8, IE9, IE10, Embedded, NonEnglishUpdates, ComputerUpdates32bit, WinXP.
4. Remove declined updates from the WSUS Database.
5. Clean out all the synchronization logs that have built up over time (configurable, with the default keeping the last 14 days of logs).
6. Compress Update Revisions.
7. Remove Obsolete Updates.
8. Computer Object Cleanup (configurable, with the default of deleting computer objects that have not synced within 30 days).
9. Application Pool Memory Configuration to display the current private memory limit and easily set it to any configurable amount including 0 for unlimited. This is a manual execution only.
10. Checks to see if you have a dirty database, and if you do, fixes it. This is primarily for Server 2012 WSUS, and is a manual execution only.
11. Run the Recommended SQL database Maintenance script on the actual SQL database.
12. Run the Server Cleanup Wizard.
It will email the report out to you or save it to a file, or both.
Although the script is lengthy, it has been made to be super easy to setup and use so don't over think it. There are some prerequisites and instructions at the top of the script. After installing the prerequisites and configuring the variables for your environment (email settings only if you are accepting all the defaults), simply run:
.\Clean-WSUS.ps1 -FirstRun
If you wish to view or increase the Application Pool Memory Configuration, or run the Dirty Database Check, you must run it with the required switch. See Get-Help .\Clean-WSUS.ps1 -Examples
If you're having trouble, there's also a -HelpMe option that will create a log so you can send it to me for support.If after 72 hours computers from running WAM, don't start to report back in, run the following script on affected clients from an Administrative command prompt.
net stop bits net stop wuauserv reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v AccountDomainSid /f reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v PingID /f reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v SusClientId /f reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v SusClientIDValidation /f rd /s /q "C:\WINDOWS\SoftwareDistribution" net start bits net start wuauserv wuauclt /resetauthorization /detectnow PowerShell.exe (New-Object -ComObject Microsoft.Update.AutoUpdate).DetectNow()
Wait between 30 min and 24 hours for the system to report back in - usually closer to the 30 minute point.
Adam Marshall, MCSE: Security
http://www.adamj.org
Microsoft MVP - Windows and Devices for ITFriday, January 19, 2018 2:51 AM -
Hi,
First , please try to stop "BITS" service and remove BITS "cache" file (then , start BITS service again):
%ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr0.dat %ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr1.dat
I also noticed some error related to "80070002" , please check the following article which detailed steps to fix it :
https://support.microsoft.com/en-us/help/910336/windows-update-error-0x80070002-or-0x80070003
Any further information please feel free to let us know.
Best Regards,
Elton
Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.Monday, January 22, 2018 3:28 AM -
Thank you, Adam, for your reply. We have been running WAM since December and are enjoying the quicker WSUS response and optimized file storage. I have run the small script you specified above and checked the 'Last Status Report' after 1.5 hours with no change so far. I will continue to check and report back, at the latest, tomorrow.
Thank you again,
Brian
Monday, January 22, 2018 8:17 PM -
Thank you, Elton, for your reply.
I have performed the following on a Windows 7 and 10 PC that has not reported back to WSUS in recent times. I will post the WindowsUpdate log below for the Windows 7 PC and post the Windows 10 results on a 2nd reply:
Windows 7 PC
- stop "BITS" service
- remove BITS "cache" files
%ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr0.dat
%ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr1.dat
- start BITS service
- Download System Update Readiness tool and install
- Restart PC, wait 2 hours, note 'Last Contact' column is currentHere is part of the WindowsUpdate log for the Windows 7 PC:
2018-01-22 13:10:25:050 964 17d4 AU #############
2018-01-22 13:10:25:050 964 17d4 AU ## START ## AU: Search for updates
2018-01-22 13:10:25:050 964 17d4 AU #########
2018-01-22 13:10:25:066 964 17d4 AU <<## SUBMITTED ## AU: Search for updates [CallId = {3810CA12-189C-40F6-8D1F-7857999F7A61}]
2018-01-22 13:10:25:066 964 1a68 Agent *************
2018-01-22 13:10:25:066 964 1a68 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-22 13:10:25:066 964 1a68 Agent *********
2018-01-22 13:10:25:066 964 1a68 Agent * Online = Yes; Ignore download priority = No
2018-01-22 13:10:25:066 964 1a68 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2018-01-22 13:10:25:066 964 1a68 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2018-01-22 13:10:25:066 964 1a68 Agent * Search Scope = {Machine}
2018-01-22 13:10:25:113 964 1a68 Setup Checking for agent SelfUpdate
2018-01-22 13:10:25:113 964 1a68 Setup Client version: Core: 7.6.7601.23806 Aux: 7.6.7601.23806
2018-01-22 13:10:25:128 964 1a68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2018-01-22 13:10:25:128 964 1a68 Misc Microsoft signed: NA
2018-01-22 13:10:25:144 964 1a68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP3564.tmp with dwProvFlags 0x00000080:
2018-01-22 13:10:25:144 964 1a68 Misc Microsoft signed: NA
2018-01-22 13:10:25:144 964 1a68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2018-01-22 13:10:25:159 964 1a68 Misc Microsoft signed: NA
2018-01-22 13:10:25:191 964 1a68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2018-01-22 13:10:25:206 964 1a68 Misc Microsoft signed: NA
2018-01-22 13:10:25:222 964 1a68 Setup Determining whether a new setup handler needs to be downloaded
2018-01-22 13:10:25:222 964 1a68 Setup SelfUpdate handler is not found. It will be downloaded
2018-01-22 13:10:25:222 964 1a68 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-22 13:10:26:033 964 1a68 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-22 13:10:26:033 964 1a68 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-22 13:10:26:049 964 1a68 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-22 13:10:26:049 964 1a68 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-22 13:10:26:080 964 1a68 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-22 13:10:26:080 964 1a68 Setup SelfUpdate check completed. SelfUpdate is NOT required.
2018-01-22 13:10:27:032 964 1a68 PT +++++++++++ PT: Synchronizing server updates +++++++++++
2018-01-22 13:10:27:032 964 1a68 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-22 13:10:27:047 964 1a68 PT WARNING: Cached cookie has expired or new PID is available
2018-01-22 13:10:27:047 964 1a68 PT Initializing simple targeting cookie, clientId = bfd8f27b-2e69-4add-98a6-2e10c002f66d, target group = City, DNS name = cfd-win7-server.ad.champaignil.gov
2018-01-22 13:10:27:047 964 1a68 PT Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
2018-01-22 13:10:48:296 964 1a68 PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2018-01-22 13:10:48:296 964 1a68 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-22 13:10:48:452 964 1a68 Agent * Found 0 updates and 82 categories in search; evaluated appl. rules of 1099 out of 1613 deployed entities
2018-01-22 13:10:48:468 964 1a68 Agent *********
2018-01-22 13:10:48:468 964 1a68 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-22 13:10:48:468 964 1a68 Agent *************
2018-01-22 13:10:48:468 964 1490 AU >>## RESUMED ## AU: Search for updates [CallId = {3810CA12-189C-40F6-8D1F-7857999F7A61}]
2018-01-22 13:10:48:468 964 1490 AU # 0 updates detected
2018-01-22 13:10:48:468 964 1490 AU #########
2018-01-22 13:10:48:468 964 1490 AU ## END ## AU: Search for updates [CallId = {3810CA12-189C-40F6-8D1F-7857999F7A61}]
2018-01-22 13:10:48:468 964 1490 AU #############
2018-01-22 13:10:48:468 964 1490 AU Successfully wrote event for AU health state:0
2018-01-22 13:10:48:468 964 1490 AU Featured notifications is disabled.
2018-01-22 13:10:48:468 964 1490 AU AU setting next detection timeout to 2018-01-23 16:45:31
2018-01-22 13:10:48:468 964 1490 AU Successfully wrote event for AU health state:0
2018-01-22 13:10:48:468 964 1490 AU Successfully wrote event for AU health state:0
2018-01-22 13:10:53:476 964 1a68 Report REPORT EVENT: {93A68E15-8678-46F2-9D4A-92439855A138} 2018-01-22 13:10:48:468-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 0 updates.
2018-01-22 13:10:53:476 964 1a68 Report REPORT EVENT: {F434744F-6C5C-4FB7-A637-8903D8D91D68} 2018-01-22 13:10:48:468-0600 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
2018-01-22 13:20:39:093 964 17d4 AU ########### AU: Uninitializing Automatic Updates ###########
2018-01-22 13:20:39:234 964 17d4 Service *********
2018-01-22 13:20:39:234 964 17d4 Service ** END ** Service: Service exit [Exit code = 0x240001]
2018-01-22 13:20:39:234 964 17d4 Service *************
2018-01-22 13:20:47:237 964 16b0 Misc =========== Logging initialized (build: 7.6.7601.23806, tz: -0600) ===========
2018-01-22 13:20:47:237 964 16b0 Misc = Process: C:\Windows\system32\svchost.exe
2018-01-22 13:20:47:237 964 16b0 Misc = Module: c:\windows\system32\wuaueng.dll
2018-01-22 13:20:47:237 964 16b0 Service *************
2018-01-22 13:20:47:237 964 16b0 Service ** START ** Service: Service startup
2018-01-22 13:20:47:237 964 16b0 Service *********
2018-01-22 13:20:47:237 964 16b0 Agent * WU client version 7.6.7601.23806
2018-01-22 13:20:47:237 964 16b0 Agent * Base directory: C:\Windows\SoftwareDistribution
2018-01-22 13:20:47:237 964 16b0 Agent * Access type: No proxy
2018-01-22 13:20:47:237 964 16b0 Agent * Network state: Connected
2018-01-22 13:20:47:736 964 16b0 DtaStor Default service for AU is {00000000-0000-0000-0000-000000000000}
2018-01-22 13:20:47:736 964 16b0 DtaStor Default service for AU is {9482F4B4-E343-43B6-B170-9A65BC822C77}
2018-01-22 13:20:47:752 964 16b0 Agent WARNING: failed to access the auth cab, fatal error 0x80070003
2018-01-22 13:20:47:752 964 16b0 Agent WARNING: Invalid service in the backup data store; cleaning up
2018-01-22 13:20:47:752 964 16b0 Agent WARNING: Failed to add and register service 7971f918-a847-4430-9279-4a52d1efe18d to the data store 0x80240031
2018-01-22 13:20:47:752 964 16b0 Agent WARNING: Default Service Recovery: Attempting to add pending registration for service 7971f918-a847-4430-9279-4a52d1efe18d to the data store
2018-01-22 13:20:49:280 964 474 Report CWERReporter::Init succeeded
2018-01-22 13:20:49:280 964 474 Agent *********** Agent: Initializing Windows Update Agent ***********
2018-01-22 13:20:49:280 964 474 Agent * Prerequisite roots succeeded.
2018-01-22 13:20:49:280 964 474 Agent *********** Agent: Initializing global settings cache ***********
2018-01-22 13:20:49:280 964 474 Agent * WSUS server: http://syscenter1:8530
2018-01-22 13:20:49:280 964 474 Agent * WSUS status server: http://syscenter1:8530
2018-01-22 13:20:49:280 964 474 Agent * Target group: City
2018-01-22 13:20:49:280 964 474 Agent * Windows Update access disabled: No
2018-01-22 13:20:49:280 964 474 DnldMgr Download manager restoring 0 downloads
2018-01-22 13:20:49:280 964 16b0 Agent Created new random SusClientId 0cacb22f-a62f-4c6c-9698-f3e4df74d55a. Old Id: none.
2018-01-22 13:20:49:280 964 16b0 Report *********** Report: Initializing static reporting data ***********
2018-01-22 13:20:49:280 964 16b0 Report * OS Version = 6.1.7601.1.0.65792
2018-01-22 13:20:49:280 964 16b0 Report * OS Product Type = 0x00000030
2018-01-22 13:20:49:296 964 16b0 Report * Computer Brand = VMware, Inc.
2018-01-22 13:20:49:296 964 16b0 Report * Computer Model = VMware Virtual Platform
2018-01-22 13:20:49:296 964 16b0 Report * Bios Revision = 6.00
2018-01-22 13:20:49:296 964 16b0 Report * Bios Name = PhoenixBIOS 4.0 Release 6.0
2018-01-22 13:20:49:296 964 16b0 Report * Bios Release Date = 2015-09-21T00:00:00
2018-01-22 13:20:49:296 964 16b0 Report * Locale ID = 1033
2018-01-22 13:20:54:397 964 474 AU ########### AU: Initializing Automatic Updates ###########
2018-01-22 13:20:54:397 964 474 AU # WSUS server: http://syscenter1:8530
2018-01-22 13:20:54:397 964 474 AU # Detection frequency: 22
2018-01-22 13:20:54:397 964 474 AU # Target group: City
2018-01-22 13:20:54:397 964 474 AU # Approval type: Pre-install notify (Policy)
2018-01-22 13:20:54:397 964 474 AU # Auto-install minor updates: Yes (Policy)
2018-01-22 13:20:54:397 964 474 AU # Will interact with non-admins (Non-admins are elevated (Policy))
2018-01-22 13:20:54:397 964 474 AU Successfully wrote event for AU health state:0
2018-01-22 13:20:54:397 964 474 AU Initializing featured updates
2018-01-22 13:20:54:397 964 474 AU Found 0 cached featured updates
2018-01-22 13:20:54:397 964 474 AU Successfully wrote event for AU health state:0
2018-01-22 13:20:54:397 964 474 AU Successfully wrote event for AU health state:0
2018-01-22 13:20:54:397 964 474 AU AU finished delayed initialization
2018-01-22 13:20:54:397 964 474 AU Triggering AU detection through DetectNow API
2018-01-22 13:20:54:397 964 474 AU Triggering Online detection (non-interactive)
2018-01-22 13:20:54:397 964 16b0 AU #############
2018-01-22 13:20:54:397 964 16b0 AU ## START ## AU: Search for updates
2018-01-22 13:20:54:397 964 16b0 AU #########
2018-01-22 13:20:54:397 964 16b0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {894C47F4-5808-4A65-9676-A84BB7A5DA58}]
2018-01-22 13:20:54:397 964 116c Agent *************
2018-01-22 13:20:54:397 964 116c Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-22 13:20:54:397 964 116c Agent *********
2018-01-22 13:20:54:397 964 116c Agent * Online = Yes; Ignore download priority = No
2018-01-22 13:20:54:397 964 116c Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2018-01-22 13:20:54:397 964 116c Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2018-01-22 13:20:54:397 964 116c Agent * Search Scope = {Machine}
2018-01-22 13:20:54:397 964 116c Setup Checking for agent SelfUpdate
2018-01-22 13:20:54:397 964 116c Setup Client version: Core: 7.6.7601.23806 Aux: 7.6.7601.23806
2018-01-22 13:20:54:429 964 116c Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2018-01-22 13:20:54:429 964 116c Misc Microsoft signed: NA
2018-01-22 13:20:54:429 964 116c Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPCF81.tmp with dwProvFlags 0x00000080:
2018-01-22 13:20:54:444 964 116c Misc Microsoft signed: NA
2018-01-22 13:20:54:475 964 116c Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2018-01-22 13:20:54:475 964 116c Misc Microsoft signed: NA
2018-01-22 13:20:54:522 964 116c Setup Determining whether a new setup handler needs to be downloaded
2018-01-22 13:20:54:522 964 116c Setup SelfUpdate handler is not found. It will be downloaded
2018-01-22 13:20:54:522 964 116c Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-22 13:20:54:522 964 116c Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-22 13:20:54:522 964 116c Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-22 13:20:54:538 964 116c Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-22 13:20:54:538 964 116c Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-22 13:20:54:553 964 116c Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-22 13:20:54:553 964 116c Setup SelfUpdate check completed. SelfUpdate is NOT required.
2018-01-22 13:20:54:600 964 116c PT +++++++++++ PT: Synchronizing server updates +++++++++++
2018-01-22 13:20:54:600 964 116c PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-22 13:20:54:616 964 116c Agent Switching to hardware-verified ClientId.
2018-01-22 13:20:54:631 964 116c PT WARNING: Cached cookie has expired or new PID is available
2018-01-22 13:20:54:678 964 116c Agent Created new random SusClientId d8c6d4df-fef0-48c3-99b6-c867057bf061. Old Id: 0cacb22f-a62f-4c6c-9698-f3e4df74d55a.
2018-01-22 13:20:54:678 964 116c PT Initializing simple targeting cookie, clientId = d8c6d4df-fef0-48c3-99b6-c867057bf061, target group = City, DNS name = cfd-win7-server.ad.champaignil.gov
2018-01-22 13:20:54:678 964 116c PT Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
2018-01-22 13:23:55:627 964 116c PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2018-01-22 13:23:55:627 964 116c PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-22 13:23:56:485 964 116c Agent * Found 0 updates and 82 categories in search; evaluated appl. rules of 1099 out of 1613 deployed entities
2018-01-22 13:23:56:485 964 116c Agent *********
2018-01-22 13:23:56:485 964 116c Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-22 13:23:56:485 964 116c Agent *************
2018-01-22 13:23:56:485 964 1700 AU >>## RESUMED ## AU: Search for updates [CallId = {894C47F4-5808-4A65-9676-A84BB7A5DA58}]
2018-01-22 13:23:56:485 964 1700 AU # 0 updates detected
2018-01-22 13:23:56:485 964 1700 AU #########
2018-01-22 13:23:56:485 964 1700 AU ## END ## AU: Search for updates [CallId = {894C47F4-5808-4A65-9676-A84BB7A5DA58}]
2018-01-22 13:23:56:485 964 1700 AU #############
2018-01-22 13:23:56:485 964 1700 AU Successfully wrote event for AU health state:0
2018-01-22 13:23:56:485 964 1700 AU Featured notifications is disabled.
2018-01-22 13:23:56:485 964 1700 AU AU setting next detection timeout to 2018-01-23 13:39:11
2018-01-22 13:23:56:501 964 1700 AU Successfully wrote event for AU health state:0
2018-01-22 13:23:56:501 964 1700 AU Successfully wrote event for AU health state:0
2018-01-22 13:24:01:492 964 116c Report REPORT EVENT: {76E38D54-87A9-447F-A0DA-232324477BA9} 2018-01-22 13:23:56:485-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 0 updates.
2018-01-22 13:24:01:492 964 116c Report REPORT EVENT: {DA101237-E493-463D-95B8-7F341FA03CEB} 2018-01-22 13:23:56:485-0600 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.Thank you,
Brian
Monday, January 22, 2018 8:29 PM -
Elton,
The following was performed on a Windows 10 PC that is currently not reporting back to the WSUS server (but contacts). I will report back tomorrow on any changes to WSUS reporting.
Windows 10 PC
- stop "BITS" service
- remove BITS "cache" files
%ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr0.dat
%ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr1.dat
(renamed qmgr* files)
- start BITS service
- DISM.exe /Online /Cleanup-image /Restorehealth
- sfc /scannow
- Restarted PC, checked for updates, verified 'last contact' updated on WSUSHere is a portion of the WindowsUpdate log file:
2018/01/22 13:23:09.5001619 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:09.5004019 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:10.3169377 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:10.3173932 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:10.3174197 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:10.3174255 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:10.3174327 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:10.3174360 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:10.3174532 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:10.7459112 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 33; does use network; is at background priority
2018/01/22 13:23:10.7559629 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 33) stopped; does use network; is at background priority
2018/01/22 13:23:10.7742765 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:10.7742804 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:10.7745282 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:11.5946356 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:11.5951225 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:11.5951490 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:11.5951548 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:11.5951623 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:11.5951653 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:11.5951825 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:12.7372726 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 34; does use network; is at background priority
2018/01/22 13:23:12.7533635 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 34) stopped; does use network; is at background priority
2018/01/22 13:23:12.7715165 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:12.7715208 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:12.7717544 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:13.5837725 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:13.5841954 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:13.5842211 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:13.5842268 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:13.5842341 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:13.5842371 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:13.5842558 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:13.9689041 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 35; does use network; is at background priority
2018/01/22 13:23:13.9794412 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 35) stopped; does use network; is at background priority
2018/01/22 13:23:13.9981952 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:13.9981994 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:13.9984400 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:14.8247720 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:14.8251916 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:14.8252163 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:14.8252221 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:14.8252296 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:14.8252348 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:14.8252505 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:15.2475091 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 36; does use network; is at background priority
2018/01/22 13:23:15.2597985 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 36) stopped; does use network; is at background priority
2018/01/22 13:23:15.2780840 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:15.2780882 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:15.2783233 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:16.0838617 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:16.0842792 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:16.0843045 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:16.0843100 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:16.0843193 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:16.0843226 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:16.0843392 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:16.1481218 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 37; does use network; is at background priority
2018/01/22 13:23:16.1575350 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 37) stopped; does use network; is at background priority
2018/01/22 13:23:16.1753294 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:16.1753333 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:16.1755893 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:16.9908129 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:16.9912735 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:16.9912995 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:16.9913076 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:16.9913152 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:16.9913182 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:16.9913336 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:17.0311206 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 38; does use network; is at background priority
2018/01/22 13:23:17.0407216 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 38) stopped; does use network; is at background priority
2018/01/22 13:23:17.0588577 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:17.0588619 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:17.0591106 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:17.8747082 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:17.8751468 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:17.8751755 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:17.8751812 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:17.8751885 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:17.8751915 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:17.8752078 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:17.9255035 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 39; does use network; is at background priority
2018/01/22 13:23:17.9377877 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 39) stopped; does use network; is at background priority
2018/01/22 13:23:17.9558085 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:17.9558121 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:17.9560364 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:18.7730403 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:18.7734569 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:18.7734832 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:18.7734889 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:18.7734961 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:18.7734992 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:18.7735170 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:18.8152229 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 40; does use network; is at background priority
2018/01/22 13:23:18.8286865 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 40) stopped; does use network; is at background priority
2018/01/22 13:23:18.8452563 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:18.8452602 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:18.8454911 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:19.6535850 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:19.6540378 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:19.6540644 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:19.6540698 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:19.6540774 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:19.6540825 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:19.6540988 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:19.6959158 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 41; does use network; is at background priority
2018/01/22 13:23:19.7053650 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 41) stopped; does use network; is at background priority
2018/01/22 13:23:19.7224108 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:19.7224147 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:19.7226613 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:20.5455717 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:20.5460300 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:20.5460568 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:20.5460629 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:20.5460725 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:20.5460758 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:20.5460921 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:20.6290815 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 42; does use network; is at background priority
2018/01/22 13:23:20.6402524 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 42) stopped; does use network; is at background priority
2018/01/22 13:23:20.6567718 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:20.6568176 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:20.6570806 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:21.4746946 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:21.4751178 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:21.4751440 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:21.4751519 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:21.4751594 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:21.4751624 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:21.4751781 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:21.8945133 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 43; does use network; is at background priority
2018/01/22 13:23:21.9069638 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 43) stopped; does use network; is at background priority
2018/01/22 13:23:21.9238882 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:21.9238919 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:21.9241789 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:22.7428881 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:22.7433391 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:22.7433680 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:22.7433741 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:22.7433816 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:22.7433846 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:22.7434015 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:22.8228959 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 44; does use network; is at background priority
2018/01/22 13:23:22.8387804 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 44) stopped; does use network; is at background priority
2018/01/22 13:23:22.8553402 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:22.8553441 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:22.8555847 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:23.6624265 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:23.6628491 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:23.6628748 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:23.6628805 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:23.6628878 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:23.6628908 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:23.6629068 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:23.9797213 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 45; does use network; is at background priority
2018/01/22 13:23:23.9940068 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 45) stopped; does use network; is at background priority
2018/01/22 13:23:24.0109956 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:24.0109995 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:24.0112452 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:24.8307573 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:24.8311485 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:24.8311745 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:24.8311802 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:24.8311874 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:24.8311905 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:24.8312071 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:24.9222208 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 46; does use network; is at background priority
2018/01/22 13:23:24.9316159 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 46) stopped; does use network; is at background priority
2018/01/22 13:23:24.9490037 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:24.9490076 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:24.9493094 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:25.7595206 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:25.7599372 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:25.7599631 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:25.7599689 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:25.7599761 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:25.7599791 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:25.7599954 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:25.8305484 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 47; does use network; is at background priority
2018/01/22 13:23:25.8476766 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 47) stopped; does use network; is at background priority
2018/01/22 13:23:25.8645267 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:25.8645325 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:25.8647731 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:26.6776687 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:26.6781287 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:26.6781541 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:26.6781598 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:26.6781670 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:26.6781701 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:26.6781864 3560 6824 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:26.7399078 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 48; does use network; is at background priority
2018/01/22 13:23:26.7489977 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 48) stopped; does use network; is at background priority
2018/01/22 13:23:26.7490071 3560 6824 ProtocolTalker SyncUpdates round trips: 34
2018/01/22 13:23:26.7920775 3560 6824 ProtocolTalker ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018/01/22 13:23:26.7920799 3560 6824 ProtocolTalker OK to reuse existing configuration
2018/01/22 13:23:26.7920826 3560 6824 ProtocolTalker Existing cookie is valid, just use it
2018/01/22 13:23:26.7920841 3560 6824 ProtocolTalker PTInfo: Server requested registration
2018/01/22 13:23:26.8008749 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 49; does use network; is at background priority
2018/01/22 13:23:26.8039234 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 49) stopped; does use network; is at background priority
2018/01/22 13:23:26.8039306 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 50; does use network; is at background priority
2018/01/22 13:23:26.8062652 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 50) stopped; does use network; is at background priority
2018/01/22 13:23:26.8062722 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 51; does use network; is at background priority
2018/01/22 13:23:26.8192051 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 51) stopped; does use network; is at background priority
2018/01/22 13:23:26.8192123 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 52; does use network; is at background priority
2018/01/22 13:23:26.8256459 3560 6824 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 52) stopped; does use network; is at background priority
2018/01/22 13:23:26.8424167 3560 6824 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/22 13:23:26.8424206 3560 6824 SLS Retrieving SLS response from server...
2018/01/22 13:23:26.8427454 3560 6824 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/22 13:23:27.6487305 3560 6824 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/22 13:23:27.6491945 3560 6824 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/22 13:23:27.6492192 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/22 13:23:27.6492249 3560 6824 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/22 13:23:27.6492322 3560 6824 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/22 13:23:27.6492352 3560 6824 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/22 13:23:27.6492699 3560 6824 ProtocolTalker SyncExtendedUpdateInfo - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/22 13:23:27.9812107 3560 6824 Agent Found 0 updates and 94 categories in search; evaluated appl. rules of 578 out of 976 deployed entities
2018/01/22 13:23:27.9975208 3560 6824 Agent * END * Finding updates CallerId = UpdateOrchestrator Id = 2
2018/01/22 13:23:28.0066723 3560 6824 Agent Started inventory process
2018/01/22 13:23:28.0098627 3560 6824 IdleTimer WU operation (CSearchCall::Init ID 2, operation # 10) stopped; does use network; is at background priority
2018/01/22 13:23:28.0099846 3560 2868 ComApi *RESUMED* Search ClientId = UpdateOrchestrator, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = 347msebk9EqhkvMr.0.1.0.0)
2018/01/22 13:23:28.0102590 3560 2868 ComApi * END * Search ClientId = UpdateOrchestrator, Updates found = 0, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = 347msebk9EqhkvMr.0.1.0.0)
2018/01/22 13:23:28.0104631 3560 4832 ComApi * END * All federated searches have completed. Jobs = 1, Succeeded = 1, ClientId = UpdateOrchestrator (cV = 347msebk9EqhkvMr.0.1.0)
2018/01/22 13:33:28.0135288 3560 7996 Agent Earliest future timer found:
2018/01/22 13:33:28.0135523 3560 7996 Agent Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
2018/01/22 13:33:29.0174014 3560 7640 Misc CSusClientGlobal::DoServicePreShutdown
2018/01/22 13:33:29.0175061 3560 7640 IdleTimer Idle timer disabled in preparation for service shutdown
2018/01/22 13:33:29.0175194 3560 7640 Misc WUTaskManager uninit
2018/01/22 13:33:29.0175408 3560 7640 Agent Earliest future timer found:
2018/01/22 13:33:29.0175559 3560 7640 Agent Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
2018/01/22 13:33:29.0208072 3560 7640 Misc CreateSessionStateChangeTrigger, TYPE:2, Enable:No
2018/01/22 13:33:29.0208178 3560 7640 Misc CreateSessionStateChangeTrigger, TYPE:4, Enable:No
2018/01/22 13:33:29.0807722 3560 7640 Misc Agent uninit
2018/01/22 13:33:29.0848518 3560 7640 Misc Reporter uninit
2018/01/22 13:33:29.0855512 3560 7640 Misc network cost manager uninit
2018/01/22 13:33:29.0855784 3560 7640 Misc Eventer uninit
2018/01/22 13:33:30.0953421 3560 7640 Misc ServiceManager uninit
2018/01/22 13:33:30.0953741 3560 7640 Misc PersistentTimeoutScheduler uninit
2018/01/22 13:33:30.0953771 3560 7640 Misc datastore uninit
2018/01/22 13:33:30.1754918 3560 7640 Misc setting cache uninit
2018/01/22 13:33:30.1754960 3560 7640 Misc security checker uninit
2018/01/22 13:33:30.1755012 3560 7640 Misc Test Hook uninit
2018/01/22 13:33:30.1755030 3560 7640 Misc IdleTimer uninit
2018/01/22 13:33:30.1770446 3560 7640 Shared * END * Service exit Exit code = 0x240001
Monday, January 22, 2018 8:42 PM -
Hi,
>>Restart PC, wait 2 hours, note 'Last Contact' column is current
Do you mean that windows 7 reported to WSUS correctly ?
In windows update log of windows 10 computer , there are some entries showing win10 tried to connect to "MS update" .
I'd suggest you try to enable group policy "Do not connect to any Windows Update Internet locations" for that win10 computer then check updates again .
Best Regards,
Elton
Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.Tuesday, January 23, 2018 1:56 AM -
Adam,
I regret that today, one day later, after running the above small script on a couple of PCs yesterday (one Windows 7 and one Windows 10), there are still no status updates to WSUS from these. Again, the 'last contact' column continues to update, just no 'last status report' for 374 of 377 PCs.
Thank you for any suggestions you may have.
Brian
Tuesday, January 23, 2018 2:02 PM -
Adam,
I regret that today, one day later, after running the above small script on a couple of PCs yesterday (one Windows 7 and one Windows 10), there are still no status updates to WSUS from these. Again, the 'last contact' column continues to update, just no 'last status report' for 374 of 377 PCs.
Thank you for any suggestions you may have.
Brian
Adam Marshall, MCSE: Security
http://www.adamj.org
Microsoft MVP - Windows and Devices for ITTuesday, January 23, 2018 2:09 PM -
Hi Elton,
Update this morning (one day later): The Windows 7 and Windows 10 workstations continue to update the 'Last Contact' column (never been an issue and workstations are receiving Windows Updates), but the 'Last Status Report' column is not changing. Thus, WSUS reporting is not functional.
I did perform a 'Check online for updates from Microsoft Update' yesterday to verify completeness of Windows Updates received locally from WSUS and this is likely why the log file showed this Microsoft lookup. I will repost both logs (Windows 7 [below] and Windows 10 [next post]) from this morning for a more accurate look and will NOT attempt any manual Windows Updates checks to Microsoft.
Thank you for any suggestions you may have.
Windows 7 WindowsUpdate log:
2018-01-23 07:39:11:603 964 16b0 AU #############
2018-01-23 07:39:11:603 964 16b0 AU ## START ## AU: Search for updates
2018-01-23 07:39:11:603 964 16b0 AU #########
2018-01-23 07:39:11:603 964 16b0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {3F13251E-2E40-48F6-88E9-E8A24C976A50}]
2018-01-23 07:39:11:603 964 1310 Agent *************
2018-01-23 07:39:11:603 964 1310 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-23 07:39:11:603 964 1310 Agent *********
2018-01-23 07:39:11:603 964 1310 Agent * Online = Yes; Ignore download priority = No
2018-01-23 07:39:11:603 964 1310 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2018-01-23 07:39:11:603 964 1310 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2018-01-23 07:39:11:603 964 1310 Agent * Search Scope = {Machine}
2018-01-23 07:39:11:650 964 1310 Setup Checking for agent SelfUpdate
2018-01-23 07:39:11:665 964 1310 Setup Client version: Core: 7.6.7601.23806 Aux: 7.6.7601.23806
2018-01-23 07:39:11:696 964 1310 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
2018-01-23 07:39:11:696 964 1310 Misc Microsoft signed: NA
2018-01-23 07:39:11:712 964 1310 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP50AB.tmp with dwProvFlags 0x00000080:
2018-01-23 07:39:11:712 964 1310 Misc Microsoft signed: NA
2018-01-23 07:39:11:743 964 1310 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2018-01-23 07:39:11:759 964 1310 Misc Microsoft signed: NA
2018-01-23 07:39:11:759 964 1310 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
2018-01-23 07:39:11:759 964 1310 Misc Microsoft signed: NA
2018-01-23 07:39:11:852 964 1310 Setup Determining whether a new setup handler needs to be downloaded
2018-01-23 07:39:11:852 964 1310 Setup SelfUpdate handler is not found. It will be downloaded
2018-01-23 07:39:11:852 964 1310 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-23 07:39:11:868 964 1310 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-23 07:39:11:868 964 1310 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-23 07:39:11:883 964 1310 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-23 07:39:11:883 964 1310 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2018-01-23 07:39:11:914 964 1310 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
2018-01-23 07:39:11:914 964 1310 Setup SelfUpdate check completed. SelfUpdate is NOT required.
2018-01-23 07:39:12:880 964 1310 PT +++++++++++ PT: Synchronizing server updates +++++++++++
2018-01-23 07:39:12:880 964 1310 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-23 07:39:12:973 964 1310 PT WARNING: Cached cookie has expired or new PID is available
2018-01-23 07:39:12:973 964 1310 PT Initializing simple targeting cookie, clientId = d8c6d4df-fef0-48c3-99b6-c867057bf061, target group = City, DNS name = cfd-win7-server.ad.champaignil.gov
2018-01-23 07:39:12:973 964 1310 PT Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
2018-01-23 07:39:42:921 964 1310 PT +++++++++++ PT: Synchronizing extended update info +++++++++++
2018-01-23 07:39:42:921 964 1310 PT + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018-01-23 07:39:43:062 964 1310 Agent * Added update {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200 to search result
2018-01-23 07:39:43:062 964 1310 Agent * Found 1 updates and 82 categories in search; evaluated appl. rules of 1104 out of 1619 deployed entities
2018-01-23 07:39:43:062 964 1310 Agent *********
2018-01-23 07:39:43:062 964 1310 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-23 07:39:43:062 964 1310 Agent *************
2018-01-23 07:39:43:062 964 1ba4 AU >>## RESUMED ## AU: Search for updates [CallId = {3F13251E-2E40-48F6-88E9-E8A24C976A50}]
2018-01-23 07:39:43:062 964 1ba4 AU # 1 updates detected
2018-01-23 07:39:43:062 964 1ba4 AU #########
2018-01-23 07:39:43:062 964 1ba4 AU ## END ## AU: Search for updates [CallId = {3F13251E-2E40-48F6-88E9-E8A24C976A50}]
2018-01-23 07:39:43:062 964 1ba4 AU #############
2018-01-23 07:39:43:062 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:39:43:062 964 1ba4 AU Featured notifications is disabled.
2018-01-23 07:39:43:062 964 1ba4 AU AU setting next detection timeout to 2018-01-24 10:56:47
2018-01-23 07:39:43:062 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:39:43:062 964 1ba4 AU Auto-approving update for download, updateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200, ForUx=0, IsOwnerUx=0, Deadline=0, IsMinor=1, UpdateFlags=40
2018-01-23 07:39:43:062 964 1ba4 AU Auto-approved 1 update(s) for download (NOT for Ux)
2018-01-23 07:39:43:062 964 1ba4 AU #############
2018-01-23 07:39:43:062 964 1ba4 AU ## START ## AU: Download updates
2018-01-23 07:39:43:062 964 1ba4 AU #########
2018-01-23 07:39:43:062 964 1ba4 AU # Approved updates = 1
2018-01-23 07:39:43:078 964 1310 DnldMgr *************
2018-01-23 07:39:43:078 964 1310 DnldMgr ** START ** DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
2018-01-23 07:39:43:078 964 1310 DnldMgr *********
2018-01-23 07:39:43:078 964 1310 DnldMgr * Call ID = {86198064-6405-4F26-96ED-358560A880B7}
2018-01-23 07:39:43:078 964 1310 DnldMgr * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
2018-01-23 07:39:43:078 964 1310 DnldMgr * Updates to download = 1
2018-01-23 07:39:43:078 964 1310 Agent * Title = Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
2018-01-23 07:39:43:078 964 1310 Agent * UpdateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200
2018-01-23 07:39:43:078 964 1310 Agent * Bundles 1 updates:
2018-01-23 07:39:43:078 964 1310 Agent * {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200
2018-01-23 07:39:43:078 964 1310 DnldMgr *********** DnldMgr: New download job [UpdateId = {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200] ***********
2018-01-23 07:39:43:187 964 1310 DnldMgr * BITS job initialized, JobId = {B0609CA5-13B4-4348-A35B-38B5089D74D9}
2018-01-23 07:39:43:187 964 1310 DnldMgr * Downloading from http://syscenter1:8530/Content/F6/F8F536223369FE6614594884FB6540BF8BBD5BF6.exe to C:\Windows\SoftwareDistribution\Download\7e3af31a7d6326501c36db29964536f0\f8f536223369fe6614594884fb6540bf8bbd5bf6 (full file).
2018-01-23 07:39:43:202 964 1310 Agent *********
2018-01-23 07:39:43:202 964 1310 Agent ** END ** Agent: Downloading updates [CallerId = AutomaticUpdates]
2018-01-23 07:39:43:202 964 1310 Agent *************
2018-01-23 07:39:43:202 964 1ba4 AU AU initiated download, updateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200, callId = {86198064-6405-4F26-96ED-358560A880B7}
2018-01-23 07:39:43:202 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:39:43:202 964 1ba4 AU AU setting pending client directive to 'Download Progress'
2018-01-23 07:39:43:218 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:39:43:218 964 1ba4 AU # Pending download calls = 1
2018-01-23 07:39:43:218 964 1ba4 AU <<## SUBMITTED ## AU: Download updates
2018-01-23 07:39:43:218 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:39:43:218 964 1310 Report REPORT EVENT: {FD05B01C-308A-4551-9BCA-DC7A56806564} 2018-01-23 07:39:43:062-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 1 updates.
2018-01-23 07:39:43:218 964 1310 Report REPORT EVENT: {684D9AD2-2C35-408F-9673-5D0FCBF727FE} 2018-01-23 07:39:43:062-0600 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
2018-01-23 07:39:43:218 964 1310 Report REPORT EVENT: {7DB9C448-CE39-4811-9401-21353BA33C8C} 2018-01-23 07:39:43:202-0600 1 167 101 {404DE591-2EFA-4AAC-AA83-E128E43F37EC} 200 0 AutomaticUpdates Success Content Download Download started.
2018-01-23 07:39:58:206 964 16b0 AU WARNING: AU found no suitable session to launch client in
2018-01-23 07:40:07:433 964 161c DnldMgr BITS job {B0609CA5-13B4-4348-A35B-38B5089D74D9} completed successfully
2018-01-23 07:40:07:480 964 161c Misc Validating signature for C:\Windows\SoftwareDistribution\Download\7e3af31a7d6326501c36db29964536f0\f8f536223369fe6614594884fb6540bf8bbd5bf6 with dwProvFlags 0x00000080:
2018-01-23 07:40:07:527 964 161c Misc Microsoft signed: Yes
2018-01-23 07:40:07:527 964 161c DnldMgr Download job bytes total = 11954960, bytes transferred = 11954960
2018-01-23 07:40:07:527 964 161c DnldMgr *********** DnldMgr: New download job [UpdateId = {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200] ***********
2018-01-23 07:40:07:573 964 161c DnldMgr * All files for update were already downloaded and are valid.
2018-01-23 07:40:07:589 964 1ba4 AU >>## RESUMED ## AU: Download update [UpdateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}, succeeded]
2018-01-23 07:40:07:589 964 1ba4 AU #########
2018-01-23 07:40:07:589 964 1ba4 AU ## END ## AU: Download updates
2018-01-23 07:40:07:589 964 1ba4 AU #############
2018-01-23 07:40:07:589 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:40:07:589 964 1ba4 AU Auto-approving update for install, updateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200, ForUx=0, IsOwnerUx=0, Deadline=0, IsMinor=1, UpdateFlags=40
2018-01-23 07:40:07:589 964 1ba4 AU Auto-approved 1 update(s) for install (NOT for Ux), installType=2
2018-01-23 07:40:07:589 964 1ba4 AU #############
2018-01-23 07:40:07:589 964 1ba4 AU ## START ## AU: Install updates
2018-01-23 07:40:07:589 964 1ba4 AU #########
2018-01-23 07:40:07:589 964 1ba4 AU # Initiating minor updates install
2018-01-23 07:40:07:589 964 1ba4 AU # Approved updates = 1
2018-01-23 07:40:07:589 964 1ba4 AU <<## SUBMITTED ## AU: Install updates / installing updates [CallId = {41FDA665-715F-46AB-9D56-E3568D350997}]
2018-01-23 07:40:07:589 964 1680 Agent *************
2018-01-23 07:40:07:589 964 1680 Agent ** START ** Agent: Installing updates [CallerId = AutomaticUpdates]
2018-01-23 07:40:07:589 964 1680 Agent *********
2018-01-23 07:40:07:589 964 1680 Agent * Updates to install = 1
2018-01-23 07:40:07:589 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:40:07:589 964 1680 Agent * Title = Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
2018-01-23 07:40:07:589 964 1680 Agent * UpdateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200
2018-01-23 07:40:07:589 964 1680 Agent * Bundles 1 updates:
2018-01-23 07:40:07:589 964 1680 Agent * {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200
2018-01-23 07:40:07:667 964 1680 DnldMgr Preparing update for install, updateId = {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200.
2018-01-23 07:40:07:792 964 1680 DnldMgr ExtractUpdateFiles: 0x00000000
2018-01-23 07:40:07:792 5964 1164 Misc =========== Logging initialized (build: 7.6.7601.23806, tz: -0600) ===========
2018-01-23 07:40:07:792 5964 1164 Misc = Process: C:\Windows\system32\wuauclt.exe
2018-01-23 07:40:07:792 5964 1164 Misc = Module: C:\Windows\system32\wuaueng.dll
2018-01-23 07:40:07:792 5964 1164 Handler :::::::::::::
2018-01-23 07:40:07:792 5964 1164 Handler :: START :: Handler: Command Line Install
2018-01-23 07:40:07:792 5964 1164 Handler :::::::::
2018-01-23 07:40:07:792 5964 1164 Handler : Updates to install = 1
2018-01-23 07:40:12:601 964 1310 Report REPORT EVENT: {DBAA63BA-87D6-4822-8BA5-577724A651F7} 2018-01-23 07:40:07:589-0600 1 162 101 {404DE591-2EFA-4AAC-AA83-E128E43F37EC} 200 0 AutomaticUpdates Success Content Download Download succeeded.
2018-01-23 07:40:12:601 964 1310 Report REPORT EVENT: {AD805D56-B951-4A8F-9548-ADBCE1D768A8} 2018-01-23 07:40:07:589-0600 1 189 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Content Install Installation Ready: The following updates are downloaded and ready for installation. To install the updates, an administrator should log on to this computer and Windows will prompt with further instructions: - Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
2018-01-23 07:40:12:601 964 1310 Report REPORT EVENT: {0E52315A-10EF-4F3B-9275-5FAC43751DC3} 2018-01-23 07:40:07:589-0600 1 181 101 {404DE591-2EFA-4AAC-AA83-E128E43F37EC} 200 0 AutomaticUpdates Success Content Install Installation Started: Windows successfully started the following update: Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
2018-01-23 07:40:33:501 5964 1164 Handler : Command line install completed. Return code = 0x00000000, Result = Succeeded, Reboot required = false
2018-01-23 07:40:33:501 5964 1164 Handler :::::::::
2018-01-23 07:40:33:501 5964 1164 Handler :: END :: Handler: Command Line Install
2018-01-23 07:40:33:501 5964 1164 Handler :::::::::::::
2018-01-23 07:40:33:517 964 1680 Agent LogHistory called. idUpdate={404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200, resultMapped=0, resultUnMapped=0
2018-01-23 07:40:33:517 964 1ba4 AU >>## RESUMED ## AU: Installing update [UpdateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}, succeeded]
2018-01-23 07:40:33:517 964 1680 Agent *********
2018-01-23 07:40:33:517 964 1680 Agent ** END ** Agent: Installing updates [CallerId = AutomaticUpdates]
2018-01-23 07:40:33:517 964 1680 Agent *************
2018-01-23 07:40:33:517 964 1ba4 AU Install call completed.
2018-01-23 07:40:33:517 964 1ba4 AU # WARNING: Install call completed, reboot required = No, error = 0x00000000
2018-01-23 07:40:33:517 964 1ba4 AU #########
2018-01-23 07:40:33:517 964 1ba4 AU ## END ## AU: Installing updates [CallId = {41FDA665-715F-46AB-9D56-E3568D350997}]
2018-01-23 07:40:33:517 964 1ba4 AU #############
2018-01-23 07:40:33:517 964 1ba4 AU Install complete for all calls, reboot NOT needed
2018-01-23 07:40:33:517 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:40:33:517 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:40:33:517 964 1ba4 AU Triggering Offline detection (non-interactive)
2018-01-23 07:40:33:517 964 16b0 AU #############
2018-01-23 07:40:33:517 964 16b0 AU ## START ## AU: Search for updates
2018-01-23 07:40:33:517 964 16b0 AU #########
2018-01-23 07:40:33:517 964 16b0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {8582E6E8-C981-4386-9CED-20809EB0B6F2}]
2018-01-23 07:40:33:517 964 1310 Agent *************
2018-01-23 07:40:33:517 964 1310 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-23 07:40:33:517 964 1310 Agent *********
2018-01-23 07:40:33:517 964 1310 Agent * Online = No; Ignore download priority = No
2018-01-23 07:40:33:517 964 1310 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2018-01-23 07:40:33:517 964 1310 Agent * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2018-01-23 07:40:33:517 964 1310 Agent * Search Scope = {Machine}
2018-01-23 07:40:47:890 964 1310 Agent * Found 0 updates and 82 categories in search; evaluated appl. rules of 697 out of 1619 deployed entities
2018-01-23 07:40:47:890 964 1310 Agent *********
2018-01-23 07:40:47:890 964 1310 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates]
2018-01-23 07:40:47:890 964 1310 Agent *************
2018-01-23 07:40:47:890 964 1310 Report REPORT EVENT: {47079DE4-B8D0-4F38-A182-23DD7F9F17AA} 2018-01-23 07:40:33:517-0600 1 183 101 {404DE591-2EFA-4AAC-AA83-E128E43F37EC} 200 0 AutomaticUpdates Success Content Install Installation Successful: Windows successfully installed the following update: Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
2018-01-23 07:40:47:890 964 1ba4 AU >>## RESUMED ## AU: Search for updates [CallId = {8582E6E8-C981-4386-9CED-20809EB0B6F2}]
2018-01-23 07:40:47:890 964 1ba4 AU # 0 updates detected
2018-01-23 07:40:47:890 964 1ba4 AU #########
2018-01-23 07:40:47:890 964 1ba4 AU ## END ## AU: Search for updates [CallId = {8582E6E8-C981-4386-9CED-20809EB0B6F2}]
2018-01-23 07:40:47:890 964 1ba4 AU #############
2018-01-23 07:40:47:890 964 1ba4 AU Featured notifications is disabled.
2018-01-23 07:40:47:890 964 1ba4 AU Successfully wrote event for AU health state:0
2018-01-23 07:40:47:890 964 1ba4 AU Successfully wrote event for AU health state:0Tuesday, January 23, 2018 2:28 PM -
Windows 10 WindowsUpdate log file from workstation that continues to receive Windows Updates and updates 'Last Contact' column but does not update the 'Last Status Report' column (making WSUS reporting invalid):
2018/01/23 02:43:06.5955044 3560 5088 Misc Infrastructure signed: Yes
2018/01/23 02:43:06.6001992 3560 5088 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\SLS\7971F918-A847-4430-9279-4A52D1EFE18D\TMP3E3F.tmp with dwProvFlags 0x00000080:
2018/01/23 02:43:06.6067834 3560 5088 Misc Infrastructure signed: Yes
2018/01/23 02:43:06.6704419 3560 5088 DataStore Service 7971F918-A847-4430-9279-4A52D1EFE18D added
2018/01/23 02:43:06.6707948 3560 5088 Agent Caller Service Recovery successfully opted in to service 7971f918-a847-4430-9279-4a52d1efe18d
2018/01/23 02:43:06.6909168 3560 5088 Misc Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: 855e8a7c-ecb4-4ca3-b045-1dfa50104289""
2018/01/23 02:43:06.7184432 3560 5088 DataStore Service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 added
2018/01/23 02:43:06.7185703 3560 5088 Agent Caller Service Recovery successfully opted in to service 855e8a7c-ecb4-4ca3-b045-1dfa50104289
2018/01/23 02:43:06.7266689 3560 5088 Misc Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: 8b24b027-1dee-babb-9a95-3517dfb9c552""
2018/01/23 02:43:06.7426817 3560 5088 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/23 02:43:06.7426856 3560 5088 SLS Retrieving SLS response from server...
2018/01/23 02:43:06.7430859 3560 5088 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{8B24B027-1DEE-BABB-9A95-3517DFB9C552}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/23 02:43:07.7805700 3560 5088 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\SLS\8B24B027-1DEE-BABB-9A95-3517DFB9C552\sls.cab with dwProvFlags 0x00000080:
2018/01/23 02:43:07.7876109 3560 5088 Misc Infrastructure signed: Yes
2018/01/23 02:43:07.7922807 3560 5088 Misc Validating signature for C:\WINDOWS\SoftwareDistribution\SLS\8B24B027-1DEE-BABB-9A95-3517DFB9C552\TMP42E3.tmp with dwProvFlags 0x00000080:
2018/01/23 02:43:07.7988966 3560 5088 Misc Infrastructure signed: Yes
2018/01/23 02:43:07.8046316 3560 5088 DataStore Service 8B24B027-1DEE-BABB-9A95-3517DFB9C552 added
2018/01/23 02:43:07.8048894 3560 5088 Agent Caller Service Recovery successfully opted in to service 8b24b027-1dee-babb-9a95-3517dfb9c552
2018/01/23 02:43:07.8442007 3560 5088 IdleTimer WU operation (SR.Update;taskhostw ID 2, operation # 8) stopped; does use network; is not at background priority
2018/01/23 02:43:07.8446602 3120 1256 ComApi Federated Search: Starting search against 1 service(s) (cV = qlgILCDJGkWQjdli.0.3.1.1.0)
2018/01/23 02:43:07.8447426 3120 1256 ComApi * START * Search ClientId = Update;taskhostw, ServiceId = 855E8A7C-ECB4-4CA3-B045-1DFA50104289 (cV = qlgILCDJGkWQjdli.0.3.1.1.0.0)
2018/01/23 02:43:07.8458042 3560 7668 IdleTimer WU operation (CSearchCall::Init ID 3) started; operation # 11; does use network; is at background priority
2018/01/23 02:43:07.8493070 3560 7668 Reporter OS Product Type = 0x00000004
2018/01/23 02:43:07.8618442 3560 7668 Agent * START * Queueing Finding updates [CallerId = Update;taskhostw Id = 3]
2018/01/23 02:43:07.8618511 3560 7668 Agent Service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 is not in sequential scan list
2018/01/23 02:43:07.8620953 3560 496 Agent Service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 is not in sequential scan list
2018/01/23 02:43:07.8640218 3560 5792 Agent * END * Queueing Finding updates [CallerId = Update;taskhostw Id = 3]
2018/01/23 02:43:07.8658496 3560 5792 Agent * START * Finding updates CallerId = Update;taskhostw Id = 3
2018/01/23 02:43:07.8658529 3560 5792 Agent Online = Yes; Interactive = No; AllowCachedResults = No; Ignore download priority = No
2018/01/23 02:43:07.8658647 3560 5792 Agent ServiceID = {855E8A7C-ECB4-4CA3-B045-1DFA50104289} Third party service
2018/01/23 02:43:07.8658689 3560 5792 Agent Search Scope = {Current User}
2018/01/23 02:43:07.8658722 3560 5792 Agent Caller SID for Applicability: S-1-5-21-2590431917-2257978904-1562285527-2135
2018/01/23 02:43:07.9103885 3560 5792 Misc Got 855E8A7C-ECB4-4CA3-B045-1DFA50104289 redir Client/Server URL: https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx""
2018/01/23 02:43:07.9112706 3560 5792 Misc Token Requested with 0 category IDs.
2018/01/23 02:43:07.9876304 3560 5792 Misc GetUserTickets: No user tickets found. Returning WU_E_NO_USERTOKEN.
2018/01/23 02:43:07.9971487 3560 5792 Misc GetAllAccountTickets, hr = 0, ticketCount = 0ll
2018/01/23 02:43:07.9983012 3560 5792 Misc Acquired new token from Server
2018/01/23 02:43:07.9983993 3560 5792 Misc Got service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 plugin Client/Server auth token of type 0x00000001
2018/01/23 02:43:08.0361569 3560 5792 Driver Skipping printer driver 5 due to incomplete info or mismatched environment - HWID[(null)] Provider[Microsoft] MfgName[Microsoft] Name[Remote Desktop Easy Print] pEnvironment[Windows x64] LocalPrintServerEnv[Windows x64]
2018/01/23 02:43:08.0361627 3560 5792 Driver Skipping printer driver 9 due to incomplete info or mismatched environment - HWID[microsoftmicrosoft_musd] Provider[Microsoft] MfgName[Microsoft] Name[Microsoft enhanced Point and Print compatibility driver] pEnvironment[Windows NT x86] LocalPrintServerEnv[Windows x64]
2018/01/23 02:43:08.1034942 3560 5792 ProtocolTalker PT: Calling GetConfig on server
2018/01/23 02:43:08.1035045 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::GetConfig_WithRecovery) started; operation # 12; does use network; is at background priority
2018/01/23 02:43:08.1035295 3560 5792 WebServices Auto proxy settings for this web service call.
2018/01/23 02:43:08.2596162 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::GetConfig_WithRecovery, operation # 12) stopped; does use network; is at background priority
2018/01/23 02:43:08.2607962 3560 5792 ProtocolTalker Skipping StartCategoryScan, no categories require server checks.
2018/01/23 02:43:08.2660003 3560 5792 ProtocolTalker ServiceId = {855E8A7C-ECB4-4CA3-B045-1DFA50104289}, Server URL = https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx
2018/01/23 02:43:08.2666731 3560 5792 ProtocolTalker OK to reuse existing configuration
2018/01/23 02:43:08.2666786 3560 5792 ProtocolTalker Cached cookie has expired or new PID is available
2018/01/23 02:43:08.2667112 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::GetCookie_WithRecovery) started; operation # 13; does use network; is at background priority
2018/01/23 02:43:08.2975737 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::GetCookie_WithRecovery, operation # 13) stopped; does use network; is at background priority
2018/01/23 02:43:08.2985783 3560 5792 ProtocolTalker ProductAttributes: (null) | CallerAttributes: E:Interactive=0&Id=Update%3Btaskhostw& | CurrentVersionOnly: No
2018/01/23 02:43:08.2994328 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 14; does use network; is at background priority
2018/01/23 02:43:08.4091818 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 14) stopped; does use network; is at background priority
2018/01/23 02:43:08.4484186 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:08.4484210 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:08.4484222 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:08.4484708 3560 5792 Metadata *FAILED* [80247168] No timestamp tokens in cache
2018/01/23 02:43:08.4484883 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::GetTimestamps_WithRecovery) started; operation # 15; does use network; is at background priority
2018/01/23 02:43:08.4849238 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::GetTimestamps_WithRecovery, operation # 15) stopped; does use network; is at background priority
2018/01/23 02:43:08.5056009 3560 5792 Metadata Added Signed Timestamp Token - CreateTime[ 2017-10-26T04:53:15Z ]
2018/01/23 02:43:08.5057066 3560 5792 Metadata Added Signed Timestamp Token - CreateTime[ 2017-11-10T04:54:13Z ]
2018/01/23 02:43:08.5057987 3560 5792 Metadata Added Signed Timestamp Token - CreateTime[ 2017-11-25T04:57:29Z ]
2018/01/23 02:43:08.5058971 3560 5792 Metadata Added Signed Timestamp Token - CreateTime[ 2017-12-10T05:15:38Z ]
2018/01/23 02:43:08.5063468 3560 5792 Metadata Added Signed Timestamp Token - CreateTime[ 2017-12-25T05:24:14Z ]
2018/01/23 02:43:08.5064579 3560 5792 Metadata Added Signed Timestamp Token - CreateTime[ 2018-01-09T05:29:53Z ]
2018/01/23 02:43:08.5315794 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 51 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:08.5942891 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:08.5942912 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:08.5942927 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:08.6009572 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 153 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:08.6546199 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 16; does use network; is at background priority
2018/01/23 02:43:08.7037284 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 16) stopped; does use network; is at background priority
2018/01/23 02:43:08.7446474 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:08.7446495 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:08.7446510 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:08.7489468 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 174 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:08.7729665 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:08.7729683 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:08.7729698 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:08.7759126 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 216 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:08.7998227 3560 5792 EEHandler *FAILED* [887A0004] D3D12 CreateDevice failed
2018/01/23 02:43:08.8176874 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 17; does use network; is at background priority
2018/01/23 02:43:08.9128318 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 17) stopped; does use network; is at background priority
2018/01/23 02:43:08.9565161 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:08.9565186 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:08.9565198 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:08.9677369 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 268 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:09.0288426 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:09.0288450 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:09.0288465 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:09.0362339 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 372 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:09.3196137 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 18; does use network; is at background priority
2018/01/23 02:43:09.6251839 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 18) stopped; does use network; is at background priority
2018/01/23 02:43:09.6498707 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:09.6498734 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:09.6498746 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:09.7081277 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 612 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:09.8948031 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:09.8948056 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:09.8948071 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:09.9279571 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 1092 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:10.1166810 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 19; does use network; is at background priority
2018/01/23 02:43:10.3407887 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 19) stopped; does use network; is at background priority
2018/01/23 02:43:10.3678130 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:10.3678151 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:10.3678164 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:10.4213577 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 1313 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:10.5620531 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:10.5620555 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:10.5620567 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:10.5943323 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 1755 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:10.8528258 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 20; does use network; is at background priority
2018/01/23 02:43:11.0907333 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 20) stopped; does use network; is at background priority
2018/01/23 02:43:11.1322500 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:11.1322522 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:11.1322534 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:11.1470817 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 1818 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:11.2122513 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:11.2122540 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:11.2122552 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:11.2221517 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 1944 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:11.3337692 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 21; does use network; is at background priority
2018/01/23 02:43:11.5049196 3560 5792 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 21) stopped; does use network; is at background priority
2018/01/23 02:43:11.5454544 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:11.5454562 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:11.5454577 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:11.5621717 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 2018 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:11.6576445 3560 5792 Metadata Enforcement Mode: Unknown => Audit
2018/01/23 02:43:11.6576469 3560 5792 Metadata TimestampToken Validity: 0 => 90 (days)
2018/01/23 02:43:11.6576481 3560 5792 Metadata Using mode: Audit, validity: 90
2018/01/23 02:43:11.6690123 3560 5792 ProtocolTalker SyncUpdates - 0 bad out of 2166 metadata signatures checked using Audit enforcement mode.
2018/01/23 02:43:11.7242688 3560 5792 ProtocolTalker SyncUpdates round trips: 7
2018/01/23 02:43:14.9370510 3560 5792 Agent Added update B563751F-967A-419E-B203-CB5166CB8E5C.1 to search result
2018/01/23 02:43:14.9370561 3560 5792 Agent Added update 75F3344F-AD04-4D8E-87A9-B8C2F43A068C.1 to search result
2018/01/23 02:43:14.9370609 3560 5792 Agent Added update BFD646AE-875F-46AA-9018-CA4EBB0C652B.1 to search result
2018/01/23 02:43:14.9370654 3560 5792 Agent Added update BD462F2B-85F4-4C61-9A0E-4C36A4A4FE25.1 to search result
2018/01/23 02:43:14.9370697 3560 5792 Agent Added update C1D25A14-D481-47C1-980A-D943D88C73EE.1 to search result
2018/01/23 02:43:14.9370730 3560 5792 Agent Added update FDC30171-7A59-4B64-B2D1-AA7F8A24B7CB.1 to search result
2018/01/23 02:43:14.9370769 3560 5792 Agent Added update A84972A2-D133-4FE8-8E00-38F09CF10FC1.2 to search result
2018/01/23 02:43:14.9370808 3560 5792 Agent Added update F93D55B1-4237-4AC2-8C7F-C97F12DA4A10.2 to search result
2018/01/23 02:43:14.9370878 3560 5792 Agent Added update D61EECC9-4FBA-4A2E-B738-4C34F598D913.2 to search result
2018/01/23 02:43:14.9371162 3560 5792 Agent Removing unreferenced framework update {D61EECC9-4FBA-4A2E-B738-4C34F598D913}.2 from search result.
2018/01/23 02:43:14.9371213 3560 5792 Agent Removing unreferenced framework update {F93D55B1-4237-4AC2-8C7F-C97F12DA4A10}.2 from search result.
2018/01/23 02:43:14.9371252 3560 5792 Agent Removing unreferenced framework update {A84972A2-D133-4FE8-8E00-38F09CF10FC1}.2 from search result.
2018/01/23 02:43:14.9371291 3560 5792 Agent Removing unreferenced framework update {FDC30171-7A59-4B64-B2D1-AA7F8A24B7CB}.1 from search result.
2018/01/23 02:43:14.9371328 3560 5792 Agent Removing unreferenced framework update {C1D25A14-D481-47C1-980A-D943D88C73EE}.1 from search result.
2018/01/23 02:43:14.9371364 3560 5792 Agent Removing unreferenced framework update {BD462F2B-85F4-4C61-9A0E-4C36A4A4FE25}.1 from search result.
2018/01/23 02:43:14.9371409 3560 5792 Agent Removing unreferenced framework update {BFD646AE-875F-46AA-9018-CA4EBB0C652B}.1 from search result.
2018/01/23 02:43:14.9371445 3560 5792 Agent Removing unreferenced framework update {75F3344F-AD04-4D8E-87A9-B8C2F43A068C}.1 from search result.
2018/01/23 02:43:14.9371485 3560 5792 Agent Removing unreferenced framework update {B563751F-967A-419E-B203-CB5166CB8E5C}.1 from search result.
2018/01/23 02:43:14.9372007 3560 5792 Agent Found 0 updates and 47 categories in search; evaluated appl. rules of 564 out of 722 deployed entities
2018/01/23 02:43:14.9466073 3560 5792 Agent * END * Finding updates CallerId = Update;taskhostw Id = 3
2018/01/23 02:43:14.9506021 3560 5792 IdleTimer WU operation (CSearchCall::Init ID 3, operation # 11) stopped; does use network; is at background priority
2018/01/23 02:43:14.9545728 3120 5180 ComApi *RESUMED* Search ClientId = Update;taskhostw, ServiceId = 855E8A7C-ECB4-4CA3-B045-1DFA50104289 (cV = qlgILCDJGkWQjdli.0.3.1.1.0.0)
2018/01/23 02:43:14.9553138 3120 5180 ComApi * END * Search ClientId = Update;taskhostw, Updates found = 0, ServiceId = 855E8A7C-ECB4-4CA3-B045-1DFA50104289 (cV = qlgILCDJGkWQjdli.0.3.1.1.0.0)
2018/01/23 02:43:14.9554959 3120 1256 ComApi * END * All federated searches have completed. Jobs = 1, Succeeded = 1, ClientId = Update;taskhostw (cV = qlgILCDJGkWQjdli.0.3.1.1.0)
2018/01/23 02:43:14.9608337 7476 548 AppAU * END * Finding app updates, exit code = 0x00000000
2018/01/23 02:43:14.9613930 7476 548 AppAU * END *, exit code = 0x00000000
2018/01/23 02:53:14.9560371 3560 5032 Agent Earliest future timer found:
2018/01/23 02:53:14.9560640 3560 5032 Agent Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
2018/01/23 02:53:15.9569723 3560 3020 Misc CSusClientGlobal::DoServicePreShutdown
2018/01/23 02:53:15.9570767 3560 3020 IdleTimer Idle timer disabled in preparation for service shutdown
2018/01/23 02:53:15.9570894 3560 3020 Misc WUTaskManager uninit
2018/01/23 02:53:15.9571054 3560 3020 Agent Earliest future timer found:
2018/01/23 02:53:15.9571193 3560 3020 Agent Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
2018/01/23 02:53:15.9601717 3560 3020 Misc CreateSessionStateChangeTrigger, TYPE:2, Enable:No
2018/01/23 02:53:15.9601819 3560 3020 Misc CreateSessionStateChangeTrigger, TYPE:4, Enable:No
2018/01/23 02:53:15.9652490 3560 3020 Misc Agent uninit
2018/01/23 02:53:15.9668863 3560 3020 Agent Sending shutdown notification to client
2018/01/23 02:53:15.9688324 3560 3020 Misc Reporter uninit
2018/01/23 02:53:15.9696703 3560 3020 Misc network cost manager uninit
2018/01/23 02:53:15.9696990 3560 3020 Misc Eventer uninit
2018/01/23 02:53:16.9813107 3560 3020 Misc ServiceManager uninit
2018/01/23 02:53:16.9814009 3560 3020 Misc PersistentTimeoutScheduler uninit
2018/01/23 02:53:16.9814039 3560 3020 Misc datastore uninit
2018/01/23 02:53:17.0931437 3560 3020 Misc setting cache uninit
2018/01/23 02:53:17.0931485 3560 3020 Misc security checker uninit
2018/01/23 02:53:17.0931564 3560 3020 Misc Test Hook uninit
2018/01/23 02:53:17.0931582 3560 3020 Misc IdleTimer uninit
2018/01/23 02:53:17.0939310 3560 3020 Shared * END * Service exit Exit code = 0x240001
2018/01/23 03:48:15.3936505 3560 3868 IdleTimer Non-AoAc machine. Aoac operations will be ignored.
2018/01/23 03:48:15.3937791 3560 3868 Agent WU client version 10.0.16299.98
2018/01/23 03:48:15.3941416 3560 3868 Agent SleepStudyTracker: Machine is non-AOAC. Sleep study tracker disabled.
2018/01/23 03:48:15.3942512 3560 3868 Agent Base directory: C:\WINDOWS\SoftwareDistribution
2018/01/23 03:48:15.3947656 3560 3868 Agent Datastore directory: C:\WINDOWS\SoftwareDistribution\DataStore\DataStore.edb
2018/01/23 03:48:15.3961517 3560 3868 DataStore JetEnableMultiInstance succeeded - applicable param count: 5, applied param count: 5
2018/01/23 03:48:15.4242900 3560 3868 Shared UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
2018/01/23 03:48:15.4244330 3560 3868 Shared UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2018/01/23 03:48:15.4247548 3560 3868 Shared Network state: Connected
2018/01/23 03:48:15.4870791 3560 3868 Misc *FAILED* [8024000C] LoadHistoryEventFromRegistry completed
2018/01/23 03:48:15.4871844 3560 3868 Shared UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
2018/01/23 03:48:15.4871917 3560 3868 Shared UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
2018/01/23 03:48:15.4871980 3560 3868 Shared Power status changed
2018/01/23 03:48:15.4881093 3560 3868 Agent Initializing global settings cache
2018/01/23 03:48:15.4881108 3560 3868 Agent WSUS server: http://syscenter1:8530
2018/01/23 03:48:15.4881117 3560 3868 Agent WSUS status server: http://syscenter1:8530
2018/01/23 03:48:15.4881126 3560 3868 Agent Alternate Download Server: (null)
2018/01/23 03:48:15.4881148 3560 3868 Agent Fill Empty Content Urls: No
2018/01/23 03:48:15.4881157 3560 3868 Agent Target group: City
2018/01/23 03:48:15.4881166 3560 3868 Agent Windows Update access disabled: No
2018/01/23 03:48:15.4881175 3560 3868 Agent Do not connect to Windows Update Internet locations: No
2018/01/23 03:48:15.4887019 3560 3868 Agent Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
2018/01/23 03:48:15.4915572 3560 3868 Agent Initializing Windows Update Agent
2018/01/23 03:48:15.4916465 3560 3868 Agent CPersistentTimeoutScheduler | GetTimer, returned hr = 0x00000000
2018/01/23 03:48:15.4979065 3560 1532 DownloadManager PurgeExpiredFiles::Found 0 expired files to delete.
2018/01/23 03:48:15.5482309 3560 7440 DataStore Service E48FA42F-4E1C-4F60-8017-3C05862D75BA added
2018/01/23 03:48:15.5483387 3560 7440 Agent AddTargetedServiceMapping: E48FA42F-4E1C-4F60-8017-3C05862D75BA -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
2018/01/23 03:48:15.5484778 3560 1532 DownloadManager PurgeExpiredUpdates::Found 0 non expired updates.
2018/01/23 03:48:15.5484923 3560 1532 DownloadManager PurgeExpiredUpdates::Found 0 expired updates.
2018/01/23 03:48:15.5496439 1940 4152 ComApi * START * SLS Discovery
2018/01/23 03:48:15.5509809 3560 7440 IdleTimer WU operation (CDiscoveryCall::Init ID 1) started; operation # 7; does use network; is not at background priority
2018/01/23 03:48:15.5511070 1940 4152 ComApi *QUEUED* SLS Discovery
2018/01/23 03:48:15.5522131 3560 1532 DownloadManager Received power state change notification: Old: <unknown>; New: AC.
2018/01/23 03:48:15.5522170 3560 1532 DownloadManager Power state changed from <unknown> to AC.
2018/01/23 03:48:15.5707871 3560 7544 IdleTimer WU operation (CDiscoveryCall::Init ID 1, operation # 7) stopped; does use network; is not at background priority
2018/01/23 03:48:15.5718977 1940 6768 ComApi *RESUMED* Discovery
2018/01/23 03:48:15.5719424 1940 6768 Api * END * Discovery ClientId
2018/01/23 03:48:15.5756118 1940 4152 ComApi * START * SLS Discovery
2018/01/23 03:48:15.5767486 3560 7440 IdleTimer WU operation (CDiscoveryCall::Init ID 2) started; operation # 12; does use network; is not at background priority
2018/01/23 03:48:15.5768844 1940 4152 ComApi *QUEUED* SLS Discovery
2018/01/23 03:48:15.6000236 3560 7544 IdleTimer WU operation (CDiscoveryCall::Init ID 2, operation # 12) stopped; does use network; is not at background priority
2018/01/23 03:48:15.6002059 1940 2740 ComApi *RESUMED* Discovery
2018/01/23 03:48:15.6002249 1940 2740 Api * END * Discovery ClientId
2018/01/23 03:48:15.6032181 1940 4152 ComApi * START * Federated Search ClientId = <<PROCESS>>: CompatTelRunner.exe (cV: i4SkNcNHfkCprr+m.1.0)
2018/01/23 03:48:15.6037675 3560 7440 IdleTimer WU operation (SR.<<PROCESS>>: CompatTelRunner.exe ID 3) started; operation # 17; does use network; is not at background priority
2018/01/23 03:48:15.6039459 3560 2624 Agent GetTargetedServiceMapping: E48FA42F-4E1C-4F60-8017-3C05862D75BA -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
2018/01/23 03:48:15.6039565 3560 2624 IdleTimer WU operation (SR.<<PROCESS>>: CompatTelRunner.exe ID 3, operation # 17) stopped; does use network; is not at background priority
2018/01/23 03:48:15.6193997 1940 5100 ComApi Federated Search: Starting search against 1 service(s) (cV = i4SkNcNHfkCprr+m.1.0)
2018/01/23 03:48:15.6194733 1940 5100 ComApi * START * Search ClientId = <<PROCESS>>: CompatTelRunner.exe, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = i4SkNcNHfkCprr+m.1.0.0)
2018/01/23 03:48:15.6201516 3560 7440 IdleTimer WU operation (CSearchCall::Init ID 4) started; operation # 20; does use network; is at background priority
2018/01/23 03:48:15.6235687 3560 7440 Reporter OS Product Type = 0x00000004
2018/01/23 03:48:15.6371391 3560 7440 Agent * START * Queueing Finding updates [CallerId = <<PROCESS>>: CompatTelRunner.exe Id = 4]
2018/01/23 03:48:15.6371467 3560 7440 Agent Service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 is not in sequential scan list
2018/01/23 03:48:15.6371506 3560 7440 Agent Added service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 to sequential scan list
2018/01/23 03:48:15.6373776 3560 6488 Agent Service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 is in sequential scan list
2018/01/23 03:48:15.6394260 3560 200 Agent * END * Queueing Finding updates [CallerId = <<PROCESS>>: CompatTelRunner.exe Id = 4]
2018/01/23 03:48:15.6413030 3560 200 Agent * START * Finding updates CallerId = <<PROCESS>>: CompatTelRunner.exe Id = 4
2018/01/23 03:48:15.6413051 3560 200 Agent Online = Yes; Interactive = No; AllowCachedResults = No; Ignore download priority = No
2018/01/23 03:48:15.6413087 3560 200 Agent Criteria = (CategoryIDs contains 'EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0' AND Type='Driver' AND VersionOverride='10.0.17031.2.0.0.256.1')""
2018/01/23 03:48:15.6413115 3560 200 Agent ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2018/01/23 03:48:15.6413124 3560 200 Agent Search Scope = {Machine}
2018/01/23 03:48:15.6413148 3560 200 Agent Caller SID for Applicability: S-1-5-18
2018/01/23 03:48:15.6628142 3560 200 Misc Got WSUS Client/Server URL: http://syscenter1:8530/ClientWebService/client.asmx""
2018/01/23 03:48:15.6815006 3560 200 Driver Skipping printer driver 5 due to incomplete info or mismatched environment - HWID[(null)] Provider[Microsoft] MfgName[Microsoft] Name[Remote Desktop Easy Print] pEnvironment[Windows x64] LocalPrintServerEnv[Windows x64]
2018/01/23 03:48:15.6815057 3560 200 Driver Skipping printer driver 9 due to incomplete info or mismatched environment - HWID[microsoftmicrosoft_musd] Provider[Microsoft] MfgName[Microsoft] Name[Microsoft enhanced Point and Print compatibility driver] pEnvironment[Windows NT x86] LocalPrintServerEnv[Windows x64]
2018/01/23 03:48:15.7501561 3560 200 ProtocolTalker ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018/01/23 03:48:15.7501579 3560 200 ProtocolTalker OK to reuse existing configuration
2018/01/23 03:48:15.7501663 3560 200 ProtocolTalker Cached cookie has expired or new PID is available
2018/01/23 03:48:15.7501799 3560 200 Misc Got WSUS SimpleTargeting URL: http://syscenter1:8530""
2018/01/23 03:48:15.7502466 3560 200 IdleTimer WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie) started; operation # 21; does use network; is at background priority
2018/01/23 03:48:15.7502511 3560 200 ProtocolTalker Initializing simple targeting cookie, clientId = 4996b16c-e6f2-4d38-80af-aafe92ff9ee3, target group = City, DNS name = 2ua24416lw.ad.champaignil.gov
2018/01/23 03:48:15.7502524 3560 200 ProtocolTalker Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
2018/01/23 03:48:15.7502593 3560 200 WebServices Auto proxy settings for this web service call.
2018/01/23 03:48:15.7634856 3560 200 IdleTimer WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie, operation # 21) stopped; does use network; is at background priority
2018/01/23 03:48:15.7636719 3560 200 IdleTimer WU operation (CAgentProtocolTalker::GetCookie_WithRecovery) started; operation # 22; does use network; is at background priority
2018/01/23 03:48:15.7637069 3560 200 WebServices Auto proxy settings for this web service call.
2018/01/23 03:48:15.7711523 3560 200 IdleTimer WU operation (CAgentProtocolTalker::GetCookie_WithRecovery, operation # 22) stopped; does use network; is at background priority
2018/01/23 03:48:15.7711686 3560 200 ProtocolTalker PTInfo: Server requested registration
2018/01/23 03:48:15.7866809 3560 200 IdleTimer WU operation (CAgentProtocolTalker::StartCategoryScan_WithRecovery) started; operation # 23; does use network; is at background priority
2018/01/23 03:48:15.7888259 3560 200 IdleTimer WU operation (CAgentProtocolTalker::StartCategoryScan_WithRecovery, operation # 23) stopped; does use network; is at background priority
2018/01/23 03:48:15.9558644 3560 200 ProtocolTalker ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018/01/23 03:48:15.9558723 3560 200 ProtocolTalker OK to reuse existing configuration
2018/01/23 03:48:15.9558756 3560 200 ProtocolTalker Existing cookie is valid, just use it
2018/01/23 03:48:15.9558771 3560 200 ProtocolTalker PTInfo: Server requested registration
2018/01/23 03:48:19.7884899 3560 200 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 24; does use network; is at background priority
2018/01/23 03:48:19.7984184 3560 200 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 24) stopped; does use network; is at background priority
2018/01/23 03:48:19.8160474 3560 200 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/23 03:48:19.8160519 3560 200 SLS Retrieving SLS response from server...
2018/01/23 03:48:19.8161398 3560 200 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/23 03:48:20.6546854 3560 200 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/23 03:48:20.6551487 3560 200 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/23 03:48:20.6551895 3560 200 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/23 03:48:20.6551979 3560 200 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/23 03:48:20.6552058 3560 200 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/23 03:48:20.6552085 3560 200 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/23 03:48:20.6552251 3560 200 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/23 03:48:20.8063233 3560 200 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 25; does use network; is at background priority
2018/01/23 03:48:20.8140892 3560 200 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 25) stopped; does use network; is at background priority
2018/01/23 03:48:20.8323557 3560 200 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/23 03:48:20.8323603 3560 200 SLS Retrieving SLS response from server...
2018/01/23 03:48:20.8324457 3560 200 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/23 03:48:21.6490605 3560 200 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/23 03:48:21.6496235 3560 200 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/23 03:48:21.6496510 3560 200 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/23 03:48:21.6496570 3560 200 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/23 03:48:21.6496645 3560 200 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/23 03:48:21.6496676 3560 200 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/23 03:48:21.6496820 3560 200 ProtocolTalker SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/23 03:48:21.7091564 3560 200 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 26; does use network; is at background priority
2018/01/23 03:48:21.7158994 3560 200 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 26) stopped; does use network; is at background priority
2018/01/23 03:48:21.7310199 3560 200 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 27; does use network; is at background priority
2018/01/23 03:48:21.7380125 3560 200 IdleTimer WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 27) stopped; does use network; is at background priority
2018/01/23 03:48:21.7380216 3560 200 ProtocolTalker SyncUpdates round trips: 4
2018/01/23 03:48:21.7837544 3560 200 ProtocolTalker ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
2018/01/23 03:48:21.7837577 3560 200 ProtocolTalker OK to reuse existing configuration
2018/01/23 03:48:21.7837607 3560 200 ProtocolTalker Existing cookie is valid, just use it
2018/01/23 03:48:21.7837622 3560 200 ProtocolTalker PTInfo: Server requested registration
2018/01/23 03:48:21.7936149 3560 200 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 28; does use network; is at background priority
2018/01/23 03:48:21.7962432 3560 200 IdleTimer WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 28) stopped; does use network; is at background priority
2018/01/23 03:48:21.8128758 3560 200 SLS *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
2018/01/23 03:48:21.8128800 3560 200 SLS Retrieving SLS response from server...
2018/01/23 03:48:21.8129642 3560 200 SLS Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
2018/01/23 03:48:22.6270905 3560 200 SLS SLS Response is Error response type. Attempting to extract the HRESULT in the payload...
2018/01/23 03:48:22.6275647 3560 200 SLS Succeeded in extracting the HRESULT from the payload => 0x80240042
2018/01/23 03:48:22.6275907 3560 200 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
2018/01/23 03:48:22.6275967 3560 200 Metadata *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
2018/01/23 03:48:22.6276064 3560 200 Metadata *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
2018/01/23 03:48:22.6276094 3560 200 Metadata Policy-driven service enabled. Using Ignore Policy.
2018/01/23 03:48:22.6276314 3560 200 ProtocolTalker SyncExtendedUpdateInfo - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
2018/01/23 03:48:22.6909657 3560 200 DownloadManager Download Manager got out of scope notification for the service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7.
2018/01/23 03:48:22.6934527 3560 200 Agent Found 0 updates and 1 categories in search; evaluated appl. rules of 598 out of 973 deployed entities
2018/01/23 03:48:22.7030272 3560 200 Agent * END * Finding updates CallerId = <<PROCESS>>: CompatTelRunner.exe Id = 4
2018/01/23 03:48:22.7052238 3560 200 IdleTimer WU operation (CSearchCall::Init ID 4, operation # 20) stopped; does use network; is at background priority
2018/01/23 03:48:22.7121868 1940 1460 ComApi *RESUMED* Search ClientId = <<PROCESS>>: CompatTelRunner.exe, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = i4SkNcNHfkCprr+m.1.0.0)
2018/01/23 03:48:22.7131353 1940 1460 ComApi * END * Search ClientId = <<PROCESS>>: CompatTelRunner.exe, Updates found = 0, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = i4SkNcNHfkCprr+m.1.0.0)
2018/01/23 03:48:22.7133417 1940 5100 ComApi * END * All federated searches have completed. Jobs = 1, Succeeded = 1, ClientId = <<PROCESS>>: CompatTelRunner.exe (cV = i4SkNcNHfkCprr+m.1.0)
2018/01/23 03:48:22.7189105 3560 7440 DataStore Service E48FA42F-4E1C-4F60-8017-3C05862D75BA removed
2018/01/23 03:48:22.7189301 3560 7440 Agent RemoveTargetedServiceMapping: E48FA42F-4E1C-4F60-8017-3C05862D75BA -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
2018/01/23 03:58:22.7180293 3560 880 Agent Earliest future timer found:
2018/01/23 03:58:22.7180517 3560 880 Agent Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
2018/01/23 03:58:23.7189911 3560 3868 Misc CSusClientGlobal::DoServicePreShutdown
2018/01/23 03:58:23.7190988 3560 3868 IdleTimer Idle timer disabled in preparation for service shutdown
2018/01/23 03:58:23.7191112 3560 3868 Misc WUTaskManager uninit
2018/01/23 03:58:23.7191263 3560 3868 Agent Earliest future timer found:
2018/01/23 03:58:23.7191402 3560 3868 Agent Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
2018/01/23 03:58:23.7221072 3560 3868 Misc CreateSessionStateChangeTrigger, TYPE:2, Enable:No
2018/01/23 03:58:23.7221171 3560 3868 Misc CreateSessionStateChangeTrigger, TYPE:4, Enable:No
2018/01/23 03:58:23.7269789 3560 3868 Misc Agent uninit
2018/01/23 03:58:23.7295344 3560 3868 Misc Reporter uninit
2018/01/23 03:58:23.7304132 3560 3868 Misc network cost manager uninit
2018/01/23 03:58:23.7304412 3560 3868 Misc Eventer uninit
2018/01/23 03:58:24.7347397 3560 3868 Misc ServiceManager uninit
2018/01/23 03:58:24.7348212 3560 3868 Misc PersistentTimeoutScheduler uninit
2018/01/23 03:58:24.7348255 3560 3868 Misc datastore uninit
2018/01/23 03:58:24.8137309 3560 3868 Misc setting cache uninit
2018/01/23 03:58:24.8137367 3560 3868 Misc security checker uninit
2018/01/23 03:58:24.8137433 3560 3868 Misc Test Hook uninit
2018/01/23 03:58:24.8137445 3560 3868 Misc IdleTimer uninit
2018/01/23 03:58:24.8146779 3560 3868 Shared * END * Service exit Exit code = 0x240001Tuesday, January 23, 2018 2:36 PM -
Thank you, Adam. The two PCs (one Windows 7 and one Windows 10) have been deleted from the WSUS console and the script has been re-run on both. I will post the results soon.
Thank you,
Brian
Tuesday, January 23, 2018 2:53 PM -
Adam,
Again, the two PCs (one Windows 7 and one Windows 10) have been deleted from the WSUS console and the script has been re-run on both. Five hours later I note the deleted PCs are now back in the WSUS console with a recent 'Last Contact' update and NO 'Last Status Report' update.
Might I need to focus more on the WSUS server health? - 3 workstations out of the total 381 populate the 'Last Status Report' column, meanwhile ALL 381 populate the 'Last Contact' and seem to be receiving Windows Updates normally. Thank you for any suggestions you may have.
Brian
Tuesday, January 23, 2018 7:32 PM -
Review the firstrun log for any errors. Perhaps rerun -FirstRun and check for errors.
Adam Marshall, MCSE: Security
http://www.adamj.org
Microsoft MVP - Windows and Devices for ITTuesday, January 23, 2018 7:39 PM -
Hi Elton,
The suggestion of "enabling group policy "Do not connect to any Windows Update Internet locations" for that win10 computer then check updates again" has been implemented this morning, followed by 'gpupdate /force' for policy application. Windows Updates seem to still be performing normally, however, one half day later, still no 'Last Status Report' column population ('Last Contact' is current).
Thank you for any suggestions you may have. I will be ready to implement.
Brian
Tuesday, January 23, 2018 7:41 PM -
Hi Adam,
I reran the -FirstRun and note the following 3 error areas and surrounding context.
Delete records from tbPreComputedLocalizedProperty: 0
Msg 547, Level 16, State 1, Server SQL3, Line 77
The DELETE statement conflicted with the REFERENCE constraint "FK_DriverFeatureScore_Driver". The conflict occurred in database "SUSDB", table "dbo.tbDriverFeatureScore".
The statement has been terminated.
Delete records from tbDriver: 0
Delete records from tbFlattenedRevisionInCategory: 0
Delete records from tbRevisionInCategory: 0
Delete records from tbMoreInfoURLForRevision: 0
Msg 547, Level 16, State 1, Server SQL3, Line 93
The DELETE statement conflicted with the REFERENCE constraint "FK__tbDriver__Revisi__3429BB53". The conflict occurred in database "SUSDB", table "dbo.tbDriver", column 'RevisionID'.
The statement has been terminated.
Delete records from tbRevision: 0
Delete records from tbUpdateSummaryForAllComputers: 0
This is the last query and this is really what we came here for.
Msg 547, Level 16, State 1, Server SQL3, Line 103
The DELETE statement conflicted with the REFERENCE constraint "PK_constraint_for_table_tbRevision". The conflict occurred in database "SUSDB", table "dbo.tbRevision", column 'LocalUpdateID'.
The statement has been terminated.
Delete records from tbUpdate: 0
Remove WSUS Drivers Stream Duration: 00:00:00:08----------------------------------------
Are the above errors significant?
Here is the full log: https://goo.gl/2aafm2
Thank you for your insight.
Brian
Tuesday, January 23, 2018 7:56 PM -
Contact me through my website for support for the script. Those are significant issues and need to be resolved. Reference this post when you contact me.
Adam Marshall, MCSE: Security
http://www.adamj.org
Microsoft MVP - Windows and Devices for IT- Marked as answer by BrianPerkinson Friday, February 2, 2018 8:03 PM
Tuesday, January 23, 2018 8:18 PM -
Thank you, Adam, for your comments. Will do.
Brian
Tuesday, January 23, 2018 8:20 PM -
Hi Elton,
I note the following settings in use in Group Policy pointing to our WSUS server:
-Set the intranet update service for detecting updates: http://SysCenter1:8530
-Set the intranet statistics server: http://SysCenter1:8530I also note that when I attempt access to http://SysCenter1:8530 thru a browser, I receive '403 - Forbidden: Access is denied' message. Is this normal? Could this be part of the reason for lack of clients reporting back to WSUS, although the 'Last Contact' column is current and Windows Updates seem to be occurring normally ('Last Status Report' is NOT updated)?
Thank you for your consideration,
Brian
Thursday, January 25, 2018 5:52 PM -
All,
The WSUS client-server communication issue was not resolved. Thanks to Adam Marshall and Elton for their troubleshooting efforts. Adam spent tireless time narrowing down the issues on the server and IIS. After provisioning a 2nd WSUS server, normal client-server communication was observed. Client migration to the new WSUS server is nearly complete.
Brian
- Marked as answer by BrianPerkinson Thursday, February 1, 2018 8:29 PM
Thursday, February 1, 2018 8:27 PM