locked
Clients connected to WSUS but not reporting since December RRS feed

  • Question

  • The WSUS console (on Update Services 10.0.14393.2007 on Windows Server 2016) reports 371 PCs have not reported since December (Windows 7 and 10 PCs: 9 last reported 12/11-12/19, 350 last reported 12/6-12/8, some older). 7 PCs began to report again between 1/11-1/18. Returning WSUS to standalone status (instead of downstream from SCCM) may be the cause of the configuration change. All PCs appear to be contacting the WSUS server and receiving updates (as noted in the 'Last Contact' column). I would like to troubleshoot/correct the reporting on these PCs. I have compared the WindowsUpdate.log files. Can you assist? I have posted a partial WindowsUpdate.log file from a Windows 7 PC that has not reported back to WSUS since 12/19 below. Thank you for your help!

    2018-01-18 07:59:36:286 332 5e0 Misc ===========  Logging initialized (build: 7.6.7601.23806, tz: -0600)  ===========
    2018-01-18 07:59:36:363 332 5e0 Misc   = Process: C:\Windows\system32\svchost.exe
    2018-01-18 07:59:36:425 332 5e0 Misc   = Module: c:\windows\system32\wuaueng.dll
    2018-01-18 07:59:36:286 332 5e0 Service *************
    2018-01-18 07:59:36:425 332 5e0 Service ** START **  Service: Service startup
    2018-01-18 07:59:36:425 332 5e0 Service *********
    2018-01-18 07:59:36:625 332 5e0 Agent   * WU client version 7.6.7601.23806
    2018-01-18 07:59:36:811 332 5e0 Agent   * Base directory: C:\Windows\SoftwareDistribution
    2018-01-18 07:59:36:827 332 5e0 Agent   * Access type: No proxy
    2018-01-18 07:59:36:827 332 5e0 Agent   * Network state: Connected
    2018-01-18 08:00:13:079 332 e1c Report CWERReporter::Init succeeded
    2018-01-18 08:00:13:079 332 e1c Agent ***********  Agent: Initializing Windows Update Agent  ***********
    2018-01-18 08:00:13:080 332 e1c Agent   * Prerequisite roots succeeded.
    2018-01-18 08:00:13:080 332 e1c Agent ***********  Agent: Initializing global settings cache  ***********
    2018-01-18 08:00:13:080 332 e1c Agent   * WSUS server: http://syscenter1:8530
    2018-01-18 08:00:13:080 332 e1c Agent   * WSUS status server: http://syscenter1:8530
    2018-01-18 08:00:13:080 332 e1c Agent   * Target group: City
    2018-01-18 08:00:13:080 332 e1c Agent   * Windows Update access disabled: No
    2018-01-18 08:00:13:102 332 e1c Agent   * Found 1 persisted download calls to restore
    2018-01-18 08:00:13:145 332 e1c DnldMgr Download manager restoring 1 downloads
    2018-01-18 08:00:14:279 332 e1c Agent   * Successfully loaded 1 persisted download calls.
    2018-01-18 08:00:19:883 332 5e0 Report ***********  Report: Initializing static reporting data  ***********
    2018-01-18 08:00:19:883 332 5e0 Report   * OS Version = 6.1.7601.1.0.65792
    2018-01-18 08:00:19:883 332 5e0 Report   * OS Product Type = 0x00000030
    2018-01-18 08:00:19:891 332 5e0 Report   * Computer Brand = Hewlett-Packard
    2018-01-18 08:00:19:891 332 5e0 Report   * Computer Model = HP Pro3500 Series
    2018-01-18 08:00:19:894 332 5e0 Report   * Bios Revision = 8.14
    2018-01-18 08:00:19:894 332 5e0 Report   * Bios Name = BIOS Date: 01/23/13 09:08:24 Ver: 04.06.05
    2018-01-18 08:00:19:894 332 5e0 Report   * Bios Release Date = 2013-01-23T00:00:00
    2018-01-18 08:00:19:894 332 5e0 Report   * Locale ID = 1033
    2018-01-18 08:00:20:527 332 1978 DnldMgr ***********  DnldMgr: Regulation Refresh [Svc: {7971F918-A847-4430-9279-4A52D1EFE18D}]  ***********
    2018-01-18 08:00:20:527 332 1978 DnldMgr Contacting regulation server for 2 updates.
    2018-01-18 08:00:20:823 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
    2018-01-18 08:00:20:970 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:20:971 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
    2018-01-18 08:00:20:978 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:21:048 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\TMPF8BF.tmp with dwProvFlags 0x00000080:
    2018-01-18 08:00:21:216 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:21:241 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
    2018-01-18 08:00:21:245 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:21:246 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\wuredir.cab with dwProvFlags 0x00000080:
    2018-01-18 08:00:21:250 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:21:253 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\TMPF98B.tmp with dwProvFlags 0x00000080:
    2018-01-18 08:00:21:258 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:21:258 332 1978 DnldMgr Regulation server path: https://fe2.update.microsoft.com/v6/UpdateRegulationService/UpdateRegulation.asmx.
    2018-01-18 08:00:21:632 332 1978 DnldMgr   Per-Update: 6bad3967-faba-449d-9161-ad014e2effec at rate 0
    2018-01-18 08:00:21:632 332 1978 DnldMgr   Per-Update: 4b5f44a0-1613-45a2-87c9-31b2fc45b1d7 at rate 0
    2018-01-18 08:00:21:632 332 1978 DnldMgr   * Regulation call complete. 0x00000000
    2018-01-18 08:00:21:632 332 1978 DnldMgr ***********  DnldMgr: New download job [UpdateId = {6BAD3967-FABA-449D-9161-AD014E2EFFEC}.203]  ***********
    2018-01-18 08:00:21:657 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 6BAD3967-FABA-449D-9161-AD014E2EFFEC is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
    2018-01-18 08:00:21:657 332 1978 DnldMgr   * Update is not allowed to download due to regulation.
    2018-01-18 08:00:21:658 332 1978 DnldMgr ***********  DnldMgr: New download job [UpdateId = {4B5F44A0-1613-45A2-87C9-31B2FC45B1D7}.200]  ***********
    2018-01-18 08:00:21:658 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 4B5F44A0-1613-45A2-87C9-31B2FC45B1D7 is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
    2018-01-18 08:00:21:658 332 1978 DnldMgr   * Update is not allowed to download due to regulation.
    2018-01-18 08:00:21:658 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 6BAD3967-FABA-449D-9161-AD014E2EFFEC is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
    2018-01-18 08:00:21:658 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 4B5F44A0-1613-45A2-87C9-31B2FC45B1D7 is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
    2018-01-18 08:00:57:878 332 5e0 AU ###########  AU: Initializing Automatic Updates  ###########
    2018-01-18 08:00:57:898 332 5e0 AU AU setting next detection timeout to 2018-01-18 14:00:57
    2018-01-18 08:00:57:898 332 5e0 AU   # WSUS server: http://syscenter1:8530
    2018-01-18 08:00:57:898 332 5e0 AU   # Detection frequency: 22
    2018-01-18 08:00:57:898 332 5e0 AU   # Target group: City
    2018-01-18 08:00:57:898 332 5e0 AU   # Approval type: Pre-install notify (Policy)
    2018-01-18 08:00:57:898 332 5e0 AU   # Auto-install minor updates: Yes (Policy)
    2018-01-18 08:00:57:898 332 5e0 AU   # Will interact with non-admins (Non-admins are elevated (Policy))
    2018-01-18 08:00:57:971 332 5e0 AU   # Reconnecting download for 1 updates
    2018-01-18 08:00:58:005 332 5e0 AU   # Reconnected 1 pending download calls
    2018-01-18 08:00:58:012 332 5e0 AU Successfully wrote event for AU health state:0
    2018-01-18 08:00:58:012 332 5e0 AU Initializing featured updates
    2018-01-18 08:00:58:012 332 5e0 AU Found 0 cached featured updates
    2018-01-18 08:00:58:012 332 5e0 AU Successfully wrote event for AU health state:0
    2018-01-18 08:00:58:012 332 5e0 AU AU setting pending client directive to 'Download Progress'
    2018-01-18 08:00:58:014 332 5e0 AU Successfully wrote event for AU health state:0
    2018-01-18 08:00:58:014 332 5e0 AU AU finished delayed initialization
    2018-01-18 08:00:58:014 332 5e0 AU #############
    2018-01-18 08:00:58:014 332 5e0 AU ## START ##  AU: Search for updates
    2018-01-18 08:00:58:014 332 5e0 AU #########
    2018-01-18 08:00:58:015 332 1978 DnldMgr ***********  DnldMgr: New download job [UpdateId = {6BAD3967-FABA-449D-9161-AD014E2EFFEC}.203]  ***********
    2018-01-18 08:00:58:015 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 6BAD3967-FABA-449D-9161-AD014E2EFFEC is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
    2018-01-18 08:00:58:015 332 1978 DnldMgr   * Update is not allowed to download due to regulation.
    2018-01-18 08:00:58:015 332 1978 DnldMgr ***********  DnldMgr: New download job [UpdateId = {4B5F44A0-1613-45A2-87C9-31B2FC45B1D7}.200]  ***********
    2018-01-18 08:00:58:015 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 4B5F44A0-1613-45A2-87C9-31B2FC45B1D7 is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
    2018-01-18 08:00:58:015 332 1978 DnldMgr   * Update is not allowed to download due to regulation.
    2018-01-18 08:00:58:015 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 6BAD3967-FABA-449D-9161-AD014E2EFFEC is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
    2018-01-18 08:00:58:015 332 1978 DnldMgr Regulation: {7971F918-A847-4430-9279-4A52D1EFE18D} - Update 4B5F44A0-1613-45A2-87C9-31B2FC45B1D7 is "PerUpdate" regulated and can NOT download. Sequence 7842 vs AcceptRate 0.
    2018-01-18 08:00:58:122 332 5e0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {3F086321-E8C3-4232-B593-863D907857B1}]
    2018-01-18 08:00:58:122 332 1978 Agent *************
    2018-01-18 08:00:58:122 332 1d3c AU AU checked download status and it changed: Downloading is paused
    2018-01-18 08:00:58:122 332 1978 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-18 08:00:58:123 332 1978 Agent *********
    2018-01-18 08:00:58:123 332 1978 Agent   * Online = Yes; Ignore download priority = No
    2018-01-18 08:00:58:123 332 1978 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2018-01-18 08:00:58:123 332 1978 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2018-01-18 08:00:58:123 332 1978 Agent   * Search Scope = {Machine}
    2018-01-18 08:00:58:124 332 1978 Setup Checking for agent SelfUpdate
    2018-01-18 08:00:58:124 332 1978 Setup Client version: Core: 7.6.7601.23806  Aux: 7.6.7601.23806
    2018-01-18 08:00:58:286 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2018-01-18 08:00:58:289 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:58:318 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP8C59.tmp with dwProvFlags 0x00000080:
    2018-01-18 08:00:58:323 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:58:336 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2018-01-18 08:00:58:340 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:58:342 332 1978 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2018-01-18 08:00:58:346 332 1978 Misc Microsoft signed: NA
    2018-01-18 08:00:58:555 332 1978 Setup Determining whether a new setup handler needs to be downloaded
    2018-01-18 08:00:58:555 332 1978 Setup SelfUpdate handler is not found.  It will be downloaded
    2018-01-18 08:00:58:555 332 1978 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-18 08:01:04:271 332 1978 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-18 08:01:04:271 332 1978 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-18 08:01:04:288 332 1978 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-18 08:01:04:288 332 1978 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-18 08:01:04:320 332 1978 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-18 08:01:04:320 332 1978 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2018-01-18 08:01:06:179 332 1978 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2018-01-18 08:01:06:179 332 1978 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-18 08:01:06:210 332 1978 PT WARNING: Cached cookie has expired or new PID is available
    2018-01-18 08:01:06:210 332 1978 PT Initializing simple targeting cookie, clientId = 7cbff95a-4112-47c6-8966-1b21380f4d6b, target group = City, DNS name = mxl3320w4j.ad.champaignil.gov
    2018-01-18 08:01:06:210 332 1978 PT   Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
    2018-01-18 08:01:12:879 332 5e0 AU No pending client directive
    2018-01-18 08:02:33:958 332 1978 PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2018-01-18 08:02:33:958 332 1978 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-18 08:02:34:424 332 1978 Agent   * Added update {38E83D6E-03A3-45CF-8D9D-F7BAC51CE9E2}.203 to search result
    2018-01-18 08:02:34:424 332 1978 Agent   * Found 1 updates and 83 categories in search; evaluated appl. rules of 1771 out of 2678 deployed entities
    2018-01-18 08:02:34:498 332 1978 Agent *********
    2018-01-18 08:02:34:498 332 1978 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-18 08:02:34:498 332 1978 Agent *************
    2018-01-18 08:02:34:501 332 1d3c AU >>##  RESUMED  ## AU: Search for updates [CallId = {3F086321-E8C3-4232-B593-863D907857B1}]
    2018-01-18 08:02:34:501 332 1d3c AU   # 1 updates detected
    2018-01-18 08:02:34:510 332 1d3c AU #########
    2018-01-18 08:02:34:510 332 1d3c AU ##  END  ##  AU: Search for updates [CallId = {3F086321-E8C3-4232-B593-863D907857B1}]
    2018-01-18 08:02:34:510 332 1d3c AU #############
    2018-01-18 08:02:34:510 332 1d3c AU Successfully wrote event for AU health state:0
    2018-01-18 08:02:34:510 332 1d3c AU Featured notifications is disabled.
    2018-01-18 08:02:34:510 332 1d3c AU AU setting next detection timeout to 2018-01-19 09:06:00
    2018-01-18 08:02:34:511 332 1d3c AU Successfully wrote event for AU health state:0
    2018-01-18 08:02:34:513 332 1d3c AU Successfully wrote event for AU health state:0
    2018-01-18 08:02:39:490 332 1978 Report REPORT EVENT: {EF6833FD-C601-4AE2-AACF-282E84E9FA4A} 2018-01-18 08:02:34:472-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 1 updates.
    2018-01-18 08:02:39:490 332 1978 Report REPORT EVENT: {D640701B-7906-47B2-809A-14042C9BCE7D} 2018-01-18 08:02:34:497-0600 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
    2018-01-18 08:03:53:535 332 e1c DtaStor Default service for AU is {7971F918-A847-4430-9279-4A52D1EFE18D}
    2018-01-18 08:03:53:551 332 e1c Agent AddTargetedServiceMapping: 8CC320A5-93A5-4491-8172-F4968DDE39E3 -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
    2018-01-18 08:03:53:753 3236 12f8 Misc ===========  Logging initialized (build: 7.6.7601.23806, tz: -0600)  ===========
    2018-01-18 08:03:53:753 3236 12f8 Misc   = Process: C:\Windows\system32\CompatTelRunner.exe
    2018-01-18 08:03:53:753 3236 12f8 Misc   = Module: C:\Windows\system32\wuapi.dll
    2018-01-18 08:03:53:753 3236 12f8 COMAPI -------------
    2018-01-18 08:03:53:753 3236 12f8 COMAPI -- START --  COMAPI: Search [ClientId = ]
    2018-01-18 08:03:53:753 3236 12f8 COMAPI ---------
    2018-01-18 08:03:53:753 332 1978 Agent *************
    2018-01-18 08:03:53:753 332 1978 Agent ** START **  Agent: Finding updates [CallerId = <<PROCESS>>: CompatTelRunner.exe]
    2018-01-18 08:03:53:753 332 1978 Agent *********
    2018-01-18 08:03:53:753 332 1978 Agent   * Online = Yes; Ignore download priority = No
    2018-01-18 08:03:53:753 332 1978 Agent   * Criteria = "(CategoryIDs contains '405706ED-F1D7-47EA-91E1-EB8860039715' AND Type='Driver' AND VersionOverride='10.0.16299.2.0.0.256.1') OR (CategoryIDs contains '34F268B4-7E2D-40E1-8966-8BB6EA3DAD27' AND Type='Driver' AND VersionOverride='10.0.16299.2.0.0.256.1') OR (CategoryIDs contains '05EEBF61-148B-43CF-80DA-1C99AB0B8699' AND Type='Driver' AND VersionOverride='10.0.16299.2.0.0.256.1')"
    2018-01-18 08:03:53:753 332 1978 Agent   * ServiceID = {8CC320A5-93A5-4491-8172-F4968DDE39E3} Third party service
    2018-01-18 08:03:53:753 332 1978 Agent   * Search Scope = {Machine}
    2018-01-18 08:03:53:753 3236 12f8 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = ]
    2018-01-18 08:03:53:753 332 1978 Agent GetTargetedServiceMapping: 8CC320A5-93A5-4491-8172-F4968DDE39E3 -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
    2018-01-18 08:03:53:910 332 1978 PT +++++++++++  PT: Starting category scan  +++++++++++
    2018-01-18 08:03:53:910 332 1978 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-18 08:03:54:285 332 1978 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2018-01-18 08:03:54:285 332 1978 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-18 08:03:54:316 332 1978 Agent   * Found 0 updates and 5 categories in search; evaluated appl. rules of 5 out of 5 deployed entities
    2018-01-18 08:03:54:316 332 1978 Agent *********
    2018-01-18 08:03:54:316 332 1978 Agent **  END  **  Agent: Finding updates [CallerId = <<PROCESS>>: CompatTelRunner.exe]
    2018-01-18 08:03:54:316 332 1978 Agent *************
    2018-01-18 08:03:54:316 3236 16d0 COMAPI >>--  RESUMED  -- COMAPI: Search [ClientId = ]
    2018-01-18 08:03:54:362 3236 16d0 COMAPI   - Updates found = 0
    2018-01-18 08:03:54:455 3236 16d0 COMAPI ---------
    2018-01-18 08:03:54:455 3236 16d0 COMAPI --  END  --  COMAPI: Search [ClientId = ]
    2018-01-18 08:03:54:471 3236 16d0 COMAPI -------------
    2018-01-18 08:03:54:549 332 1210 Agent WARNING: could not delete Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\Services\8cc320a5-93a5-4491-8172-f4968dde39e3 service registry key 0x80070002
    2018-01-18 08:03:54:549 332 1210 Agent WARNING: Failed to delete service from the backup store, error = 0x80070002
    2018-01-18 08:03:54:549 332 1210 Agent RemoveTargetedServiceMapping: 8CC320A5-93A5-4491-8172-F4968DDE39E3 -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
    2018-01-18 08:03:59:306 332 1978 Report REPORT EVENT: {BFF293F8-4686-486A-9B5D-B9F525AF3B10} 2018-01-18 08:03:54:316-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 <<PROCESS>>: CompatTelRunner.ex Success Software Synchronization Windows Update Client successfully detected 0 updates.
    2018-01-18 08:07:44:066 332 5e0 AU Successfully wrote event for AU health state:0
    2018-01-18 08:07:44:071 332 5e0 AU Successfully wrote event for AU health state:0
    2018-01-18 08:30:17:419 332 5e0 AU AU setting next sqm report timeout to 2018-01-19 14:30:17


    Thursday, January 18, 2018 7:05 PM

Answers

  • Contact me through my website for support for the script. Those are significant issues and need to be resolved. Reference this post when you contact me.

    Adam Marshall, MCSE: Security
    http://www.adamj.org
    Microsoft MVP - Windows and Devices for IT

    Tuesday, January 23, 2018 8:18 PM
  • All,

    The WSUS client-server communication issue was not resolved. Thanks to Adam Marshall and Elton for their troubleshooting efforts. Adam spent tireless time narrowing down the issues on the server and IIS. After provisioning a 2nd WSUS server, normal client-server communication was observed. Client migration to the new WSUS server is nearly complete.

    Brian

    • Marked as answer by BrianPerkinson Thursday, February 1, 2018 8:29 PM
    Thursday, February 1, 2018 8:27 PM

All replies

  • WAM it! WAM Fixes these types of issues.

    Please have a look at the WSUS Automated Maintenance (WAM) system. It is an automated maintenance system for WSUS, the last system you'll ever need to maintain WSUS!

    https://community.spiceworks.com/scripts/show/2998-wsus-automated-maintenance-formerly-adamj-clean-wsus

    What it does:

    1. Add WSUS Index Optimization to the database to increase the speed of many database operations in WSUS by approximately 1000-1500 times faster.
    2. Remove all Drivers from the WSUS Database (Default; Optional).
    3. Shrink your WSUSContent folder's size by declining multiple types of updates including by default any superseded updates, preview updates, expired updates, Itanium updates, and beta updates. Optional extras: Language Packs, IE7, IE8, IE9, IE10, Embedded, NonEnglishUpdates, ComputerUpdates32bit, WinXP.
    4. Remove declined updates from the WSUS Database.
    5. Clean out all the synchronization logs that have built up over time (configurable, with the default keeping the last 14 days of logs).
    6. Compress Update Revisions.
    7. Remove Obsolete Updates.
    8. Computer Object Cleanup (configurable, with the default of deleting computer objects that have not synced within 30 days).
    9. Application Pool Memory Configuration to display the current private memory limit and easily set it to any configurable amount including 0 for unlimited. This is a manual execution only.
    10. Checks to see if you have a dirty database, and if you do, fixes it. This is primarily for Server 2012 WSUS, and is a manual execution only.
    11. Run the Recommended SQL database Maintenance script on the actual SQL database.
    12. Run the Server Cleanup Wizard.

    It will email the report out to you or save it to a file, or both.

    Although the script is lengthy, it has been made to be super easy to setup and use so don't over think it. There are some prerequisites and instructions at the top of the script. After installing the prerequisites and configuring the variables for your environment (email settings only if you are accepting all the defaults), simply run:

    .\Clean-WSUS.ps1 -FirstRun

    If you wish to view or increase the Application Pool Memory Configuration, or run the Dirty Database Check, you must run it with the required switch. See Get-Help .\Clean-WSUS.ps1 -Examples

    If you're having trouble, there's also a -HelpMe option that will create a log so you can send it to me for support.

    If after 72 hours computers from running WAM, don't start to report back in, run the following script on affected clients from an Administrative command prompt.

    net stop bits
    net stop wuauserv
    reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v AccountDomainSid /f
    reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v PingID /f
    reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v SusClientId /f
    reg delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v SusClientIDValidation /f
    rd /s /q "C:\WINDOWS\SoftwareDistribution"
    net start bits
    net start wuauserv
    wuauclt /resetauthorization /detectnow
    PowerShell.exe (New-Object -ComObject Microsoft.Update.AutoUpdate).DetectNow()

    Wait between 30 min and 24 hours for the system to report back in - usually closer to the 30 minute point.


    Adam Marshall, MCSE: Security
    http://www.adamj.org
    Microsoft MVP - Windows and Devices for IT

    Friday, January 19, 2018 2:51 AM
  • Hi,

    First , please try to stop "BITS" service and remove BITS "cache" file (then , start BITS service again):

    %ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr0.dat 
    
    %ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr1.dat
     

    I also noticed some error related to "80070002" , please check the following article which detailed steps to fix it  :

    https://support.microsoft.com/en-us/help/910336/windows-update-error-0x80070002-or-0x80070003

    Any further information please feel free to let us know.

    Best Regards,

    Elton


    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Monday, January 22, 2018 3:28 AM
  • Thank you, Adam, for your reply. We have been running WAM since December and are enjoying the quicker WSUS response and optimized file storage. I have run the small script you specified above and checked the 'Last Status Report' after 1.5 hours with no change so far. I will continue to check and report back, at the latest, tomorrow.

    Thank you again,

    Brian

    Monday, January 22, 2018 8:17 PM
  • Thank you, Elton, for your reply.

    I have performed the following on a Windows 7 and 10 PC that has not reported back to WSUS in recent times. I will post the WindowsUpdate log below for the Windows 7 PC and post the Windows 10 results on a 2nd reply:

    Windows 7 PC
    - stop "BITS" service
    - remove BITS "cache" files
    %ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr0.dat 
    %ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr1.dat
    - start BITS service
    - Download System Update Readiness tool and install
    - Restart PC, wait 2 hours, note 'Last Contact' column is current

    Here is part of the WindowsUpdate log for the Windows 7 PC:

    2018-01-22 13:10:25:050 964 17d4 AU #############
    2018-01-22 13:10:25:050 964 17d4 AU ## START ##  AU: Search for updates
    2018-01-22 13:10:25:050 964 17d4 AU #########
    2018-01-22 13:10:25:066 964 17d4 AU <<## SUBMITTED ## AU: Search for updates [CallId = {3810CA12-189C-40F6-8D1F-7857999F7A61}]
    2018-01-22 13:10:25:066 964 1a68 Agent *************
    2018-01-22 13:10:25:066 964 1a68 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-22 13:10:25:066 964 1a68 Agent *********
    2018-01-22 13:10:25:066 964 1a68 Agent   * Online = Yes; Ignore download priority = No
    2018-01-22 13:10:25:066 964 1a68 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2018-01-22 13:10:25:066 964 1a68 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2018-01-22 13:10:25:066 964 1a68 Agent   * Search Scope = {Machine}
    2018-01-22 13:10:25:113 964 1a68 Setup Checking for agent SelfUpdate
    2018-01-22 13:10:25:113 964 1a68 Setup Client version: Core: 7.6.7601.23806  Aux: 7.6.7601.23806
    2018-01-22 13:10:25:128 964 1a68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2018-01-22 13:10:25:128 964 1a68 Misc Microsoft signed: NA
    2018-01-22 13:10:25:144 964 1a68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP3564.tmp with dwProvFlags 0x00000080:
    2018-01-22 13:10:25:144 964 1a68 Misc Microsoft signed: NA
    2018-01-22 13:10:25:144 964 1a68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2018-01-22 13:10:25:159 964 1a68 Misc Microsoft signed: NA
    2018-01-22 13:10:25:191 964 1a68 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2018-01-22 13:10:25:206 964 1a68 Misc Microsoft signed: NA
    2018-01-22 13:10:25:222 964 1a68 Setup Determining whether a new setup handler needs to be downloaded
    2018-01-22 13:10:25:222 964 1a68 Setup SelfUpdate handler is not found.  It will be downloaded
    2018-01-22 13:10:25:222 964 1a68 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-22 13:10:26:033 964 1a68 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-22 13:10:26:033 964 1a68 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-22 13:10:26:049 964 1a68 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-22 13:10:26:049 964 1a68 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-22 13:10:26:080 964 1a68 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-22 13:10:26:080 964 1a68 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2018-01-22 13:10:27:032 964 1a68 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2018-01-22 13:10:27:032 964 1a68 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-22 13:10:27:047 964 1a68 PT WARNING: Cached cookie has expired or new PID is available
    2018-01-22 13:10:27:047 964 1a68 PT Initializing simple targeting cookie, clientId = bfd8f27b-2e69-4add-98a6-2e10c002f66d, target group = City, DNS name = cfd-win7-server.ad.champaignil.gov
    2018-01-22 13:10:27:047 964 1a68 PT   Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
    2018-01-22 13:10:48:296 964 1a68 PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2018-01-22 13:10:48:296 964 1a68 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-22 13:10:48:452 964 1a68 Agent   * Found 0 updates and 82 categories in search; evaluated appl. rules of 1099 out of 1613 deployed entities
    2018-01-22 13:10:48:468 964 1a68 Agent *********
    2018-01-22 13:10:48:468 964 1a68 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-22 13:10:48:468 964 1a68 Agent *************
    2018-01-22 13:10:48:468 964 1490 AU >>##  RESUMED  ## AU: Search for updates [CallId = {3810CA12-189C-40F6-8D1F-7857999F7A61}]
    2018-01-22 13:10:48:468 964 1490 AU   # 0 updates detected
    2018-01-22 13:10:48:468 964 1490 AU #########
    2018-01-22 13:10:48:468 964 1490 AU ##  END  ##  AU: Search for updates [CallId = {3810CA12-189C-40F6-8D1F-7857999F7A61}]
    2018-01-22 13:10:48:468 964 1490 AU #############
    2018-01-22 13:10:48:468 964 1490 AU Successfully wrote event for AU health state:0
    2018-01-22 13:10:48:468 964 1490 AU Featured notifications is disabled.
    2018-01-22 13:10:48:468 964 1490 AU AU setting next detection timeout to 2018-01-23 16:45:31
    2018-01-22 13:10:48:468 964 1490 AU Successfully wrote event for AU health state:0
    2018-01-22 13:10:48:468 964 1490 AU Successfully wrote event for AU health state:0
    2018-01-22 13:10:53:476 964 1a68 Report REPORT EVENT: {93A68E15-8678-46F2-9D4A-92439855A138} 2018-01-22 13:10:48:468-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 0 updates.
    2018-01-22 13:10:53:476 964 1a68 Report REPORT EVENT: {F434744F-6C5C-4FB7-A637-8903D8D91D68} 2018-01-22 13:10:48:468-0600 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
    2018-01-22 13:20:39:093 964 17d4 AU ###########  AU: Uninitializing Automatic Updates  ###########
    2018-01-22 13:20:39:234 964 17d4 Service *********
    2018-01-22 13:20:39:234 964 17d4 Service **  END  **  Service: Service exit [Exit code = 0x240001]
    2018-01-22 13:20:39:234 964 17d4 Service *************
    2018-01-22 13:20:47:237 964 16b0 Misc ===========  Logging initialized (build: 7.6.7601.23806, tz: -0600)  ===========
    2018-01-22 13:20:47:237 964 16b0 Misc   = Process: C:\Windows\system32\svchost.exe
    2018-01-22 13:20:47:237 964 16b0 Misc   = Module: c:\windows\system32\wuaueng.dll
    2018-01-22 13:20:47:237 964 16b0 Service *************
    2018-01-22 13:20:47:237 964 16b0 Service ** START **  Service: Service startup
    2018-01-22 13:20:47:237 964 16b0 Service *********
    2018-01-22 13:20:47:237 964 16b0 Agent   * WU client version 7.6.7601.23806
    2018-01-22 13:20:47:237 964 16b0 Agent   * Base directory: C:\Windows\SoftwareDistribution
    2018-01-22 13:20:47:237 964 16b0 Agent   * Access type: No proxy
    2018-01-22 13:20:47:237 964 16b0 Agent   * Network state: Connected
    2018-01-22 13:20:47:736 964 16b0 DtaStor Default service for AU is {00000000-0000-0000-0000-000000000000}
    2018-01-22 13:20:47:736 964 16b0 DtaStor Default service for AU is {9482F4B4-E343-43B6-B170-9A65BC822C77}
    2018-01-22 13:20:47:752 964 16b0 Agent WARNING: failed to access the auth cab, fatal error 0x80070003
    2018-01-22 13:20:47:752 964 16b0 Agent WARNING: Invalid service in the backup data store; cleaning up 
    2018-01-22 13:20:47:752 964 16b0 Agent WARNING: Failed to add and register service 7971f918-a847-4430-9279-4a52d1efe18d to the data store 0x80240031
    2018-01-22 13:20:47:752 964 16b0 Agent WARNING: Default Service Recovery: Attempting to add pending registration for service 7971f918-a847-4430-9279-4a52d1efe18d to the data store
    2018-01-22 13:20:49:280 964 474 Report CWERReporter::Init succeeded
    2018-01-22 13:20:49:280 964 474 Agent ***********  Agent: Initializing Windows Update Agent  ***********
    2018-01-22 13:20:49:280 964 474 Agent   * Prerequisite roots succeeded.
    2018-01-22 13:20:49:280 964 474 Agent ***********  Agent: Initializing global settings cache  ***********
    2018-01-22 13:20:49:280 964 474 Agent   * WSUS server: http://syscenter1:8530
    2018-01-22 13:20:49:280 964 474 Agent   * WSUS status server: http://syscenter1:8530
    2018-01-22 13:20:49:280 964 474 Agent   * Target group: City
    2018-01-22 13:20:49:280 964 474 Agent   * Windows Update access disabled: No
    2018-01-22 13:20:49:280 964 474 DnldMgr Download manager restoring 0 downloads
    2018-01-22 13:20:49:280 964 16b0 Agent Created new random SusClientId 0cacb22f-a62f-4c6c-9698-f3e4df74d55a. Old Id: none.
    2018-01-22 13:20:49:280 964 16b0 Report ***********  Report: Initializing static reporting data  ***********
    2018-01-22 13:20:49:280 964 16b0 Report   * OS Version = 6.1.7601.1.0.65792
    2018-01-22 13:20:49:280 964 16b0 Report   * OS Product Type = 0x00000030
    2018-01-22 13:20:49:296 964 16b0 Report   * Computer Brand = VMware, Inc.
    2018-01-22 13:20:49:296 964 16b0 Report   * Computer Model = VMware Virtual Platform
    2018-01-22 13:20:49:296 964 16b0 Report   * Bios Revision = 6.00
    2018-01-22 13:20:49:296 964 16b0 Report   * Bios Name = PhoenixBIOS 4.0 Release 6.0     
    2018-01-22 13:20:49:296 964 16b0 Report   * Bios Release Date = 2015-09-21T00:00:00
    2018-01-22 13:20:49:296 964 16b0 Report   * Locale ID = 1033
    2018-01-22 13:20:54:397 964 474 AU ###########  AU: Initializing Automatic Updates  ###########
    2018-01-22 13:20:54:397 964 474 AU   # WSUS server: http://syscenter1:8530
    2018-01-22 13:20:54:397 964 474 AU   # Detection frequency: 22
    2018-01-22 13:20:54:397 964 474 AU   # Target group: City
    2018-01-22 13:20:54:397 964 474 AU   # Approval type: Pre-install notify (Policy)
    2018-01-22 13:20:54:397 964 474 AU   # Auto-install minor updates: Yes (Policy)
    2018-01-22 13:20:54:397 964 474 AU   # Will interact with non-admins (Non-admins are elevated (Policy))
    2018-01-22 13:20:54:397 964 474 AU Successfully wrote event for AU health state:0
    2018-01-22 13:20:54:397 964 474 AU Initializing featured updates
    2018-01-22 13:20:54:397 964 474 AU Found 0 cached featured updates
    2018-01-22 13:20:54:397 964 474 AU Successfully wrote event for AU health state:0
    2018-01-22 13:20:54:397 964 474 AU Successfully wrote event for AU health state:0
    2018-01-22 13:20:54:397 964 474 AU AU finished delayed initialization
    2018-01-22 13:20:54:397 964 474 AU Triggering AU detection through DetectNow API
    2018-01-22 13:20:54:397 964 474 AU Triggering Online detection (non-interactive)
    2018-01-22 13:20:54:397 964 16b0 AU #############
    2018-01-22 13:20:54:397 964 16b0 AU ## START ##  AU: Search for updates
    2018-01-22 13:20:54:397 964 16b0 AU #########
    2018-01-22 13:20:54:397 964 16b0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {894C47F4-5808-4A65-9676-A84BB7A5DA58}]
    2018-01-22 13:20:54:397 964 116c Agent *************
    2018-01-22 13:20:54:397 964 116c Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-22 13:20:54:397 964 116c Agent *********
    2018-01-22 13:20:54:397 964 116c Agent   * Online = Yes; Ignore download priority = No
    2018-01-22 13:20:54:397 964 116c Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2018-01-22 13:20:54:397 964 116c Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2018-01-22 13:20:54:397 964 116c Agent   * Search Scope = {Machine}
    2018-01-22 13:20:54:397 964 116c Setup Checking for agent SelfUpdate
    2018-01-22 13:20:54:397 964 116c Setup Client version: Core: 7.6.7601.23806  Aux: 7.6.7601.23806
    2018-01-22 13:20:54:429 964 116c Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2018-01-22 13:20:54:429 964 116c Misc Microsoft signed: NA
    2018-01-22 13:20:54:429 964 116c Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPCF81.tmp with dwProvFlags 0x00000080:
    2018-01-22 13:20:54:444 964 116c Misc Microsoft signed: NA
    2018-01-22 13:20:54:475 964 116c Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2018-01-22 13:20:54:475 964 116c Misc Microsoft signed: NA
    2018-01-22 13:20:54:522 964 116c Setup Determining whether a new setup handler needs to be downloaded
    2018-01-22 13:20:54:522 964 116c Setup SelfUpdate handler is not found.  It will be downloaded
    2018-01-22 13:20:54:522 964 116c Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-22 13:20:54:522 964 116c Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-22 13:20:54:522 964 116c Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-22 13:20:54:538 964 116c Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-22 13:20:54:538 964 116c Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-22 13:20:54:553 964 116c Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-22 13:20:54:553 964 116c Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2018-01-22 13:20:54:600 964 116c PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2018-01-22 13:20:54:600 964 116c PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-22 13:20:54:616 964 116c Agent Switching to hardware-verified ClientId.
    2018-01-22 13:20:54:631 964 116c PT WARNING: Cached cookie has expired or new PID is available
    2018-01-22 13:20:54:678 964 116c Agent Created new random SusClientId d8c6d4df-fef0-48c3-99b6-c867057bf061. Old Id: 0cacb22f-a62f-4c6c-9698-f3e4df74d55a.
    2018-01-22 13:20:54:678 964 116c PT Initializing simple targeting cookie, clientId = d8c6d4df-fef0-48c3-99b6-c867057bf061, target group = City, DNS name = cfd-win7-server.ad.champaignil.gov
    2018-01-22 13:20:54:678 964 116c PT   Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
    2018-01-22 13:23:55:627 964 116c PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2018-01-22 13:23:55:627 964 116c PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-22 13:23:56:485 964 116c Agent   * Found 0 updates and 82 categories in search; evaluated appl. rules of 1099 out of 1613 deployed entities
    2018-01-22 13:23:56:485 964 116c Agent *********
    2018-01-22 13:23:56:485 964 116c Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-22 13:23:56:485 964 116c Agent *************
    2018-01-22 13:23:56:485 964 1700 AU >>##  RESUMED  ## AU: Search for updates [CallId = {894C47F4-5808-4A65-9676-A84BB7A5DA58}]
    2018-01-22 13:23:56:485 964 1700 AU   # 0 updates detected
    2018-01-22 13:23:56:485 964 1700 AU #########
    2018-01-22 13:23:56:485 964 1700 AU ##  END  ##  AU: Search for updates [CallId = {894C47F4-5808-4A65-9676-A84BB7A5DA58}]
    2018-01-22 13:23:56:485 964 1700 AU #############
    2018-01-22 13:23:56:485 964 1700 AU Successfully wrote event for AU health state:0
    2018-01-22 13:23:56:485 964 1700 AU Featured notifications is disabled.
    2018-01-22 13:23:56:485 964 1700 AU AU setting next detection timeout to 2018-01-23 13:39:11
    2018-01-22 13:23:56:501 964 1700 AU Successfully wrote event for AU health state:0
    2018-01-22 13:23:56:501 964 1700 AU Successfully wrote event for AU health state:0
    2018-01-22 13:24:01:492 964 116c Report REPORT EVENT: {76E38D54-87A9-447F-A0DA-232324477BA9} 2018-01-22 13:23:56:485-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 0 updates.
    2018-01-22 13:24:01:492 964 116c Report REPORT EVENT: {DA101237-E493-463D-95B8-7F341FA03CEB} 2018-01-22 13:23:56:485-0600 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.

    Thank you,

    Brian

    Monday, January 22, 2018 8:29 PM
  • Elton,

    The following was performed on a Windows 10 PC that is currently not reporting back to the WSUS server (but contacts). I will report back tomorrow on any changes to WSUS reporting.

    Windows 10 PC
    - stop "BITS" service
    - remove BITS "cache" files
    %ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr0.dat 
    %ALLUSERSPROFILE%\Microsoft\Network\Downloader\qmgr1.dat
    (renamed qmgr* files)
    - start BITS service
    - DISM.exe /Online /Cleanup-image /Restorehealth
    - sfc /scannow
    - Restarted PC, checked for updates, verified 'last contact' updated on WSUS

    Here is a portion of the WindowsUpdate log file:

    2018/01/22 13:23:09.5001619 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:09.5004019 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:10.3169377 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:10.3173932 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:10.3174197 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:10.3174255 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:10.3174327 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:10.3174360 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:10.3174532 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:10.7459112 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 33; does use network; is at background priority
    2018/01/22 13:23:10.7559629 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 33) stopped; does use network; is at background priority
    2018/01/22 13:23:10.7742765 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:10.7742804 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:10.7745282 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:11.5946356 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:11.5951225 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:11.5951490 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:11.5951548 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:11.5951623 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:11.5951653 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:11.5951825 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:12.7372726 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 34; does use network; is at background priority
    2018/01/22 13:23:12.7533635 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 34) stopped; does use network; is at background priority
    2018/01/22 13:23:12.7715165 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:12.7715208 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:12.7717544 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:13.5837725 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:13.5841954 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:13.5842211 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:13.5842268 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:13.5842341 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:13.5842371 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:13.5842558 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:13.9689041 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 35; does use network; is at background priority
    2018/01/22 13:23:13.9794412 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 35) stopped; does use network; is at background priority
    2018/01/22 13:23:13.9981952 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:13.9981994 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:13.9984400 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:14.8247720 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:14.8251916 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:14.8252163 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:14.8252221 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:14.8252296 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:14.8252348 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:14.8252505 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:15.2475091 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 36; does use network; is at background priority
    2018/01/22 13:23:15.2597985 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 36) stopped; does use network; is at background priority
    2018/01/22 13:23:15.2780840 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:15.2780882 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:15.2783233 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:16.0838617 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:16.0842792 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:16.0843045 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:16.0843100 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:16.0843193 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:16.0843226 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:16.0843392 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:16.1481218 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 37; does use network; is at background priority
    2018/01/22 13:23:16.1575350 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 37) stopped; does use network; is at background priority
    2018/01/22 13:23:16.1753294 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:16.1753333 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:16.1755893 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:16.9908129 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:16.9912735 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:16.9912995 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:16.9913076 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:16.9913152 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:16.9913182 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:16.9913336 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:17.0311206 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 38; does use network; is at background priority
    2018/01/22 13:23:17.0407216 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 38) stopped; does use network; is at background priority
    2018/01/22 13:23:17.0588577 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:17.0588619 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:17.0591106 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:17.8747082 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:17.8751468 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:17.8751755 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:17.8751812 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:17.8751885 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:17.8751915 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:17.8752078 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:17.9255035 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 39; does use network; is at background priority
    2018/01/22 13:23:17.9377877 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 39) stopped; does use network; is at background priority
    2018/01/22 13:23:17.9558085 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:17.9558121 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:17.9560364 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:18.7730403 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:18.7734569 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:18.7734832 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:18.7734889 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:18.7734961 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:18.7734992 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:18.7735170 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:18.8152229 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 40; does use network; is at background priority
    2018/01/22 13:23:18.8286865 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 40) stopped; does use network; is at background priority
    2018/01/22 13:23:18.8452563 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:18.8452602 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:18.8454911 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:19.6535850 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:19.6540378 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:19.6540644 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:19.6540698 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:19.6540774 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:19.6540825 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:19.6540988 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:19.6959158 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 41; does use network; is at background priority
    2018/01/22 13:23:19.7053650 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 41) stopped; does use network; is at background priority
    2018/01/22 13:23:19.7224108 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:19.7224147 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:19.7226613 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:20.5455717 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:20.5460300 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:20.5460568 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:20.5460629 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:20.5460725 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:20.5460758 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:20.5460921 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:20.6290815 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 42; does use network; is at background priority
    2018/01/22 13:23:20.6402524 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 42) stopped; does use network; is at background priority
    2018/01/22 13:23:20.6567718 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:20.6568176 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:20.6570806 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:21.4746946 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:21.4751178 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:21.4751440 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:21.4751519 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:21.4751594 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:21.4751624 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:21.4751781 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:21.8945133 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 43; does use network; is at background priority
    2018/01/22 13:23:21.9069638 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 43) stopped; does use network; is at background priority
    2018/01/22 13:23:21.9238882 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:21.9238919 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:21.9241789 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:22.7428881 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:22.7433391 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:22.7433680 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:22.7433741 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:22.7433816 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:22.7433846 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:22.7434015 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:22.8228959 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 44; does use network; is at background priority
    2018/01/22 13:23:22.8387804 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 44) stopped; does use network; is at background priority
    2018/01/22 13:23:22.8553402 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:22.8553441 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:22.8555847 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:23.6624265 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:23.6628491 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:23.6628748 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:23.6628805 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:23.6628878 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:23.6628908 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:23.6629068 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:23.9797213 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 45; does use network; is at background priority
    2018/01/22 13:23:23.9940068 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 45) stopped; does use network; is at background priority
    2018/01/22 13:23:24.0109956 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:24.0109995 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:24.0112452 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:24.8307573 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:24.8311485 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:24.8311745 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:24.8311802 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:24.8311874 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:24.8311905 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:24.8312071 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:24.9222208 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 46; does use network; is at background priority
    2018/01/22 13:23:24.9316159 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 46) stopped; does use network; is at background priority
    2018/01/22 13:23:24.9490037 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:24.9490076 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:24.9493094 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:25.7595206 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:25.7599372 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:25.7599631 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:25.7599689 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:25.7599761 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:25.7599791 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:25.7599954 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:25.8305484 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 47; does use network; is at background priority
    2018/01/22 13:23:25.8476766 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 47) stopped; does use network; is at background priority
    2018/01/22 13:23:25.8645267 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:25.8645325 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:25.8647731 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:26.6776687 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:26.6781287 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:26.6781541 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:26.6781598 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:26.6781670 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:26.6781701 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:26.6781864 3560  6824  ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:26.7399078 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 48; does use network; is at background priority
    2018/01/22 13:23:26.7489977 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 48) stopped; does use network; is at background priority
    2018/01/22 13:23:26.7490071 3560  6824  ProtocolTalker  SyncUpdates round trips: 34
    2018/01/22 13:23:26.7920775 3560  6824  ProtocolTalker  ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018/01/22 13:23:26.7920799 3560  6824  ProtocolTalker  OK to reuse existing configuration
    2018/01/22 13:23:26.7920826 3560  6824  ProtocolTalker  Existing cookie is valid, just use it
    2018/01/22 13:23:26.7920841 3560  6824  ProtocolTalker  PTInfo: Server requested registration
    2018/01/22 13:23:26.8008749 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 49; does use network; is at background priority
    2018/01/22 13:23:26.8039234 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 49) stopped; does use network; is at background priority
    2018/01/22 13:23:26.8039306 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 50; does use network; is at background priority
    2018/01/22 13:23:26.8062652 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 50) stopped; does use network; is at background priority
    2018/01/22 13:23:26.8062722 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 51; does use network; is at background priority
    2018/01/22 13:23:26.8192051 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 51) stopped; does use network; is at background priority
    2018/01/22 13:23:26.8192123 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 52; does use network; is at background priority
    2018/01/22 13:23:26.8256459 3560  6824  IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 52) stopped; does use network; is at background priority
    2018/01/22 13:23:26.8424167 3560  6824  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/22 13:23:26.8424206 3560  6824  SLS             Retrieving SLS response from server...
    2018/01/22 13:23:26.8427454 3560  6824  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/22 13:23:27.6487305 3560  6824  SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/22 13:23:27.6491945 3560  6824  SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/22 13:23:27.6492192 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/22 13:23:27.6492249 3560  6824  Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/22 13:23:27.6492322 3560  6824  Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/22 13:23:27.6492352 3560  6824  Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/22 13:23:27.6492699 3560  6824  ProtocolTalker  SyncExtendedUpdateInfo - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/22 13:23:27.9812107 3560  6824  Agent           Found 0 updates and 94 categories in search; evaluated appl. rules of 578 out of 976 deployed entities
    2018/01/22 13:23:27.9975208 3560  6824  Agent           * END * Finding updates CallerId = UpdateOrchestrator  Id = 2
    2018/01/22 13:23:28.0066723 3560  6824  Agent           Started inventory process
    2018/01/22 13:23:28.0098627 3560  6824  IdleTimer       WU operation (CSearchCall::Init ID 2, operation # 10) stopped; does use network; is at background priority
    2018/01/22 13:23:28.0099846 3560  2868  ComApi          *RESUMED*   Search ClientId = UpdateOrchestrator, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = 347msebk9EqhkvMr.0.1.0.0)
    2018/01/22 13:23:28.0102590 3560  2868  ComApi          * END *   Search ClientId = UpdateOrchestrator, Updates found = 0, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = 347msebk9EqhkvMr.0.1.0.0)
    2018/01/22 13:23:28.0104631 3560  4832  ComApi          * END *   All federated searches have completed. Jobs = 1, Succeeded = 1, ClientId = UpdateOrchestrator (cV = 347msebk9EqhkvMr.0.1.0)
    2018/01/22 13:33:28.0135288 3560  7996  Agent           Earliest future timer found: 
    2018/01/22 13:33:28.0135523 3560  7996  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
    2018/01/22 13:33:29.0174014 3560  7640  Misc            CSusClientGlobal::DoServicePreShutdown
    2018/01/22 13:33:29.0175061 3560  7640  IdleTimer       Idle timer disabled in preparation for service shutdown
    2018/01/22 13:33:29.0175194 3560  7640  Misc            WUTaskManager uninit
    2018/01/22 13:33:29.0175408 3560  7640  Agent           Earliest future timer found: 
    2018/01/22 13:33:29.0175559 3560  7640  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
    2018/01/22 13:33:29.0208072 3560  7640  Misc            CreateSessionStateChangeTrigger, TYPE:2, Enable:No
    2018/01/22 13:33:29.0208178 3560  7640  Misc            CreateSessionStateChangeTrigger, TYPE:4, Enable:No
    2018/01/22 13:33:29.0807722 3560  7640  Misc            Agent uninit
    2018/01/22 13:33:29.0848518 3560  7640  Misc            Reporter uninit
    2018/01/22 13:33:29.0855512 3560  7640  Misc            network cost manager uninit
    2018/01/22 13:33:29.0855784 3560  7640  Misc            Eventer uninit
    2018/01/22 13:33:30.0953421 3560  7640  Misc            ServiceManager uninit
    2018/01/22 13:33:30.0953741 3560  7640  Misc            PersistentTimeoutScheduler uninit
    2018/01/22 13:33:30.0953771 3560  7640  Misc            datastore uninit
    2018/01/22 13:33:30.1754918 3560  7640  Misc            setting cache uninit
    2018/01/22 13:33:30.1754960 3560  7640  Misc            security checker uninit
    2018/01/22 13:33:30.1755012 3560  7640  Misc            Test Hook uninit
    2018/01/22 13:33:30.1755030 3560  7640  Misc            IdleTimer uninit
    2018/01/22 13:33:30.1770446 3560  7640  Shared          * END * Service exit Exit code = 0x240001


    Monday, January 22, 2018 8:42 PM
  • Hi,

    >>Restart PC, wait 2 hours, note 'Last Contact' column is current

    Do you mean that windows 7 reported to WSUS correctly ?

     

    In windows update log of windows 10 computer , there are some entries showing win10 tried to connect to "MS update" .

    I'd suggest you try to enable group policy "Do not connect to any Windows Update Internet locations" for that win10 computer then check updates again .

    Best Regards,

    Elton


    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Tuesday, January 23, 2018 1:56 AM
  • Adam,

    I regret that today, one day later, after running the above small script on a couple of PCs yesterday (one Windows 7 and one Windows 10), there are still no status updates to WSUS from these. Again, the 'last contact' column continues to update, just no 'last status report' for 374 of 377 PCs.

    Thank you for any suggestions you may have.

    Brian

    Tuesday, January 23, 2018 2:02 PM
  • Adam,

    I regret that today, one day later, after running the above small script on a couple of PCs yesterday (one Windows 7 and one Windows 10), there are still no status updates to WSUS from these. Again, the 'last contact' column continues to update, just no 'last status report' for 374 of 377 PCs.

    Thank you for any suggestions you may have.

    Brian

    Delete those 2 client computers from WSUS and re-run the small client script. Check in an hour to see if the computers re-appeared in WSUS and check to see if they are reporting in properly. It is possible that the Deletion of the computer object within the WSUS Console is necessary.

    Adam Marshall, MCSE: Security
    http://www.adamj.org
    Microsoft MVP - Windows and Devices for IT

    Tuesday, January 23, 2018 2:09 PM
  • Hi Elton,

    Update this morning (one day later): The Windows 7 and Windows 10 workstations continue to update the 'Last Contact' column (never been an issue and workstations are receiving Windows Updates), but the 'Last Status Report' column is not changing. Thus, WSUS reporting is not functional.

    I did perform a 'Check online for updates from Microsoft Update' yesterday to verify completeness of Windows Updates received locally from WSUS and this is likely why the log file showed this Microsoft lookup. I will repost both logs (Windows 7 [below] and Windows 10 [next post]) from this morning for a more accurate look and will NOT attempt any manual Windows Updates checks to Microsoft.

    Thank you for any suggestions you may have.

    Windows 7 WindowsUpdate log:

    2018-01-23 07:39:11:603 964 16b0 AU #############
    2018-01-23 07:39:11:603 964 16b0 AU ## START ##  AU: Search for updates
    2018-01-23 07:39:11:603 964 16b0 AU #########
    2018-01-23 07:39:11:603 964 16b0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {3F13251E-2E40-48F6-88E9-E8A24C976A50}]
    2018-01-23 07:39:11:603 964 1310 Agent *************
    2018-01-23 07:39:11:603 964 1310 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-23 07:39:11:603 964 1310 Agent *********
    2018-01-23 07:39:11:603 964 1310 Agent   * Online = Yes; Ignore download priority = No
    2018-01-23 07:39:11:603 964 1310 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2018-01-23 07:39:11:603 964 1310 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2018-01-23 07:39:11:603 964 1310 Agent   * Search Scope = {Machine}
    2018-01-23 07:39:11:650 964 1310 Setup Checking for agent SelfUpdate
    2018-01-23 07:39:11:665 964 1310 Setup Client version: Core: 7.6.7601.23806  Aux: 7.6.7601.23806
    2018-01-23 07:39:11:696 964 1310 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2018-01-23 07:39:11:696 964 1310 Misc Microsoft signed: NA
    2018-01-23 07:39:11:712 964 1310 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMP50AB.tmp with dwProvFlags 0x00000080:
    2018-01-23 07:39:11:712 964 1310 Misc Microsoft signed: NA
    2018-01-23 07:39:11:743 964 1310 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2018-01-23 07:39:11:759 964 1310 Misc Microsoft signed: NA
    2018-01-23 07:39:11:759 964 1310 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
    2018-01-23 07:39:11:759 964 1310 Misc Microsoft signed: NA
    2018-01-23 07:39:11:852 964 1310 Setup Determining whether a new setup handler needs to be downloaded
    2018-01-23 07:39:11:852 964 1310 Setup SelfUpdate handler is not found.  It will be downloaded
    2018-01-23 07:39:11:852 964 1310 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-23 07:39:11:868 964 1310 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-23 07:39:11:868 964 1310 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-23 07:39:11:883 964 1310 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-23 07:39:11:883 964 1310 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
    2018-01-23 07:39:11:914 964 1310 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is not applicable
    2018-01-23 07:39:11:914 964 1310 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2018-01-23 07:39:12:880 964 1310 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2018-01-23 07:39:12:880 964 1310 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-23 07:39:12:973 964 1310 PT WARNING: Cached cookie has expired or new PID is available
    2018-01-23 07:39:12:973 964 1310 PT Initializing simple targeting cookie, clientId = d8c6d4df-fef0-48c3-99b6-c867057bf061, target group = City, DNS name = cfd-win7-server.ad.champaignil.gov
    2018-01-23 07:39:12:973 964 1310 PT   Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
    2018-01-23 07:39:42:921 964 1310 PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2018-01-23 07:39:42:921 964 1310 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018-01-23 07:39:43:062 964 1310 Agent   * Added update {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200 to search result
    2018-01-23 07:39:43:062 964 1310 Agent   * Found 1 updates and 82 categories in search; evaluated appl. rules of 1104 out of 1619 deployed entities
    2018-01-23 07:39:43:062 964 1310 Agent *********
    2018-01-23 07:39:43:062 964 1310 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-23 07:39:43:062 964 1310 Agent *************
    2018-01-23 07:39:43:062 964 1ba4 AU >>##  RESUMED  ## AU: Search for updates [CallId = {3F13251E-2E40-48F6-88E9-E8A24C976A50}]
    2018-01-23 07:39:43:062 964 1ba4 AU   # 1 updates detected
    2018-01-23 07:39:43:062 964 1ba4 AU #########
    2018-01-23 07:39:43:062 964 1ba4 AU ##  END  ##  AU: Search for updates [CallId = {3F13251E-2E40-48F6-88E9-E8A24C976A50}]
    2018-01-23 07:39:43:062 964 1ba4 AU #############
    2018-01-23 07:39:43:062 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:39:43:062 964 1ba4 AU Featured notifications is disabled.
    2018-01-23 07:39:43:062 964 1ba4 AU AU setting next detection timeout to 2018-01-24 10:56:47
    2018-01-23 07:39:43:062 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:39:43:062 964 1ba4 AU Auto-approving update for download, updateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200, ForUx=0, IsOwnerUx=0, Deadline=0, IsMinor=1, UpdateFlags=40
    2018-01-23 07:39:43:062 964 1ba4 AU Auto-approved 1 update(s) for download (NOT for Ux)
    2018-01-23 07:39:43:062 964 1ba4 AU #############
    2018-01-23 07:39:43:062 964 1ba4 AU ## START ##  AU: Download updates
    2018-01-23 07:39:43:062 964 1ba4 AU #########
    2018-01-23 07:39:43:062 964 1ba4 AU   # Approved updates = 1
    2018-01-23 07:39:43:078 964 1310 DnldMgr *************
    2018-01-23 07:39:43:078 964 1310 DnldMgr ** START **  DnldMgr: Downloading updates [CallerId = AutomaticUpdates]
    2018-01-23 07:39:43:078 964 1310 DnldMgr *********
    2018-01-23 07:39:43:078 964 1310 DnldMgr   * Call ID = {86198064-6405-4F26-96ED-358560A880B7}
    2018-01-23 07:39:43:078 964 1310 DnldMgr   * Priority = 2, Interactive = 0, Owner is system = 1, Explicit proxy = 0, Proxy session id = -1, ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}
    2018-01-23 07:39:43:078 964 1310 DnldMgr   * Updates to download = 1
    2018-01-23 07:39:43:078 964 1310 Agent   *   Title = Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
    2018-01-23 07:39:43:078 964 1310 Agent   *   UpdateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200
    2018-01-23 07:39:43:078 964 1310 Agent   *     Bundles 1 updates:
    2018-01-23 07:39:43:078 964 1310 Agent   *       {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200
    2018-01-23 07:39:43:078 964 1310 DnldMgr ***********  DnldMgr: New download job [UpdateId = {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200]  ***********
    2018-01-23 07:39:43:187 964 1310 DnldMgr   * BITS job initialized, JobId = {B0609CA5-13B4-4348-A35B-38B5089D74D9}
    2018-01-23 07:39:43:187 964 1310 DnldMgr   * Downloading from http://syscenter1:8530/Content/F6/F8F536223369FE6614594884FB6540BF8BBD5BF6.exe to C:\Windows\SoftwareDistribution\Download\7e3af31a7d6326501c36db29964536f0\f8f536223369fe6614594884fb6540bf8bbd5bf6 (full file).
    2018-01-23 07:39:43:202 964 1310 Agent *********
    2018-01-23 07:39:43:202 964 1310 Agent **  END  **  Agent: Downloading updates [CallerId = AutomaticUpdates]
    2018-01-23 07:39:43:202 964 1310 Agent *************
    2018-01-23 07:39:43:202 964 1ba4 AU AU initiated download, updateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200, callId = {86198064-6405-4F26-96ED-358560A880B7}
    2018-01-23 07:39:43:202 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:39:43:202 964 1ba4 AU AU setting pending client directive to 'Download Progress'
    2018-01-23 07:39:43:218 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:39:43:218 964 1ba4 AU   # Pending download calls = 1
    2018-01-23 07:39:43:218 964 1ba4 AU <<## SUBMITTED ## AU: Download updates
    2018-01-23 07:39:43:218 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:39:43:218 964 1310 Report REPORT EVENT: {FD05B01C-308A-4551-9BCA-DC7A56806564} 2018-01-23 07:39:43:062-0600 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 1 updates.
    2018-01-23 07:39:43:218 964 1310 Report REPORT EVENT: {684D9AD2-2C35-408F-9673-5D0FCBF727FE} 2018-01-23 07:39:43:062-0600 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
    2018-01-23 07:39:43:218 964 1310 Report REPORT EVENT: {7DB9C448-CE39-4811-9401-21353BA33C8C} 2018-01-23 07:39:43:202-0600 1 167 101 {404DE591-2EFA-4AAC-AA83-E128E43F37EC} 200 0 AutomaticUpdates Success Content Download Download started.
    2018-01-23 07:39:58:206 964 16b0 AU WARNING: AU found no suitable session to launch client in
    2018-01-23 07:40:07:433 964 161c DnldMgr BITS job {B0609CA5-13B4-4348-A35B-38B5089D74D9} completed successfully
    2018-01-23 07:40:07:480 964 161c Misc Validating signature for C:\Windows\SoftwareDistribution\Download\7e3af31a7d6326501c36db29964536f0\f8f536223369fe6614594884fb6540bf8bbd5bf6 with dwProvFlags 0x00000080:
    2018-01-23 07:40:07:527 964 161c Misc Microsoft signed: Yes
    2018-01-23 07:40:07:527 964 161c DnldMgr   Download job bytes total = 11954960, bytes transferred = 11954960
    2018-01-23 07:40:07:527 964 161c DnldMgr ***********  DnldMgr: New download job [UpdateId = {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200]  ***********
    2018-01-23 07:40:07:573 964 161c DnldMgr   * All files for update were already downloaded and are valid.
    2018-01-23 07:40:07:589 964 1ba4 AU >>##  RESUMED  ## AU: Download update [UpdateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}, succeeded]
    2018-01-23 07:40:07:589 964 1ba4 AU #########
    2018-01-23 07:40:07:589 964 1ba4 AU ##  END  ##  AU: Download updates
    2018-01-23 07:40:07:589 964 1ba4 AU #############
    2018-01-23 07:40:07:589 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:40:07:589 964 1ba4 AU Auto-approving update for install, updateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200, ForUx=0, IsOwnerUx=0, Deadline=0, IsMinor=1, UpdateFlags=40
    2018-01-23 07:40:07:589 964 1ba4 AU Auto-approved 1 update(s) for install (NOT for Ux), installType=2
    2018-01-23 07:40:07:589 964 1ba4 AU #############
    2018-01-23 07:40:07:589 964 1ba4 AU ## START ##  AU: Install updates
    2018-01-23 07:40:07:589 964 1ba4 AU #########
    2018-01-23 07:40:07:589 964 1ba4 AU   # Initiating minor updates install
    2018-01-23 07:40:07:589 964 1ba4 AU   # Approved updates = 1
    2018-01-23 07:40:07:589 964 1ba4 AU <<## SUBMITTED ## AU: Install updates / installing updates [CallId = {41FDA665-715F-46AB-9D56-E3568D350997}]
    2018-01-23 07:40:07:589 964 1680 Agent *************
    2018-01-23 07:40:07:589 964 1680 Agent ** START **  Agent: Installing updates [CallerId = AutomaticUpdates]
    2018-01-23 07:40:07:589 964 1680 Agent *********
    2018-01-23 07:40:07:589 964 1680 Agent   * Updates to install = 1
    2018-01-23 07:40:07:589 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:40:07:589 964 1680 Agent   *   Title = Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
    2018-01-23 07:40:07:589 964 1680 Agent   *   UpdateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200
    2018-01-23 07:40:07:589 964 1680 Agent   *     Bundles 1 updates:
    2018-01-23 07:40:07:589 964 1680 Agent   *       {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200
    2018-01-23 07:40:07:667 964 1680 DnldMgr Preparing update for install, updateId = {B6833E77-8BA9-41DF-A7D3-1016A6E09100}.200.
    2018-01-23 07:40:07:792 964 1680 DnldMgr ExtractUpdateFiles: 0x00000000
    2018-01-23 07:40:07:792 5964 1164 Misc ===========  Logging initialized (build: 7.6.7601.23806, tz: -0600)  ===========
    2018-01-23 07:40:07:792 5964 1164 Misc   = Process: C:\Windows\system32\wuauclt.exe
    2018-01-23 07:40:07:792 5964 1164 Misc   = Module: C:\Windows\system32\wuaueng.dll
    2018-01-23 07:40:07:792 5964 1164 Handler :::::::::::::
    2018-01-23 07:40:07:792 5964 1164 Handler :: START ::  Handler: Command Line Install
    2018-01-23 07:40:07:792 5964 1164 Handler :::::::::
    2018-01-23 07:40:07:792 5964 1164 Handler   : Updates to install = 1
    2018-01-23 07:40:12:601 964 1310 Report REPORT EVENT: {DBAA63BA-87D6-4822-8BA5-577724A651F7} 2018-01-23 07:40:07:589-0600 1 162 101 {404DE591-2EFA-4AAC-AA83-E128E43F37EC} 200 0 AutomaticUpdates Success Content Download Download succeeded.
    2018-01-23 07:40:12:601 964 1310 Report REPORT EVENT: {AD805D56-B951-4A8F-9548-ADBCE1D768A8} 2018-01-23 07:40:07:589-0600 1 189 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Content Install Installation Ready: The following updates are downloaded and ready for installation. To install the updates, an administrator should log on to this computer and Windows will prompt with further instructions:  - Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
    2018-01-23 07:40:12:601 964 1310 Report REPORT EVENT: {0E52315A-10EF-4F3B-9275-5FAC43751DC3} 2018-01-23 07:40:07:589-0600 1 181 101 {404DE591-2EFA-4AAC-AA83-E128E43F37EC} 200 0 AutomaticUpdates Success Content Install Installation Started: Windows successfully started the following update: Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
    2018-01-23 07:40:33:501 5964 1164 Handler   : Command line install completed. Return code = 0x00000000, Result = Succeeded, Reboot required = false
    2018-01-23 07:40:33:501 5964 1164 Handler :::::::::
    2018-01-23 07:40:33:501 5964 1164 Handler ::  END  ::  Handler: Command Line Install
    2018-01-23 07:40:33:501 5964 1164 Handler :::::::::::::
    2018-01-23 07:40:33:517 964 1680 Agent LogHistory called. idUpdate={404DE591-2EFA-4AAC-AA83-E128E43F37EC}.200, resultMapped=0, resultUnMapped=0
    2018-01-23 07:40:33:517 964 1ba4 AU >>##  RESUMED  ## AU: Installing update [UpdateId = {404DE591-2EFA-4AAC-AA83-E128E43F37EC}, succeeded]
    2018-01-23 07:40:33:517 964 1680 Agent *********
    2018-01-23 07:40:33:517 964 1680 Agent **  END  **  Agent: Installing updates [CallerId = AutomaticUpdates]
    2018-01-23 07:40:33:517 964 1680 Agent *************
    2018-01-23 07:40:33:517 964 1ba4 AU Install call completed.
    2018-01-23 07:40:33:517 964 1ba4 AU   # WARNING: Install call completed, reboot required = No, error = 0x00000000
    2018-01-23 07:40:33:517 964 1ba4 AU #########
    2018-01-23 07:40:33:517 964 1ba4 AU ##  END  ##  AU: Installing updates [CallId = {41FDA665-715F-46AB-9D56-E3568D350997}]
    2018-01-23 07:40:33:517 964 1ba4 AU #############
    2018-01-23 07:40:33:517 964 1ba4 AU Install complete for all calls, reboot NOT needed
    2018-01-23 07:40:33:517 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:40:33:517 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:40:33:517 964 1ba4 AU Triggering Offline detection (non-interactive)
    2018-01-23 07:40:33:517 964 16b0 AU #############
    2018-01-23 07:40:33:517 964 16b0 AU ## START ##  AU: Search for updates
    2018-01-23 07:40:33:517 964 16b0 AU #########
    2018-01-23 07:40:33:517 964 16b0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {8582E6E8-C981-4386-9CED-20809EB0B6F2}]
    2018-01-23 07:40:33:517 964 1310 Agent *************
    2018-01-23 07:40:33:517 964 1310 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-23 07:40:33:517 964 1310 Agent *********
    2018-01-23 07:40:33:517 964 1310 Agent   * Online = No; Ignore download priority = No
    2018-01-23 07:40:33:517 964 1310 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2018-01-23 07:40:33:517 964 1310 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2018-01-23 07:40:33:517 964 1310 Agent   * Search Scope = {Machine}
    2018-01-23 07:40:47:890 964 1310 Agent   * Found 0 updates and 82 categories in search; evaluated appl. rules of 697 out of 1619 deployed entities
    2018-01-23 07:40:47:890 964 1310 Agent *********
    2018-01-23 07:40:47:890 964 1310 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2018-01-23 07:40:47:890 964 1310 Agent *************
    2018-01-23 07:40:47:890 964 1310 Report REPORT EVENT: {47079DE4-B8D0-4F38-A182-23DD7F9F17AA} 2018-01-23 07:40:33:517-0600 1 183 101 {404DE591-2EFA-4AAC-AA83-E128E43F37EC} 200 0 AutomaticUpdates Success Content Install Installation Successful: Windows successfully installed the following update: Definition Update for Windows Defender - KB915597 (Definition 1.261.104.0)
    2018-01-23 07:40:47:890 964 1ba4 AU >>##  RESUMED  ## AU: Search for updates [CallId = {8582E6E8-C981-4386-9CED-20809EB0B6F2}]
    2018-01-23 07:40:47:890 964 1ba4 AU   # 0 updates detected
    2018-01-23 07:40:47:890 964 1ba4 AU #########
    2018-01-23 07:40:47:890 964 1ba4 AU ##  END  ##  AU: Search for updates [CallId = {8582E6E8-C981-4386-9CED-20809EB0B6F2}]
    2018-01-23 07:40:47:890 964 1ba4 AU #############
    2018-01-23 07:40:47:890 964 1ba4 AU Featured notifications is disabled.
    2018-01-23 07:40:47:890 964 1ba4 AU Successfully wrote event for AU health state:0
    2018-01-23 07:40:47:890 964 1ba4 AU Successfully wrote event for AU health state:0

    Tuesday, January 23, 2018 2:28 PM
  • Windows 10 WindowsUpdate log file from workstation that continues to receive Windows Updates and updates 'Last Contact' column but does not update the 'Last Status Report' column (making WSUS reporting invalid):

    2018/01/23 02:43:06.5955044 3560  5088  Misc             Infrastructure signed: Yes
    2018/01/23 02:43:06.6001992 3560  5088  Misc            Validating signature for C:\WINDOWS\SoftwareDistribution\SLS\7971F918-A847-4430-9279-4A52D1EFE18D\TMP3E3F.tmp with dwProvFlags 0x00000080:
    2018/01/23 02:43:06.6067834 3560  5088  Misc             Infrastructure signed: Yes
    2018/01/23 02:43:06.6704419 3560  5088  DataStore       Service 7971F918-A847-4430-9279-4A52D1EFE18D added
    2018/01/23 02:43:06.6707948 3560  5088  Agent           Caller Service Recovery successfully opted in to service 7971f918-a847-4430-9279-4a52d1efe18d
    2018/01/23 02:43:06.6909168 3560  5088  Misc            Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: 855e8a7c-ecb4-4ca3-b045-1dfa50104289""
    2018/01/23 02:43:06.7184432 3560  5088  DataStore       Service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 added
    2018/01/23 02:43:06.7185703 3560  5088  Agent           Caller Service Recovery successfully opted in to service 855e8a7c-ecb4-4ca3-b045-1dfa50104289
    2018/01/23 02:43:06.7266689 3560  5088  Misc            Got 9482F4B4-E343-43B6-B170-9A65BC822C77 redir SecondaryServiceAuth URL: 8b24b027-1dee-babb-9a95-3517dfb9c552""
    2018/01/23 02:43:06.7426817 3560  5088  SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/23 02:43:06.7426856 3560  5088  SLS             Retrieving SLS response from server...
    2018/01/23 02:43:06.7430859 3560  5088  SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{8B24B027-1DEE-BABB-9A95-3517DFB9C552}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/23 02:43:07.7805700 3560  5088  Misc            Validating signature for C:\WINDOWS\SoftwareDistribution\SLS\8B24B027-1DEE-BABB-9A95-3517DFB9C552\sls.cab with dwProvFlags 0x00000080:
    2018/01/23 02:43:07.7876109 3560  5088  Misc             Infrastructure signed: Yes
    2018/01/23 02:43:07.7922807 3560  5088  Misc            Validating signature for C:\WINDOWS\SoftwareDistribution\SLS\8B24B027-1DEE-BABB-9A95-3517DFB9C552\TMP42E3.tmp with dwProvFlags 0x00000080:
    2018/01/23 02:43:07.7988966 3560  5088  Misc             Infrastructure signed: Yes
    2018/01/23 02:43:07.8046316 3560  5088  DataStore       Service 8B24B027-1DEE-BABB-9A95-3517DFB9C552 added
    2018/01/23 02:43:07.8048894 3560  5088  Agent           Caller Service Recovery successfully opted in to service 8b24b027-1dee-babb-9a95-3517dfb9c552
    2018/01/23 02:43:07.8442007 3560  5088  IdleTimer       WU operation (SR.Update;taskhostw ID 2, operation # 8) stopped; does use network; is not at background priority
    2018/01/23 02:43:07.8446602 3120  1256  ComApi          Federated Search: Starting search against 1 service(s) (cV = qlgILCDJGkWQjdli.0.3.1.1.0)
    2018/01/23 02:43:07.8447426 3120  1256  ComApi          * START *   Search ClientId = Update;taskhostw, ServiceId = 855E8A7C-ECB4-4CA3-B045-1DFA50104289 (cV = qlgILCDJGkWQjdli.0.3.1.1.0.0)
    2018/01/23 02:43:07.8458042 3560  7668  IdleTimer       WU operation (CSearchCall::Init ID 3) started; operation # 11; does use network; is at background priority
    2018/01/23 02:43:07.8493070 3560  7668  Reporter        OS Product Type = 0x00000004
    2018/01/23 02:43:07.8618442 3560  7668  Agent           * START * Queueing Finding updates [CallerId = Update;taskhostw  Id = 3]
    2018/01/23 02:43:07.8618511 3560  7668  Agent           Service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 is not in sequential scan list
    2018/01/23 02:43:07.8620953 3560  496   Agent           Service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 is not in sequential scan list
    2018/01/23 02:43:07.8640218 3560  5792  Agent           * END * Queueing Finding updates [CallerId = Update;taskhostw  Id = 3]
    2018/01/23 02:43:07.8658496 3560  5792  Agent           * START * Finding updates CallerId = Update;taskhostw  Id = 3
    2018/01/23 02:43:07.8658529 3560  5792  Agent           Online = Yes; Interactive = No; AllowCachedResults = No; Ignore download priority = No
    2018/01/23 02:43:07.8658647 3560  5792  Agent           ServiceID = {855E8A7C-ECB4-4CA3-B045-1DFA50104289} Third party service
    2018/01/23 02:43:07.8658689 3560  5792  Agent           Search Scope = {Current User}
    2018/01/23 02:43:07.8658722 3560  5792  Agent           Caller SID for Applicability: S-1-5-21-2590431917-2257978904-1562285527-2135
    2018/01/23 02:43:07.9103885 3560  5792  Misc            Got 855E8A7C-ECB4-4CA3-B045-1DFA50104289 redir Client/Server URL: https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx""
    2018/01/23 02:43:07.9112706 3560  5792  Misc            Token Requested with 0 category IDs.
    2018/01/23 02:43:07.9876304 3560  5792  Misc            GetUserTickets: No user tickets found. Returning WU_E_NO_USERTOKEN.
    2018/01/23 02:43:07.9971487 3560  5792  Misc            GetAllAccountTickets, hr = 0, ticketCount = 0ll
    2018/01/23 02:43:07.9983012 3560  5792  Misc            Acquired new token from Server
    2018/01/23 02:43:07.9983993 3560  5792  Misc            Got service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 plugin Client/Server auth token of type 0x00000001
    2018/01/23 02:43:08.0361569 3560  5792  Driver          Skipping printer driver 5 due to incomplete info or mismatched environment - HWID[(null)] Provider[Microsoft] MfgName[Microsoft] Name[Remote Desktop Easy Print] pEnvironment[Windows x64] LocalPrintServerEnv[Windows x64]
    2018/01/23 02:43:08.0361627 3560  5792  Driver          Skipping printer driver 9 due to incomplete info or mismatched environment - HWID[microsoftmicrosoft_musd] Provider[Microsoft] MfgName[Microsoft] Name[Microsoft enhanced Point and Print compatibility driver] pEnvironment[Windows NT x86] LocalPrintServerEnv[Windows x64]
    2018/01/23 02:43:08.1034942 3560  5792  ProtocolTalker  PT: Calling GetConfig on server
    2018/01/23 02:43:08.1035045 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::GetConfig_WithRecovery) started; operation # 12; does use network; is at background priority
    2018/01/23 02:43:08.1035295 3560  5792  WebServices     Auto proxy settings for this web service call.
    2018/01/23 02:43:08.2596162 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::GetConfig_WithRecovery, operation # 12) stopped; does use network; is at background priority
    2018/01/23 02:43:08.2607962 3560  5792  ProtocolTalker  Skipping StartCategoryScan, no categories require server checks.
    2018/01/23 02:43:08.2660003 3560  5792  ProtocolTalker  ServiceId = {855E8A7C-ECB4-4CA3-B045-1DFA50104289}, Server URL = https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx
    2018/01/23 02:43:08.2666731 3560  5792  ProtocolTalker  OK to reuse existing configuration
    2018/01/23 02:43:08.2666786 3560  5792  ProtocolTalker  Cached cookie has expired or new PID is available
    2018/01/23 02:43:08.2667112 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::GetCookie_WithRecovery) started; operation # 13; does use network; is at background priority
    2018/01/23 02:43:08.2975737 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::GetCookie_WithRecovery, operation # 13) stopped; does use network; is at background priority
    2018/01/23 02:43:08.2985783 3560  5792  ProtocolTalker  ProductAttributes: (null) | CallerAttributes: E:Interactive=0&Id=Update%3Btaskhostw& | CurrentVersionOnly: No
    2018/01/23 02:43:08.2994328 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 14; does use network; is at background priority
    2018/01/23 02:43:08.4091818 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 14) stopped; does use network; is at background priority
    2018/01/23 02:43:08.4484186 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:08.4484210 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:08.4484222 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:08.4484708 3560  5792  Metadata        *FAILED* [80247168] No timestamp tokens in cache
    2018/01/23 02:43:08.4484883 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::GetTimestamps_WithRecovery) started; operation # 15; does use network; is at background priority
    2018/01/23 02:43:08.4849238 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::GetTimestamps_WithRecovery, operation # 15) stopped; does use network; is at background priority
    2018/01/23 02:43:08.5056009 3560  5792  Metadata        Added Signed Timestamp Token - CreateTime[ 2017-10-26T04:53:15Z ]
    2018/01/23 02:43:08.5057066 3560  5792  Metadata        Added Signed Timestamp Token - CreateTime[ 2017-11-10T04:54:13Z ]
    2018/01/23 02:43:08.5057987 3560  5792  Metadata        Added Signed Timestamp Token - CreateTime[ 2017-11-25T04:57:29Z ]
    2018/01/23 02:43:08.5058971 3560  5792  Metadata        Added Signed Timestamp Token - CreateTime[ 2017-12-10T05:15:38Z ]
    2018/01/23 02:43:08.5063468 3560  5792  Metadata        Added Signed Timestamp Token - CreateTime[ 2017-12-25T05:24:14Z ]
    2018/01/23 02:43:08.5064579 3560  5792  Metadata        Added Signed Timestamp Token - CreateTime[ 2018-01-09T05:29:53Z ]
    2018/01/23 02:43:08.5315794 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 51 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:08.5942891 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:08.5942912 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:08.5942927 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:08.6009572 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 153 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:08.6546199 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 16; does use network; is at background priority
    2018/01/23 02:43:08.7037284 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 16) stopped; does use network; is at background priority
    2018/01/23 02:43:08.7446474 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:08.7446495 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:08.7446510 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:08.7489468 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 174 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:08.7729665 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:08.7729683 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:08.7729698 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:08.7759126 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 216 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:08.7998227 3560  5792  EEHandler       *FAILED* [887A0004] D3D12 CreateDevice failed
    2018/01/23 02:43:08.8176874 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 17; does use network; is at background priority
    2018/01/23 02:43:08.9128318 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 17) stopped; does use network; is at background priority
    2018/01/23 02:43:08.9565161 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:08.9565186 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:08.9565198 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:08.9677369 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 268 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:09.0288426 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:09.0288450 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:09.0288465 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:09.0362339 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 372 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:09.3196137 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 18; does use network; is at background priority
    2018/01/23 02:43:09.6251839 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 18) stopped; does use network; is at background priority
    2018/01/23 02:43:09.6498707 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:09.6498734 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:09.6498746 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:09.7081277 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 612 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:09.8948031 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:09.8948056 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:09.8948071 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:09.9279571 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 1092 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:10.1166810 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 19; does use network; is at background priority
    2018/01/23 02:43:10.3407887 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 19) stopped; does use network; is at background priority
    2018/01/23 02:43:10.3678130 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:10.3678151 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:10.3678164 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:10.4213577 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 1313 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:10.5620531 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:10.5620555 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:10.5620567 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:10.5943323 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 1755 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:10.8528258 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 20; does use network; is at background priority
    2018/01/23 02:43:11.0907333 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 20) stopped; does use network; is at background priority
    2018/01/23 02:43:11.1322500 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:11.1322522 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:11.1322534 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:11.1470817 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 1818 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:11.2122513 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:11.2122540 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:11.2122552 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:11.2221517 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 1944 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:11.3337692 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 21; does use network; is at background priority
    2018/01/23 02:43:11.5049196 3560  5792  IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 21) stopped; does use network; is at background priority
    2018/01/23 02:43:11.5454544 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:11.5454562 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:11.5454577 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:11.5621717 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 2018 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:11.6576445 3560  5792  Metadata        Enforcement Mode: Unknown => Audit
    2018/01/23 02:43:11.6576469 3560  5792  Metadata        TimestampToken Validity: 0 => 90 (days)
    2018/01/23 02:43:11.6576481 3560  5792  Metadata        Using mode: Audit, validity: 90
    2018/01/23 02:43:11.6690123 3560  5792  ProtocolTalker  SyncUpdates - 0 bad out of 2166 metadata signatures checked using Audit enforcement mode.
    2018/01/23 02:43:11.7242688 3560  5792  ProtocolTalker  SyncUpdates round trips: 7
    2018/01/23 02:43:14.9370510 3560  5792  Agent           Added update B563751F-967A-419E-B203-CB5166CB8E5C.1 to search result
    2018/01/23 02:43:14.9370561 3560  5792  Agent           Added update 75F3344F-AD04-4D8E-87A9-B8C2F43A068C.1 to search result
    2018/01/23 02:43:14.9370609 3560  5792  Agent           Added update BFD646AE-875F-46AA-9018-CA4EBB0C652B.1 to search result
    2018/01/23 02:43:14.9370654 3560  5792  Agent           Added update BD462F2B-85F4-4C61-9A0E-4C36A4A4FE25.1 to search result
    2018/01/23 02:43:14.9370697 3560  5792  Agent           Added update C1D25A14-D481-47C1-980A-D943D88C73EE.1 to search result
    2018/01/23 02:43:14.9370730 3560  5792  Agent           Added update FDC30171-7A59-4B64-B2D1-AA7F8A24B7CB.1 to search result
    2018/01/23 02:43:14.9370769 3560  5792  Agent           Added update A84972A2-D133-4FE8-8E00-38F09CF10FC1.2 to search result
    2018/01/23 02:43:14.9370808 3560  5792  Agent           Added update F93D55B1-4237-4AC2-8C7F-C97F12DA4A10.2 to search result
    2018/01/23 02:43:14.9370878 3560  5792  Agent           Added update D61EECC9-4FBA-4A2E-B738-4C34F598D913.2 to search result
    2018/01/23 02:43:14.9371162 3560  5792  Agent           Removing unreferenced framework update {D61EECC9-4FBA-4A2E-B738-4C34F598D913}.2 from search result.
    2018/01/23 02:43:14.9371213 3560  5792  Agent           Removing unreferenced framework update {F93D55B1-4237-4AC2-8C7F-C97F12DA4A10}.2 from search result.
    2018/01/23 02:43:14.9371252 3560  5792  Agent           Removing unreferenced framework update {A84972A2-D133-4FE8-8E00-38F09CF10FC1}.2 from search result.
    2018/01/23 02:43:14.9371291 3560  5792  Agent           Removing unreferenced framework update {FDC30171-7A59-4B64-B2D1-AA7F8A24B7CB}.1 from search result.
    2018/01/23 02:43:14.9371328 3560  5792  Agent           Removing unreferenced framework update {C1D25A14-D481-47C1-980A-D943D88C73EE}.1 from search result.
    2018/01/23 02:43:14.9371364 3560  5792  Agent           Removing unreferenced framework update {BD462F2B-85F4-4C61-9A0E-4C36A4A4FE25}.1 from search result.
    2018/01/23 02:43:14.9371409 3560  5792  Agent           Removing unreferenced framework update {BFD646AE-875F-46AA-9018-CA4EBB0C652B}.1 from search result.
    2018/01/23 02:43:14.9371445 3560  5792  Agent           Removing unreferenced framework update {75F3344F-AD04-4D8E-87A9-B8C2F43A068C}.1 from search result.
    2018/01/23 02:43:14.9371485 3560  5792  Agent           Removing unreferenced framework update {B563751F-967A-419E-B203-CB5166CB8E5C}.1 from search result.
    2018/01/23 02:43:14.9372007 3560  5792  Agent           Found 0 updates and 47 categories in search; evaluated appl. rules of 564 out of 722 deployed entities
    2018/01/23 02:43:14.9466073 3560  5792  Agent           * END * Finding updates CallerId = Update;taskhostw  Id = 3
    2018/01/23 02:43:14.9506021 3560  5792  IdleTimer       WU operation (CSearchCall::Init ID 3, operation # 11) stopped; does use network; is at background priority
    2018/01/23 02:43:14.9545728 3120  5180  ComApi          *RESUMED*   Search ClientId = Update;taskhostw, ServiceId = 855E8A7C-ECB4-4CA3-B045-1DFA50104289 (cV = qlgILCDJGkWQjdli.0.3.1.1.0.0)
    2018/01/23 02:43:14.9553138 3120  5180  ComApi          * END *   Search ClientId = Update;taskhostw, Updates found = 0, ServiceId = 855E8A7C-ECB4-4CA3-B045-1DFA50104289 (cV = qlgILCDJGkWQjdli.0.3.1.1.0.0)
    2018/01/23 02:43:14.9554959 3120  1256  ComApi          * END *   All federated searches have completed. Jobs = 1, Succeeded = 1, ClientId = Update;taskhostw (cV = qlgILCDJGkWQjdli.0.3.1.1.0)
    2018/01/23 02:43:14.9608337 7476  548   AppAU           * END * Finding app updates, exit code = 0x00000000
    2018/01/23 02:43:14.9613930 7476  548   AppAU           * END *, exit code = 0x00000000
    2018/01/23 02:53:14.9560371 3560  5032  Agent           Earliest future timer found: 
    2018/01/23 02:53:14.9560640 3560  5032  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
    2018/01/23 02:53:15.9569723 3560  3020  Misc            CSusClientGlobal::DoServicePreShutdown
    2018/01/23 02:53:15.9570767 3560  3020  IdleTimer       Idle timer disabled in preparation for service shutdown
    2018/01/23 02:53:15.9570894 3560  3020  Misc            WUTaskManager uninit
    2018/01/23 02:53:15.9571054 3560  3020  Agent           Earliest future timer found: 
    2018/01/23 02:53:15.9571193 3560  3020  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
    2018/01/23 02:53:15.9601717 3560  3020  Misc            CreateSessionStateChangeTrigger, TYPE:2, Enable:No
    2018/01/23 02:53:15.9601819 3560  3020  Misc            CreateSessionStateChangeTrigger, TYPE:4, Enable:No
    2018/01/23 02:53:15.9652490 3560  3020  Misc            Agent uninit
    2018/01/23 02:53:15.9668863 3560  3020  Agent           Sending shutdown notification to client
    2018/01/23 02:53:15.9688324 3560  3020  Misc            Reporter uninit
    2018/01/23 02:53:15.9696703 3560  3020  Misc            network cost manager uninit
    2018/01/23 02:53:15.9696990 3560  3020  Misc            Eventer uninit
    2018/01/23 02:53:16.9813107 3560  3020  Misc            ServiceManager uninit
    2018/01/23 02:53:16.9814009 3560  3020  Misc            PersistentTimeoutScheduler uninit
    2018/01/23 02:53:16.9814039 3560  3020  Misc            datastore uninit
    2018/01/23 02:53:17.0931437 3560  3020  Misc            setting cache uninit
    2018/01/23 02:53:17.0931485 3560  3020  Misc            security checker uninit
    2018/01/23 02:53:17.0931564 3560  3020  Misc            Test Hook uninit
    2018/01/23 02:53:17.0931582 3560  3020  Misc            IdleTimer uninit
    2018/01/23 02:53:17.0939310 3560  3020  Shared          * END * Service exit Exit code = 0x240001
    2018/01/23 03:48:15.3936505 3560  3868  IdleTimer       Non-AoAc machine.  Aoac operations will be ignored.
    2018/01/23 03:48:15.3937791 3560  3868  Agent           WU client version 10.0.16299.98
    2018/01/23 03:48:15.3941416 3560  3868  Agent           SleepStudyTracker: Machine is non-AOAC. Sleep study tracker disabled.
    2018/01/23 03:48:15.3942512 3560  3868  Agent           Base directory: C:\WINDOWS\SoftwareDistribution
    2018/01/23 03:48:15.3947656 3560  3868  Agent           Datastore directory: C:\WINDOWS\SoftwareDistribution\DataStore\DataStore.edb
    2018/01/23 03:48:15.3961517 3560  3868  DataStore       JetEnableMultiInstance succeeded - applicable param count: 5, applied param count: 5
    2018/01/23 03:48:15.4242900 3560  3868  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2018/01/23 03:48:15.4244330 3560  3868  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
    2018/01/23 03:48:15.4247548 3560  3868  Shared          Network state: Connected
    2018/01/23 03:48:15.4870791 3560  3868  Misc            *FAILED* [8024000C] LoadHistoryEventFromRegistry completed
    2018/01/23 03:48:15.4871844 3560  3868  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 1.
    2018/01/23 03:48:15.4871917 3560  3868  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
    2018/01/23 03:48:15.4871980 3560  3868  Shared          Power status changed
    2018/01/23 03:48:15.4881093 3560  3868  Agent           Initializing global settings cache
    2018/01/23 03:48:15.4881108 3560  3868  Agent           WSUS server: http://syscenter1:8530
    2018/01/23 03:48:15.4881117 3560  3868  Agent           WSUS status server: http://syscenter1:8530
    2018/01/23 03:48:15.4881126 3560  3868  Agent           Alternate Download Server: (null)
    2018/01/23 03:48:15.4881148 3560  3868  Agent           Fill Empty Content Urls: No
    2018/01/23 03:48:15.4881157 3560  3868  Agent           Target group: City
    2018/01/23 03:48:15.4881166 3560  3868  Agent           Windows Update access disabled: No
    2018/01/23 03:48:15.4881175 3560  3868  Agent           Do not connect to Windows Update Internet locations: No
    2018/01/23 03:48:15.4887019 3560  3868  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
    2018/01/23 03:48:15.4915572 3560  3868  Agent           Initializing Windows Update Agent
    2018/01/23 03:48:15.4916465 3560  3868  Agent           CPersistentTimeoutScheduler | GetTimer, returned hr = 0x00000000
    2018/01/23 03:48:15.4979065 3560  1532  DownloadManager PurgeExpiredFiles::Found 0 expired files to delete.
    2018/01/23 03:48:15.5482309 3560  7440  DataStore       Service E48FA42F-4E1C-4F60-8017-3C05862D75BA added
    2018/01/23 03:48:15.5483387 3560  7440  Agent           AddTargetedServiceMapping: E48FA42F-4E1C-4F60-8017-3C05862D75BA -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
    2018/01/23 03:48:15.5484778 3560  1532  DownloadManager PurgeExpiredUpdates::Found 0 non expired updates.
    2018/01/23 03:48:15.5484923 3560  1532  DownloadManager PurgeExpiredUpdates::Found 0 expired updates.
    2018/01/23 03:48:15.5496439 1940  4152  ComApi          * START *   SLS Discovery
    2018/01/23 03:48:15.5509809 3560  7440  IdleTimer       WU operation (CDiscoveryCall::Init ID 1) started; operation # 7; does use network; is not at background priority
    2018/01/23 03:48:15.5511070 1940  4152  ComApi          *QUEUED* SLS Discovery
    2018/01/23 03:48:15.5522131 3560  1532  DownloadManager Received power state change notification: Old: <unknown>; New: AC.
    2018/01/23 03:48:15.5522170 3560  1532  DownloadManager Power state changed from <unknown> to AC.
    2018/01/23 03:48:15.5707871 3560  7544  IdleTimer       WU operation (CDiscoveryCall::Init ID 1, operation # 7) stopped; does use network; is not at background priority
    2018/01/23 03:48:15.5718977 1940  6768  ComApi          *RESUMED* Discovery
    2018/01/23 03:48:15.5719424 1940  6768  Api             * END *   Discovery ClientId
    2018/01/23 03:48:15.5756118 1940  4152  ComApi          * START *   SLS Discovery
    2018/01/23 03:48:15.5767486 3560  7440  IdleTimer       WU operation (CDiscoveryCall::Init ID 2) started; operation # 12; does use network; is not at background priority
    2018/01/23 03:48:15.5768844 1940  4152  ComApi          *QUEUED* SLS Discovery
    2018/01/23 03:48:15.6000236 3560  7544  IdleTimer       WU operation (CDiscoveryCall::Init ID 2, operation # 12) stopped; does use network; is not at background priority
    2018/01/23 03:48:15.6002059 1940  2740  ComApi          *RESUMED* Discovery
    2018/01/23 03:48:15.6002249 1940  2740  Api             * END *   Discovery ClientId
    2018/01/23 03:48:15.6032181 1940  4152  ComApi          * START *   Federated Search ClientId = <<PROCESS>>: CompatTelRunner.exe (cV: i4SkNcNHfkCprr+m.1.0)
    2018/01/23 03:48:15.6037675 3560  7440  IdleTimer       WU operation (SR.<<PROCESS>>: CompatTelRunner.exe ID 3) started; operation # 17; does use network; is not at background priority
    2018/01/23 03:48:15.6039459 3560  2624  Agent           GetTargetedServiceMapping: E48FA42F-4E1C-4F60-8017-3C05862D75BA -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
    2018/01/23 03:48:15.6039565 3560  2624  IdleTimer       WU operation (SR.<<PROCESS>>: CompatTelRunner.exe ID 3, operation # 17) stopped; does use network; is not at background priority
    2018/01/23 03:48:15.6193997 1940  5100  ComApi          Federated Search: Starting search against 1 service(s) (cV = i4SkNcNHfkCprr+m.1.0)
    2018/01/23 03:48:15.6194733 1940  5100  ComApi          * START *   Search ClientId = <<PROCESS>>: CompatTelRunner.exe, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = i4SkNcNHfkCprr+m.1.0.0)
    2018/01/23 03:48:15.6201516 3560  7440  IdleTimer       WU operation (CSearchCall::Init ID 4) started; operation # 20; does use network; is at background priority
    2018/01/23 03:48:15.6235687 3560  7440  Reporter        OS Product Type = 0x00000004
    2018/01/23 03:48:15.6371391 3560  7440  Agent           * START * Queueing Finding updates [CallerId = <<PROCESS>>: CompatTelRunner.exe  Id = 4]
    2018/01/23 03:48:15.6371467 3560  7440  Agent           Service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 is not in sequential scan list
    2018/01/23 03:48:15.6371506 3560  7440  Agent           Added service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 to sequential scan list
    2018/01/23 03:48:15.6373776 3560  6488  Agent           Service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 is in sequential scan list
    2018/01/23 03:48:15.6394260 3560  200   Agent           * END * Queueing Finding updates [CallerId = <<PROCESS>>: CompatTelRunner.exe  Id = 4]
    2018/01/23 03:48:15.6413030 3560  200   Agent           * START * Finding updates CallerId = <<PROCESS>>: CompatTelRunner.exe  Id = 4
    2018/01/23 03:48:15.6413051 3560  200   Agent           Online = Yes; Interactive = No; AllowCachedResults = No; Ignore download priority = No
    2018/01/23 03:48:15.6413087 3560  200   Agent           Criteria = (CategoryIDs contains 'EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0' AND Type='Driver' AND VersionOverride='10.0.17031.2.0.0.256.1')""
    2018/01/23 03:48:15.6413115 3560  200   Agent           ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2018/01/23 03:48:15.6413124 3560  200   Agent           Search Scope = {Machine}
    2018/01/23 03:48:15.6413148 3560  200   Agent           Caller SID for Applicability: S-1-5-18
    2018/01/23 03:48:15.6628142 3560  200   Misc            Got WSUS Client/Server URL: http://syscenter1:8530/ClientWebService/client.asmx""
    2018/01/23 03:48:15.6815006 3560  200   Driver          Skipping printer driver 5 due to incomplete info or mismatched environment - HWID[(null)] Provider[Microsoft] MfgName[Microsoft] Name[Remote Desktop Easy Print] pEnvironment[Windows x64] LocalPrintServerEnv[Windows x64]
    2018/01/23 03:48:15.6815057 3560  200   Driver          Skipping printer driver 9 due to incomplete info or mismatched environment - HWID[microsoftmicrosoft_musd] Provider[Microsoft] MfgName[Microsoft] Name[Microsoft enhanced Point and Print compatibility driver] pEnvironment[Windows NT x86] LocalPrintServerEnv[Windows x64]
    2018/01/23 03:48:15.7501561 3560  200   ProtocolTalker  ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018/01/23 03:48:15.7501579 3560  200   ProtocolTalker  OK to reuse existing configuration
    2018/01/23 03:48:15.7501663 3560  200   ProtocolTalker  Cached cookie has expired or new PID is available
    2018/01/23 03:48:15.7501799 3560  200   Misc            Got WSUS SimpleTargeting URL: http://syscenter1:8530""
    2018/01/23 03:48:15.7502466 3560  200   IdleTimer       WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie) started; operation # 21; does use network; is at background priority
    2018/01/23 03:48:15.7502511 3560  200   ProtocolTalker  Initializing simple targeting cookie, clientId = 4996b16c-e6f2-4d38-80af-aafe92ff9ee3, target group = City, DNS name = 2ua24416lw.ad.champaignil.gov
    2018/01/23 03:48:15.7502524 3560  200   ProtocolTalker    Server URL = http://syscenter1:8530/SimpleAuthWebService/SimpleAuth.asmx
    2018/01/23 03:48:15.7502593 3560  200   WebServices     Auto proxy settings for this web service call.
    2018/01/23 03:48:15.7634856 3560  200   IdleTimer       WU operation (CAuthorizationCookieWrapper::InitializeSimpleTargetingCookie, operation # 21) stopped; does use network; is at background priority
    2018/01/23 03:48:15.7636719 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::GetCookie_WithRecovery) started; operation # 22; does use network; is at background priority
    2018/01/23 03:48:15.7637069 3560  200   WebServices     Auto proxy settings for this web service call.
    2018/01/23 03:48:15.7711523 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::GetCookie_WithRecovery, operation # 22) stopped; does use network; is at background priority
    2018/01/23 03:48:15.7711686 3560  200   ProtocolTalker  PTInfo: Server requested registration
    2018/01/23 03:48:15.7866809 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::StartCategoryScan_WithRecovery) started; operation # 23; does use network; is at background priority
    2018/01/23 03:48:15.7888259 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::StartCategoryScan_WithRecovery, operation # 23) stopped; does use network; is at background priority
    2018/01/23 03:48:15.9558644 3560  200   ProtocolTalker  ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018/01/23 03:48:15.9558723 3560  200   ProtocolTalker  OK to reuse existing configuration
    2018/01/23 03:48:15.9558756 3560  200   ProtocolTalker  Existing cookie is valid, just use it
    2018/01/23 03:48:15.9558771 3560  200   ProtocolTalker  PTInfo: Server requested registration
    2018/01/23 03:48:19.7884899 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 24; does use network; is at background priority
    2018/01/23 03:48:19.7984184 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 24) stopped; does use network; is at background priority
    2018/01/23 03:48:19.8160474 3560  200   SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/23 03:48:19.8160519 3560  200   SLS             Retrieving SLS response from server...
    2018/01/23 03:48:19.8161398 3560  200   SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/23 03:48:20.6546854 3560  200   SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/23 03:48:20.6551487 3560  200   SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/23 03:48:20.6551895 3560  200   Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/23 03:48:20.6551979 3560  200   Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/23 03:48:20.6552058 3560  200   Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/23 03:48:20.6552085 3560  200   Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/23 03:48:20.6552251 3560  200   ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/23 03:48:20.8063233 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 25; does use network; is at background priority
    2018/01/23 03:48:20.8140892 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 25) stopped; does use network; is at background priority
    2018/01/23 03:48:20.8323557 3560  200   SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/23 03:48:20.8323603 3560  200   SLS             Retrieving SLS response from server...
    2018/01/23 03:48:20.8324457 3560  200   SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/23 03:48:21.6490605 3560  200   SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/23 03:48:21.6496235 3560  200   SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/23 03:48:21.6496510 3560  200   Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/23 03:48:21.6496570 3560  200   Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/23 03:48:21.6496645 3560  200   Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/23 03:48:21.6496676 3560  200   Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/23 03:48:21.6496820 3560  200   ProtocolTalker  SyncUpdates - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/23 03:48:21.7091564 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 26; does use network; is at background priority
    2018/01/23 03:48:21.7158994 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 26) stopped; does use network; is at background priority
    2018/01/23 03:48:21.7310199 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover) started; operation # 27; does use network; is at background priority
    2018/01/23 03:48:21.7380125 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::SyncUpdates_WithRecover, operation # 27) stopped; does use network; is at background priority
    2018/01/23 03:48:21.7380216 3560  200   ProtocolTalker  SyncUpdates round trips: 4
    2018/01/23 03:48:21.7837544 3560  200   ProtocolTalker  ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://syscenter1:8530/ClientWebService/client.asmx
    2018/01/23 03:48:21.7837577 3560  200   ProtocolTalker  OK to reuse existing configuration
    2018/01/23 03:48:21.7837607 3560  200   ProtocolTalker  Existing cookie is valid, just use it
    2018/01/23 03:48:21.7837622 3560  200   ProtocolTalker  PTInfo: Server requested registration
    2018/01/23 03:48:21.7936149 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery) started; operation # 28; does use network; is at background priority
    2018/01/23 03:48:21.7962432 3560  200   IdleTimer       WU operation (CAgentProtocolTalker::GetExtendedUpdateInfo_WithRecovery, operation # 28) stopped; does use network; is at background priority
    2018/01/23 03:48:21.8128758 3560  200   SLS             *FAILED* [80248007] Method failed [SlsDatastoreLookup:797]
    2018/01/23 03:48:21.8128800 3560  200   SLS             Retrieving SLS response from server...
    2018/01/23 03:48:21.8129642 3560  200   SLS             Making request with URL HTTPS://sls.update.microsoft.com/SLS/{3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}/x64/10.0.16299.0/0?CH=806&L=en-US&P=&PT=0x4&WUA=10.0.16299.98&MK=Hewlett-Packard&MD=HP+Z220+CMT+Workstation
    2018/01/23 03:48:22.6270905 3560  200   SLS             SLS Response is Error response type.  Attempting to extract the HRESULT in the payload...
    2018/01/23 03:48:22.6275647 3560  200   SLS             Succeeded in extracting the HRESULT from the payload => 0x80240042
    2018/01/23 03:48:22.6275907 3560  200   Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfig:793]
    2018/01/23 03:48:22.6275967 3560  200   Metadata        *FAILED* [80245004] GetFragmentSigningConfig (Using default enforcement mode: Audit)
    2018/01/23 03:48:22.6276064 3560  200   Metadata        *FAILED* [80245004] Method failed [MetadataIntegrity::SignatureVerifier::GetFragmentSigningConfigAndUpdateEnforcementPolicy:745]
    2018/01/23 03:48:22.6276094 3560  200   Metadata        Policy-driven service enabled. Using Ignore Policy.
    2018/01/23 03:48:22.6276314 3560  200   ProtocolTalker  SyncExtendedUpdateInfo - 0 bad out of 0 metadata signatures checked using Audit enforcement mode.
    2018/01/23 03:48:22.6909657 3560  200   DownloadManager Download Manager got out of scope notification for the service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7.
    2018/01/23 03:48:22.6934527 3560  200   Agent           Found 0 updates and 1 categories in search; evaluated appl. rules of 598 out of 973 deployed entities
    2018/01/23 03:48:22.7030272 3560  200   Agent           * END * Finding updates CallerId = <<PROCESS>>: CompatTelRunner.exe  Id = 4
    2018/01/23 03:48:22.7052238 3560  200   IdleTimer       WU operation (CSearchCall::Init ID 4, operation # 20) stopped; does use network; is at background priority
    2018/01/23 03:48:22.7121868 1940  1460  ComApi          *RESUMED*   Search ClientId = <<PROCESS>>: CompatTelRunner.exe, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = i4SkNcNHfkCprr+m.1.0.0)
    2018/01/23 03:48:22.7131353 1940  1460  ComApi          * END *   Search ClientId = <<PROCESS>>: CompatTelRunner.exe, Updates found = 0, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 (cV = i4SkNcNHfkCprr+m.1.0.0)
    2018/01/23 03:48:22.7133417 1940  5100  ComApi          * END *   All federated searches have completed. Jobs = 1, Succeeded = 1, ClientId = <<PROCESS>>: CompatTelRunner.exe (cV = i4SkNcNHfkCprr+m.1.0)
    2018/01/23 03:48:22.7189105 3560  7440  DataStore       Service E48FA42F-4E1C-4F60-8017-3C05862D75BA removed
    2018/01/23 03:48:22.7189301 3560  7440  Agent           RemoveTargetedServiceMapping: E48FA42F-4E1C-4F60-8017-3C05862D75BA -> 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7
    2018/01/23 03:58:22.7180293 3560  880   Agent           Earliest future timer found: 
    2018/01/23 03:58:22.7180517 3560  880   Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
    2018/01/23 03:58:23.7189911 3560  3868  Misc            CSusClientGlobal::DoServicePreShutdown
    2018/01/23 03:58:23.7190988 3560  3868  IdleTimer       Idle timer disabled in preparation for service shutdown
    2018/01/23 03:58:23.7191112 3560  3868  Misc            WUTaskManager uninit
    2018/01/23 03:58:23.7191263 3560  3868  Agent           Earliest future timer found: 
    2018/01/23 03:58:23.7191402 3560  3868  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2018-01-23 19:22:48, not idle-only, not network-only
    2018/01/23 03:58:23.7221072 3560  3868  Misc            CreateSessionStateChangeTrigger, TYPE:2, Enable:No
    2018/01/23 03:58:23.7221171 3560  3868  Misc            CreateSessionStateChangeTrigger, TYPE:4, Enable:No
    2018/01/23 03:58:23.7269789 3560  3868  Misc            Agent uninit
    2018/01/23 03:58:23.7295344 3560  3868  Misc            Reporter uninit
    2018/01/23 03:58:23.7304132 3560  3868  Misc            network cost manager uninit
    2018/01/23 03:58:23.7304412 3560  3868  Misc            Eventer uninit
    2018/01/23 03:58:24.7347397 3560  3868  Misc            ServiceManager uninit
    2018/01/23 03:58:24.7348212 3560  3868  Misc            PersistentTimeoutScheduler uninit
    2018/01/23 03:58:24.7348255 3560  3868  Misc            datastore uninit
    2018/01/23 03:58:24.8137309 3560  3868  Misc            setting cache uninit
    2018/01/23 03:58:24.8137367 3560  3868  Misc            security checker uninit
    2018/01/23 03:58:24.8137433 3560  3868  Misc            Test Hook uninit
    2018/01/23 03:58:24.8137445 3560  3868  Misc            IdleTimer uninit
    2018/01/23 03:58:24.8146779 3560  3868  Shared          * END * Service exit Exit code = 0x240001

    Tuesday, January 23, 2018 2:36 PM
  • Thank you, Adam. The two PCs (one Windows 7 and one Windows 10) have been deleted from the WSUS console and the script has been re-run on both. I will post the results soon.

    Thank you,

    Brian

    Tuesday, January 23, 2018 2:53 PM
  • Adam,

    Again, the two PCs (one Windows 7 and one Windows 10) have been deleted from the WSUS console and the script has been re-run on both. Five hours later I note the deleted PCs are now back in the WSUS console with a recent 'Last Contact' update and NO 'Last Status Report' update.

    Might I need to focus more on the WSUS server health? - 3 workstations out of the total 381 populate the 'Last Status Report' column, meanwhile ALL 381 populate the 'Last Contact' and seem to be receiving Windows Updates normally. Thank you for any suggestions you may have.

    Brian

    Tuesday, January 23, 2018 7:32 PM
  • Review the firstrun log for any errors. Perhaps rerun -FirstRun and check for errors.

    Adam Marshall, MCSE: Security
    http://www.adamj.org
    Microsoft MVP - Windows and Devices for IT

    Tuesday, January 23, 2018 7:39 PM
  • Hi Elton,

    The suggestion of "enabling group policy "Do not connect to any Windows Update Internet locations" for that win10 computer then check updates again" has been implemented this morning, followed by 'gpupdate /force' for policy application. Windows Updates seem to still be performing normally, however, one half day later, still no 'Last Status Report' column population ('Last Contact' is current).

    Thank you for any suggestions you may have. I will be ready to implement.

    Brian

    Tuesday, January 23, 2018 7:41 PM
  • Hi Adam,

    I reran the -FirstRun and note the following 3 error areas and surrounding context.

     Delete records from tbPreComputedLocalizedProperty: 0

     Msg 547, Level 16, State 1, Server SQL3, Line 77

     The DELETE statement conflicted with the REFERENCE constraint "FK_DriverFeatureScore_Driver". The conflict occurred in database "SUSDB", table "dbo.tbDriverFeatureScore".

     The statement has been terminated.

     Delete records from tbDriver: 0

     Delete records from tbFlattenedRevisionInCategory: 0

     Delete records from tbRevisionInCategory: 0

     Delete records from tbMoreInfoURLForRevision: 0

     Msg 547, Level 16, State 1, Server SQL3, Line 93

     The DELETE statement conflicted with the REFERENCE constraint "FK__tbDriver__Revisi__3429BB53". The conflict occurred in database "SUSDB", table "dbo.tbDriver", column 'RevisionID'.

     The statement has been terminated.

     Delete records from tbRevision: 0

     Delete records from tbUpdateSummaryForAllComputers: 0

     

     This is the last query and this is really what we came here for.

     Msg 547, Level 16, State 1, Server SQL3, Line 103

     The DELETE statement conflicted with the REFERENCE constraint "PK_constraint_for_table_tbRevision". The conflict occurred in database "SUSDB", table "dbo.tbRevision", column 'LocalUpdateID'.

     The statement has been terminated.

     Delete records from tbUpdate: 0

    Remove WSUS Drivers Stream Duration: 00:00:00:08

    ----------------------------------------

    Are the above errors significant?

    Here is the full log: https://goo.gl/2aafm2

    Thank you for your insight.

    Brian

    Tuesday, January 23, 2018 7:56 PM
  • Contact me through my website for support for the script. Those are significant issues and need to be resolved. Reference this post when you contact me.

    Adam Marshall, MCSE: Security
    http://www.adamj.org
    Microsoft MVP - Windows and Devices for IT

    Tuesday, January 23, 2018 8:18 PM
  • Thank you, Adam, for your comments. Will do.

    Brian

    Tuesday, January 23, 2018 8:20 PM
  • Hi Elton,

    I note the following settings in use in Group Policy pointing to our WSUS server:
    -Set the intranet update service for detecting updates: http://SysCenter1:8530
    -Set the intranet statistics server: http://SysCenter1:8530

    I also note that when I attempt access to http://SysCenter1:8530 thru a browser, I receive '403 - Forbidden: Access is denied' message. Is this normal? Could this be part of the reason for lack of clients reporting back to WSUS, although the 'Last Contact' column is current and Windows Updates seem to be occurring normally ('Last Status Report' is NOT updated)?

    Thank you for your consideration,

    Brian

    Thursday, January 25, 2018 5:52 PM
  • All,

    The WSUS client-server communication issue was not resolved. Thanks to Adam Marshall and Elton for their troubleshooting efforts. Adam spent tireless time narrowing down the issues on the server and IIS. After provisioning a 2nd WSUS server, normal client-server communication was observed. Client migration to the new WSUS server is nearly complete.

    Brian

    • Marked as answer by BrianPerkinson Thursday, February 1, 2018 8:29 PM
    Thursday, February 1, 2018 8:27 PM