locked
Clients failing to report their status to WSUS 3.0 SP2 server RRS feed

  • Question

  • Have an issue with a bunch of machines, they can download the windows update agent from the server and communicate their last contact time, however they never report their status.

    I've ran through the usual fixes (deleted susclientid, rename softwaredistribution), the issue still persists.

    Here's the client from one of the machines:

    2015-03-17    10:13:01:224    1900    e2c    Agent      * WU client version 7.6.7600.256
    2015-03-17    10:13:01:224    1900    e2c    Agent      * Base directory: C:\WINDOWS\SoftwareDistribution
    2015-03-17    10:13:01:224    1900    e2c    Agent      * Access type: No proxy
    2015-03-17    10:13:01:224    1900    e2c    Agent      * Network state: Connected
    2015-03-17    10:13:02:802    1900    e2c    Report    ***********  Report: Initializing static reporting data  ***********
    2015-03-17    10:13:02:802    1900    e2c    Report      * OS Version = 5.1.2600.3.0.65792
    2015-03-17    10:13:02:833    1900    e2c    Report      * Computer Brand = LENOVO
    2015-03-17    10:13:02:833    1900    e2c    Report      * Computer Model = 7360CE4
    2015-03-17    10:13:02:833    1900    e2c    Report      * Bios Revision = 5CKT61AUS
    2015-03-17    10:13:02:833    1900    e2c    Report      * Bios Name = Lenovo ThinkCentre BIOS Ver 5CKT61.0
    2015-03-17    10:13:02:833    1900    e2c    Report      * Bios Release Date = 2010-02-01T00:00:00
    2015-03-17    10:13:02:833    1900    e2c    Report      * Locale ID = 2057
    2015-03-17    10:13:02:833    1900    e2c    Service      * Service restarted after self update
    2015-03-17    10:13:07:833    1900    198    Report    REPORT EVENT: {7E7DB294-8317-420D-A786-4EC23060F16C}    2015-03-17 10:13:02:724-0000    1    183    101    {D67661EB-2423-451D-BF5D-13199E37DF28}    0    0    SelfUpdate    Success    Content Install    Installation Successful: Windows successfully installed the following update: Automatic Updates
    2015-03-17    10:13:47:677    1900    e2c    Agent    ***********  Agent: Initializing Windows Update Agent  ***********
    2015-03-17    10:13:47:677    1900    e2c    Agent    ***********  Agent: Initializing global settings cache  ***********
    2015-03-17    10:13:47:677    1900    e2c    Agent      * WSUS server: HTTP://My_Server_Name
    2015-03-17    10:13:47:677    1900    e2c    Agent      * WSUS status server: HTTP://My_Server_Name
    2015-03-17    10:13:47:677    1900    e2c    Agent      * Target group: IE8
    2015-03-17    10:13:47:677    1900    e2c    Agent      * Windows Update access disabled: No
    2015-03-17    10:13:47:677    1900    e2c    DnldMgr    Download manager restoring 0 downloads
    2015-03-17    10:13:47:677    1900    e2c    AU    ###########  AU: Initializing Automatic Updates  ###########
    2015-03-17    10:13:47:677    1900    e2c    AU    AU setting next sqm report timeout to 2015-03-17 10:13:47
    2015-03-17    10:13:47:677    1900    e2c    AU      # WSUS server: HTTP://My_Server_Name
    2015-03-17    10:13:47:677    1900    e2c    AU      # Detection frequency: 5
    2015-03-17    10:13:47:677    1900    e2c    AU      # Target group: IE8
    2015-03-17    10:13:47:677    1900    e2c    AU      # Approval type: Scheduled (Policy)
    2015-03-17    10:13:47:677    1900    e2c    AU      # Scheduled install day/time: Every day at 12:00
    2015-03-17    10:13:47:677    1900    e2c    AU      # Auto-install minor updates: Yes (Policy)
    2015-03-17    10:13:47:692    1900    e2c    AU    Setting AU scheduled install time to 2015-03-17 12:00:00
    2015-03-17    10:13:47:692    1900    e2c    AU    Initializing featured updates
    2015-03-17    10:13:47:692    1900    e2c    AU    Found 0 cached featured updates
    2015-03-17    10:13:47:692    1900    e2c    AU    AU finished delayed initialization
    2015-03-17    10:13:47:692    1900    e2c    AU    #############
    2015-03-17    10:13:47:692    1900    e2c    AU    ## START ##  AU: Search for updates
    2015-03-17    10:13:47:692    1900    e2c    AU    #########
    2015-03-17    10:13:47:692    1900    e2c    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {3F1025EF-27F0-428E-B892-DFF4A365B5E1}]
    2015-03-17    10:13:47:692    1900    198    Agent    *************
    2015-03-17    10:13:47:692    1900    198    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-03-17    10:13:47:692    1900    198    Agent    *********
    2015-03-17    10:13:47:692    1900    198    Agent      * Online = No; Ignore download priority = No
    2015-03-17    10:13:47:692    1900    198    Agent      * Criteria = "IsHidden=0 and IsInstalled=0 and DeploymentAction='Installation' and IsAssigned=1 or IsHidden=0 and IsPresent=1 and DeploymentAction='Uninstallation' and IsAssigned=1 or IsHidden=0 and IsInstalled=1 and DeploymentAction='Installation' and IsAssigned=1 and RebootRequired=1 or IsHidden=0 and IsInstalled=0 and DeploymentAction='Uninstallation' and IsAssigned=1 and RebootRequired=1"
    2015-03-17    10:13:47:692    1900    198    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2015-03-17    10:13:47:692    1900    198    Agent      * Search Scope = {Machine}
    2015-03-17    10:13:47:817    1900    198    Agent      * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
    2015-03-17    10:13:47:817    1900    198    Agent    *********
    2015-03-17    10:13:47:817    1900    198    Agent    **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-03-17    10:13:47:817    1900    198    Agent    *************
    2015-03-17    10:13:47:817    1900    e48    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {3F1025EF-27F0-428E-B892-DFF4A365B5E1}]
    2015-03-17    10:13:47:817    1900    e48    AU      # 0 updates detected
    2015-03-17    10:13:47:817    1900    e48    AU    #########
    2015-03-17    10:13:47:817    1900    e48    AU    ##  END  ##  AU: Search for updates [CallId = {3F1025EF-27F0-428E-B892-DFF4A365B5E1}]
    2015-03-17    10:13:47:817    1900    e48    AU    #############
    2015-03-17    10:13:47:817    1900    e48    AU    Featured notifications is disabled.
    2015-03-17    10:13:47:817    1900    e48    AU    Setting AU scheduled install time to 2015-03-17 12:00:00
    2015-03-17    10:13:52:692    1900    198    Report    REPORT EVENT: {FE17185D-7F56-4046-B9E3-9B7D847F56C7}    2015-03-17 10:13:47:692-0000    1    202    102    {00000000-0000-0000-0000-000000000000}    0    0    AutomaticUpdates    Success    Content Install    Reboot completed.
    2015-03-17    10:16:02:239    1900    150    AU    Triggering AU detection through DetectNow API
    2015-03-17    10:16:02:239    1900    150    AU    Triggering Online detection (non-interactive)
    2015-03-17    10:16:02:239    1900    e2c    AU    #############
    2015-03-17    10:16:02:239    1900    e2c    AU    ## START ##  AU: Search for updates
    2015-03-17    10:16:02:239    1900    e2c    AU    #########
    2015-03-17    10:16:02:255    1900    e2c    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {9BB782EB-E740-4D02-8BF2-411E9EA6CB96}]
    2015-03-17    10:16:02:255    1900    198    Agent    *************
    2015-03-17    10:16:02:255    1900    198    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-03-17    10:16:02:255    1900    198    Agent    *********
    2015-03-17    10:16:02:255    1900    198    Agent      * Online = Yes; Ignore download priority = No
    2015-03-17    10:16:02:255    1900    198    Agent      * Criteria = "IsHidden=0 and IsInstalled=0 and DeploymentAction='Installation' and IsAssigned=1 or IsHidden=0 and IsPresent=1 and DeploymentAction='Uninstallation' and IsAssigned=1 or IsHidden=0 and IsInstalled=1 and DeploymentAction='Installation' and IsAssigned=1 and RebootRequired=1 or IsHidden=0 and IsInstalled=0 and DeploymentAction='Uninstallation' and IsAssigned=1 and RebootRequired=1"
    2015-03-17    10:16:02:255    1900    198    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2015-03-17    10:16:02:255    1900    198    Agent      * Search Scope = {Machine}
    2015-03-17    10:16:02:255    1900    198    Setup    Agent skipping selfupdate check following a successful selfupdate
    2015-03-17    10:16:02:396    1900    198    PT    +++++++++++  PT: Synchronizing server updates  +++++++++++
    2015-03-17    10:16:02:396    1900    198    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://My_Server_Name/ClientWebService/client.asmx
    2015-03-17    10:16:02:552    1900    198    PT    Initializing simple targeting cookie, clientId = 057d5989-5ae8-4f1c-b4dc-355dfe3e8307, target group = IE8, DNS name = PC_00042.Domain.com
    2015-03-17    10:16:02:552    1900    198    PT      Server URL = HTTP://My_Server_Name/SimpleAuthWebService/SimpleAuth.asmx
    2015-03-17    10:19:00:349    1900    198    PT    +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2015-03-17    10:19:00:349    1900    198    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://My_Server_Name/ClientWebService/client.asmx
    2015-03-17    11:18:16:304    1900    e2c    AU    AU received policy change subscription event
    2015-03-17    12:00:10:028    1900    e2c    AU    Forced install timer expired for scheduled install
    2015-03-17    12:00:10:028    1900    e2c    AU    UpdateDownloadProperties: 0 download(s) are still in progress.
    2015-03-17    12:00:10:028    1900    e2c    AU    Setting AU scheduled install time to 2015-03-18 12:00:00

    It seems to be the same each time, it gets to

    +++++++++++  PT: Synchronizing extended update info  +++++++++++
    PT      + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = HTTP://My_Server_Name/ClientWebService/client.asmx

    and fails to do anything else.

    Here's the log from anotyher machine after I restarted the service at 11:33, then ran wuauclt /detectnow at 12:45:

    2015-03-17    11:33:31:930    1892    53c    Service    *************
    2015-03-17    11:33:31:977    1892    53c    Service    ** START **  Service: Service startup
    2015-03-17    11:33:31:977    1892    53c    Service    *********
    2015-03-17    11:33:32:024    1892    53c    Agent      * WU client version 7.6.7600.256
    2015-03-17    11:33:32:024    1892    53c    Agent      * Base directory: C:\WINDOWS\SoftwareDistribution
    2015-03-17    11:33:32:024    1892    53c    Agent      * Access type: No proxy
    2015-03-17    11:33:32:040    1892    53c    Agent      * Network state: Connected
    2015-03-17    11:33:32:884     288    2f4    DtaStor    Out of proc datastore is now inactive
    2015-03-17    11:34:17:886    1892    53c    Agent    ***********  Agent: Initializing Windows Update Agent  ***********
    2015-03-17    11:34:17:901    1892    53c    Agent    ***********  Agent: Initializing global settings cache  ***********
    2015-03-17    11:34:17:901    1892    53c    Agent      * WSUS server: http://My_server_Name
    2015-03-17    11:34:17:901    1892    53c    Agent      * WSUS status server: http://My_server_Name
    2015-03-17    11:34:17:901    1892    53c    Agent      * Target group: IE8
    2015-03-17    11:34:17:901    1892    53c    Agent      * Windows Update access disabled: No
    2015-03-17    11:34:17:901    1892    53c    DnldMgr    Download manager restoring 0 downloads
    2015-03-17    11:34:17:901    1892    53c    AU    ###########  AU: Initializing Automatic Updates  ###########
    2015-03-17    11:34:17:917    1892    53c    AU    AU setting next detection timeout to 2015-03-17 11:34:17
    2015-03-17    11:34:17:932    1892    53c    AU    AU setting next sqm report timeout to 2015-03-17 11:34:17
    2015-03-17    11:34:17:932    1892    53c    AU      # WSUS server: http://My_server_Name
    2015-03-17    11:34:17:932    1892    53c    AU      # Detection frequency: 5
    2015-03-17    11:34:17:932    1892    53c    AU      # Target group: IE8
    2015-03-17    11:34:17:932    1892    53c    AU      # Approval type: Scheduled (Policy)
    2015-03-17    11:34:17:932    1892    53c    AU      # Scheduled install day/time: Every day at 12:00
    2015-03-17    11:34:17:932    1892    53c    AU      # Auto-install minor updates: Yes (Policy)
    2015-03-17    11:34:17:932    1892    53c    AU    Setting AU scheduled install time to 2015-03-17 12:00:00
    2015-03-17    11:34:17:932    1892    53c    AU    Initializing featured updates
    2015-03-17    11:34:17:932    1892    53c    AU    Found 0 cached featured updates
    2015-03-17    11:34:19:058    1892    53c    Report    ***********  Report: Initializing static reporting data  ***********
    2015-03-17    11:34:19:058    1892    53c    Report      * OS Version = 5.1.2600.3.0.65792
    2015-03-17    11:34:19:167    1892    53c    Report      * Computer Brand = LENOVO
    2015-03-17    11:34:19:167    1892    53c    Report      * Computer Model = 6258AU3
    2015-03-17    11:34:19:183    1892    53c    Report      * Bios Revision = 5CKT50AUS
    2015-03-17    11:34:19:183    1892    53c    Report      * Bios Name = Lenovo ThinkCentre BIOS Ver 5CKT50.0
    2015-03-17    11:34:19:183    1892    53c    Report      * Bios Release Date = 2009-06-10T00:00:00
    2015-03-17    11:34:19:183    1892    53c    Report      * Locale ID = 2057
    2015-03-17    11:34:19:214    1892    53c    AU    AU finished delayed initialization
    2015-03-17    11:34:19:214    1892    53c    AU    #############
    2015-03-17    11:34:19:214    1892    53c    AU    ## START ##  AU: Search for updates
    2015-03-17    11:34:19:214    1892    53c    AU    #########
    2015-03-17    11:34:19:214    1892    53c    AU    <<## SUBMITTED ## AU: Search for updates [CallId = {F71D220A-7AAF-41B9-9B5B-2384DE746A47}]
    2015-03-17    11:34:21:104    1892    ef4    Agent    *************
    2015-03-17    11:34:21:104    1892    ef4    Agent    ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-03-17    11:34:21:104    1892    ef4    Agent    *********
    2015-03-17    11:34:21:104    1892    ef4    Agent      * Online = No; Ignore download priority = No
    2015-03-17    11:34:21:104    1892    ef4    Agent      * Criteria = "IsHidden=0 and IsInstalled=0 and DeploymentAction='Installation' and IsAssigned=1 or IsHidden=0 and IsPresent=1 and DeploymentAction='Uninstallation' and IsAssigned=1 or IsHidden=0 and IsInstalled=1 and DeploymentAction='Installation' and IsAssigned=1 and RebootRequired=1 or IsHidden=0 and IsInstalled=0 and DeploymentAction='Uninstallation' and IsAssigned=1 and RebootRequired=1"
    2015-03-17    11:34:21:104    1892    ef4    Agent      * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2015-03-17    11:34:21:104    1892    ef4    Agent      * Search Scope = {Machine}
    2015-03-17    12:00:10:002    1892    53c    AU    Forced install timer expired for scheduled install
    2015-03-17    12:00:10:017    1892    53c    AU    UpdateDownloadProperties: 0 download(s) are still in progress.
    2015-03-17    12:00:10:017    1892    53c    AU    Setting AU scheduled install time to 2015-03-18 12:00:00
    2015-03-17    12:45:48:093    1892    3bc    AU    Triggering AU detection through DetectNow API
    2015-03-17    12:45:48:093    1892    3bc    AU    Will do the detection after current detection completes

    Does anyone have any idea what could be causing this and how I can fix it?

    Tuesday, March 17, 2015 12:50 PM

Answers

  • Just came across this again, thought I should update that it got resolved.

    Turns out a patch for XP that was provided under a custom support agreement updated MSXML3.DLL on the machines, this prevented them from receiving patches. Renaming the file in system32 and using an old copy allowed the new updates to download and install.

    • Marked as answer by ElRobinio Tuesday, September 15, 2015 7:55 AM
    Tuesday, September 15, 2015 7:55 AM

All replies

  • what's the exact version of WSUS, have you applied any updates to the server itself?


    If you find the answer of assistance please "Vote as Helpful"and/or "Mark as Answer" where applicable. This helps others to find solutions for there issues, and recognises contributions made to the community :)

    Tuesday, March 17, 2015 2:39 PM
  • WSUS is on version 3.2.7600.226, it's on a Windows server 2003 box.

    The server should have all critical & security OS patches installed, except for those released this month. From what I can gather, the issue with these client machines does not coincide with any server patch installation, it start a month after a batch of patches were installed and no more patches were installed for about a month after that.

    Tuesday, March 17, 2015 3:13 PM
  • WSUS needs to be at version 3.2.7600.251 or later in order to properly communicate with clients at version 7.6.7600.256 or later. 

    I would install the following, it will bring the WSUS up to 3.2.7600.262 

    https://support.microsoft.com/en-ie/kb/2828185


    If you find the answer of assistance please "Vote as Helpful"and/or "Mark as Answer" where applicable. This helps others to find solutions for there issues, and recognises contributions made to the community :)

    Tuesday, March 17, 2015 3:46 PM
  • Thanks for that, I'll get that included when the next batch of updates are applied to the server, although that may be a few weeks as we have aq reboot schedule for it.

    This issue has only just started up & is affecting a dozen machines out of ~200. It's been fine ever since KB2734608 was installed, is it likely to be that patch causing this issue?

    Edit:

    Apologies, I gave the wrong server information earlier as I grabbed it from the Help>About section rather than from the front page of the WSUS MMC. It's actually running 3.2.7600.256.

    • Edited by ElRobinio Tuesday, March 17, 2015 4:21 PM
    Tuesday, March 17, 2015 4:13 PM
  • Ah,

    in that case the newer patch shouldn't affect things: 2828185 has 734608 rolled in to it, and that's the one that would be needed in this case. 

    You could try the client diag tool from SolarWinds, see if that turns up anything (Disclaimer, I work for SolarWinds)


    If you find the answer of assistance please "Vote as Helpful"and/or "Mark as Answer" where applicable. This helps others to find solutions for there issues, and recognises contributions made to the community :)

    Wednesday, March 18, 2015 7:47 AM
  • Have just given that tool a whirl, it seems to think that I don't have admin rights and there's no web connectivity:

    # Solarwinds® Diagnostic Tool for the WSUS Agent
    # 18/03/2015
    Machine state
      User rights:                                       User does not have administrative rights (Administrator rights are not available)
      Update service status:                             Running
      Background Intelligent Transfer service status:    Running
      OS Version:                                        Windows XP Professional Service Pack 3
      Windows update agent version:                      7.6.7600.256 (WU Agent is OK)
    Windows Update Agent configuration settings
      Automatic Update:                                  Enabled
      Options:                                           Scheduled (Every day at  12:00 PM)
      Use WSUS Server:                                   Enabled
      Windows Update Server:                             http://My_Server_Name
      Windows Update Status Server:                      http://My_Server_Name
      WSUS URLs are identical:                           Identical
      WSUS URL is valid:                                 Valid URL
    WSUS Server Connectivity
      clientwebservice/client.asmx:                      Error: GatewayTimeout (The request failed with HTTP status 504: Unknown Host.)
      simpleauthwebservice/simpleauth.asmx:              Error: GatewayTimeout (The remote server returned an error: (504) Gateway Timeout.)
      content:                                           Error: GatewayTimeout (The remote server returned an error: (504) Gateway Timeout.)
      selfupdate/iuident.cab:                            Error: GatewayTimeout (The remote server returned an error: (504) Gateway Timeout.)
      iuident.cab:                                       Error: GatewayTimeout (The remote server returned an error: (504) Gateway Timeout.)

    I've tested the URLs manually though and they're working, the machines will also pull down the WUIDENT.cab file and perform a self update when needed. I've can confirm I have full admin rights to the machines too.

    WSUS shouldn't be operating through the proxy, if I manually set the proxy using proxycfg -p proxy.my.company, the clients get the error code 0x80244023

    Wednesday, March 18, 2015 9:56 AM
  • Here's the MS clientdiag log for reference as well:

    Checking Machine State
        Checking for admin rights to run tool . . . . . . . . . PASS
        Automatic Updates Service is running. . . . . . . . . . PASS
        Background Intelligent Transfer Service is running. . . PASS
        Wuaueng.dll version 7.6.7600.256. . . . . . . . . . . . PASS
            This version is WSUS 2.0

    Checking AU Settings
        AU Option is 4: Scheduled Install . . . . . . . . . . . PASS
            Option is from Policy settings

    Checking Proxy Configuration
        Checking for winhttp local machine Proxy settings . . . PASS
            Winhttp local machine access type
                <Direct Connection>
            Winhttp local machine Proxy. . . . . . . . . .  PASS
            Winhttp local machine ProxyBypass. . . . . . .  PASS
        Checking User IE Proxy settings . . . . . . . . . . . . PASS
            User IE Proxy
            proxy.my.company
            User IE ProxyByPass. . . . . . . . . . . . . .  PASS
            User IE AutoConfig URL Proxy . . . . . . . . .  PASS
            User IE AutoDetect
            AutoDetect in use

    Checking Connection to WSUS/SUS Server
            WUServer = http://My_Server_Name
            WUStatusServer = http://My_Server_Name
        UseWuServer is enabled. . . . . . . . . . . . . . . . . PASS
        Connection to server. . . . . . . . . . . . . . . . . . PASS
        SelfUpdate folder is present. . . . . . . . . . . . . . PASS

    Wednesday, March 18, 2015 9:58 AM
  • Just came across this again, thought I should update that it got resolved.

    Turns out a patch for XP that was provided under a custom support agreement updated MSXML3.DLL on the machines, this prevented them from receiving patches. Renaming the file in system32 and using an old copy allowed the new updates to download and install.

    • Marked as answer by ElRobinio Tuesday, September 15, 2015 7:55 AM
    Tuesday, September 15, 2015 7:55 AM