locked
A server is not shown in WSUS computers list RRS feed

  • Question

  • Hi all,

    I recently deployed a WSUS 2012 R2. It seems all of our computers correctly report to this WSUS, but one of them, a Windows 2008 R2 SP1 computer, is not shown in WSUS console.

    I already verified the WindowsUpdateLog file on this server, and it seems that it correctly connects to the WSUS server.

    Below the last trace in this log fils :

    2015-11-03	10:42:07:237	 840	2c58	AU	Triggering AU detection through DetectNow API
    2015-11-03	10:42:07:237	 840	2c58	AU	Triggering Online detection (interactive)
    2015-11-03	10:42:07:237	 840	9d4	AU	#############
    2015-11-03	10:42:07:237	 840	9d4	AU	## START ##  AU: Search for updates
    2015-11-03	10:42:07:237	 840	9d4	AU	#########
    2015-11-03	10:42:07:237	 840	9d4	AU	<<## SUBMITTED ## AU: Search for updates [CallId = {BC72E56F-8C72-4985-8248-2D5D6CF2B7AE}]
    2015-11-03	10:42:07:252	 840	21f4	Agent	*************
    2015-11-03	10:42:07:252	 840	21f4	Agent	** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-11-03	10:42:07:252	 840	21f4	Agent	*********
    2015-11-03	10:42:07:252	 840	21f4	Agent	  * Online = Yes; Ignore download priority = No
    2015-11-03	10:42:07:252	 840	21f4	Agent	  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2015-11-03	10:42:07:252	 840	21f4	Agent	  * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2015-11-03	10:42:07:252	 840	21f4	Agent	  * Search Scope = {Machine}
    2015-11-03	10:42:07:252	 840	21f4	Setup	Checking for agent SelfUpdate
    2015-11-03	10:42:07:252	 840	21f4	Setup	Client version: Core: 7.6.7601.19016  Aux: 7.6.7601.19016
    2015-11-03	10:42:09:873	 840	21f4	Misc	Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2015-11-03	10:42:09:889	 840	21f4	Misc	 Microsoft signed: NA
    2015-11-03	10:42:09:889	 840	21f4	Misc	WARNING: Cab does not contain correct inner CAB file.
    2015-11-03	10:42:09:889	 840	21f4	Misc	Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
    2015-11-03	10:42:09:889	 840	21f4	Misc	 Microsoft signed: NA
    2015-11-03	10:42:09:889	 840	21f4	Setup	Wuident for the managed service is valid but not quorum-signed. Skipping selfupdate.
    2015-11-03	10:42:09:889	 840	21f4	Setup	Skipping SelfUpdate check based on the /SKIP directive in wuident
    2015-11-03	10:42:09:889	 840	21f4	Setup	SelfUpdate check completed.  SelfUpdate is NOT required.
    2015-11-03	10:42:11:199	 840	21f4	PT	+++++++++++  PT: Synchronizing server updates  +++++++++++
    2015-11-03	10:42:11:199	 840	21f4	PT	  + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://OurWSUS:8530/ClientWebService/client.asmx
    2015-11-03	10:42:37:938	 840	21f4	Agent	  * Found 0 updates and 76 categories in search; evaluated appl. rules of 691 out of 1430 deployed entities
    2015-11-03	10:42:37:938	 840	21f4	Agent	*********
    2015-11-03	10:42:37:938	 840	21f4	Agent	**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2015-11-03	10:42:37:938	 840	21f4	Agent	*************
    2015-11-03	10:42:37:938	 840	2d80	AU	>>##  RESUMED  ## AU: Search for updates [CallId = {BC72E56F-8C72-4985-8248-2D5D6CF2B7AE}]
    2015-11-03	10:42:37:938	 840	2d80	AU	  # 0 updates detected
    2015-11-03	10:42:37:938	 840	2d80	AU	#########
    2015-11-03	10:42:37:938	 840	2d80	AU	##  END  ##  AU: Search for updates [CallId = {BC72E56F-8C72-4985-8248-2D5D6CF2B7AE}]
    2015-11-03	10:42:37:938	 840	2d80	AU	#############
    2015-11-03	10:42:37:938	 840	2d80	AU	Successfully wrote event for AU health state:0
    2015-11-03	10:42:37:938	 840	2d80	AU	Featured notifications is disabled.
    2015-11-03	10:42:37:938	 840	2d80	AU	AU setting next detection timeout to 2015-11-04 05:46:40
    2015-11-03	10:42:37:938	 840	2d80	AU	Setting AU scheduled install time to 2015-11-07 22:00:00
    2015-11-03	10:42:37:938	 840	2d80	AU	Successfully wrote event for AU health state:0
    2015-11-03	10:42:37:938	 840	2d80	AU	Successfully wrote event for AU health state:0
    2015-11-03	10:42:42:945	 840	21f4	Report	REPORT EVENT: {33CB32B4-C4C5-40BA-BC5A-177447B9DA6D}	2015-11-03 10:42:37:938+0100	1	147	101	{00000000-0000-0000-0000-000000000000}	0	0	AutomaticUpdates	Success	Software Synchronization	Windows Update Client successfully detected 0 updates.
    2015-11-03	10:42:42:945	 840	21f4	Report	REPORT EVENT: {3DC25B82-E0B3-48B0-B64D-6ADBE76A5A69}	2015-11-03 10:42:37:938+0100	1	156	101	{00000000-0000-0000-0000-000000000000}	0	0	AutomaticUpdates	Success	Pre-Deployment Check	Reporting client status.
    2015-11-03	10:43:57:092	 840	21f4	Report	Uploading 2 events using cached cookie, reporting URL = http://OurWSUS:8530/ReportingWebService/ReportingWebService.asmx
    2015-11-03	10:43:57:108	 840	21f4	Report	Reporter successfully uploaded 2 events.

    Any idea about that ?

    Thank you.

    Regards,


    FXE



    • Edited by FXE Tuesday, November 3, 2015 1:40 PM
    Tuesday, November 3, 2015 1:38 PM

Answers

  • Hi how are you managing your WSUS through Registry or GPO.

    You can try this and see if it shoes in the WSUS.

    Run this with elevated command prompt on the problem server.

    REG Delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v SusClientId  /f
    REG Delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v SusClientIdValidation  /f
    REG Add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate /v WUServer /t REG_SZ /d "http://yourwsusserver:8530" /F
    REG Add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate /v WUStatusServer /t REG_SZ /d "http://yourwsusserver:8530" /F
      
    gpupdate
    net stop wuauserv /y
    net stop BITS /y
    rd C:\WINDOWS\SoftwareDistribution /s /Q
    del "c:\windows\windowsupdate.log"
    regsvr32 WUAPI.DLL /s
    regsvr32 WUAUENG.DLL /s
    regsvr32 WUAUENG1.DLL /s
    regsvr32 ATL.DLL /s
    regsvr32 WUCLTUI.DLL /s
    regsvr32 WUPS.DLL /s
    regsvr32 WUPS2.DLL /s
    regsvr32 WUWEB.DLL /s
    regsvr32 msxml3.dll /s
    net start wuauserv /y
    wuauclt.exe /resetauthorisation /detectnow
    wuauclt.exe /resetauthorization /detectnow
    wuauclt.exe /reportnow

    • Marked as answer by FXE Wednesday, November 4, 2015 8:19 AM
    Tuesday, November 3, 2015 9:14 PM

All replies

  • Hi how are you managing your WSUS through Registry or GPO.

    You can try this and see if it shoes in the WSUS.

    Run this with elevated command prompt on the problem server.

    REG Delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v SusClientId  /f
    REG Delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate /v SusClientIdValidation  /f
    REG Add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate /v WUServer /t REG_SZ /d "http://yourwsusserver:8530" /F
    REG Add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate /v WUStatusServer /t REG_SZ /d "http://yourwsusserver:8530" /F
      
    gpupdate
    net stop wuauserv /y
    net stop BITS /y
    rd C:\WINDOWS\SoftwareDistribution /s /Q
    del "c:\windows\windowsupdate.log"
    regsvr32 WUAPI.DLL /s
    regsvr32 WUAUENG.DLL /s
    regsvr32 WUAUENG1.DLL /s
    regsvr32 ATL.DLL /s
    regsvr32 WUCLTUI.DLL /s
    regsvr32 WUPS.DLL /s
    regsvr32 WUPS2.DLL /s
    regsvr32 WUWEB.DLL /s
    regsvr32 msxml3.dll /s
    net start wuauserv /y
    wuauclt.exe /resetauthorisation /detectnow
    wuauclt.exe /resetauthorization /detectnow
    wuauclt.exe /reportnow

    • Marked as answer by FXE Wednesday, November 4, 2015 8:19 AM
    Tuesday, November 3, 2015 9:14 PM
  • Hi and thank you for your answer,

    I'm managing WSUS through GPO.

    I'm going to test your commands...


    FXE

    Wednesday, November 4, 2015 8:10 AM
  • Yeah !

    It's running now ! My server is correctly shown in WSUS !

    Thank you for your help.

    Have a good day.


    FXE

    Wednesday, November 4, 2015 8:19 AM