locked
Windows 10 - Version 1803 (Build 17134.320) RRS feed

  • Question

  • Every 10 minutes the user get's a notification that windows has failed trying to install the below optional feature:  

    Windows to feature pack - optical character recognition failing with error *0x800F0954" 

    Any ideas why? I have posted some of the log file it wont let me post much more 

    2019/03/20 16:54:54.5470963 8176  1456  Shared          * START * Service startup
    2019/03/20 16:54:54.5624261 8176  1456  IdleTimer       Non-AoAc machine.  Aoac operations will be ignored.
    2019/03/20 16:54:54.5627950 8176  1456  Agent           WU client version 10.0.17134.320
    2019/03/20 16:54:54.5631001 8176  1456  Agent           SleepStudyTracker: Machine is non-AOAC. Sleep study tracker disabled.
    2019/03/20 16:54:54.5632151 8176  1456  Agent           Base directory: C:\Windows\SoftwareDistribution
    2019/03/20 16:54:54.5643175 8176  1456  Agent           Datastore directory: C:\Windows\SoftwareDistribution\DataStore\DataStore.edb
    2019/03/20 16:54:54.5653658 8176  1456  DataStore       JetEnableMultiInstance succeeded - applicable param count: 5, applied param count: 5
    2019/03/20 16:54:54.5904198 8176  1456  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 3.
    2019/03/20 16:54:54.5907859 8176  1456  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
    2019/03/20 16:54:54.5912537 8176  1456  Shared          Network state: Connected
    2019/03/20 16:54:54.6769446 8176  1456  Misc            *FAILED* [8024000C] LoadHistoryEventFromRegistry completed
    2019/03/20 16:54:54.6775414 8176  1456  Shared          UpdateNetworkState Ipv6, cNetworkInterfaces = 3.
    2019/03/20 16:54:54.6775479 8176  1456  Shared          UpdateNetworkState Ipv4, cNetworkInterfaces = 1.
    2019/03/20 16:54:54.6775565 8176  1456  Shared          Power status changed
    2019/03/20 16:54:54.6790385 8176  9668  Agent           *FAILED* [80240013] m_services.Add()
    2019/03/20 16:54:54.6790412 8176  9668  Agent           *FAILED* [80240013] Method failed [CAgentServiceManager::CreateServiceObjectAndAddIntoMap:2099]
    2019/03/20 16:54:54.6790444 8176  9668  Agent           *FAILED* [80240013] Method failed [CAgentServiceManager::DelayedInit:2743]
    2019/03/20 16:54:54.6795694 8176  9668  Agent               Timer: 29A863E7-8609-4D1E-B7CD-5668F857F1DB, Expires 2019-03-21 07:24:07, not idle-only, not network-only
    2019/03/20 16:54:54.6800819 8176  1456  Agent           Initializing global settings cache
    2019/03/20 16:54:54.6800836 8176  1456  Agent           WSUS 
    2019/03/20 16:54:54.6800846 8176  1456  Agent           WSUS status server: *******
    2019/03/20 16:54:54.6800852 8176  1456  Agent           Alternate Download Server: (null)
    2019/03/20 16:54:54.6800863 8176  1456  Agent           Fill Empty Content Urls: No
    2019/03/20 16:54:54.6800873 8176  1456  Agent           Target group: (Unassigned Computers)
    2019/03/20 16:54:54.6800884 8176  1456  Agent           Windows Update access disabled: No
    2019/03/20 16:54:54.6800895 8176  1456  Agent           Do not connect to Windows Update Internet locations: No
    2019/03/20 16:54:54.6839949 8176  9668  Agent           Initializing Windows Update Agent
    2019/03/20 16:54:54.6840926 8176  9668  Agent           CPersistentTimeoutScheduler | GetTimer, returned hr = 0x00000000
    2019/03/20 16:54:54.7040244 8176  25964 DownloadManager Received power state change notification: Old: <unknown>; New: AC.
    2019/03/20 16:54:54.7040271 8176  25964 DownloadManager Power state changed from <unknown> to AC.
    2019/03/20 16:54:54.7912195 21752 24268 ComApi          * START *   Federated Search ClientId = TrustedInstaller FOD (cV: UNS2cw8apkK/Hm3A.9.1.0)
    2019/03/20 16:54:54.7923456 8176  9668  IdleTimer       WU operation (SR.TrustedInstaller FOD ID 1) started; operation # 6; does use network; is not at background priority
    2019/03/20 16:54:54.7925368 8176  10284 Agent           *FAILED* [80240007] Method failed [CAgentServiceManager::GetTargetedServiceMapping:3010]
    2019/03/20 16:54:54.8666958 8176  10284 IdleTimer       WU operation (SR.TrustedInstaller FOD ID 1, operation # 6) stopped; does use network; is not at background priority
    2019/03/20 16:54:54.8672392 21752 25040 ComApi          Federated Search: Starting search against 1 service(s) (cV = UNS2cw8apkK/Hm3A.9.1.0)
    2019/03/20 16:54:54.8673191 21752 25040 ComApi          * START *   Search ClientId = TrustedInstaller FOD, ServiceId = 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7, Flags: 0X80010010 (cV = UNS2cw8apkK/Hm3A.9.1.0.0)
    2019/03/20 16:54:54.8688432 8176  9668  IdleTimer       WU operation (CSearchCall::Init ID 2) started; operation # 9; does use network; is not at background priority
    2019/03/20 16:54:54.8688686 8176  9668  Reporter        OS Product Type = 0x00000004
    2019/03/20 16:54:55.0379778 8176  9668  Agent           * START * Queueing Finding updates [CallerId = TrustedInstaller FOD  Id = 2]
    2019/03/20 16:54:55.0379848 8176  9668  Agent           Service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 is not in sequential scan list
    2019/03/20 16:54:55.0379886 8176  9668  Agent           Added service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 to sequential scan list
    2019/03/20 16:54:55.0382252 8176  17264 Agent           Service 3DA21691-E39D-4DA6-8A4B-B43877BCB1B7 is in sequential scan list
    2019/03/20 16:54:55.1223806 8176  4264  Agent           * END * Queueing Finding updates [CallerId = TrustedInstaller FOD  Id = 2]
    2019/03/20 16:54:55.1991375 8176  4264  Agent           * START * Finding updates CallerId = TrustedInstaller FOD  Id = 2 (cV = UNS2cw8apkK/Hm3A.9.1.0.0.2)
    2019/03/20 16:54:55.1991402 8176  4264  Agent           Online = Yes; Interactive = Yes; AllowCachedResults = No; Ignore download priority = No
    2019/03/20 16:54:55.1991413 8176  4264  Agent           Criteria = (Product='Client.OS.rs2.amd64' and CurrentVersionOnly=1)""
    2019/03/20 16:54:55.1991440 8176  4264  Agent           ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2019/03/20 16:54:55.1991445 8176  4264  Agent           Search Scope = {Machine}
    2019/03/20 16:54:55.1991483 8176  4264  Agent           Caller SID for Applicability: S-1-5-18
    2019/03/20 16:54:55.2887770 8176  4264  Misc            Got WSUS Client/Server URL: https://***************:8531/ClientWebService/client.asmx""
    2019/03/20 16:54:55.6283197 8176  4264  ProtocolTalker  ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = https://**************/ClientWebService/client.asmx
    2019/03/20 16:54:55.6283272 8176  4264  ProtocolTalker  OK to reuse existing configuration




    Friday, March 22, 2019 12:21 PM

All replies

  • Could you please explain what the exact problem about ?

    Mark it as answer if your question has solved. MCT Regional Lead. x2 MCSE-MCSA Exchange Server & Windows Server

    Friday, March 22, 2019 1:03 PM
  • I think I may have found a fix anyway


    *Can someone verify my account its very annoying i can post links or photos 

    "

    After researching this on and off for ages, i finally came across a proper fix for this issue!

    The problem is applicable to clients that are pointed at a WSUS server and that is where they try to pull content for Optional Features. There is a GPO setting that instructs the machine to pull Optional Feature content from Windows Update directly, rather than try to obtain it from your WSUS:

    Computer Configuration\Administrative Templates\System

    "Specify settings for optional component installation and component repair"

    You need to enable the option "Download repair content and optional features directly from Windows Update instead of Windows Server Update Services (WSUS)"

    This will then allow clients to communicate with WSUS as required, whilst still being able to install these annoying optional components."

    Friday, March 22, 2019 2:07 PM
  • It seems you've found it, did you try the configuration ?

    Mark it as answer if your question has solved. MCT Regional Lead. x2 MCSE-MCSA Exchange Server & Windows Server

    Friday, March 22, 2019 2:11 PM
  • I have run RsoP on my machine but I can't find this particular policy to enable 
    Friday, March 22, 2019 3:44 PM
  • I spoke to someone in my company we think the update is not approved in WSUS and he also have a language pack so we will  try to update that first thanks anyway.
    Friday, March 22, 2019 3:51 PM
  • After researching this on and off for ages, i finally came across a proper fix for this issue!

    The problem is applicable to clients that are pointed at a WSUS server and that is where they try to pull content for Optional Features. There is a GPO setting that instructs the machine to pull Optional Feature content from Windows Update directly, rather than try to obtain it from your WSUS:

    Computer Configuration\Administrative Templates\System

    "Specify settings for optional component installation and component repair"

    You need to enable the option "Download repair content and optional features directly from Windows Update instead of Windows Server Update Services (WSUS)"

    This will then allow clients to communicate with WSUS as required, whilst still being able to install these annoying optional components."

    The failure may be due to the computer connecting to the domain and the GPO directing the update to the WSUS server. This problem can also be fixed by the following steps:
     

    1. Load Regedit as Admin
    2. Navigate to HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
    3. Change reg key UseWUServer from 1 to 0
    4. Open elevated command prompt and type commands:
      >  net stop wuauserv
      >  net start wuauserv
    5. Return to the Region and Language settings screen
    6. Click on the language, click options button, click download next to the optional packs that are failing to install.
       

    Hope the above can help you.
     

    Regards,
    Yic

    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Monday, March 25, 2019 6:24 AM