WSUS Client is not updating while it is connected to the WSUS Server
hi guys,
day. having issue in getting updates pushed wsus server one of test client. environment below:
wsus server : win server 2003 r2 sp2 (with internet connection) (ip: 192.168.207.188)
(version: 3.2.7600.226)
wsus client : win server 2008 r2 standard (without internet connection, connected through local network server) (192.168.207.130)
client can found in admin console of server, , updates have been approved (critical , security updates only).
however, not updates downloaded , installed in client, despite there no error message in windowsupdate.log file. below can found in log file of client:
2017-03-07 16:16:40:147 872 55c service ** start ** service: service startup
2017-03-07 16:16:40:147 872 55c service *********
2017-03-07 16:16:40:303 872 55c agent * wu client version 7.6.7600.320
2017-03-07 16:16:40:303 872 55c agent * base directory: c:\windows\softwaredistribution
2017-03-07 16:16:40:303 872 55c agent * access type: no proxy
2017-03-07 16:16:40:319 872 55c agent * network state: connected
2017-03-07 16:17:25:887 872 55c report cwerreporter::init succeeded
2017-03-07 16:17:25:887 872 55c agent *********** agent: initializing windows update agent ***********
2017-03-07 16:17:25:902 872 55c agent * prerequisite roots succeeded.
2017-03-07 16:17:25:902 872 55c agent *********** agent: initializing global settings cache ***********
2017-03-07 16:17:25:902 872 55c agent * wsus server: http://192.168.207.188:8530
2017-03-07 16:17:25:902 872 55c agent * wsus status server: http://192.168.207.188:8530
2017-03-07 16:17:25:902 872 55c agent * target group: (unassigned computers)
2017-03-07 16:17:25:902 872 55c agent * windows update access disabled: no
2017-03-07 16:17:25:902 872 55c dnldmgr download manager restoring 0 downloads
2017-03-07 16:17:25:902 872 55c au ########### au: initializing automatic updates ###########
2017-03-07 16:17:25:902 872 55c au au setting next detection timeout 2017-03-07 08:17:25
2017-03-07 16:17:25:902 872 55c au # wsus server: http://192.168.207.188:8530
2017-03-07 16:17:25:902 872 55c au # detection frequency: 1
2017-03-07 16:17:25:902 872 55c au # approval type: scheduled (policy)
2017-03-07 16:17:25:902 872 55c au # scheduled install day/time: every day @ 16:00
2017-03-07 16:17:25:902 872 55c au # auto-install minor updates: yes (user preference)
2017-03-07 16:17:25:902 872 55c au # interact non-admins (non-admins elevated (user preference))
2017-03-07 16:17:25:902 872 55c au # display featured software notifications (policy)
2017-03-07 16:17:25:902 872 55c au setting au scheduled install time 2017-03-08 08:00:00
2017-03-07 16:17:26:089 872 55c report *********** report: initializing static reporting data ***********
2017-03-07 16:17:26:089 872 55c report * os version = 6.1.7601.1.0.196880
2017-03-07 16:17:26:089 872 55c report * os product type = 0x00000007
2017-03-07 16:17:26:121 872 55c report * computer brand = hp
2017-03-07 16:17:26:121 872 55c report * computer model = proliant dl380p gen8
2017-03-07 16:17:26:121 872 55c report * bios revision = p70
2017-03-07 16:17:26:121 872 55c report * bios name = default system bios
2017-03-07 16:17:26:121 872 55c report * bios release date = 2014-02-10t00:00:00
2017-03-07 16:17:26:121 872 55c report * locale id = 1033
2017-03-07 16:17:26:136 872 55c au wrote event au health state:0
2017-03-07 16:17:26:136 872 55c au initializing featured updates
2017-03-07 16:17:26:136 872 55c au found 0 cached featured updates
2017-03-07 16:17:26:136 872 55c au wrote event au health state:0
2017-03-07 16:17:26:136 872 55c au wrote event au health state:0
2017-03-07 16:17:26:136 872 55c au au finished delayed initialization
2017-03-07 16:17:26:136 872 55c au #############
2017-03-07 16:17:26:136 872 55c au ## start ## au: search updates
2017-03-07 16:17:26:136 872 55c au #########
2017-03-07 16:17:26:152 872 55c au <<## submitted ## au: search updates [callid = {89669659-231a-41ee-828e-0b20399757f0}]
2017-03-07 16:17:26:152 872 284 agent *************
2017-03-07 16:17:26:152 872 284 agent ** start ** agent: finding updates [callerid = automaticupdates]
2017-03-07 16:17:26:152 872 284 agent *********
2017-03-07 16:17:26:152 872 284 agent * online = yes; ignore download priority = no
2017-03-07 16:17:26:152 872 284 agent * criteria = "isinstalled=0 , deploymentaction='installation' or ispresent=1 , deploymentaction='uninstallation' or isinstalled=1 , deploymentaction='installation' , rebootrequired=1 or isinstalled=0 , deploymentaction='uninstallation' , rebootrequired=1"
2017-03-07 16:17:26:152 872 284 agent * serviceid = {3da21691-e39d-4da6-8a4b-b43877bcb1b7} managed
2017-03-07 16:17:26:152 872 284 agent * search scope = {machine}
2017-03-07 16:17:26:152 872 284 setup checking agent selfupdate
2017-03-07 16:17:26:152 872 284 setup client version: core: 7.6.7600.320 aux: 7.6.7600.320
2017-03-07 16:17:28:788 872 284 misc validating signature c:\windows\softwaredistribution\selfupdate\wuident.cab dwprovflags 0x00000080:
2017-03-07 16:17:44:560 872 284 misc microsoft signed: na
2017-03-07 16:17:44:607 872 284 misc validating signature c:\windows\softwaredistribution\selfupdate\tmp5427.tmp dwprovflags 0x00000080:
2017-03-07 16:18:05:495 872 284 misc microsoft signed: na
2017-03-07 16:18:05:511 872 284 misc validating signature c:\windows\softwaredistribution\selfupdate\wsus3setup.cab dwprovflags 0x00000080:
2017-03-07 16:18:21:173 872 284 misc microsoft signed: na
2017-03-07 16:18:21:392 872 284 setup determining whether new setup handler needs downloaded
2017-03-07 16:18:21:392 872 284 setup selfupdate handler not found. downloaded
2017-03-07 16:18:21:392 872 284 setup evaluating applicability of setup package "wuclient-selfupdate-activex~31bf3856ad364e35~amd64~~7.6.7600.320"
2017-03-07 16:18:21:392 872 284 setup setup package "wuclient-selfupdate-activex~31bf3856ad364e35~amd64~~7.6.7600.320" installed.
2017-03-07 16:18:21:392 872 284 setup evaluating applicability of setup package "wuclient-selfupdate-aux-toplevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2017-03-07 16:18:21:438 872 284 setup setup package "wuclient-selfupdate-aux-toplevel~31bf3856ad364e35~amd64~~7.6.7600.320" installed.
2017-03-07 16:18:21:438 872 284 setup evaluating applicability of setup package "wuclient-selfupdate-core-toplevel~31bf3856ad364e35~amd64~~7.6.7600.320"
2017-03-07 16:18:21:485 872 284 setup setup package "wuclient-selfupdate-core-toplevel~31bf3856ad364e35~amd64~~7.6.7600.320" installed.
2017-03-07 16:18:21:485 872 284 setup selfupdate check completed. selfupdate not required.
2017-03-07 16:18:21:672 872 284 pt +++++++++++ pt: synchronizing server updates +++++++++++
2017-03-07 16:18:21:672 872 284 pt + serviceid = {3da21691-e39d-4da6-8a4b-b43877bcb1b7}, server url = http://192.168.207.188:8530/clientwebservice/client.asmx
2017-03-07 16:18:21:735 872 284 pt warning: cached cookie has expired or new pid available
2017-03-07 16:18:21:735 872 284 pt initializing simple targeting cookie, clientid = c83a9b7d-2618-4544-9a0b-df66a7015304, target group = , dns name = wsus-clienttest
2017-03-07 16:18:21:735 872 284 pt server url = http://192.168.207.188:8530/simpleauthwebservice/simpleauth.asmx
2017-03-07 16:24:01:893 872 284 pt +++++++++++ pt: synchronizing extended update info +++++++++++
2017-03-07 16:24:01:893 872 284 pt + serviceid = {3da21691-e39d-4da6-8a4b-b43877bcb1b7}, server url = http://192.168.207.188:8530/clientwebservice/client.asmx
2017-03-07 17:30:15:018 872 f10 au triggering au detection through detectnow api
2017-03-07 17:30:15:018 872 f10 au piggybacking on au detection in progress
2017-03-07 17:49:01:490 872 d74 au triggering au detection through detectnow api
2017-03-07 17:49:01:490 872 d74 au piggybacking on au detection in progress
2017-03-07 18:01:50:728 872 55c au au received policy change subscription event
2017-03-07 18:01:50:728 872 55c au au options changed policy.
2017-03-07 18:01:50:728 872 55c au wrote event au health state:0
2017-03-07 18:01:50:728 872 55c au ########### au: policy change processed ###########
2017-03-07 18:01:50:728 872 55c au # policy changed, au refresh required = no
2017-03-07 18:01:50:728 872 55c au # wsus server: http://192.168.207.188:8530
2017-03-07 18:01:50:728 872 55c au # detection frequency: 1
2017-03-07 18:01:50:728 872 55c au # approval type: scheduled (policy)
2017-03-07 18:01:50:728 872 55c au # scheduled install day/time: every day @ 19:00
2017-03-07 18:01:50:728 872 55c au # auto-install minor updates: yes (user preference)
2017-03-07 18:01:50:728 872 55c au # interact non-admins (non-admins elevated (user preference))
2017-03-07 18:01:50:728 872 55c au # display featured software notifications (policy)
2017-03-07 18:01:50:728 872 55c au au settings changed through policy.
2017-03-07 18:01:50:728 872 55c au setting au scheduled install time 2017-03-07 11:00:00
2017-03-07 18:01:50:728 872 55c au wrote event au health state:0
2017-03-07 18:01:50:728 872 55c au wrote event au health state:0
2017-03-07 18:01:59:745 872 55c au au received policy change subscription event
2017-03-07 18:02:32:770 872 ec8 au triggering au detection through detectnow api
2017-03-07 18:02:32:770 872 ec8 au piggybacking on au detection in progress
2017-03-07 18:29:40:009 872 55c au au setting next sqm report timeout 2017-03-08 10:29:40
2017-03-07 19:00:10:001 872 55c au forced install timer expired scheduled install
2017-03-07 19:00:10:001 872 55c au updatedownloadproperties: 0 download(s) still in progress.
2017-03-07 19:00:10:001 872 55c au setting au scheduled install time 2017-03-08 11:00:00
2017-03-07 19:00:10:001 872 55c au wrote event au health state:0
2017-03-08 10:05:36:410 872 55c au au received policy change subscription event
2017-03-08 10:05:36:410 872 55c au au options changed policy.
2017-03-08 10:05:36:410 872 55c au wrote event au health state:0
2017-03-08 10:05:36:410 872 55c au ########### au: policy change processed ###########
2017-03-08 10:05:36:410 872 55c au # policy changed, au refresh required = no
2017-03-08 10:05:36:410 872 55c au # wsus server: http://192.168.207.188:8530
2017-03-08 10:05:36:410 872 55c au # detection frequency: 1
2017-03-08 10:05:36:410 872 55c au # approval type: scheduled (policy)
2017-03-08 10:05:36:410 872 55c au # scheduled install day/time: every day @ 11:00
2017-03-08 10:05:36:410 872 55c au # auto-install minor updates: yes (user preference)
2017-03-08 10:05:36:410 872 55c au # interact non-admins (non-admins elevated (user preference))
2017-03-08 10:05:36:410 872 55c au # display featured software notifications (policy)
2017-03-08 10:05:36:410 872 55c au au settings changed through policy.
2017-03-08 10:05:36:410 872 55c au setting au scheduled install time 2017-03-08 03:00:00
2017-03-08 10:05:36:410 872 55c au wrote event au health state:0
2017-03-08 10:05:36:410 872 55c au wrote event au health state:0
2017-03-08 10:06:01:230 872 c58 au triggering au detection through detectnow api
2017-03-08 10:06:01:230 872 c58 au piggybacking on au detection in progress
2017-03-08 11:00:10:013 872 55c au forced install timer expired scheduled install
2017-03-08 11:00:10:013 872 55c au updatedownloadproperties: 0 download(s) still in progress.
2017-03-08 11:00:10:013 872 55c au setting au scheduled install time 2017-03-09 03:00:00
2017-03-08 11:00:10:013 872 55c au wrote event au health state:0
2017-03-08 11:26:25:179 872 11c au triggering au detection through detectnow api
2017-03-08 11:26:25:179 872 11c au piggybacking on au detection in progress
note:
1) have run wuauclt /resetauthorization and /detectnow commands few times without luck
2) solarwinds client diagnostic tool shows fine
3) tried set iis , without directory browsing (and monitored few days, still no changes)
4) cleared susid , susclientid
5) re-format client pc
6) deleted softwaredistribution folder
7) enabled anonymous access in iis setting
8) created "selfupdate" virtual directory in iis
have tried possible solutions found online, no luck. appreciate if can point out what did wrong can work, first time set wsus.
in advance.
farid
hi farid,
>wsus server : win server 2003 r2 sp2 (with internet connection) (ip: 192.168.207.188)
(version: 3.2.7600.226)
since server 2003 out of support, suggest install wsus on server 2012, 2012r2 or 2016, may better support;
>wsus server: http://192.168.207.188:8530
wsus 2003 use http port 80 , https port 443 default, change port manually http 8530? if not, port not correct;
>the client can found in admin console of server, , updates have been approved (critical , security updates only).
could provide related screenshot of wsus server, wsus clients need show in wsus console , "report" wsus server, clients report wsus server there updates needed installed?
please try resetting windows update components on clients, check if help:
https://support.microsoft.com/en-us/kb/971058
best regards,
anne
please remember mark replies answers if help.
if have feedback technet subscriber support, contact tnmff@microsoft.com.
Windows Server > WSUS
Comments
Post a Comment