Client not detecting needed updates from WSUS server or directly from Microsoft update


i stumped on this, have been working @ 3 days , not found solution. background: have large domain , updates working across pcs , servers. on past week added 6 new 2012 r2 servers network. each of servers able detect , install updates, , reboot. after rebooting each have failed receive more updates since then. initial update did on servers done wsus server. when attempt update microsoft directly, update client still fails detect missing patches. 

here log entry of attempt update microsoft directly:

2016-12-29 09:04:08:686 764 1b24 idletmr incremented idle timer priority operation counter 1
2016-12-29 09:04:08:686 4264 79c misc ===========  logging initialized (build: 7.9.9600.16441, tz: -0500)  ===========
2016-12-29 09:04:08:686 4264 79c misc  = process: c:\windows\explorer.exe
2016-12-29 09:04:08:686 4264 79c misc  = module: c:\windows\system32\wucltux.dll
2016-12-29 09:04:08:686 4264 79c cltui fatal: cnetworkcostchangehandler::registerforcostchangenotifications: cocreateinstance failed error 80004002
2016-12-29 09:04:08:686 4264 79c cltui warning: registernetworkcostchangenotification: error 80004002
2016-12-29 09:04:11:155 764 1b24 au triggering au detection through detectnow api
2016-12-29 09:04:11:155 764 1b24 au triggering online detection (interactive) non-default
2016-12-29 09:04:11:155 764 353c au #############
2016-12-29 09:04:11:155 764 353c au ## start ##  au: search updates
2016-12-29 09:04:11:155 764 353c au #########
2016-12-29 09:04:11:155 764 353c idletmr wu operation (csearchcall::init id 1) started; operation # 10; use network; not @ background priority
2016-12-29 09:04:11:155 764 353c idletmr incremented pdc refcount network 1
2016-12-29 09:04:11:155 764 353c idletmr incremented idle timer priority operation counter 2
2016-12-29 09:04:11:249 764 353c report ***********  report: initializing static reporting data  ***********
2016-12-29 09:04:11:249 764 353c report  * os version = 6.3.9600.0.0.197008
2016-12-29 09:04:11:249 764 353c report  * os product type = 0x00000008
2016-12-29 09:04:11:264 764 353c report  * computer brand = vmware, inc.
2016-12-29 09:04:11:264 764 353c report  * computer model = vmware virtual platform
2016-12-29 09:04:11:264 764 353c report  * platform role = 1
2016-12-29 09:04:11:264 764 353c report  * alwayson/alwaysconnected (aoac) = 0
2016-12-29 09:04:11:264 764 353c report  * bios revision = 6.00
2016-12-29 09:04:11:264 764 353c report  * bios name = phoenixbios 4.0 release 6.0     
2016-12-29 09:04:11:264 764 353c report  * bios release date = 2014-04-14t00:00:00
2016-12-29 09:04:11:264 764 353c report  * bios sku number unavailable.
2016-12-29 09:04:11:264 764 353c report  * bios vendor = phoenix technologies ltd
2016-12-29 09:04:11:264 764 353c report  * bios family unavailable.
2016-12-29 09:04:11:264 764 353c report  * bios major release = 4
2016-12-29 09:04:11:264 764 353c report  * bios minor release = 6
2016-12-29 09:04:11:264 764 353c report  * locale id = 1033
2016-12-29 09:04:11:264 764 353c agent *** start ***  queueing finding updates [callerid = automaticupdateswuapp  id = 1]
2016-12-29 09:04:11:264 764 353c au <<## submitted ## au: search updates  [callid = {11098957-a024-4ebd-8656-041770ce9014} serviceid = {7971f918-a847-4430-9279-4a52d1efe18d}]
2016-12-29 09:04:11:264 764 244c agent ***  end  ***  queueing finding updates [callerid = automaticupdateswuapp  id = 1]
2016-12-29 09:04:11:264 764 244c agent *************
2016-12-29 09:04:11:264 764 244c agent ** start **  agent: finding updates [callerid = automaticupdateswuapp  id = 1]
2016-12-29 09:04:11:264 764 244c agent *********
2016-12-29 09:04:11:264 764 244c agent  * online = yes; ignore download priority = no
2016-12-29 09:04:11:264 764 244c agent  * criteria = "isinstalled=0 , deploymentaction='installation' or ispresent=1 , deploymentaction='uninstallation' or isinstalled=1 , deploymentaction='installation' , rebootrequired=1 or isinstalled=0 , deploymentaction='uninstallation' , rebootrequired=1"
2016-12-29 09:04:11:264 764 244c agent  * serviceid = {7971f918-a847-4430-9279-4a52d1efe18d} third party service
2016-12-29 09:04:11:264 764 244c agent  * search scope = {machine & users}
2016-12-29 09:04:11:264 764 244c agent  * caller sid applicability: s-1-5-21-373770480-2062961480-879972363-13372
2016-12-29 09:04:11:264 764 244c ep got 9482f4b4-e343-43b6-b170-9a65bc822c77 redir secondaryserviceauth url: "7971f918-a847-4430-9279-4a52d1efe18d"
2016-12-29 09:04:11:280 764 244c sls retrieving sls response server...
2016-12-29 09:04:11:280 764 244c sls making request url https://sls.update.microsoft.com/sls/{7971f918-a847-4430-9279-4a52d1efe18d}/x64/6.3.9600.0/0?ch=41&l=en-us&p=&pt=0x8&wua=7.9.9600.16422
2016-12-29 09:04:11:968 764 244c misc validating signature c:\windows\softwaredistribution\sls\7971f918-a847-4430-9279-4a52d1efe18d\sls.cab:
2016-12-29 09:04:11:968 764 244c misc microsoft signed: yes
2016-12-29 09:04:11:968 764 244c misc infrastructure signed: yes
2016-12-29 09:04:11:968 764 244c misc validating signature c:\windows\softwaredistribution\sls\7971f918-a847-4430-9279-4a52d1efe18d\tmp1b2b.tmp:
2016-12-29 09:04:11:983 764 244c misc microsoft signed: yes
2016-12-29 09:04:11:983 764 244c misc infrastructure signed: yes
2016-12-29 09:04:11:983 764 244c ep got 7971f918-a847-4430-9279-4a52d1efe18d redir client/server url: "https://fe2.update.microsoft.com/v6/clientwebservice/client.asmx"
2016-12-29 09:04:11:983 764 244c setup checking agent selfupdate
2016-12-29 09:04:11:983 764 244c setup client version: core: 7.9.9600.16422  aux: 7.9.9600.16384
2016-12-29 09:04:11:983 764 244c ep got 9482f4b4-e343-43b6-b170-9a65bc822c77 redir selfupdate url: "https://fe2.update.microsoft.com/v10/3/windowsupdate/selfupdate"
2016-12-29 09:04:12:639 764 244c misc validating signature c:\windows\softwaredistribution\selfupdate\wuident.cab:
2016-12-29 09:04:12:639 764 244c misc microsoft signed: yes
2016-12-29 09:04:12:639 764 244c misc infrastructure signed: yes
2016-12-29 09:04:12:639 764 244c misc validating signature c:\windows\softwaredistribution\selfupdate\tmp1dcc.tmp:
2016-12-29 09:04:12:639 764 244c misc microsoft signed: yes
2016-12-29 09:04:12:655 764 244c misc infrastructure signed: yes
2016-12-29 09:04:12:655 764 244c setup skipping selfupdate check based on /skip directive in wuident
2016-12-29 09:04:12:655 764 244c setup selfupdate check completed.  selfupdate not required.
2016-12-29 09:04:15:343 764 244c pt +++++++++++  pt: synchronizing server updates  +++++++++++
2016-12-29 09:04:15:343 764 244c pt  + serviceid = {7971f918-a847-4430-9279-4a52d1efe18d}, server url = https://fe2.update.microsoft.com/v6/clientwebservice/client.asmx
2016-12-29 09:04:15:343 764 244c agent reading cached app categories using lifetime 604800 seconds
2016-12-29 09:04:15:343 764 244c agent read 1 cached app categories
2016-12-29 09:04:21:484 764 244c pt  + syncupdates round trips: 2
2016-12-29 09:04:22:265 764 244c agent warning: failed evaluate installed rule, updateid = {{4deb7f5f-d14d-43e2-93fa-f81b10846cf7}.200}, hr = 80070057
2016-12-29 09:04:22:265 764 244c agent warning: failed evaluate installable rule, updateid = {{4deb7f5f-d14d-43e2-93fa-f81b10846cf7}.200}, hr = 80070057
2016-12-29 09:04:22:265 764 244c agent warning: failed evaluate installed rule, updateid = {{22ffd207-0eb5-4fcf-9f6a-67078327d7a3}.200}, hr = 80070057
2016-12-29 09:04:22:280 764 244c agent warning: failed evaluate installed rule, updateid = {{a4ecf96e-fe76-4933-b1a9-faa712dc2a3b}.200}, hr = 80070057
2016-12-29 09:04:22:280 764 244c agent warning: failed evaluate installable rule, updateid = {{a4ecf96e-fe76-4933-b1a9-faa712dc2a3b}.200}, hr = 80070057
2016-12-29 09:04:22:280 764 244c agent warning: failed evaluate installed rule, updateid = {{9941eb5f-4953-446d-99a2-c5989c596283}.200}, hr = 80070057
2016-12-29 09:04:22:280 764 244c agent warning: failed evaluate installable rule, updateid = {{9941eb5f-4953-446d-99a2-c5989c596283}.200}, hr = 80070057
2016-12-29 09:04:28:015 764 244c pt +++++++++++  pt: synchronizing extended update info  +++++++++++
2016-12-29 09:04:28:015 764 244c pt  + serviceid = {7971f918-a847-4430-9279-4a52d1efe18d}, server url = https://fe2.update.microsoft.com/v6/clientwebservice/client.asmx
2016-12-29 09:04:32:156 764 244c agent update {ff434e78-8b6a-4860-bd0f-4ac472e29063}.101 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent update {566b95d4-66f6-47ba-8953-02caea29022c}.101 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent update {b932d155-4c7f-4cbc-8527-d5df17b0a220}.101 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent update {b6c0f3c6-c368-4a76-a3bf-be068c7358f0}.101 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent  * added update {ca46fe98-f4c8-432f-9eb5-192ed4e0e5ee}.200 search result
2016-12-29 09:04:32:156 764 244c agent update {0c028e91-f849-476d-94cd-c5cd4ccbad75}.200 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent update {5af4ff91-e9a7-45b3-841f-ae886bb3c658}.201 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent update {81e92824-528f-4583-b074-406d9ed8701b}.200 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent update {95b42be3-50ba-4ad2-908b-af3f10304827}.201 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent update {547d2f41-089b-448f-9265-79579ec92f80}.200 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent update {b9271f09-68f6-4af6-a188-340d1c9ad7cc}.200 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent update {29a16cc3-adc5-45cd-99b0-50398e334137}.200 pruned out due potential supersedence
2016-12-29 09:04:32:156 764 244c agent  * added update {1971370b-aa59-4ad3-8230-2364fd01e334}.200 search result
2016-12-29 09:04:32:156 764 244c agent  * found 2 updates , 84 categories in search; evaluated appl. rules of 2688 out of 4336 deployed entities
2016-12-29 09:04:32:156 764 244c agent *********
2016-12-29 09:04:32:171 764 244c agent **  end  **  agent: finding updates [callerid = automaticupdateswuapp  id = 1]
2016-12-29 09:04:32:171 764 244c agent *************
2016-12-29 09:04:32:171 764 244c idletmr wu operation (csearchcall::init id 1, operation # 10) stopped; use network; not @ background priority
2016-12-29 09:04:32:171 764 244c idletmr decremented pdc refcount network 0
2016-12-29 09:04:32:171 764 244c idletmr decremented idle timer priority operation counter 1
2016-12-29 09:04:32:171 764 f50 au >>##  resumed  ## au: search updates [callid = {11098957-a024-4ebd-8656-041770ce9014} serviceid = {7971f918-a847-4430-9279-4a52d1efe18d}]
2016-12-29 09:04:32:171 764 f50 au  # 2 updates detected
2016-12-29 09:04:32:171 764 f50 au #########
2016-12-29 09:04:32:171 764 f50 au ##  end  ##  au: search updates  [callid = {11098957-a024-4ebd-8656-041770ce9014} serviceid = {7971f918-a847-4430-9279-4a52d1efe18d}]
2016-12-29 09:04:32:171 764 f50 au #############
2016-12-29 09:04:32:171 764 f50 au all au searches complete.

the attempt microsoft directly returns 2 optional updates. know based on security scanning software server missing on 100 security patches. here second log ran using wsus server:

2016-12-29 09:19:13:467 764 244c agent  * found 0 updates , 81 categories in search; evaluated appl. rules of 1016 out of 1714 deployed entities
2016-12-29 09:19:13:483 764 244c agent reporting status event 0 installable, 43 installed,  0 installed pending, 0 failed , 0 downloaded updates
2016-12-29 09:19:13:483 764 244c agent *********
2016-12-29 09:19:13:483 764 244c agent **  end  **  agent: finding updates [callerid = automaticupdateswuapp  id = 2]
2016-12-29 09:19:13:483 764 244c agent *************
2016-12-29 09:19:13:483 764 244c idletmr wu operation (csearchcall::init id 2, operation # 230) stopped; use network; not @ background priority
2016-12-29 09:19:13:483 764 244c idletmr decremented pdc refcount network 0
2016-12-29 09:19:13:483 764 244c idletmr decremented idle timer priority operation counter 1
2016-12-29 09:19:13:483 764 f50 au >>##  resumed  ## au: search updates [callid = {d0c6762b-9fd5-4604-a0e2-07e347a87c06} serviceid = {3da21691-e39d-4da6-8a4b-b43877bcb1b7}]
2016-12-29 09:19:13:483 764 f50 au  # 0 updates detected
2016-12-29 09:19:13:483 764 f50 au #########
2016-12-29 09:19:13:483 764 f50 au ##  end  ##  au: search updates  [callid = {d0c6762b-9fd5-4604-a0e2-07e347a87c06} serviceid = {3da21691-e39d-4da6-8a4b-b43877bcb1b7}]
2016-12-29 09:19:13:483 764 f50 au #############
2016-12-29 09:19:13:483 764 f50 au all au searches complete.
2016-12-29 09:19:13:483 764 f50 au au setting next detection timeout 2016-12-29 21:15:21

i have did normal tricks of deleting , recreating software distribution folder, reset authorization, etc. not working. advice appreciated.





hi,

for agent failed evaluate installable rule, here similar thread below may helpful you.

my 2012 r2 servers not receiving updates

https://social.technet.microsoft.com/forums/en-us/d315e0a9-48e5-4133-9e12-6d53cea2b9a9/my-2012-r2-servers-are-not-receiving-updates?forum=winserverwsus

best regards,

jay


please remember mark replies answers if help.
if have feedback technet subscriber support, contact tnmff@microsoft.com.



Windows Server  >  WSUS



Comments

Popular posts from this blog

CRL Revocation always failed

Failed to query the results of bpa xpath

0x300000d errors in Microsoft Remote Desktop client