Link to home
Start Free TrialLog in
Avatar of Hypercat (Deb)
Hypercat (Deb)Flag for United States of America

asked on

Updates not available on one server, WSUS on Win2016

Background: Migrated domain from SBS2008 to Windows 2016 Standard. All servers are VMs: one 2016 DC, one 2016 RDS, and one 2008R2 database server (SQL2008R2) (created by P2V). I will call the 2008R2 server "SQL1" for reference.

I had some problems getting WSUS to work on the 2016 server, but it is now working and both 2016 servers are updating with no problems, as well as the workstations.  The SQL1 server was FORMERLY the WSUS server, but WSUS has been completely removed.  The WSUS database is, however, on the SQL 2008 installation on SQL1.

The SQL1 server is the problem.  I have done considerable troubleshooting, including doing a complete Windows Update reset (stopping services, renaming the SoftwareDistribution and catroot2 folders, reregistering all the dlls, etc., etc.).  This did not solve the problem.  As it stands now, WSUS shows the server as checking in on a current basis, shows that it has downloaded updates and is ready for the updates to be installed, which I do manually on all servers. However, when I look on the server itself, although it shows the prompt that "Updates are ready to be installed," in control panel there are NO updates available.

Here's a screen shot from the SQL1 server:

User generated image
And here is a section of the Windows Update log from SQ1, which shows successful detection of the updates:
________________________________________________________________________________________

2017-06-27 10:49:35:068  164 26f0 AU #############
 2017-06-27 10:49:35:068  164 26f0 AU ## START ##  AU: Search for updates
 2017-06-27 10:49:35:068  164 26f0 AU #########
 2017-06-27 10:49:35:083  164 26f0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {F60C30F6-461B-4DC0-82F7-BD22E05808CE}]
 2017-06-27 10:49:35:083  164 2144 Agent *************
 2017-06-27 10:49:35:083  164 2144 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
 2017-06-27 10:49:35:083  164 2144 Agent *********
 2017-06-27 10:49:35:083  164 2144 Agent   * Online = Yes; Ignore download priority = No
 2017-06-27 10:49:35:083  164 2144 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
 2017-06-27 10:49:35:083  164 2144 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
 2017-06-27 10:49:35:083  164 2144 Agent   * Search Scope = {Machine}
 2017-06-27 10:49:35:083  164 2144 Setup Checking for agent SelfUpdate
 2017-06-27 10:49:35:130  164 2144 Setup Client version: Core: 7.6.7601.23453  Aux: 7.6.7601.23453
 2017-06-27 10:49:35:161  164 2144 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab with dwProvFlags 0x00000080:
 2017-06-27 10:49:35:177  164 2144 Misc  Microsoft signed: NA
 2017-06-27 10:49:35:177  164 2144 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\TMPE463.tmp with dwProvFlags 0x00000080:
 2017-06-27 10:49:35:192  164 2144 Misc  Microsoft signed: NA
 2017-06-27 10:49:35:208  164 2144 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
 2017-06-27 10:49:35:224  164 2144 Misc  Microsoft signed: NA
 2017-06-27 10:49:35:224  164 2144 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab with dwProvFlags 0x00000080:
 2017-06-27 10:49:35:224  164 2144 Misc  Microsoft signed: NA
 2017-06-27 10:49:35:302  164 2144 Setup Determining whether a new setup handler needs to be downloaded
 2017-06-27 10:49:35:302  164 2144 Setup SelfUpdate handler is not found.  It will be downloaded
 2017-06-27 10:49:35:302  164 2144 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320"
 2017-06-27 10:49:35:302  164 2144 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
 2017-06-27 10:49:35:302  164 2144 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
 2017-06-27 10:49:35:333  164 2144 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
 2017-06-27 10:49:35:333  164 2144 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320"
 2017-06-27 10:49:35:380  164 2144 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.320" is already installed.
 2017-06-27 10:49:35:380  164 2144 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
 2017-06-27 10:49:36:706  164 2144 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
 2017-06-27 10:49:36:706  164 2144 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://Leda:8530/ClientWebService/client.asmx
 2017-06-27 10:50:39:670  164 2144 PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
 2017-06-27 10:50:39:670  164 2144 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL = http://Leda:8530/ClientWebService/client.asmx
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {F1B99598-A22D-4FBE-9B63-09724833ACC3}.205 to search result
 2017-06-27 10:50:39:982  164 2144 Agent Update {8744404F-1DEE-4F5B-8845-6E7B82B7A77A}.201 is pruned out due to potential supersedence
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {592C9A40-6BDC-4122-8496-0B4295CF7A86}.206 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {BD312012-799E-4B68-9AF2-F9EEE93E86AA}.205 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {158250E3-4EF3-47EF-ACF3-908145BE487A}.200 to search result
 2017-06-27 10:50:39:982  164 2144 Agent Update {EBEE7D44-6FCC-44AC-B831-408A65B37058}.203 is pruned out due to potential supersedence
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {DEDEA6DA-E039-487B-8EC6-2729551F7165}.202 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {46C89AAA-6D7F-48C4-ABDA-2E0709B58B71}.204 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {5ECC171D-BB0D-422E-BA34-0921DCA313B5}.201 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {3244AF7A-F1C3-4B03-911B-100CD1ADFB7C}.202 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {1D26CDDD-003B-45CC-A794-DF5ABBFB2D55}.201 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {4AA2ED70-7C26-4727-BD11-6A98B6DD622C}.200 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {4182F860-3205-4B8D-BF9D-4B0B93F34ADC}.201 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {3AC4F294-F247-4771-813B-8F02B6F33526}.201 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Added update {1A20690C-ECCC-4617-83F1-EE5AA6A920AD}.203 to search result
 2017-06-27 10:50:39:982  164 2144 Agent   * Found 13 updates and 88 categories in search; evaluated appl. rules of 1959 out of 3562 deployed entities
 2017-06-27 10:50:39:998  164 2144 Agent *********
 2017-06-27 10:50:39:998  164 2144 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
 2017-06-27 10:50:39:998  164 2144 Agent *************
 2017-06-27 10:50:39:998  164 2144 Report REPORT EVENT: {0BA4A6C4-59E3-4804-A4E7-927F5780F3BB} 2017-06-27 10:50:39:982-0400 1 147 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Software Synchronization Windows Update Client successfully detected 13 updates.
 2017-06-27 10:50:39:998  164 2144 Report REPORT EVENT: {F8672599-0A40-43C6-B802-9D8952E151AC} 2017-06-27 10:50:39:982-0400 1 156 101 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Pre-Deployment Check Reporting client status.
 2017-06-27 10:50:39:998  164 2358 AU >>##  RESUMED  ## AU: Search for updates [CallId = {F60C30F6-461B-4DC0-82F7-BD22E05808CE}]
 2017-06-27 10:50:39:998  164 2358 AU   # 13 updates detected
 2017-06-27 10:50:39:998  164 2358 AU #########
 2017-06-27 10:50:39:998  164 2358 AU ##  END  ##  AU: Search for updates [CallId = {F60C30F6-461B-4DC0-82F7-BD22E05808CE}]
 2017-06-27 10:50:39:998  164 2358 AU #############
 2017-06-27 10:50:39:998  164 2358 AU Successfully wrote event for AU health state:0
 2017-06-27 10:50:39:998  164 2358 AU Featured notifications is disabled.
 2017-06-27 10:50:39:998  164 2358 AU AU setting next detection timeout to 2017-06-27 15:40:46
 2017-06-27 10:50:39:998  164 2358 AU Successfully wrote event for AU health state:0
 2017-06-27 10:50:39:998  164 2358 AU Successfully wrote event for AU health state:0
__________________________________________________________________________________________

Obviously, I'm missing something, but I don't know what...
Avatar of Don
Don
Flag of United States of America image

Have you clicked on the check for updates link??
Avatar of Hypercat (Deb)

ASKER

Yes - I get this message (as you would expect if WSUS was working!): Windows Update cannot currently check for updates, because updates on this computer are controlled by your system administrator.
ASKER CERTIFIED SOLUTION
Avatar of Don
Don
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
BINGO!!!!  Yes, I definitely forgot about that one. Thanks for your help, Donald.

Deb
Glad to help, that indicates a GPO causing that
I don't think so in this case, since this server is using the same GPO as the other servers that are working properly. I think I may have changed it manually during some of my other troubleshooting and then forgot about it.
could always do rsop.msc just to be sure.