Quantcast
Channel: Configuration Manager 2012 - Security, Updates and Compliance forum
Viewing all 6382 articles
Browse latest View live

[RESOLVED] SCCM Current Branch 1906 - Compliance Report for Application and Windows Updates

$
0
0

Specs: 

SCCM Current Branch 1906

Windows 2016 x64 Enterprise - Build 1607

Microsoft SQL 2016 Standard

Symptoms:

About 2 weeks ago, around Nov 12th 2019 endpoints and server have stopped reporting their compliance.

Essentially, I can deploy patches and software to systems just fine and they install.

However when I check on the monitoring side via SCCM the packages do not get updated with compliant, in progress and whatnot, I'm completely blind as to what's going on.

Network side, I've verified via our SiEM verified of there's any traffic and none of the network firewalls are blocking and neither are endpoints and server blocking the traffic.

I check on the server and I don't really see any major errors...

I'm kind of dumbfounded at the moment as to what could be the cause... my reports are just not updating.

Also, as a result, let's say I build a compliance baseline config and deploy it to a collection and then build a collection based on the said compliance, no systems are appearing in the list...

Also for testing purposes, I clone one of my application package and re-deployed it and I'm not getting any status report even though I'm able to install and remove the package on the system target.

Please advise...




SCCM Application Deployment Error: 0x80091007 (-2146889721),The hash value is not correct

$
0
0

SCCM 1902

Peer-Caching Turned On

Action in SCCM: Created a new application called “Zoom Client for Meetings V1.0” and deployed to “All Windows 10” collection.

The installation worked on about 1500 devices and caused errors on about 600.

What I’m seeing on the device:

Currently what I’m seeing is the device pulls the content from a peer device and creates a temp folder in ccmcache and then the folder disappears from the ccmcache leaving the application not installed.

CAS log error:

Failed to do hash verification with preference : 4. Try to verify at next hash algorithm

Tried these things:

          • Update Content on original Zoom package 
          • Created a copy of the SCCM package and uploaded content – “Zoom Client for Meetings and redeployed to collection.
          • Application Revision History – deleted one of the 2 revisions
        • Re-created brand new source and package in “Zoom Client for Meetings
      • Deleted all content from all 3 x DP's and re-distributed new package.
    • Excluded files and folders set >included %windir%\CCMCache for AV
  • Added 8 machines to test collection this has the client setting for the peer cache turned off - to see if it will force the devices to go to the main dp's instead of the peer devices - still same errors.

Help?? Something so simple is giving me so much grief this week.

Any logs on the SCCM server I can check?

Anything to do with superpeers in the SCCM database?





Windows 7 system upgraded to Windows 10 not getting any deployed updates

$
0
0

Hi,

I've updated an older Windows 7 x86 system to Windows 10 x86 with no apparent issues during the upgrade process, and in the SCCM console I can see the system as active, so the config manager client appears to be installed correctly

The problem is that the system doesn't seem to be pulling down any updates that I deploy. The nightly updates to Defender that I push out aren't getting installed for example, and neither did the last round of updates from Microsoft that I deployed.

In the SCCM console for the nightly Defender updates the deployment status for this system shows an error 0X80004005 - unspecified error.

And for the latest round of Windows updates I deployed, in the SCCM console the deployment status shows as Unknown (Client check passed/Active).

What logs should I be reviewing on the client system to see why the updates aren't being deployed?

Thanks

Nick

Could not find Forefront Endpoint Protection 2010 in the list of software

$
0
0

I'm in the process of configuring Forefront protection for sccm 2012r2 i'v installed the EP role, and the SCEP client it will install on the client.

I'm not able to download the updates since i can't find Forefront Endpoint Protection 2010 in the product list, can someone help me?

SUP sync problem: Category products not found on WSUS

$
0
0

Hello,

Updates stopped working suddenly for clients, and the clients reported back with message: "Client check passed/Active".
I can't say much about it because I have to be honest, I didn't do much troubleshooting.

I went straight to re-configuration of SUP/WSUS.
So I removed the SUP CM role, and WSUS and re-installed everything again.
I did this several times now and followed similar procedures, but slightly different.

Basically:

Remove SUP
Remove WSUS
Restart
Install WSUS
Install the two famous updates
Restart
Add SUP role

Environment (one machine):
Server: 2008 R2
SCCM: 2012 SP1 - 5.0.7804.1000
WSUS 3.0 SP2 with both KB's

Syncing doesn't work.
From the wsyncmgr.log I'd say that SCCM is unable to communicate with WSUS.
From the wcm.log I'd think that Category Products are enabled on SCCM which cannot be found on WSUS, which I find a strange reason to block the whole Updating process but who am I to critisize. :-)
The problem is that I can't find these products in SCCM, let alone disable.

I really hope someone can help me out with this as this is starting to drive me crazy.
Also tried to run the WSUS configuration wizard partially until the products but that didn't help either.

Each time I restart the whole configuration, when I add the SUP role it seems to remember my settings. Is there a proper way to completely remove SUP?

WCM.log:

Category Product:70cfad70-6629-b54b-5819-c809a605515e (Adobe Flash Player) not found on WSUSSMS_WSUS_CONFIGURATION_MANAGER13/12/2013 15:32:125572 (0x15C4)
Category Product:e1d507be-497c-d8fd-61d7-b0d93ee399ca (Adobe Reader) not found on WSUSSMS_WSUS_CONFIGURATION_MANAGER13/12/2013 15:32:125572 (0x15C4)
Subscription contains categories unknown to WSUS. SMS_WSUS_CONFIGURATION_MANAGER13/12/2013 15:32:125572 (0x15C4)
Failed to set Subscriptions on the WSUS Server. Error:(-2147467259)Unspecified errorSMS_WSUS_CONFIGURATION_MANAGER13/12/2013 15:32:125572 (0x15C4)

WSYNCMGR.log

Sync failed: WSUS server not configured. Please refer to WCM.log for configuration error details.. Source: CWSyncMgr::DoSyncSMS_WSUS_SYNC_MANAGER13/12/2013 15:37:125660 (0x161C)
STATMSG: ID=6703 SEV=E LEV=M SOURCE="SMS Server" COMP="SMS_WSUS_SYNC_MANAGER" SYS=SVCMSS001.mobilebelgium.be SITE=PS1 PID=5216 TID=5660 GMTDATE=Fri Dec 13 14:37:12.547 2013 ISTR0="CWSyncMgr::DoSync" ISTR1="WSUS server not configured. Please refer to WCM.log for configuration error details." ISTR2="" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=0SMS_WSUS_SYNC_MANAGER13/12/2013 15:37:125660 (0x161C)
Sync failed. Will retry in 60 minutesSMS_WSUS_SYNC_MANAGER13/12/2013 15:37:125660 (0x161C)

Software Updates issue - Clients shown as active but updates (office 365) are not downloading to the device.

$
0
0

Hi all,

We are having issues with Office 365 updates and some 1709 Windows 10 devices. the devices have the correct registry setting for semi-annual updates. They are currently running office 365 1701.

I have deployed office 365 updates using an ADR to a number of devices. Majority of the devices are receiving the update. But some Windows 10 1709 devices are not receiving the update. 

If I check the deployment - the device is seen as active. It has been like this for a few days now. The devices are receiving defender updates (however we do have a fallback source for defender updates which is WSUS on the same server)

CIAgent.log

CAgent::SerializedCIDeletion - Cannot delete CI ModelName: Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_ff5aeb9c-1ab1-42f0-97bf-7f4a9e47d8e9 Version: 200 User SYSTEM. Waiting for active jobs to finish.CIAgent05/06/2018 09:05:205520 (0x1590)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore DownloadCIsCIAgent05/06/2018 09:11:408960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=DownloadCIs, CurrentState=CheckingApplicability)CIAgent05/06/2018 09:11:401264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): TransitionState(From=CheckingApplicability, To=DownloadingCIs) for Event=TransitionCIAgent05/06/2018 09:11:401264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:401264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:401264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=Transition, CurrentState=DownloadingCIs)CIAgent05/06/2018 09:11:408960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): Client requesting CIAgentJob context info for key: PostRebootDetectCIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_277cc8a0-f3fb-439a-8c16-41991f894354:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_e357e451-815c-400f-94fe-b3d074729d97:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_b9d6e54c-3894-40ee-bad2-d5a65f03f30a:201 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_a90c3005-7b59-4268-8b11-12d9be5c8ea0:201 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_5a7caf18-4f8b-42ec-b873-72dc693ba615:201 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_12d710cf-9eb7-408b-ba1b-b55e33c4585f:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_c22c4358-0189-4bfa-8a3d-2d2201b3ef8c:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_2bd21574-a3dc-42fb-a232-c06d9618b811:201 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_3e2fd768-3492-48a2-aba5-601f1daf34a6:201 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_022f043b-57fb-4017-9239-629e82367a70:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_88718960-31fb-4bd9-9f3c-c005eef1eb27:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_cd5377d6-0435-4b72-a699-ddcc5772b68a:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_a3cb891a-fa07-455d-85c2-ece6581932f2:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_77739281-38ce-4dc9-b620-e9e354d37ddc:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_f4f8264e-3171-4df5-b3b3-a944784e9360:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_07d9cb5f-0724-4b69-b6b0-a8b5e26b8c39:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_da422b55-f1fc-486f-aba3-7dbfcffa5460:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_aa38b52b-ecff-40d0-9d06-437f020e671f:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_2304a806-695b-455a-a927-3e3d35629d1c:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_1b1b4f78-523e-4a98-a630-907aa79b22a5:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_c1b25c86-343c-4a15-9128-72331ed8a2aa:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_6905cb2f-26a7-47c1-aa90-068dff211b37:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
Skipping CI Site_FB33B31E-0807-4478-801D-E8E466F206F1/SUM_f24e1bd8-0567-495d-9f99-3a31505ff0f9:200 because it is not needed.CIAgent05/06/2018 09:11:408960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): Started CIDownloadJob({54B7D890-7475-4A5A-A500-ED1C3E37CB2F})CIAgent05/06/2018 09:11:408960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:408960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore PersistCIsCIAgent05/06/2018 09:11:492784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=PersistCIs, CurrentState=DownloadingCIs)CIAgent05/06/2018 09:11:491264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): TransitionState(From=DownloadingCIs, To=PersistingCIModels) for Event=TransitionCIAgent05/06/2018 09:11:491264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:491264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:491264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=Transition, CurrentState=PersistingCIModels)CIAgent05/06/2018 09:11:492784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): TransitionState(From=PersistingCIModels, To=InvokingSdmMethod) for Event=TransitionCIAgent05/06/2018 09:11:492784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:492784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:492784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=Transition, CurrentState=InvokingSdmMethod)CIAgent05/06/2018 09:11:498960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): Invoking method provider...CIAgent05/06/2018 09:11:498960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): Client requesting CIAgentJob context info for key: MTCTaskHandleCIAgent05/06/2018 09:11:498960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): Client requesting CIAgentJob context info for key: MTCTaskPriorityCIAgent05/06/2018 09:11:498960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): Client requesting CIAgentJob context info for key: UpdateJobOptionsCIAgent05/06/2018 09:11:498960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore NotifyProgressCIAgent05/06/2018 09:11:508960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:508960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=NotifyProgress, CurrentState=InvokingSdmMethod)CIAgent05/06/2018 09:11:501264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:501264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore NotifyCompleteCIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=NotifyComplete, CurrentState=InvokingSdmMethod)CIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): TransitionState(From=InvokingSdmMethod, To=CompletedSdmMethodInvocation) for Event=TransitionCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=Transition, CurrentState=CompletedSdmMethodInvocation)CIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): TransitionState(From=CompletedSdmMethodInvocation, To=ProviderNotifiedForCompletion) for Event=TransitionCIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=Transition, CurrentState=ProviderNotifiedForCompletion)CIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CompleteJobCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): Released referencesCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): TransitionState(From=ProviderNotifiedForCompletion, To=Completed) for Event=TransitionCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=Transition, CurrentState=Completed)CIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): TransitionState(From=Completed, To=StateWaitOnCompletion) for Event=TransitionCIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:512784 (0x0AE0)
CAgent::CreateJob - Creating new CI Agent Job for machineCIAgent05/06/2018 09:11:512784 (0x0AE0)
CAgent::EvaluateCIsCIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::HandleEvent(Event=Transition, CurrentState=Init)CIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): Client requesting CIAgentJob context info for key: StateMessagePriorityCIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): TransitionState(From=Init, To=WaitingForAssignedCI) for Event=TransitionCIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::HandleEvent(Event=Transition, CurrentState=WaitingForAssignedCI)CIAgent05/06/2018 09:11:511264 (0x04F0)
Request to delete CIAgent job {9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}CIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): Deleting CIAgent JobCIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore JobDeleteCIAgent05/06/2018 09:11:512784 (0x0AE0)
Queued Deletion for job {9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}CIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): TransitionState(From=WaitingForAssignedCI, To=CheckingApplicability) for Event=TransitionCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::HandleEvent(Event=Transition, CurrentState=CheckingApplicability)CIAgent05/06/2018 09:11:518960 (0x2300)
Initiating custom applicability handlers.CIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=Transition, CurrentState=StateWaitOnCompletion)CIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}): CAgentJob::HandleEvent(Event=JobDelete, CurrentState=StateWaitOnCompletion)CIAgent05/06/2018 09:11:512784 (0x0AE0)
Internal Request to delete CIAgent job {9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}CIAgent05/06/2018 09:11:512784 (0x0AE0)
Deleted CIAgent job {9C50817E-3ACC-4091-B5A1-3FE57EC0FAFE}CIAgent05/06/2018 09:11:512784 (0x0AE0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore DownloadCIsCIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::HandleEvent(Event=DownloadCIs, CurrentState=CheckingApplicability)CIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): TransitionState(From=CheckingApplicability, To=DownloadingCIs) for Event=TransitionCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore TransitionCIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:511264 (0x04F0)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::HandleEvent(Event=Transition, CurrentState=DownloadingCIs)CIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): Client requesting CIAgentJob context info for key: PostRebootDetectCIAgent05/06/2018 09:11:518960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): Nothing to be downloaded.CIAgent05/06/2018 09:11:528960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::QueueEvent - Queueing event and incrementing semaphore PersistCIsCIAgent05/06/2018 09:11:528960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): QueueDebug - Executing Event.CIAgent05/06/2018 09:11:528960 (0x2300)
CIAgentJob({F9EAD119-5BC2-43B5-A0C9-BE71929E8320}): CAgentJob::Hand


SCANAGENT.log

- - -Evaluating Update Status...ScanAgent05/06/2018 09:11:568960 (0x2300)
Found CategoryID of :e0789628-ce08-4437-be74-2495b842f43b for Update:0b901459-0f11-499d-b4a0-d0c1cb53dc9fScanAgent05/06/2018 09:11:568960 (0x2300)
CScanAgent::ScanByUpdates - Found UpdateClassification e0789628-ce08-4437-be74-2495b842f43b for Update:0b901459-0f11-499d-b4a0-d0c1cb53dc9fScanAgent05/06/2018 09:11:568960 (0x2300)
Found CategoryID of :e0789628-ce08-4437-be74-2495b842f43b for Update:f8827516-bdba-470a-a271-21441e1625dcScanAgent05/06/2018 09:11:568960 (0x2300)
CScanAgent::ScanByUpdates - Found UpdateClassification e0789628-ce08-4437-be74-2495b842f43b for Update:f8827516-bdba-470a-a271-21441e1625dcScanAgent05/06/2018 09:11:568960 (0x2300)
Sources are current and valid. TTLs are also valid.ScanAgent05/06/2018 09:11:568960 (0x2300)
CScanJobManager::Scan - SKIPPING SCAN and using cached results...ScanAgent05/06/2018 09:11:568960 (0x2300)
CScanJobManager::Scan - Reporting Scan request complete to clients...ScanAgent05/06/2018 09:11:568960 (0x2300)
- - -Evaluating Update Status...ScanAgent05/06/2018 09:11:568324 (0x2084)
- - Calling back to client on Scan request complete...ScanAgent05/06/2018 09:11:568324 (0x2084)
*****ScanByUpdates request received with ForceReScan=0, ScanOptions=0x00000010,  WSUSLocationTimeout = 604800ScanAgent05/06/2018 09:11:569620 (0x2594)
- - -Evaluating Update Status...ScanAgent05/06/2018 09:11:569620 (0x2594)
Found CategoryID of :e0789628-ce08-4437-be74-2495b842f43b for Update:0b901459-0f11-499d-b4a0-d0c1cb53dc9fScanAgent05/06/2018 09:11:569620 (0x2594)
CScanAgent::ScanByUpdates - Found UpdateClassification e0789628-ce08-4437-be74-2495b842f43b for Update:0b901459-0f11-499d-b4a0-d0c1cb53dc9fScanAgent05/06/2018 09:11:569620 (0x2594)
Found CategoryID of :e0789628-ce08-4437-be74-2495b842f43b for Update:f8827516-bdba-470a-a271-21441e1625dcScanAgent05/06/2018 09:11:569620 (0x2594)
CScanAgent::ScanByUpdates - Found UpdateClassification e0789628-ce08-4437-be74-2495b842f43b for Update:f8827516-bdba-470a-a271-21441e1625dcScanAgent05/06/2018 09:11:569620 (0x2594)
Sources are current and valid. TTLs are also valid.ScanAgent05/06/2018 09:11:569620 (0x2594)
CScanJobManager::Scan - SKIPPING SCAN and using cached results...ScanAgent05/06/2018 09:11:569620 (0x2594)
CScanJobManager::Scan - Reporting Scan request complete to clients...ScanAgent05/06/2018 09:11:569620 (0x2594)
- - -Evaluating Update Status...ScanAgent05/06/2018 09:11:568324 (0x2084)
- - Calling back to client on Scan request complete...ScanAgent05/06/2018 09:11:568324 (0x2084)
*****ScanByUpdates request received with ForceReScan=2, ScanOptions=0x00000012,  WSUSLocationTimeout = 604800ScanAgent05/06/2018 09:12:208324 (0x2084)
- - -Evaluating Update Status...ScanAgent05/06/2018 09:12:208324 (0x2084)
Found CategoryID of :e0789628-ce08-4437-be74-2495b842f43b for Update:0b901459-0f11-499d-b4a0-d0c1cb53dc9fScanAgent05/06/2018 09:12:208324 (0x2084)
CScanAgent::ScanByUpdates - Found UpdateClassification e0789628-ce08-4437-be74-2495b842f43b for Update:0b901459-0f11-499d-b4a0-d0c1cb53dc9fScanAgent05/06/2018 09:12:208324 (0x2084)
Found CategoryID of :e0789628-ce08-4437-be74-2495b842f43b for Update:f8827516-bdba-470a-a271-21441e1625dcScanAgent05/06/2018 09:12:208324 (0x2084)
CScanAgent::ScanByUpdates - Found UpdateClassification e0789628-ce08-4437-be74-2495b842f43b for Update:f8827516-bdba-470a-a271-21441e1625dcScanAgent05/06/2018 09:12:208324 (0x2084)
Sources are current and valid. TTLs are also valid.ScanAgent05/06/2018 09:12:208324 (0x2084)
Sources are Valid, so converting to Offline Scan. ScanAgent05/06/2018 09:12:208324 (0x2084)
ScanJob({77D09DED-1B70-4A41-8676-2640FFEF3EB0}): CScanJob::Scan- Requesting Offline Scan with last known location.ScanAgent05/06/2018 09:12:208324 (0x2084)
Sources are current and valid. TTLs are also valid.ScanAgent05/06/2018 09:12:201264 (0x04F0)
ScanJob({77D09DED-1B70-4A41-8676-2640FFEF3EB0}): CScanJob::Execute- Requesting scan with CategoryIDs=E0789628-CE08-4437-BE74-2495B842F43B,E0789628-CE08-4437-BE74-2495B842F43BScanAgent05/06/2018 09:12:201264 (0x04F0)
ScanJob({77D09DED-1B70-4A41-8676-2640FFEF3EB0}): Scan Succeeded, setting flag that performed scan was catscanScanAgent05/06/2018 09:12:208324 (0x2084)
ScanJob({77D09DED-1B70-4A41-8676-2640FFEF3EB0}): CScanJob::OnScanComplete - Scan completed successfully, ScanType=2ScanAgent05/06/2018 09:12:208324 (0x2084)
ScanJob({77D09DED-1B70-4A41-8676-2640FFEF3EB0}): CScanJobManager::OnScanComplete -ScanJob is completed.ScanAgent05/06/2018 09:12:208324 (0x2084)
ScanJob({77D09DED-1B70-4A41-8676-2640FFEF3EB0}): CScanJobManager::OnScanComplete - Reporting Scan request complete to clients...ScanAgent05/06/2018 09:12:208324 (0x2084)
- - -Evaluating Update Status...ScanAgent05/06/2018 09:12:201264 (0x04F0)
- - Calling back to client on Scan request complete...ScanAgent05/06/2018 09:12:201264 (0x04F0)

WUAHandler.log

Scan results will include all superseded updates. WUAHandler04/06/2018 15:42:456600 (0x19C8)
Search Criteria is ((DeploymentAction=* AND Type='Software' AND CategoryIDs contains '30EB551C-6288-4716-9A78-F300EC36D72B'))WUAHandler04/06/2018 15:42:456600 (0x19C8)
Async searching of updates using WUAgent started. WUAHandler04/06/2018 15:42:456600 (0x19C8)
Async searching completed.WUAHandler04/06/2018 15:42:455416 (0x1528)
Successfully completed scan.WUAHandler04/06/2018 15:42:452072 (0x0818)
Scan results will include all superseded updates. WUAHandler04/06/2018 15:42:456600 (0x19C8)
Search Criteria is ((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'A38C835C-2950-4E87-86CC-6911A52C34A3') OR (DeploymentAction=* AND Type='Software' AND CategoryIDs contains '8C3FCC84-7410-4A95-8B89-A166A0190486') OR (DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E0789628-CE08-4437-BE74-2495B842F43B') OR (DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E6CF1350-C01B-414D-A61F-263D14D133B4'))WUAHandler04/06/2018 15:42:456600 (0x19C8)
Async searching of updates using WUAgent started. WUAHandler04/06/2018 15:42:456600 (0x19C8)
Async searching completed.WUAHandler04/06/2018 15:42:462228 (0x08B4)
Successfully completed scan.WUAHandler04/06/2018 15:42:466064 (0x17B0)
Its a WSUS Update Source type ({FB33B31E-0807-4478-801D-E8E466F206F1}), adding it.WUAHandler04/06/2018 15:42:496600 (0x19C8)
Device is not MDM enrolled yet. All workloads are managed by SCCM.WUAHandler04/06/2018 15:42:496772 (0x1A74)
SourceManager::GetIsWUfBEnabled - There is no Windows Update for Business settings assignment. Windows Update for Business is not enabled through ConfigMgrWUAHandler04/06/2018 15:42:496772 (0x1A74)
Existing WUA Managed server was already set (http://SCCMServer.site.local:8530), skipping Group Policy registration.WUAHandler04/06/2018 15:42:496600 (0x19C8)
Added Update Source ({FB33B31E-0807-4478-801D-E8E466F206F1}) of content type: 2WUAHandler04/06/2018 15:42:496600 (0x19C8)
Scan results will include all superseded updates. WUAHandler04/06/2018 15:42:496600 (0x19C8)
Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')WUAHandler04/06/2018 15:42:496600 (0x19C8)
Async searching of updates using WUAgent started. WUAHandler04/06/2018 15:42:496600 (0x19C8)
Async searching completed.WUAHandler04/06/2018 15:42:525880 (0x16F8)
Successfully completed scan.WUAHandler04/06/2018 15:42:526064 (0x17B0)
CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundlesWUAHandler04/06/2018 15:50:156544 (0x1990)
CWuaHandler::SetCategoriesForStateReportingExclusion called with E0789628-CE08-4437-BE74-2495B842F43B;E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for leaves and E0789628-CE08-4437-BE74-2495B842F43B,A38C835C-2950-4E87-86CC-6911A52C34A3; for bundlesWUAHandler04/06/2018 15:56:525520 (0x1590)
Scan results will include all superseded updates. WUAHandler04/06/2018 15:57:361168 (0x0490)
Search Criteria is ((DeploymentAction=* AND Type='Software' AND CategoryIDs contains '30EB551C-6288-4716-9A78-F300EC36D72B'))WUAHandler04/06/2018 15:57:361168 (0x0490)
Async searching of updates using WUAgent started. WUAHandler04/06/2018 15:57:361168 (0x0490)
Async searching completed.WUAHandler04/06/2018 15:57:369032 (0x2348)
Successfully completed scan.WUAHandler04/06/2018 15:57:371264 (0x04F0)
Scan results will include all superseded updates. WUAHandler04/06/2018 15:57:371168 (0x0490)
Search Criteria is ((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'A38C835C-2950-4E87-86CC-6911A52C34A3') OR (DeploymentAction=* AND Type='Software' AND CategoryIDs contains '8C3FCC84-7410-4A95-8B89-A166A0190486') OR (DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E0789628-CE08-4437-BE74-2495B842F43B') OR (DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E6CF1350-C01B-414D-A61F-263D14D133B4'))WUAHandler04/06/2018 15:57:371168 (0x0490)
Async searching of updates using WUAgent started. WUAHandler04/06/2018 15:57:371168 (0x0490)
Async searching completed.WUAHandler04/06/2018 15:57:379836 (0x266C)
Successfully completed scan.WUAHandler04/06/2018 15:57:371256 (0x04E8)
Its a WSUS Update Source type ({FB33B31E-0807-4478-801D-E8E466F206F1}), adding it.WUAHandler05/06/2018 09:05:117136 (0x1BE0)
Device is not MDM enrolled yet. All workloads are managed by SCCM.WUAHandler05/06/2018 09:05:1110324 (0x2854)
SourceManager::GetIsWUfBEnabled - There is no Windows Update for Business settings assignment. Windows Update for Business is not enabled through ConfigMgrWUAHandler05/06/2018 09:05:1110324 (0x2854)
Existing WUA Managed server was already set (http://SCCMServer.site.local:8530), skipping Group Policy registration.WUAHandler05/06/2018 09:05:117136 (0x1BE0)
Added Update Source ({FB33B31E-0807-4478-801D-E8E466F206F1}) of content type: 2WUAHandler05/06/2018 09:05:117136 (0x1BE0)
Scan results will include all superseded updates. WUAHandler05/06/2018 09:05:117136 (0x1BE0)
Search Criteria is (DeploymentAction=* AND Type='Software') OR (DeploymentAction=* AND Type='Driver')WUAHandler05/06/2018 09:05:117136 (0x1BE0)
Async searching of updates using WUAgent started. WUAHandler05/06/2018 09:05:117136 (0x1BE0)
Async searching completed.WUAHandler05/06/2018 09:11:396932 (0x1B14)
Successfully completed scan.WUAHandler05/06/2018 09:11:398960 (0x2300)
Going to search using WSUS update source.WUAHandler05/06/2018 09:11:568324 (0x2084)
Synchronous searching started using filter: 'UpdateID = '0b901459-0f11-499d-b4a0-d0c1cb53dc9f' AND DeploymentAction = *'...WUAHandler05/06/2018 09:11:568324 (0x2084)
Successfully completed synchronous searching of updates.WUAHandler05/06/2018 09:11:578324 (0x2084)
1. Update: 0b901459-0f11-499d-b4a0-d0c1cb53dc9f, 200   BundledUpdates: 1WUAHandler05/06/2018 09:11:578324 (0x2084)
       Update: f8827516-bdba-470a-a271-21441e1625dc, 200   BundledUpdates: 0WUAHandler05/06/2018 09:11:578324 (0x2084)
1. Update (Missing): Definition Update for Windows Defender Antivirus - KB2267602 (Definition 1.269.678.0) (0b901459-0f11-499d-b4a0-d0c1cb53dc9f, 200)WUAHandler05/06/2018 09:11:578324 (0x2084)
Async installation of updates started.WUAHandler05/06/2018 09:11:578324 (0x2084)
Update 1 (0b901459-0f11-499d-b4a0-d0c1cb53dc9f) finished installing (0x00000000), Reboot Required? NoWUAHandler05/06/2018 09:12:2011196 (0x2BBC)
Async install completed.WUAHandler05/06/2018 09:12:2011196 (0x2BBC)
Installation of updates completed.WUAHandler05/06/2018 09:12:208960 (0x2300)
Scan results will include all superseded updates. WUAHandler05/06/2018 09:12:201264 (0x04F0)
Search Criteria is ((DeploymentAction=* AND Type='Software' AND CategoryIDs contains 'E0789628-CE08-4437-BE74-2495B842F43B'))WUAHandler05/06/2018 09:12:201264 (0x04F0)
Async searching of updates using WUAgent started. WUAHandler05/06/2018 09:12:201264 (0x04F0)
Async searching completed.WUAHandler05/06/2018 09:12:207248 (0x1C50)
Successfully completed scan.WUAHandler05/06/2018 09:12:201264 (0x04F0)



Registry Changes After Windows Patch Installation

$
0
0

We recently had a scan on our network which revealed that many Critical/High Windows patches are missing. Upon further investigation, these patches are installed, but apparently require additional Registry configuration for the patch to be enabled. An example would be:
https://support.microsoft.com/en-us/help/4072698/windows-server-speculative-execution-side-channel-vulnerabilities-prot

For CVE-2017-5715, this involves adding 2 DWORD's and 1 String, in order to enable the mitigations.

My question is, how do others manage the additional requirements? Like many, we see the patch installed in the SCCM reporting and assume all is well. Does anyone review every individual patch each month to look for additional requirements? Then test the Registry changes for each patch and roll them out using GPO?

Most importantly, why don't Microsoft include the required Registry changes in the patch installation? Thus making it truly automated.

Thanks all!

Chris

GPO Settings when using SCCM 2012 R2 /WSUS for Windows Update

$
0
0

Hi, I would like to know the default GPO Settings when using SCCM/WSUS 2012 R2 for Windows Update. i have been looking on line and cant find a concise answer.
I have an issue on site where a machine in my test group os getting a Windows Update pop up message:

How can i disable all settings via GPO so updates/messages are managed by SCCM?

SCCM 2012 R2 (1511)

2008 R2 DC

Cheers



SCCM Endpoint Protection - 2016 Server "unmanaged"

$
0
0

Under "\Assets and Compliance\Overview\Devices\All Desktop and Server Clients: Endpoint Protection agent not yet installed"
I have a range of server, the only thing they have in common is that there are all windows servers 2016. The agent were installed on these servers. I've already tried to get a server "managed" by clicking under "configuration manager properties" --> "actions" --> "Hardware Inv. Cycle", "Machine Policy Retrieval & Evaluation Cycle", "Software Inventory Cycle" and so on without success.

I assume the problem is caused because where using an older version of sccm which might not be fully compatible with 2016 server.

SCCM Version is 1706 we are using.

When the clean up wizard run for the sccm wsus ,from which stream server it start to clean ?

$
0
0
Generally the clean up process supposed to be start from the bottom to up for the wsus cleanup so i was in confusion when we run clean up wizard on site server ..From which server it start performing cleaning  down steam server or upsteam servers ?

Edge Beta Versionm

$
0
0
I am running MS Edge Beta version. When can I get updates?

All Software Updates Cumulative updates for Windows server 2019 missing

$
0
0

Hello,

I can see heaps of updates in "All Software Updates" for "Windows Server 2016" but none for "Windows Server 2019". Although I don't have any of these Servers in AD yet, I would have thought the updates should be there with Required=0

Creating an ADR also for shows nothing for 2019 but 2016 does?

What am I missing?

Running CM v1902

SCCM not updating OS build information after servicing plan

$
0
0

Hi, everyone

Has anyone had this problem: after using servicing plans to update some W10 Enterprise 1511 build 10586 to 1703 build 15063, the information in ConfMgr hasn't update accordingly. Notice this when trying to make a collection based on the build and the collection didn't update with the correct clients.

In the clients, About information and command line ver both show correct version and build, but SCCM doesn't.

I have already forced Software and Hardware scans but still no result.

Thanks!

How to I get SCCM "All Software Updates" to show neweset upddates? I am only seeing 30 days or older updates

$
0
0

I want to push security updates 2020-01 to my servers. The latest updates I am able to download is 2019-12.  Instead of waiting next month to see the updates I want to be able to push now. How do I get SCCM to see newest updates?

Client can't dowload updates from SCCM Server

$
0
0

Hi, I have one client that can't update from SCCM. When I try to run the updates manually it fails right after trying to download the update.

The error I'm getting is "The software change returned error code 0x87D00705(-2016409851)."

Any ideas what might cause this error?


Lost the account with full control of sccm

$
0
0

Hello,

We have SCCM 1806, where some features and options are not available and grayed out. As i read in Internet, i found that only the account which was used to setup SCCM for the first time, is the only one who has those privileges.

The privileges for example, the option "All security scopes" is grayed out:

or this one, when i try to remove an old administrative account:

I would like to know, if there is any solution or changes in database or any configuration files, to declare a new super user that can remove those accounts or accomplish these settings?

Thank you in advance,

The Microsoft Software License Terms have not been completely downloaded and cannot be accepted

$
0
0

I have setup SCCM 2012 Sp1 on Server 2012 with WSUS using the internal database. When I sync updates in SCCM, I get the following error on some of the updates. I have run the sync 3 times over a day with the same updates failing

"Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.SoapExceptionProcessor.DeserializeAndThrow"

"Sync failed: Failed to sync some of the updates. Source: Microsoft.SystemsManagementServer.SoftwareUpdatesManagement.WsusSyncAction.WSyncAction.SyncUpdates"

"STATMSG: ID=6703 SEV=E LEV=M SOURCE="SMS Server" COMP="SMS_WSUS_SYNC_MANAGER" SYS=SiteServerxx.COM.AU SITE=MEL PID=2260 TID=2716 GMTDATE=Sat Jan 26 03:56:15.496 2013 ISTR0="Microsoft.SystemsManagementServer.SoftwareUpdatesManagement.WsusSyncAction.WSyncAction.SyncUpdates" ISTR1="Failed to sync some of the updates" ISTR2="" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=0"

Not all of the updates are showing

Can't update Distribution points in Boot Image x64 after sccm upgrade to version 1902

$
0
0

Hi Fellas, 

I am struggling to update distribution points for my boot image x64 after I upgraded my SCCM from 1802 to 1902. 

Do i inject new 3Com Dual Port 1000-SX PCI-X Server NIC driver into my boot image?

Please advise!!!

  Error: Update boot image: 
Microsoft Windows PE (x64)

  Error: Update actions: 
Add ConfigMgr binaries using Production Client version 5.00.8790.1007
Set scratch space
Enable Windows PE command line support
Add drivers

 

Error: Failed to import the following drivers:
3Com Dual Port 1000-SX PCI-X Server NIC - Failed to inject a ConfigMgr driver into the mounted WIM file

  Error: The wizard detected the following problems when updating the boot image.
Failed to inject a ConfigMgr driver into the mounted WIM file
The SMS Provider reported an error.: ConfigMgr Error Object:
instance of SMS_ExtendedStatus

Not able to update Boot Image x64 dp's after sccm upgrade to version 1902

$
0
0

Hi Fellas, 

I am struggling to update distribution points for my boot image x64 after I upgraded my SCCM from 1802 to 1902. 

Do i inject new 3Com Dual Port 1000-SX PCI-X Server NIC driver into my boot image?

Please advise!!!

  Error: Update boot image: 
Microsoft Windows PE (x64)

  Error: Update actions: 
Add ConfigMgr binaries using Production Client version 5.00.8790.1007
Set scratch space
Enable Windows PE command line support
Add drivers

 

Error: Failed to import the following drivers:
3Com Dual Port 1000-SX PCI-X Server NIC - Failed to inject a ConfigMgr driver into the mounted WIM file

  Error: The wizard detected the following problems when updating the boot image.
Failed to inject a ConfigMgr driver into the mounted WIM file
The SMS Provider reported an error.: ConfigMgr Error Object:
instance of SMS_ExtendedStatus


The Microsoft Software License Terms have not been completely downloaded and cannot be accepted

$
0
0

I have setup SCCM 2012 Sp1 on Server 2012 with WSUS using the internal database. When I sync updates in SCCM, I get the following error on some of the updates. I have run the sync 3 times over a day with the same updates failing

"Error: The Microsoft Software License Terms have not been completely downloaded and cannot be accepted. Source: Microsoft.UpdateServices.Internal.BaseApi.SoapExceptionProcessor.DeserializeAndThrow"

"Sync failed: Failed to sync some of the updates. Source: Microsoft.SystemsManagementServer.SoftwareUpdatesManagement.WsusSyncAction.WSyncAction.SyncUpdates"

"STATMSG: ID=6703 SEV=E LEV=M SOURCE="SMS Server" COMP="SMS_WSUS_SYNC_MANAGER" SYS=SiteServerxx.COM.AU SITE=MEL PID=2260 TID=2716 GMTDATE=Sat Jan 26 03:56:15.496 2013 ISTR0="Microsoft.SystemsManagementServer.SoftwareUpdatesManagement.WsusSyncAction.WSyncAction.SyncUpdates" ISTR1="Failed to sync some of the updates" ISTR2="" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=0"

Not all of the updates are showing

Viewing all 6382 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>