Cwerreporter finishing event handling with error 800700a1

Hi everyone,
  • Question

  • Hi everyone,

    Recently, all of our company window 7 PC are having issue downloading window update from wsus server.

    When i check on one of the pc windowupdate.log, it has below error message:-

    Report 80244019 — Automaticupdatewuapp failure content download error: download failed.

    Any advise as to what i should troubleshoot? is it wsus server have problem? where should i navigate the problem?

    Please help.

    Thanks!

All replies

  • Hi,

    Try do this on one workstation and you can see if after that downloads and update start working it’s mean workstation problem

    net stop bits
    net stop wuauserv
    net stop appidsvc
    net stop cryptsvc
    
    Del "%ALLUSERSPROFILE%Application DataMicrosoftNetworkDownloader*.*"
    
    rmdir %systemroot%SoftwareDistribution /S /Q
    rmdir %systemroot%system32catroot2 /S /Q
    
    sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
    sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
    
    cd /d %windir%system32
    
    regsvr32.exe /s atl.dll
    regsvr32.exe /s urlmon.dll
    regsvr32.exe /s mshtml.dll
    regsvr32.exe /s shdocvw.dll
    regsvr32.exe /s browseui.dll
    regsvr32.exe /s jscript.dll
    regsvr32.exe /s vbscript.dll
    regsvr32.exe /s scrrun.dll
    regsvr32.exe /s msxml.dll
    regsvr32.exe /s msxml3.dll
    regsvr32.exe /s msxml6.dll
    regsvr32.exe /s actxprxy.dll
    regsvr32.exe /s softpub.dll
    regsvr32.exe /s wintrust.dll
    regsvr32.exe /s dssenh.dll
    regsvr32.exe /s rsaenh.dll
    regsvr32.exe /s gpkcsp.dll
    regsvr32.exe /s sccbase.dll
    regsvr32.exe /s slbcsp.dll
    regsvr32.exe /s cryptdlg.dll
    regsvr32.exe /s oleaut32.dll
    regsvr32.exe /s ole32.dll
    regsvr32.exe /s shell32.dll
    regsvr32.exe /s initpki.dll
    regsvr32.exe /s wuapi.dll
    regsvr32.exe /s wuaueng.dll
    regsvr32.exe /s wuaueng1.dll
    regsvr32.exe /s wucltui.dll
    regsvr32.exe /s wups.dll
    regsvr32.exe /s wups2.dll
    regsvr32.exe /s wuweb.dll
    regsvr32.exe /s qmgr.dll
    regsvr32.exe /s qmgrprxy.dll
    regsvr32.exe /s wucltux.dll
    regsvr32.exe /s muweb.dll
    regsvr32.exe /s wuwebv.dll
    
    netsh winsock reset
    netsh winsock reset proxy
    
    net start bits
    net start wuauserv
    net start appidsvc
    net start cryptsvc
    

    thank you

  • Hi Min777,
      

    If your clients are located in a domain environment, the clients will receive the WSUS configuration information by receiving Group Policy, then check the configuration of the following Group Policy:
      

    • Windows Components > Windows Update > [Specify intranet Microsoft update service location]
      Please check if the intranet server you entered is the FDQN and port number of the WSUS server.
      For example, «http://wsusserver.mydomain.local:8530«.
        

    If your clients are in a workgroup environment, the clients will obtain the WSUS configuration information through the registry, then check the configuration of the following key values:
       

    • [HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdate]
      Please check WUServer WUStatusServer fill in the FQDN and port number of the WSUS server, or the IP and port number.
      For example, «http://10.1.1.51:8530«.
         

    Reply back with the results would be happy to help.
       

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

    • Edited by

      Wednesday, December 25, 2019 2:04 AM
      Paragraph format.

  • Hi,

    Try do this on one workstation and you can see if after that downloads and update start working it’s mean workstation problem

    net stop bits
    net stop wuauserv
    net stop appidsvc
    net stop cryptsvc
    
    Del "%ALLUSERSPROFILE%Application DataMicrosoftNetworkDownloader*.*"
    
    rmdir %systemroot%SoftwareDistribution /S /Q
    rmdir %systemroot%system32catroot2 /S /Q
    
    sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
    sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
    
    cd /d %windir%system32
    
    regsvr32.exe /s atl.dll
    regsvr32.exe /s urlmon.dll
    regsvr32.exe /s mshtml.dll
    regsvr32.exe /s shdocvw.dll
    regsvr32.exe /s browseui.dll
    regsvr32.exe /s jscript.dll
    regsvr32.exe /s vbscript.dll
    regsvr32.exe /s scrrun.dll
    regsvr32.exe /s msxml.dll
    regsvr32.exe /s msxml3.dll
    regsvr32.exe /s msxml6.dll
    regsvr32.exe /s actxprxy.dll
    regsvr32.exe /s softpub.dll
    regsvr32.exe /s wintrust.dll
    regsvr32.exe /s dssenh.dll
    regsvr32.exe /s rsaenh.dll
    regsvr32.exe /s gpkcsp.dll
    regsvr32.exe /s sccbase.dll
    regsvr32.exe /s slbcsp.dll
    regsvr32.exe /s cryptdlg.dll
    regsvr32.exe /s oleaut32.dll
    regsvr32.exe /s ole32.dll
    regsvr32.exe /s shell32.dll
    regsvr32.exe /s initpki.dll
    regsvr32.exe /s wuapi.dll
    regsvr32.exe /s wuaueng.dll
    regsvr32.exe /s wuaueng1.dll
    regsvr32.exe /s wucltui.dll
    regsvr32.exe /s wups.dll
    regsvr32.exe /s wups2.dll
    regsvr32.exe /s wuweb.dll
    regsvr32.exe /s qmgr.dll
    regsvr32.exe /s qmgrprxy.dll
    regsvr32.exe /s wucltux.dll
    regsvr32.exe /s muweb.dll
    regsvr32.exe /s wuwebv.dll
    
    netsh winsock reset
    netsh winsock reset proxy
    
    net start bits
    net start wuauserv
    net start appidsvc
    net start cryptsvc

    thank you

    Tried this before, and PC still having the same issue..

  • Hi Min777,
      

    If your clients are located in a domain environment, the clients will receive the WSUS configuration information by receiving Group Policy, then check the configuration of the following Group Policy:
      

    • Windows Components > Windows Update > [Specify intranet Microsoft update service location]
      Please check if the intranet server you entered is the FDQN and port number of the WSUS server.
      For example, «http://wsusserver.mydomain.local:8530«.
        

    If your clients are in a workgroup environment, the clients will obtain the WSUS configuration information through the registry, then check the configuration of the following key values:
       

    • [HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdate]
      Please check WUServer WUStatusServer fill in the FQDN and port number of the WSUS server, or the IP and port number.
      For example, «http://10.1.1.51:8530«.
         

    Reply back with the results would be happy to help.
       

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

    Hi, yes all pc is domain joined, and previously they have been able to download wsus update from wsus server through port 8531 without problem, just recently, only window 7 pc having problem..

    from Client PC (With Problem), i’m able to telnet wsus server with port 8531, but can’t access through web browser..

    any idea?

    thanks!

  • from Client PC (With Problem), i’m able to telnet wsus server with port 8531, but can’t access through web browser..

    Has the certificate used for SSL connection encryption been added to the client’s «Trusted Root Certification Authorities» directory? 
      

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

  • from Client PC (With Problem), i’m able to telnet wsus server with port 8531, but can’t access through web browser..

    Has the certificate used for SSL connection encryption been added to the client’s «Trusted Root Certification Authorities» directory? 
      

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

    Hi Yic,

    Yes, I checked mmc in the PC with problem, there’s SSL certificate in the trusted root certification authorities.

  • Hi Min,
       

    Please determine if you have SSL enabled only for the web pages of the following WSUS administration sites:
      

    • ClientWebService
    • DssAuthWebService
    • ServerSyncWebService
    • SimpleAuthWebService
         

    In addition, please do not enable SSL for other web pages and main sites.
    Reply back with the results would be happy to help.
       

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

  • Hi Yic,

    Thanks for your swift respond, did you mean to check the web pages in IIS of the WSUS Server?

    If yes, then all web services in WSUS Server IIS, the SSL setting did not require SSL and client certificate is selected ignore.

    Thanks!

  • Hi ,

    Could you tell me please your version of WSUS?

    thank you

  • Hi Min,
      

    Sorry I didn’t express clearly.
    If you need to enable SSL access to your WSUS site, you need to enable SSL on those pages I mentioned:
      

    • ClientWebService
      DssAuthWebService
      ServerSyncWebService
      SimpleAuthWebService
         

    and:
        

    • ApiRemoting30
         

    The opening method can refer to the following snapshot:

       

    If you have questions about how to enable SSL configuration, you can refer to the steps mentioned in this article: «Enabling
    SSL on Windows Server Update Services.
    «

       
    * Please Note: Since the web site is not hosted by Microsoft, the link may change without notice. Microsoft does not guarantee the accuracy of this information.

    Hope the above can help you.
       

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

  • Hi ,

    Could you tell me please your version of WSUS?

    thank you

    Hi Mooner09, it is version 6.3.9600

  • Hi Min,
      

    Sorry I didn’t express clearly.
    If you need to enable SSL access to your WSUS site, you need to enable SSL on those pages I mentioned:
      

    • ClientWebService
      DssAuthWebService
      ServerSyncWebService
      SimpleAuthWebService
         

    and:
        

    • ApiRemoting30
         

    The opening method can refer to the following snapshot:

       

    If you have questions about how to enable SSL configuration, you can refer to the steps mentioned in this article: «Enabling
    SSL on Windows Server Update Services.
    «

       
    * Please Note: Since the web site is not hosted by Microsoft, the link may change without notice. Microsoft does not guarantee the accuracy of this information.

    Hope the above can help you.
       

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

    Hi Yic,

    Not sure if this is the correct direction we heading, because other PC that is window 10 are not having any issue downloading the window update.

  • Hi Min,
       

    The 0x80244019 error means a 404 error for HTTP, which happens when some resources cannot be found. If we first rule out issues that are not SSL, consider the following checks:
       

    1. On the Win7 client where 80244019 appears, you can find the location of the problem by retrieving 80244019 in WindowsUpdate.log. 
    2. Usually, the context of these locations should include a record of obtaining some update files, but an error occurs because it is not available. Please consider checking that these mentioned files are actually stored in the content folder of the WSUS server.
    3. You can also try decline these problematic updates in the WSUS console and re-approve.
    4. There may also be problems caused by other reasons, refer to the explanation from Lawrence in
      this thread.
         

    Hope the above can help you.
      

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

    • Edited by
      Yic LvMicrosoft contingent staff
      Monday, December 30, 2019 7:49 AM
      Paragraph format.

  • Hi Min,
       

    The 0x80244019 error means a 404 error for HTTP, which happens when some resources cannot be found. If we first rule out issues that are not SSL, consider the following checks:
       

    1. On the Win7 client where 80244019 appears, you can find the location of the problem by retrieving 80244019 in WindowsUpdate.log. 
    2. Usually, the context of these locations should include a record of obtaining some update files, but an error occurs because it is not available. Please consider checking that these mentioned files are actually stored in the content folder of the WSUS server.
    3. You can also try decline these problematic updates in the WSUS console and re-approve.
    4. There may also be problems caused by other reasons, refer to the explanation from Lawrence in
      this thread.
         

    Hope the above can help you.
      

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

    Hi Yic,

    Thanks for the feedback,for item no3, how can i decline the problematic window update?

    I selected the window update in wsus console, and when i click on the declide button, below alert appears.

    here are the windowupdate.log captured.

    2019-12-30    17:54:22:299     804    324c    Report    REPORT EVENT: {8E1D6878-9084-49A2-926D-335540327F28}    2019-12-30 17:54:03:244+0800    1  
     161    101    {ECAF8036-92F9-4F9F-8C20-CC4E381E9CDC}    202    80244019    AutomaticUpdatesWuApp    Failure    Content Download    Error:
    Download failed.
    2019-12-30    17:54:22:299     804    2474    AU    >>##  RESUMED  ## AU: Search for updates [CallId = {60B27BA6-FB23-4DE2-A63F-470DE896A211}]
    2019-12-30    17:54:22:299     804    2474    AU      # 5 updates detected
    2019-12-30    17:54:22:299     804    324c    Report    REPORT EVENT: {84B570D6-A25B-4839-80F3-1D8E44326EC5}    2019-12-30 17:54:03:861+0800    1  
     161    101    {1B9EA75E-B216-4B3C-AF63-2A03FE2800FF}    200    80244019    AutomaticUpdatesWuApp    Failure    Content Download    Error:
    Download failed.
    2019-12-30    17:54:22:300     804    2474    AU    #########
    2019-12-30    17:54:22:300     804    2474    AU    ##  END  ##  AU: Search for updates [CallId = {60B27BA6-FB23-4DE2-A63F-470DE896A211}]
    2019-12-30    17:54:22:300     804    2474    AU    #############
    2019-12-30    17:54:22:300     804    2474    AU    Featured notifications is disabled.
    2019-12-30    17:54:22:301     804    2474    AU    Successfully wrote event for AU health state:0
    2019-12-30    17:54:22:303     804    2474    AU    Successfully wrote event for AU health state:0
    2019-12-30    17:54:22:305     804    1118    AU    Getting featured update notifications.  fIncludeDismissed = true
    2019-12-30    17:54:22:305     804    1118    AU    No featured updates available.
    2019-12-30    17:54:22:306     804    324c    Report    WARNING: CWERReporter finishing event handling with error = 800700a1
    2019-12-30    17:54:22:306     804    324c    Report    REPORT EVENT: {8E1D6878-9084-49A2-926D-335540327F28}    2019-12-30 17:54:03:244+0800    1  
     161    101    {ECAF8036-92F9-4F9F-8C20-CC4E381E9CDC}    202    80244019    AutomaticUpdatesWuApp    Failure    Content Download    Error:
    Download failed.
    2019-12-30    17:54:22:306     804    324c    Report    REPORT EVENT: {84B570D6-A25B-4839-80F3-1D8E44326EC5}    2019-12-30 17:54:03:861+0800    1  
     161    101    {1B9EA75E-B216-4B3C-AF63-2A03FE2800FF}    200    80244019    AutomaticUpdatesWuApp    Failure    Content Download    Error:
    Download failed.
    2019-12-30    17:54:22:312     804    324c    Report    WARNING: CWERReporter finishing event handling with error = 800700a1
    2019-12-30    17:54:22:312     804    324c    Report    REPORT EVENT: {8E1D6878-9084-49A2-926D-335540327F28}    2019-12-30 17:54:03:244+0800    1  
     161    101    {ECAF8036-92F9-4F9F-8C20-CC4E381E9CDC}    202    80244019    AutomaticUpdatesWuApp    Failure    Content Download    Error:
    Download failed.
    2019-12-30    17:54:22:312     804    324c    Report    REPORT EVENT: {84B570D6-A25B-4839-80F3-1D8E44326EC5}    2019-12-30 17:54:03:861+0800    1  
     161    101    {1B9EA75E-B216-4B3C-AF63-2A03FE2800FF}    200    80244019    AutomaticUpdatesWuApp    Failure    Content Download    Error:
    Download failed.
    2019-12-30    17:54:22:319     804    324c    Report    WARNING: CWERReporter finishing event handling with error = 800700a1
    2019-12-30    17:54:22:329     804    324c    Report    Uploading 32 events using cached cookie, reporting URL = http://dc04/ReportingWebService/ReportingWebService.asmx
    2019-12-30    17:54:22:336     804    324c    Report    Reporter successfully uploaded 32 events.

    Kindly advise.

    Thanks.!

  • I selected the window update in wsus console, and when i click on the declide button, below alert appears.

    Please clicking «Yes» in the window will decline the update.
    And than, you can then filter the «Approval» attribute to «Declined» in the update view of the WSUS console, find KB4525233, and re-approve.
      

    Reply back with the results would be happy to help.
      

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

  • I selected the window update in wsus console, and when i click on the declide button, below alert appears.

    Please clicking «Yes» in the window will decline the update.
    And than, you can then filter the «Approval» attribute to «Declined» in the update view of the WSUS console, find KB4525233, and re-approve.
      

    Reply back with the results would be happy to help.
      

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

    Hi Yic,

    Thanks for your feedback, i tried declined the update then reapproved it, afterward in the client pc i tried redownload the window update, but it is still showing same error message.

    Hmm,…any idea where i can check if the window update is re-download successfully?

    Thanks.

  • you can import this update KB4525233 from Microsoft catalog 

    Click on USUS Updates and from Right side hits Import Updates
    after that in IE catalog.update.microsoft.com search you update KB4525233 and click
    Add and Import after that you will know exactly what uploaded successfully 

    thank you

  • Hi Min,
       

    Please consider running «regedit» on the WSUS server and navigating to the following location in the Registry Editor:
       

    • HKEY_LOCAL_MACHINESOFTWAREMicrosoftUpdate ServicesServerSetup
         

    Check if the address configured by «ContentDir» is canonical, don’t lack the necessary colons and slashes. 
       


       

    Then navigate to IIS-WSUS Administration-Content-Advanced Settings. Notice the value of ‘Physical Path’ and don’t lack the necessary colons and slashes. 
       


         

    If these values are inconsistent or abnormal, it may cause the update file to fail to download.
    Reply back with the results would be happy to help.
      

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

  • Hi Yic,

    I checked the mentioned path, it look tallied:-

    Regedit of WSUS Server

    IIS:-

  • Hi everyone,

    any idea where i can further troubleshoot on this?

    I’m able to download the .cab file from client PC through browser that it using port 80.

    thanks!

  • I’m able to download the .cab file from client PC through browser that it using port 80.

    On WSUS 6.2 and later (at least Windows Server 2012 ), port 8530 for HTTP and 8531 for HTTPS are used.
    If the port number is changed to 80 after the WSUS configuration is completed, this may be the cause of the fault. If the conditions work, consider adjusting the port number of WSUS to 8530.
       

    Hope the above can help you.
       

    Regards,
    Yic


    Please remember to mark as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact
    tnmff@microsoft.com.

  • Hi Yic,

    Thanks for your feedback.

    The weird part is pc that are OS window 10 doesnt have this problem, and the OS window 10 PC cant telnet 8530 as well. 

    This means it shouldn’t be port number 80 problem right? because our OS Window 10 PC is able to download window update, in the wsus console it is showing 100% for all OS 10 pc.

    Thanks for your help Yic, but look like we are going back to the starting point.

Содержание

  1. Warning cwerreporter finishing event handling with error 800700a1
  2. Asked by:
  3. Question
  4. All replies
  5. Warning cwerreporter finishing event handling with error 800700a1
  6. Вопрос
  7. Все ответы

Warning cwerreporter finishing event handling with error 800700a1

This forum has migrated to Microsoft Q&A. Visit Microsoft Q&A to post new questions.

Asked by:

Question

Recently, all of our company window 7 PC are having issue downloading window update from wsus server.

When i check on one of the pc windowupdate.log, it has below error message:-

Report 80244019 — Automaticupdatewuapp failure content download error: download failed.

Any advise as to what i should troubleshoot? is it wsus server have problem? where should i navigate the problem?

«Vote or mark as answer if you think useful» «Marquer comme réponse les réponses qui ont résolu votre problème»

Try do this on one workstation and you can see if after that downloads and update start working it’s mean workstation problem

If your clients are located in a domain environment, the clients will receive the WSUS configuration information by receiving Group Policy, then check the configuration of the following Group Policy:

  • Windows Components > Windows Update > [Specify intranet Microsoft update service location]
    Please check if the intranet server you entered is the FDQN and port number of the WSUS server.
    For example, » http: //wsusserver.mydomain.local:8530 «.

If your clients are in a workgroup environment, the clients will obtain the WSUS configuration information through the registry, then check the configuration of the following key values:

  • [HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdate]
    Please check WUServer & WUStatusServer fill in the FQDN and port number of the WSUS server, or the IP and port number.
    For example, » http://10.1.1.51:8530 «.

Reply back with the results would be happy to help.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

  • Edited by Yic Lv Microsoft contingent staff Wednesday, December 25, 2019 2:04 AM Paragraph format.

Followup the given steps in this guidance,

Try do this on one workstation and you can see if after that downloads and update start working it’s mean workstation problem

Tried this before, and PC still having the same issue..

If your clients are located in a domain environment, the clients will receive the WSUS configuration information by receiving Group Policy, then check the configuration of the following Group Policy:

  • Windows Components > Windows Update > [Specify intranet Microsoft update service location]
    Please check if the intranet server you entered is the FDQN and port number of the WSUS server.
    For example, » http: //wsusserver.mydomain.local:8530 «.

If your clients are in a workgroup environment, the clients will obtain the WSUS configuration information through the registry, then check the configuration of the following key values:

  • [HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdate]
    Please check WUServer & WUStatusServer fill in the FQDN and port number of the WSUS server, or the IP and port number.
    For example, » http://10.1.1.51:8530 «.

Reply back with the results would be happy to help.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Hi, yes all pc is domain joined, and previously they have been able to download wsus update from wsus server through port 8531 without problem, just recently, only window 7 pc having problem..

from Client PC (With Problem), i’m able to telnet wsus server with port 8531, but can’t access through web browser..

Followup the given steps in this guidance,

from Client PC (With Problem), i’m able to telnet wsus server with port 8531, but can’t access through web browser..

Has the certificate used for SSL connection encryption been added to the client’s «Trusted Root Certification Authorities» directory?

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

from Client PC (With Problem), i’m able to telnet wsus server with port 8531, but can’t access through web browser..

Has the certificate used for SSL connection encryption been added to the client’s «Trusted Root Certification Authorities» directory?

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Yes, I checked mmc in the PC with problem, there’s SSL certificate in the trusted root certification authorities.

Please determine if you have SSL enabled only for the web pages of the following WSUS administration sites:

  • ClientWebService
  • DssAuthWebService
  • ServerSyncWebService
  • SimpleAuthWebService

In addition, please do not enable SSL for other web pages and main sites.
Reply back with the results would be happy to help.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Thanks for your swift respond, did you mean to check the web pages in IIS of the WSUS Server?

If yes, then all web services in WSUS Server IIS, the SSL setting did not require SSL and client certificate is selected ignore.

Could you tell me please your version of WSUS?

Sorry I didn’t express clearly.
If you need to enable SSL access to your WSUS site, you need to enable SSL on those pages I mentioned:

  • ClientWebService
    DssAuthWebService
    ServerSyncWebService
    SimpleAuthWebService

The opening method can refer to the following snapshot:

If you have questions about how to enable SSL configuration, you can refer to the steps mentioned in this article: » Enabling SSL on Windows Server Update Services. «

* Please Note: Since the web site is not hosted by Microsoft, the link may change without notice. Microsoft does not guarantee the accuracy of this information.

Hope the above can help you.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Could you tell me please your version of WSUS?

Sorry I didn’t express clearly.
If you need to enable SSL access to your WSUS site, you need to enable SSL on those pages I mentioned:

  • ClientWebService
    DssAuthWebService
    ServerSyncWebService
    SimpleAuthWebService

The opening method can refer to the following snapshot:

If you have questions about how to enable SSL configuration, you can refer to the steps mentioned in this article: » Enabling SSL on Windows Server Update Services. «

* Please Note: Since the web site is not hosted by Microsoft, the link may change without notice. Microsoft does not guarantee the accuracy of this information.

Hope the above can help you.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Not sure if this is the correct direction we heading, because other PC that is window 10 are not having any issue downloading the window update.

The 0x80244019 error means a 404 error for HTTP, which happens when some resources cannot be found. If we first rule out issues that are not SSL, consider the following checks:

  1. On the Win7 client where 80244019 appears, you can find the location of the problem by retrieving 80244019 in WindowsUpdate.log.
  2. Usually, the context of these locations should include a record of obtaining some update files, but an error occurs because it is not available. Please consider checking that these mentioned files are actually stored in the content folder of the WSUS server.
  3. You can also try decline these problematic updates in the WSUS console and re-approve.
  4. There may also be problems caused by other reasons, refer to the explanation from Lawrence in this thread .

Hope the above can help you.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

  • Edited by Yic Lv Microsoft contingent staff Monday, December 30, 2019 7:49 AM Paragraph format.

The 0x80244019 error means a 404 error for HTTP, which happens when some resources cannot be found. If we first rule out issues that are not SSL, consider the following checks:

  1. On the Win7 client where 80244019 appears, you can find the location of the problem by retrieving 80244019 in WindowsUpdate.log.
  2. Usually, the context of these locations should include a record of obtaining some update files, but an error occurs because it is not available. Please consider checking that these mentioned files are actually stored in the content folder of the WSUS server.
  3. You can also try decline these problematic updates in the WSUS console and re-approve.
  4. There may also be problems caused by other reasons, refer to the explanation from Lawrence in this thread .

Hope the above can help you.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Thanks for the feedback,for item no3, how can i decline the problematic window update?

I selected the window update in wsus console, and when i click on the declide button, below alert appears.

Источник

Warning cwerreporter finishing event handling with error 800700a1

Вопрос

Recently, all of our company window 7 PC are having issue downloading window update from wsus server.

When i check on one of the pc windowupdate.log, it has below error message:-

Report 80244019 — Automaticupdatewuapp failure content download error: download failed.

Any advise as to what i should troubleshoot? is it wsus server have problem? where should i navigate the problem?

Все ответы

«Vote or mark as answer if you think useful» «Marquer comme réponse les réponses qui ont résolu votre problème»

Try do this on one workstation and you can see if after that downloads and update start working it’s mean workstation problem

If your clients are located in a domain environment, the clients will receive the WSUS configuration information by receiving Group Policy, then check the configuration of the following Group Policy:

  • Windows Components > Windows Update > [Specify intranet Microsoft update service location]
    Please check if the intranet server you entered is the FDQN and port number of the WSUS server.
    For example, » http: //wsusserver.mydomain.local:8530 «.

If your clients are in a workgroup environment, the clients will obtain the WSUS configuration information through the registry, then check the configuration of the following key values:

  • [HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdate]
    Please check WUServer & WUStatusServer fill in the FQDN and port number of the WSUS server, or the IP and port number.
    For example, » http://10.1.1.51:8530 «.

Reply back with the results would be happy to help.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

  • Изменено Yic Lv Microsoft contingent staff 25 декабря 2019 г. 2:04 Paragraph format.

Followup the given steps in this guidance,

Try do this on one workstation and you can see if after that downloads and update start working it’s mean workstation problem

Tried this before, and PC still having the same issue..

If your clients are located in a domain environment, the clients will receive the WSUS configuration information by receiving Group Policy, then check the configuration of the following Group Policy:

  • Windows Components > Windows Update > [Specify intranet Microsoft update service location]
    Please check if the intranet server you entered is the FDQN and port number of the WSUS server.
    For example, » http: //wsusserver.mydomain.local:8530 «.

If your clients are in a workgroup environment, the clients will obtain the WSUS configuration information through the registry, then check the configuration of the following key values:

  • [HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdate]
    Please check WUServer & WUStatusServer fill in the FQDN and port number of the WSUS server, or the IP and port number.
    For example, » http://10.1.1.51:8530 «.

Reply back with the results would be happy to help.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Hi, yes all pc is domain joined, and previously they have been able to download wsus update from wsus server through port 8531 without problem, just recently, only window 7 pc having problem..

from Client PC (With Problem), i’m able to telnet wsus server with port 8531, but can’t access through web browser..

Followup the given steps in this guidance,

from Client PC (With Problem), i’m able to telnet wsus server with port 8531, but can’t access through web browser..

Has the certificate used for SSL connection encryption been added to the client’s «Trusted Root Certification Authorities» directory?

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

from Client PC (With Problem), i’m able to telnet wsus server with port 8531, but can’t access through web browser..

Has the certificate used for SSL connection encryption been added to the client’s «Trusted Root Certification Authorities» directory?

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Yes, I checked mmc in the PC with problem, there’s SSL certificate in the trusted root certification authorities.

Please determine if you have SSL enabled only for the web pages of the following WSUS administration sites:

  • ClientWebService
  • DssAuthWebService
  • ServerSyncWebService
  • SimpleAuthWebService

In addition, please do not enable SSL for other web pages and main sites.
Reply back with the results would be happy to help.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Thanks for your swift respond, did you mean to check the web pages in IIS of the WSUS Server?

If yes, then all web services in WSUS Server IIS, the SSL setting did not require SSL and client certificate is selected ignore.

Could you tell me please your version of WSUS?

Sorry I didn’t express clearly.
If you need to enable SSL access to your WSUS site, you need to enable SSL on those pages I mentioned:

  • ClientWebService
    DssAuthWebService
    ServerSyncWebService
    SimpleAuthWebService

The opening method can refer to the following snapshot:

If you have questions about how to enable SSL configuration, you can refer to the steps mentioned in this article: » Enabling SSL on Windows Server Update Services. «

* Please Note: Since the web site is not hosted by Microsoft, the link may change without notice. Microsoft does not guarantee the accuracy of this information.

Hope the above can help you.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Could you tell me please your version of WSUS?

Sorry I didn’t express clearly.
If you need to enable SSL access to your WSUS site, you need to enable SSL on those pages I mentioned:

  • ClientWebService
    DssAuthWebService
    ServerSyncWebService
    SimpleAuthWebService

The opening method can refer to the following snapshot:

If you have questions about how to enable SSL configuration, you can refer to the steps mentioned in this article: » Enabling SSL on Windows Server Update Services. «

* Please Note: Since the web site is not hosted by Microsoft, the link may change without notice. Microsoft does not guarantee the accuracy of this information.

Hope the above can help you.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Not sure if this is the correct direction we heading, because other PC that is window 10 are not having any issue downloading the window update.

The 0x80244019 error means a 404 error for HTTP, which happens when some resources cannot be found. If we first rule out issues that are not SSL, consider the following checks:

  1. On the Win7 client where 80244019 appears, you can find the location of the problem by retrieving 80244019 in WindowsUpdate.log.
  2. Usually, the context of these locations should include a record of obtaining some update files, but an error occurs because it is not available. Please consider checking that these mentioned files are actually stored in the content folder of the WSUS server.
  3. You can also try decline these problematic updates in the WSUS console and re-approve.
  4. There may also be problems caused by other reasons, refer to the explanation from Lawrence in this thread .

Hope the above can help you.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

  • Изменено Yic Lv Microsoft contingent staff 30 декабря 2019 г. 7:49 Paragraph format.

The 0x80244019 error means a 404 error for HTTP, which happens when some resources cannot be found. If we first rule out issues that are not SSL, consider the following checks:

  1. On the Win7 client where 80244019 appears, you can find the location of the problem by retrieving 80244019 in WindowsUpdate.log.
  2. Usually, the context of these locations should include a record of obtaining some update files, but an error occurs because it is not available. Please consider checking that these mentioned files are actually stored in the content folder of the WSUS server.
  3. You can also try decline these problematic updates in the WSUS console and re-approve.
  4. There may also be problems caused by other reasons, refer to the explanation from Lawrence in this thread .

Hope the above can help you.

Please remember to mark as answers if they help.
If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com .

Thanks for the feedback,for item no3, how can i decline the problematic window update?

I selected the window update in wsus console, and when i click on the declide button, below alert appears.

Источник

ok all I need some help, I have googled the heck out of this.  I recently had to reinstall my WSUS server and for some reason none of my clients will report to it?  I have done everything that Microsoft has suggested and even a few things people form the web have said and still no luck.  I have confirmed with the Client Diag tool they see the see the sever along with the web tool for downloading a file from that server and they all work fine. I have posted the windows update log from one of the clients here in hopes that someone will see what I’m missing. if you guys need any other logs from either the client or the server just let me know and I will post them as well. Thanks all

2014-04-22 17:24:05:185  964 1a0c Misc ===========  Logging initialized (build: 7.6.7600.256, tz: -0700)  ===========
2014-04-22 17:24:05:185  964 1a0c Misc   = Process: C:Windowssystem32svchost.exe
2014-04-22 17:24:05:185  964 1a0c Misc   = Module: c:windowssystem32wuaueng.dll
2014-04-22 17:24:05:185  964 1a0c Service *************
2014-04-22 17:24:05:185  964 1a0c Service ** START **  Service: Service startup
2014-04-22 17:24:05:185  964 1a0c Service *********
2014-04-22 17:24:05:189  964 1a0c Agent   * WU client version 7.6.7600.256
2014-04-22 17:24:05:189  964 1a0c Agent   * Base directory: C:WindowsSoftwareDistribution
2014-04-22 17:24:05:189  964 1a0c Agent   * Access type: No proxy
2014-04-22 17:24:05:190  964 1a0c Agent   * Network state: Connected
2014-04-22 17:24:50:221  964 1a0c Report CWERReporter::Init succeeded
2014-04-22 17:24:50:221  964 1a0c Agent ***********  Agent: Initializing Windows Update Agent  ***********
2014-04-22 17:24:50:222  964 1a0c Agent ***********  Agent: Initializing global settings cache  ***********
2014-04-22 17:24:50:222  964 1a0c Agent   * WSUS server: <NULL>
2014-04-22 17:24:50:222  964 1a0c Agent   * WSUS status server: <NULL>
2014-04-22 17:24:50:222  964 1a0c Agent   * Target group: (Unassigned Computers)
2014-04-22 17:24:50:222  964 1a0c Agent   * Windows Update access disabled: No
2014-04-22 17:24:50:222  964 1a0c DnldMgr Download manager restoring 0 downloads
2014-04-22 17:24:50:225  964 1a0c AU ###########  AU: Initializing Automatic Updates  ###########
2014-04-22 17:24:50:227  964 1a0c AU   # Approval type: Scheduled (User preference)
2014-04-22 17:24:50:227  964 1a0c AU   # Scheduled install day/time: Every day at 3:00
2014-04-22 17:24:50:227  964 1a0c AU   # Auto-install minor updates: Yes (User preference)
2014-04-22 17:24:50:228  964 1a0c AU Setting AU scheduled install time to 2014-04-23 10:00:00
2014-04-22 17:24:50:566  964 1a0c Report ***********  Report: Initializing static reporting data  ***********
2014-04-22 17:24:50:566  964 1a0c Report   * OS Version = 6.1.7601.1.0.65792
2014-04-22 17:24:50:566  964 1a0c Report   * OS Product Type = 0x00000001
2014-04-22 17:24:50:593  964 1a0c Report   * Computer Brand = TOSHIBA
2014-04-22 17:24:50:593  964 1a0c Report   * Computer Model = Pottege0M750
2014-04-22 17:24:50:596  964 1a0c Report   * Bios Revision = Version 1.00
2014-04-22 17:24:50:596  964 1a0c Report   * Bios Name = v1.00 
2014-04-22 17:24:50:596  964 1a0c Report   * Bios Release Date = 2008-08-06T00:00:00
2014-04-22 17:24:50:596  964 1a0c Report   * Locale ID = 1033
2014-04-22 17:24:50:602  964 1a0c AU Successfully wrote event for AU health state:1
2014-04-22 17:24:50:602  964 1a0c AU Initializing featured updates
2014-04-22 17:24:50:602  964 1a0c AU Found 0 cached featured updates
2014-04-22 17:24:50:603  964 1a0c AU Successfully wrote event for AU health state:1
2014-04-22 17:24:50:603  964 1a0c AU Successfully wrote event for AU health state:1
2014-04-22 17:24:50:603  964 1a0c AU AU finished delayed initialization
2014-04-22 17:24:53:570  964 1a0c Agent ***********  Agent: Refreshing global settings cache  ***********
2014-04-22 17:24:53:571  964 1a0c Agent   * WSUS server: http://cu57531sv1cyprs Opens a new window (Changed)
2014-04-22 17:24:53:571  964 1a0c Agent   * WSUS status server: http://cu57531sv1cyprs Opens a new window (Changed)
2014-04-22 17:24:53:571  964 1a0c Agent   * Target group: (Unassigned Computers) (Unchanged)
2014-04-22 17:24:53:571  964 1a0c Agent   * Windows Update access disabled: No (Unchanged)
2014-04-22 17:24:53:571  964 1a0c AU AU received policy change subscription event
2014-04-22 17:24:53:571  964 1a0c AU Sus server changed through policy.
2014-04-22 17:24:53:571  964 1a0c AU AU Options changed from policy.
2014-04-22 17:24:53:572  964 1a0c AU Successfully wrote event for AU health state:1
2014-04-22 17:24:53:572  964 1a0c AU ###########  AU: Policy change processed  ###########
2014-04-22 17:24:53:572  964 1a0c AU   # Policy changed, AU refresh required = No
2014-04-22 17:24:53:572  964 1a0c AU   # WSUS server: http://cu57531sv1cyprs Opens a new window
2014-04-22 17:24:53:572  964 1a0c AU   # Detection frequency: 22
2014-04-22 17:24:53:572  964 1a0c AU   # Approval type: Scheduled (Policy)
2014-04-22 17:24:53:572  964 1a0c AU   # Scheduled install day/time: Every day at 13:00
2014-04-22 17:24:53:572  964 1a0c AU   # Auto-install minor updates: Yes (Policy)
2014-04-22 17:24:53:572  964 1a0c AU   # Will interact with non-admins (Non-admins are elevated (Policy))
2014-04-22 17:24:53:572  964 1a0c AU AU Refresh required….
2014-04-22 17:24:53:573  964 1a0c AU AU setting next detection timeout to 2014-04-23 00:24:53
2014-04-22 17:24:53:574  964 1a0c AU AU setting next featured software notification timeout to 2014-04-23 00:24:53
2014-04-22 17:24:53:574  964 1a0c AU Successfully wrote event for AU health state:0
2014-04-22 17:24:53:574  964 1a0c AU Triggering Online detection (non-interactive)
2014-04-22 17:24:53:574  964 1a0c AU #############
2014-04-22 17:24:53:574  964 1a0c AU ## START ##  AU: Search for updates
2014-04-22 17:24:53:574  964 1a0c AU #########
2014-04-22 17:24:53:579  964 1a0c AU <<## SUBMITTED ## AU: Search for updates [CallId = {AE8D134B-E13A-48D3-A066-6F624C3D2AB4}]
2014-04-22 17:24:53:580  964 1200 Agent *************
2014-04-22 17:24:53:580  964 1200 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-04-22 17:24:53:580  964 1200 Agent *********
2014-04-22 17:24:53:580  964 1200 Agent   * Online = Yes; Ignore download priority = No
2014-04-22 17:24:53:580  964 1200 Agent   * Criteria = «IsInstalled=0 and DeploymentAction=’Installation’ or IsPresent=1 and DeploymentAction=’Uninstallation’ or IsInstalled=1 and DeploymentAction=’Installation’ and RebootRequired=1 or IsInstalled=0 and DeploymentAction=’Uninstallation’ and RebootRequired=1»
2014-04-22 17:24:53:580  964 1200 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-04-22 17:24:53:580  964 1200 Agent   * Search Scope = {Machine}
2014-04-22 17:24:53:580  964 1200 Setup Checking for agent SelfUpdate
2014-04-22 17:24:53:581  964 1200 Setup Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
2014-04-22 17:25:04:405  964 1200 Misc Validating signature for C:WindowsSoftwareDistributionSelfUpdatewuident.cab:
2014-04-22 17:25:04:415  964 1200 Misc  Microsoft signed: Yes
2014-04-22 17:25:04:415  964 1200 Misc WARNING: Digital Signatures on file C:WindowsSoftwareDistributionSelfUpdatewuident.cab are not trusted: Error 0x800b0001
2014-04-22 17:25:04:416  964 1200 Setup WARNING: SelfUpdate check failed to download package information, error = 0x800B0001
2014-04-22 17:25:04:416  964 1200 Setup FATAL: SelfUpdate check failed, err = 0x800B0001
2014-04-22 17:25:04:416  964 1200 Agent   * WARNING: Skipping scan, self-update check returned 0x800B0001
2014-04-22 17:25:04:417  964 1200 Agent   * WARNING: Exit code = 0x800B0001
2014-04-22 17:25:04:417  964 1200 Agent *********
2014-04-22 17:25:04:417  964 1200 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-04-22 17:25:04:417  964 1200 Agent *************
2014-04-22 17:25:04:417  964 1200 Agent WARNING: WU client failed Searching for update with error 0x800b0001
2014-04-22 17:25:04:418  964 1608 AU >>##  RESUMED  ## AU: Search for updates [CallId = {AE8D134B-E13A-48D3-A066-6F624C3D2AB4}]
2014-04-22 17:25:04:418  964 1608 AU   # WARNING: Search callback failed, result = 0x800B0001
2014-04-22 17:25:04:418  964 1608 AU   # WARNING: Failed to find updates with error code 800B0001
2014-04-22 17:25:04:418  964 1608 AU #########
2014-04-22 17:25:04:418  964 1608 AU ##  END  ##  AU: Search for updates [CallId = {AE8D134B-E13A-48D3-A066-6F624C3D2AB4}]
2014-04-22 17:25:04:418  964 1608 AU #############
2014-04-22 17:25:04:418  964 1608 AU Need to show Unable to Detect notification
2014-04-22 17:25:04:420  964 1608 AU Successfully wrote event for AU health state:1
2014-04-22 17:25:04:421  964 1608 AU AU setting next detection timeout to 2014-04-23 05:25:04
2014-04-22 17:25:04:423  964 1608 AU Setting AU scheduled install time to 2014-04-23 20:00:00
2014-04-22 17:25:04:424  964 1608 AU Successfully wrote event for AU health state:1
2014-04-22 17:25:04:424  964 1608 AU Successfully wrote event for AU health state:1
2014-04-22 17:25:04:433  964 1200 Report CWERReporter finishing event handling. (00000000)
2014-04-22 17:25:09:413  964 1200 Report REPORT EVENT: {622C5DC3-4ADC-43AC-BCE2-7E5A4D019980} 2014-04-22 17:25:04:416-0700 1 148 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 1 800b0001 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x800b0001.
2014-04-22 17:25:09:423  964 1200 Report CWERReporter::HandleEvents — WER report upload completed with status 0x8
2014-04-22 17:25:09:423  964 1200 Report WER Report sent: 7.6.7600.256 0x800b0001 D67661EB-2423-451D-BF5D-13199E37DF28 Scan 101 Managed
2014-04-22 17:25:09:423  964 1200 Report CWERReporter finishing event handling. (00000000)
2014-04-22 17:25:16:695  964 1648 AU Triggering AU detection through DetectNow API
2014-04-22 17:25:16:695  964 1648 AU Triggering Online detection (non-interactive)
2014-04-22 17:25:16:695  964 1a0c AU #############
2014-04-22 17:25:16:695  964 1a0c AU ## START ##  AU: Search for updates
2014-04-22 17:25:16:695  964 1a0c AU #########
2014-04-22 17:25:16:696  964 1a0c AU <<## SUBMITTED ## AU: Search for updates [CallId = {CCA946E6-39B7-4E15-B6D1-2CA6BAAB289F}]
2014-04-22 17:25:16:696  964 1200 Agent *************
2014-04-22 17:25:16:696  964 1200 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-04-22 17:25:16:696  964 1200 Agent *********
2014-04-22 17:25:16:696  964 1200 Agent   * Online = Yes; Ignore download priority = No
2014-04-22 17:25:16:696  964 1200 Agent   * Criteria = «IsInstalled=0 and DeploymentAction=’Installation’ or IsPresent=1 and DeploymentAction=’Uninstallation’ or IsInstalled=1 and DeploymentAction=’Installation’ and RebootRequired=1 or IsInstalled=0 and DeploymentAction=’Uninstallation’ and RebootRequired=1»
2014-04-22 17:25:16:696  964 1200 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-04-22 17:25:16:697  964 1200 Agent   * Search Scope = {Machine}
2014-04-22 17:25:16:697  964 1200 Setup Checking for agent SelfUpdate
2014-04-22 17:25:16:697  964 1200 Setup Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
2014-04-22 17:25:17:212  964 1200 Misc Validating signature for C:WindowsSoftwareDistributionSelfUpdatewuident.cab:
2014-04-22 17:25:17:227  964 1200 Misc  Microsoft signed: Yes
2014-04-22 17:25:17:228  964 1200 Misc WARNING: Digital Signatures on file C:WindowsSoftwareDistributionSelfUpdatewuident.cab are not trusted: Error 0x800b0001
2014-04-22 17:25:17:228  964 1200 Setup WARNING: SelfUpdate check failed to download package information, error = 0x800B0001
2014-04-22 17:25:17:228  964 1200 Setup FATAL: SelfUpdate check failed, err = 0x800B0001
2014-04-22 17:25:17:229  964 1200 Agent   * WARNING: Skipping scan, self-update check returned 0x800B0001
2014-04-22 17:25:17:231  964 1200 Agent   * WARNING: Exit code = 0x800B0001
2014-04-22 17:25:17:231  964 1200 Agent *********
2014-04-22 17:25:17:231  964 1200 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-04-22 17:25:17:231  964 1200 Agent *************
2014-04-22 17:25:17:231  964 1200 Agent WARNING: WU client failed Searching for update with error 0x800b0001
2014-04-22 17:25:17:231  964 1608 AU >>##  RESUMED  ## AU: Search for updates [CallId = {CCA946E6-39B7-4E15-B6D1-2CA6BAAB289F}]
2014-04-22 17:25:17:232  964 1608 AU   # WARNING: Search callback failed, result = 0x800B0001
2014-04-22 17:25:17:232  964 1608 AU   # WARNING: Failed to find updates with error code 800B0001
2014-04-22 17:25:17:232  964 1608 AU #########
2014-04-22 17:25:17:232  964 1608 AU ##  END  ##  AU: Search for updates [CallId = {CCA946E6-39B7-4E15-B6D1-2CA6BAAB289F}]
2014-04-22 17:25:17:232  964 1608 AU #############
2014-04-22 17:25:17:232  964 1608 AU Need to show Unable to Detect notification
2014-04-22 17:25:17:233  964 1608 AU Successfully wrote event for AU health state:1
2014-04-22 17:25:17:233  964 1608 AU AU setting next detection timeout to 2014-04-23 05:25:17
2014-04-22 17:25:17:233  964 1608 AU Setting AU scheduled install time to 2014-04-23 20:00:00
2014-04-22 17:25:17:234  964 1608 AU Successfully wrote event for AU health state:1
2014-04-22 17:25:17:235  964 1608 AU Successfully wrote event for AU health state:1
2014-04-22 17:25:20:500  964 1da4 AU Triggering AU detection through DetectNow API
2014-04-22 17:25:20:500  964 1da4 AU Triggering Online detection (interactive)
2014-04-22 17:25:20:501  964 1a0c AU #############
2014-04-22 17:25:20:501  964 1a0c AU ## START ##  AU: Search for updates
2014-04-22 17:25:20:501  964 1a0c AU #########
2014-04-22 17:25:20:502  964 1a0c AU <<## SUBMITTED ## AU: Search for updates [CallId = {2C64103F-3D49-4DE3-AE71-44284A3BB9C1}]
2014-04-22 17:25:20:502  964 1200 Agent *************
2014-04-22 17:25:20:502  964 1200 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-04-22 17:25:20:502  964 1200 Agent *********
2014-04-22 17:25:20:502  964 1200 Agent   * Online = Yes; Ignore download priority = No
2014-04-22 17:25:20:502  964 1200 Agent   * Criteria = «IsInstalled=0 and DeploymentAction=’Installation’ or IsPresent=1 and DeploymentAction=’Uninstallation’ or IsInstalled=1 and DeploymentAction=’Installation’ and RebootRequired=1 or IsInstalled=0 and DeploymentAction=’Uninstallation’ and RebootRequired=1»
2014-04-22 17:25:20:502  964 1200 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
2014-04-22 17:25:20:502  964 1200 Agent   * Search Scope = {Machine}
2014-04-22 17:25:20:502  964 1200 Setup Checking for agent SelfUpdate
2014-04-22 17:25:20:503  964 1200 Setup Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
2014-04-22 17:25:21:039  964 1200 Misc Validating signature for C:WindowsSoftwareDistributionSelfUpdatewuident.cab:
2014-04-22 17:25:21:051  964 1200 Misc  Microsoft signed: Yes
2014-04-22 17:25:21:051  964 1200 Misc WARNING: Digital Signatures on file C:WindowsSoftwareDistributionSelfUpdatewuident.cab are not trusted: Error 0x800b0001
2014-04-22 17:25:21:051  964 1200 Setup WARNING: SelfUpdate check failed to download package information, error = 0x800B0001
2014-04-22 17:25:21:051  964 1200 Setup FATAL: SelfUpdate check failed, err = 0x800B0001
2014-04-22 17:25:21:052  964 1200 Agent   * WARNING: Skipping scan, self-update check returned 0x800B0001
2014-04-22 17:25:21:052  964 1200 Agent   * WARNING: Exit code = 0x800B0001
2014-04-22 17:25:21:052  964 1200 Agent *********
2014-04-22 17:25:21:052  964 1200 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2014-04-22 17:25:21:052  964 1200 Agent *************
2014-04-22 17:25:21:052  964 1200 Agent WARNING: WU client failed Searching for update with error 0x800b0001
2014-04-22 17:25:21:052  964 1608 AU >>##  RESUMED  ## AU: Search for updates [CallId = {2C64103F-3D49-4DE3-AE71-44284A3BB9C1}]
2014-04-22 17:25:21:052  964 1608 AU   # WARNING: Search callback failed, result = 0x800B0001
2014-04-22 17:25:21:052  964 1608 AU   # WARNING: Failed to find updates with error code 800B0001
2014-04-22 17:25:21:053  964 1608 AU #########
2014-04-22 17:25:21:053  964 1608 AU ##  END  ##  AU: Search for updates [CallId = {2C64103F-3D49-4DE3-AE71-44284A3BB9C1}]
2014-04-22 17:25:21:053  964 1608 AU #############
2014-04-22 17:25:21:053  964 1608 AU Need to show Unable to Detect notification
2014-04-22 17:25:21:053  964 1608 AU Successfully wrote event for AU health state:1
2014-04-22 17:25:21:053  964 1608 AU AU setting next detection timeout to 2014-04-23 05:25:21
2014-04-22 17:25:21:053  964 1608 AU Setting AU scheduled install time to 2014-04-23 20:00:00
2014-04-22 17:25:21:053  964 1608 AU Successfully wrote event for AU health state:1
2014-04-22 17:25:21:054  964 1608 AU Successfully wrote event for AU health state:1
2014-04-22 17:25:22:228  964 1200 Report REPORT EVENT: {F99BD9C4-6A30-4F26-91DC-348AD3BED509} 2014-04-22 17:25:17:228-0700 1 148 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 1 800b0001 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x800b0001.
2014-04-22 17:25:22:229  964 1200 Report REPORT EVENT: {C0AC6ABB-E093-4C67-8C09-BC5B37F79753} 2014-04-22 17:25:21:051-0700 1 148 101 {D67661EB-2423-451D-BF5D-13199E37DF28} 1 800b0001 SelfUpdate Failure Software Synchronization Windows Update Client failed to detect with error 0x800b0001.
2014-04-22 17:25:22:244  964 1200 Report CWERReporter::HandleEvents — WER report upload completed with status 0x8
2014-04-22 17:25:22:244  964 1200 Report WER Report sent: 7.6.7600.256 0x800b0001 D67661EB-2423-451D-BF5D-13199E37DF28 Scan 101 Managed
2014-04-22 17:25:22:261  964 1200 Report CWERReporter::HandleEvents — WER report upload completed with status 0x8
2014-04-22 17:25:22:261  964 1200 Report WER Report sent: 7.6.7600.256 0x800b0001 D67661EB-2423-451D-BF5D-13199E37DF28 Scan 101 Managed
2014-04-22 17:25:22:261  964 1200 Report CWERReporter finishing event handling. (00000000)

Эта статья объединяет известные мне способы починки агента WSUS.

Ранее, я уже писал, как сверить список компьютеров, которые есть в AD с теми, которые есть во WSUS. Если эти списки не совпадают, то у вас проблема и часть компьютеров не обновляется.

В самом простом случае, вы забыли сделать групповую политику, которая настраивает клиентские компьютеры и серверы на обновление со WSUS, или сконфигурировали ее так, что она не применяется. Ручная настройка параметров через gpedit.msc тоже допустима, но только для тех компьютеров, которые не входят в домен.

Итак, политика применяется, но все равно компьютер не обновляется. Что делать и как лечить?

Если у вас Windows Vista, Windows Server 2008, Windows 7 или Windows Server 2008 R2, то самым первым способом будет скачать с сайта Microsoft утилиту System Update Readiness Tool и запустить ее. Если это не поможет, то нижу приведены различные способы, которые могут помочь вам восстановить работоспособность.

На серверах Windows Server 2008 R2 и Windows Server 2008 стала проявляться следующая проблема. Windows Update показывает, что нужно обновить агента: 

Install new Windows Update software

Мы пытаемся это сделать, но в результате получаем ошибку:

Error Code 80070005

В логе %systemroot%WindowsUpdate.log обнаружтваются следующие сообщения:

2012-06-20    14:04:12:198     912    698    Setup    FATAL: WuSetupV.exe process ended prematurely, err = 0x80070005
2012-06-20    14:04:12:198     912    698    Setup    WARNING: SelfUpdate install failed, error = 0x80070005
2012-06-20    14:04:17:166     912    b54    Report    REPORT EVENT: {857B6F41-5A79-470E-9DCA-7749D23682E6}    2012-06-20 14:04:12:198+0300    1    182    101    {61CA813A-7585-442E-A66B-B0D15CE6BDC0}    1    80070005    SelfUpdate    Failure    Content Install    Installation Failure: Windows failed to install the following update with error 0x80070005: Windows Update Setup Handler.
2012-06-20    14:04:17:182     912    b54    Report    CWERReporter::HandleEvents — WER report upload completed with status 0x8
2012-06-20    14:04:17:182     912    b54    Report    WER Report sent: 7.5.7601.17514 0x80070005 61CA813A-7585-442E-A66B-B0D15CE6BDC0 Install 101 Managed
2012-06-20    14:04:17:182     912    b54    Report    CWERReporter finishing event handling. (00000000)

WARNING: WU client fails CClientCallRecorder::RemoveService with error 0x80248014

2012-06-21    12:06:26:649    3020    13ec    Setup    Performing SelfUpdate installation
2012-06-21    12:06:26:665    3020    13ec    Setup    WARNING: Failed to stop the WU service, error = 0x80070005
2012-06-21    12:06:26:665    3020    13ec    Setup    WuSetup has finished.  Exit code is 0x00000005
2012-06-21    12:06:26:665     968    f84    Setup    FATAL: WuSetupV.exe process ended prematurely, err = 0x80070005
2012-06-21    12:06:26:665     968    f84    Setup    WARNING: SelfUpdate install failed, error = 0x80070005

Следует проверить разрешения в групповой политике для сервиса «Windows Updates”

Startup Mode: Automatic и разрешения:

Type    Name    Permission
Allow   Everyone        Read, Delete
Allow   Everyone        Change template, Start, Stop, Pause and continue

  Если установка таких разрешений не принесет результата, попробуйте следующий вариант:

  a) Поменять параметры для “Windows Updates» сервиса в «not defined» и для старта и разрешения

  b) Удалить ключ в реестре:

HKLMSYSTEMCurrentControlSetServiceswuauservSecurity

  После следующего обновления групповой политики проблема должна устраниться. gpupdate /force

Для простоты, для следующих способов, выкладываю все эти скрипты в уже готовом виде: Wsus-fix

1. Первый скрипт самый простой, и, на самом деле, даже не для лечения используется, а для того, чтобы принудительно запустить проверку на обновление, ну и, заодно, чистит папку, в которой накапливаются дистрибутивы уже установленных обновлений:

wsus_detect_manual.cmd

net stop wuauserv && net stop bits && net stop cryptsvc

del /f /s /q %windir%SoftwareDistributiondownload*.*

net start wuauserv && net start bits && net start cryptsvc

wuauclt.exe /detectnow exit

2. Второй скрипт нужен для того, чтобы “оживить” неработающий сервис WSUS. В нем идет чистка от старых обновлений, после чего папки SoftwareDistribution и Catroot2 переименовываются, что при перезапуске сервиса приведет к их пересозданию. Затем системные dll библиотеки перерегистрируются.

fix_wsus_service.cmd

net stop bits
net stop wuauserv
net stop cryptsvc

del /f /s /q %windir%SoftwareDistributiondownload*.*

ren %systemroot%System32Catroot2 Catroot2.old
ren %systemroot%SoftwareDistribution SoftwareDistribution.old

REM del /f /s /q %windir%SoftwareDistribution*.*

del /f /s /q %windir%windowsupdate.log

%windir%system32regsvr32.exe /U /s %windir%system32vbscript.dll
%windir%system32regsvr32.exe /U /s %windir%system32mshtml.dll
%windir%system32regsvr32.exe /U /s %windir%system32msjava.dll
%windir%system32regsvr32.exe /U /s %windir%system32msxml.dll
%windir%system32regsvr32.exe /U /s %windir%system32actxprxy.dll
%windir%system32regsvr32.exe /U /s %windir%system32shdocvw.dll
%windir%system32regsvr32.exe /U /s %windir%system32Mssip32.dll
%windir%system32regsvr32.exe /U /s %windir%system32wintrust.dll
%windir%system32regsvr32.exe /U /s %windir%system32initpki.dll
%windir%system32regsvr32.exe /U /s %windir%system32dssenh.dll
%windir%system32regsvr32.exe /U /s %windir%system32rsaenh.dll
%windir%system32regsvr32.exe /U /s %windir%system32gpkcsp.dll
%windir%system32regsvr32.exe /U /s %windir%system32sccbase.dll
%windir%system32regsvr32.exe /U /s %windir%system32slbcsp.dll
%windir%system32regsvr32.exe /U /s %windir%system32cryptdlg.dll
%windir%system32regsvr32.exe /U /s %windir%system32Urlmon.dll
%windir%system32regsvr32.exe /U /s %windir%system32Oleaut32.dll
%windir%system32regsvr32.exe /U /s %windir%system32msxml2.dll
%windir%system32regsvr32.exe /U /s %windir%system32Browseui.dll
%windir%system32regsvr32.exe /U /s %windir%system32shell32.dll
%windir%system32regsvr32.exe /U /s %windir%system32Mssip32.dll
%windir%system32regsvr32.exe /U /s %windir%system32atl.dll
%windir%system32regsvr32.exe /U /s %windir%system32jscript.dll
%windir%system32regsvr32.exe /U /s %windir%system32msxml3.dll
%windir%system32regsvr32.exe /U /s %windir%system32softpub.dll
%windir%system32regsvr32.exe /U /s %windir%system32wuapi.dll
%windir%system32regsvr32.exe /U /s %windir%system32wuaueng.dll
%windir%system32regsvr32.exe /U /s %windir%system32wuaueng1.dll
%windir%system32regsvr32.exe /U /s %windir%system32wucltui.dll
%windir%system32regsvr32.exe /U /s %windir%system32wups.dll
%windir%system32regsvr32.exe /U /s %windir%system32wups2.dll
%windir%system32regsvr32.exe /U /s %windir%system32wuweb.dll

%windir%system32regsvr32.exe /s %windir%system32vbscript.dll
%windir%system32regsvr32.exe /s %windir%system32mshtml.dll
%windir%system32regsvr32.exe /s %windir%system32msjava.dll
%windir%system32regsvr32.exe /s %windir%system32msxml.dll
%windir%system32regsvr32.exe /s %windir%system32actxprxy.dll
%windir%system32regsvr32.exe /s %windir%system32shdocvw.dll
%windir%system32regsvr32.exe /s %windir%system32Mssip32.dll
%windir%system32regsvr32.exe /s %windir%system32wintrust.dll
%windir%system32regsvr32.exe /s %windir%system32initpki.dll
%windir%system32regsvr32.exe /s %windir%system32dssenh.dll
%windir%system32regsvr32.exe /s %windir%system32rsaenh.dll
%windir%system32regsvr32.exe /s %windir%system32gpkcsp.dll
%windir%system32regsvr32.exe /s %windir%system32sccbase.dll
%windir%system32regsvr32.exe /s %windir%system32slbcsp.dll
%windir%system32regsvr32.exe /s %windir%system32cryptdlg.dll
%windir%system32regsvr32.exe /s %windir%system32Urlmon.dll
%windir%system32regsvr32.exe /s %windir%system32Oleaut32.dll
%windir%system32regsvr32.exe /s %windir%system32msxml2.dll
%windir%system32regsvr32.exe /s %windir%system32Browseui.dll
%windir%system32regsvr32.exe /s %windir%system32shell32.dll
%windir%system32regsvr32.exe /s %windir%system32Mssip32.dll
%windir%system32regsvr32.exe /s %windir%system32atl.dll
%windir%system32regsvr32.exe /s %windir%system32jscript.dll
%windir%system32regsvr32.exe /s %windir%system32msxml3.dll
%windir%system32regsvr32.exe /s %windir%system32softpub.dll
%windir%system32regsvr32.exe /s %windir%system32wuapi.dll
%windir%system32regsvr32.exe /s %windir%system32wuaueng.dll
%windir%system32regsvr32.exe /s %windir%system32wuaueng1.dll
%windir%system32regsvr32.exe /s %windir%system32wucltui.dll
%windir%system32regsvr32.exe /s %windir%system32wups.dll
%windir%system32regsvr32.exe /s %windir%system32wups2.dll
%windir%system32regsvr32.exe /s %windir%system32wuweb.dll

net start bits
net start wuauserv
net start cryptsvc

wuauclt /detectnow

exit

3. Этот скрипт применяется в тех случаях, когда компьютер был недавно клонирован, или в тех, когда регистрации в WSUS у компьютера так и не произошло. Он отличается от предыдущего только предпоследней строчкой, в которой производится обнуление авторизации с перегенерацией идентификатора. Приведу только эту строчку:

wsus_resetaut_detect_manual.cmd

wuauclt.exe /resetauthorization /detectnow

4. Если нужно просто обнулить авторизацию, то можно воспользоваться конструкцией из предыдущего скрипта. Практика показала, что еще лучше удалять лишние ключи из реестра, для чего мы используем следующий скрипт

AU_Clean_SID.cmd

@echo on
net stop wuauserv
REG DELETE «HKLMSOFTWAREMicrosoftWindowsCurrentVersionWindowsUpdate» /v AccountDomainSid /f
REG DELETE «HKLMSOFTWAREMicrosoftWindowsCurrentVersionWindowsUpdate» /v PingID /f
REG DELETE «HKLMSOFTWAREMicrosoftWindowsCurrentVersionWindowsUpdate» /v SusClientId /f
net start wuauserv
wuauclt /resetauthorization /detectnow

5. Иногда, для того, чтобы все заработало нужно переустановить агента WSUS. Вначале нужно скачать latest Windows Update Agent, ну а затем установить соответствующую редакцию

для x32 версий Windows

windowsupdateagent30-x86.exe /wuforce

для x64 версий Windows

windowsupdateagent30-x64.exe /wuforce

Если вы счастливый обладатель Itanium – догадаетесь сами :-)

После установки агента нужно обязательно перезагрузиться.

6. Для “лечения” ошибок 0x80070005, т.е. ошибок доступа может пригодиться нижеприведенный скрипт. Он восстанавливает доступы для администраторов и системы к реестру и системным папкам.

Для выполнения этого скрипта понадобится майкрософтовская утилита subinacl.exe. Она входит в resource kit для Windows Server 2003, но пользоваться той версией, что входит туда не стоит, т.к. там неприятные ошибки. Следует скачать subinacl.exe версии 5.2.3790.1180.

Restore_registry_and_system_permission.cmd

@echo off
REM Применять при ошибках 0x80070005 Windows Update
subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=administrators=f
subinacl /subkeyreg HKEY_CURRENT_USER /grant=administrators=f
subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=administrators=f
subinacl /subdirectories %SystemDrive% /grant=administrators=f
subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=system=f
subinacl /subkeyreg HKEY_CURRENT_USER /grant=system=f
subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=system=f
subinacl /subdirectories %SystemDrive% /grant=system=f

Скрипт был найден в статье базы знаний Microsoft

Все эти скрипты можно выполнять практически автоматически, в случае возникновения проблем. Если в результате проблема таки не решена, то приходится разбираться уже плотнее. И тут нам пригодится тот самый windowsupdate.log, который лежит в корне папки Windows. Если компьютер проблемный, то файл этот большого размера. Для простоты, желательно его удалить перед тем как запускать скрипты. Почти во всех скриптах предусмотрена команда его удаления, но не все так просто. Не смотря на остановку сервиса wuauserv, обычно, его продолжают держать открытые IE и т.п. Поэтому, есть хитрый способ. Запускаю

notepad.exe %windir%windowsupdate.log

Выделяю весь текст, удаляю его и сохраняю вместо старого файла (не забыть в диалоге сохранения поменять тип файла на *.*, а то по умолчанию – *.txt)

Итак, вернемся к логу, коды ошибок WSUS 3 могут помочь в разбирательстве.

Одна из распространенных проблем со wsus клиентом на серверах может заключаться в том, что сам сервис может подключаться к WSUS через прокси, а этого не нужно и наоборот. Манипулировать этим поведением можно с помощью команды proxycfg

Доступ без прокси: proxycfg –d
Доступ через прокси с опциональным указанием байпас листа: proxycfg –d
Проимпортировать пользовательские настройки: proxycfg –u

В новых версиях Windows используется другой способ — Настройка прокси для сервисов на Windows 7/Windows Server 2008

Стоит заметить, что есть случаи, когда заставить клиента обновляться со wsus так и не получается. У меня есть прецеденты с парочкой Windows Server 2003 R2, которые мне побороть так и не удалось. Поэтому я их обновляю через интернет :-)

Свежие операционные системы типа Windows 7, Windows 2008 иногда “заводятся” с трудом. Для таких случаев, эмпирическим путем, был найден алгоритм типа:
1. Обновляемся первый раз с сайта microsoft с обновлением агента
2. Потом обновляем агента уже локально
3. А потом все начинает работать

Надеюсь, что плоды наших трудов кому-нибудь помогут.

Для простоты, выкладываю все эти скрипты в уже готовом виде: Wsus-fix

Let’s see how you can FIX SCCM Task Sequence has failed with the error code 0x800700A1. You might encounter a prompt error message while performing Operating System Deployment with SCCM Task Sequence. The error 0x800700A1 translates “The specified path is invalid.”. This is often seen when you will perform the deployment in new machines.

Being an IT admin, we keep used to replacing an HDD on a machine and perform the deployment most of the time. In this scenario, the error code 0x800700A1 has been noticed as well.

0x800700A1 means BAD_PATHNAME. The reason you get this error is if the task sequence cannot find the path because the drive is RAW. In this case, it’s always recommended to format the disk partition before deploying Windows Image to help us avoid unwanted issues.

Issue Summary

This error occurs when attempting to run an operating system deployment task sequence and in a step, it attempted to copy the files to the local hard drive but cannot find the path as the drive is in RAW state.

Patch My PC

Task Sequence Error: Task Sequence has failed with the error code 0x800700A1 in the task sequence step. For more information, contact your system administrator or helpdesk operator.

FIX: SCCM Task sequence has failed with the error code 0x800700A1
FIX: SCCM Task sequence has failed with the error code 0x800700A1

It’s always recommended to examine the SMSTS log for task sequence failure issues to help you get the inside about the failure prompt to troubleshoot the task sequence error. Most importantly, to be aware of the location of the SMSTS log during SCCM OSD process. More you can explore SCCM OSD Task Sequence Troubleshooting Steps by Step Ultimate Guide SMSTS.log.

Here are the highlights the Task sequence has failed with the error code 0x800700A1 from the SMSTS.log.

FIX: SCCM Task sequence has failed with the error code 0x800700A1
FIX: SCCM Task sequence has failed with the error code 0x800700A1
Failed to resolve the source for SMS PKGID=MEM00026, hr=0x800700a1	InstallSoftware	11-08-2021 17:22:47	536 (0x0218)
Install Software failed to run command line, hr=0x800700a1
Process completed with exit code 2147942561
The execution of the group (Install Operating System) has failed and the execution has been aborted. An action failed. Error 0x80004004
Failed to run the last action: Decrypt Drive. Result -2147024735. Execution of task sequence failed.

To fix this issue, The drive needs to be formatted before continuing with the task sequence. Let’s follow the steps below to format the hard drive –

Adaptiva

If you’re already in the error windows screen Task sequence has failed with the error code 0x800700A1, Press F8 to launch the command prompt window or Restart the machine and boot with the same task sequence.

Important – Enable command support (F8) that is not recommended for production use. You can explore the available command prompt support option in Boot Image.

The diskpart command interpreter helps you manage your computer’s drives (disks, partitions, volumes, or virtual hard disks), Type the following commands in the command prompt –

Diskpart
List disk                (Displays all the disks on the device)
Select disk 0            
Clean                    (Wipes the disk)
Create partition primary (Creates windows partition)
Select partition 1
Format quick fs=NTFS     (Format primary partition)
Assign letter C
Exit

Disclaimer – The information provided on site is for general informational purposes only. All information on the site is provided in good faith, however, we make no representation or warranty of any kind, express or implied regarding the accuracy, adequacy, validity, reliability, availability, or completeness of any information on the website.

Once you are done with the above steps, Restart the target machine and reinitiate the task sequence deployment, It should continue without any errors.

About Author -> Jitesh has over 5 years of working experience in the IT Industry. He writes and shares his experiences related to Microsoft device management technologies and IT Infrastructure management. His primary focus area is Windows 10 Deployment solution with Configuration Manager, Microsoft Deployment Toolkit (MDT), and Microsoft Intune.

Resources

  • OSD Known Issues Troubleshooting Guide |SCCM |ConfigMgr
  • ConfigMgr OSD Troubleshooting Known Issues Guide Part 2 | SCCM
  • FIX: SCCM Task Sequence Failed to load class properties 0x80041002 (2147749890)
  • SCCM Deployment Failed to Resolve Task Sequence Dependencies 0X80040102

Понравилась статья? Поделить с друзьями:
  • Cypress trackpad ошибка
  • Cv2 cvtcolor error
  • Cute error sans
  • Cut off error
  • Cut data file creation error 117442049 can not create mgl file 0x08018022