asdf2345 Posted July 28, 2020 Posted July 28, 2020 (edited) 52 minutes ago, TigTex said: Take a look at this ftp .net update doesn't work, even with the target modifier on the previous page Edited July 28, 2020 by asdf2345
wiktorynka Posted July 30, 2020 Posted July 30, 2020 (edited) On 7/21/2020 at 9:42 PM, Vistapocalypse said: Unlike patches for Windows 6.0 per se, the Server 2008 security updates for IE9 never listed Vista as an applicable OS in the extractable text document. It does not follow that installation is blocked on Vista. However, installation might very well be blocked unless sha2 support has been properly installed. This method works: https://forums.mydigitallife.net/threads/bypass-windows-7-extended-security-updates-eligibility.80606/page-123#post-1585640 The last working update for IE9 is KB4534251 Edited July 30, 2020 by wiktorynka
burd Posted July 30, 2020 Posted July 30, 2020 (edited) 15 minutes ago, wiktorynka said: This method works: https://forums.mydigitallife.net/threads/bypass-windows-7-extended-security-updates-eligibility.80606/page-123#post-1585640 The last working update for IE9 is KB4534251 yes it works , thats how i patched my vista ie9 with it around a week back Edited July 30, 2020 by burd
Vistapocalypse Posted August 1, 2020 Posted August 1, 2020 (edited) On 7/15/2019 at 5:09 AM, greenhillmaniac said: ...BTW, I've seen demand for it, so I'm thinking of posting my Vista update repository that holds all of Vista's x86 and x64 updates from the beginning until its EOL (April 2017). Useful if you want to update your system offline without using WU. It's completely separate from this repository I'm updating every other month. Is there any interest? I suspect that there might be more interest very soon. See my post here, and BTW posting there might be better than of flurry of OT posts in this Server 2008 thread such as we saw last summer. Edit: See new Windows Vista Update Repository thread! Edited August 8, 2020 by Vistapocalypse 1
VistaLover Posted August 1, 2020 Posted August 1, 2020 (edited) 7 hours ago, Vistapocalypse said: BTW posting there might be better than of flurry of OT posts in this Server 2008 thread ... Considering that the title of that thread on the Windows XP subforum is "On decommissioning of update servers for 2000, XP, (and Vista?) as of July 2019" i.e. our beloved OS is inside parentheses and with a question mark, and given the, admittedly, low respect XP-diehards hold for Vista (), I would suggest a separate dedicated (pinned?) thread/post be posted in the main Vista subforum, wouldn't you agree @greenhillmaniac ? FWIW, a casual search on the Vista subforum has revealed an entry that hasn't (till now...) attracted much attention, On 8/2/2019 at 2:19 AM, daniel_k said: 1) Download all files from Main_URLs.txt to the same folder. Should be helpful for the duration Vista .msus are kept online in the catalog by evil M$... There's also another thread with a very promising title https://msfn.org/board/topic/179120-windows-vista-post-sp2-updates/ but, sadly , NOT the content one would expect going by that title... =========================================== Semi-OT: Vista SP2 reached its EoS without ever getting support for either TLS 1.2 nor SHA-2 code signing ; so I am inclined to believe that all Vista SP2 created MS updates were sha1 code-signed; in https://support.microsoft.com/en-us/help/4569557/windows-update-sha-1-based-endpoints-discontinued Quote connections to Windows Update service endpoints use a more modern algorithm (SHA-256). Older versions of Windows connect to Windows Update service endpoints by using the less secure SHA-1 algorithm. so what breaks WU for Vista SP2 is the secure connection negotiation to those WUS SHA-2 endpoints (CDNs); connections which, and this isn't said explicitly, have been probably updated to use TLS 1.2 ... I don't think MS will touch and re-sign with SHA-2 sigs existing WS2008SP2 sha1 update packages (and certainly not the Vista ones...); but we, Vista users, are extremely unlucky : While we can implement postEoS TLS 1.2 support, installing KB4474419 (even v1 with a digital sig of 16/04/2019) + KB4493730 will, as pointed out elsewhere by @Vistapocalypse , change the kernel version to 6.0.6003.205xx; while that is fine with WS2008SP2 and WU, the latter had been probably configured in a way to only serve Vista with a 6.0.6002.xxxxx kernel version... And no-one has found (yet?) a way to (cheat and) make Vista appear in the eyes of WU as WS2008... Another question that comes up is if the Vista MS updates were hosted on special "outdated (SHA-1) Windows Update service endpoints used only for older platforms" that are "now being discontinued", does that mean that the update packages themselves will cease being on line on WU servers? If so, any (theoretical) discussion about re-enabling connections to WU from Vista will be a moot one... ... As The Doors sang many decades ago: Quote This is the end, beautiful friend This is the end, my only friend The end of our elaborate plans The end of ev'rything that stands The end No safety or surprise The end Edited August 2, 2020 by VistaLover 1
Vistapocalypse Posted August 1, 2020 Posted August 1, 2020 [Imagine a quote of my friend VistaLover’s entire post ] It might be wise for greenhillmaniac to consult with MSFN administrators before proceeding. (A couple of posts pertaining to XP seem to have vanished from the above-mentioned thread.) As mentioned, download links could be helpful as long as content remains in the catalog - but I’m afraid another link might be construed as saying that content will be removed from the catalog soon... https://techcommunity.microsoft.com/t5/windows-it-pro-blog/sha-1-windows-content-to-be-retired-august-3-2020/ba-p/1544373
VistaLover Posted August 2, 2020 Posted August 2, 2020 52 minutes ago, Vistapocalypse said: but I’m afraid another link might be construed as saying that content will be removed from the catalog soon ... For the time being at least, ONLY Microsoft Download Center content will be affected: Quote Microsoft will retire content that is Windows-signed for Secure Hash Algorithm 1 (SHA-1) from the Microsoft Download Center on August 3, 2020. Microsoft Download Center != Microsoft Update Catalog The Windows XP communities had been preparing for a good while now for the (inevitable) event M$ busts the WU service on fresh XP (SP2/3) installations; I might be wrong, but I haven't witnessed (at least here in MSFN) a similar impetus for salvaging all Vista updates off of WU/MUC come to fruition...
Vistapocalypse Posted August 2, 2020 Posted August 2, 2020 Hmm, it seems unlikely that M$ will remove all the old updates for Server 2008 SP2 (or Windows 7 for that matter) while it is under ESU. Patching Vista SP2 with Server 2008 updates all the way back might be a possibility (and brings this thread back toward topic). I would imagine that Vista had more patches than 2008 though, since it had more features. But what if M$ replaces old patches with sha2 versions? In that case, the April 2019 SSU (which was dual-signed) becomes the single most important patch to stockpile. But what if M$ decides to block installation on Vista while they’re at it? We need a repository!
asdf2345 Posted August 2, 2020 Posted August 2, 2020 15 hours ago, Vistapocalypse said: I suspect that there might be more interest very soon. See my post here, and BTW posting there might be better than of flurry of OT posts in this Server 2008 thread such as we saw last summer. Would help making a custom updated ISO much easier
freakedenough Posted August 15, 2020 Posted August 15, 2020 Quote 2020-08 Servicing Stack Update für Windows Server 2008 für x86-basierte Systeme(KB4572374).msu 2020-08 Sicherheits- und Qualitätsrollup für .NET Framework 2.0, 3.0 unter Windows Server 2008 SP2 (KB4569766).msu 2020-08 Sicherheitsupdate für .NET Framework 2.0, 3.0 unter Windows Server 2008SP2 (KB4569735).msu 2020-08 – Monatliches Sicherheitsqualitätsrollup für Windows Server 2008 für x86-basierte Systeme (KB4571730).msu 2020-08 – Sicherheitsqualitätsupdate für Windows Server 2008 für x86-basierte Systeme (KB4571746).msu 2020-08 Kumulatives Sicherheitsupdate für Internet Explorer 9 für Windows Server 2008 für x86-basierte System (KB4571687).msu august 2020 updates work too.
TigTex Posted August 16, 2020 Posted August 16, 2020 On 8/15/2020 at 9:11 AM, freakedenough said: august 2020 updates work too. Except IE9 on vista x64. It needs some extra procedures to install. On x86 there is no problem 1
asdf2345 Posted August 16, 2020 Posted August 16, 2020 5 minutes ago, TigTex said: Except IE9 on vista x64. It needs some extra procedures to install. On x86 there is no problem Why even bother updating IE?
nicolaasjan Posted August 17, 2020 Posted August 17, 2020 22 hours ago, asdf2345 said: Why even bother updating IE? Even if you don't use the browser itself, the engine is still deeply integrated into the operating system, so exploits can still affect you... 2
NojusK Posted September 22, 2020 Posted September 22, 2020 Not so long ago installed Server 2008 SP2 and I'm wondering what are the updates to install the ESU updates from M$?
freakedenough Posted October 25, 2020 Posted October 25, 2020 (edited) 2020-10 – Monatliches Sicherheitsqualitätsrollup für Windows Server 2008 für x86-basierte Systeme (KB4580378) 2020-10 – Sicherheitsqualitätsupdate für Windows Server 2008 für x86-basierte Systeme (KB4580385) 2020-10-25 16:30:05:772 1192 f4c Shutdwn user declined update at shutdown 2020-10-25 16:30:05:772 1192 f4c AU AU initiates service shutdown 2020-10-25 16:30:05:772 1192 f4c AU ########### AU: Uninitializing Automatic Updates ########### 2020-10-25 16:30:05:803 1192 f4c Report CWERReporter finishing event handling. (00000000) 2020-10-25 16:30:05:803 1192 f4c Service ********* 2020-10-25 16:30:05:803 1192 f4c Service ** END ** Service: Service exit [Exit code = 0x240001] 2020-10-25 16:30:05:803 1192 f4c Service ************* 2020-10-25 16:33:40:387 3568 cc8 Misc =========== Logging initialized (build: 7.6.7600.256, tz: +0100) =========== 2020-10-25 16:33:40:388 3568 cc8 Misc = Process: C:\Windows\system32\wusa.exe 2020-10-25 16:33:40:388 3568 cc8 Misc = Module: C:\Windows\system32\wuapi.dll 2020-10-25 16:33:40:386 3568 cc8 COMAPI ----------- COMAPI: IUpdateServiceManager::AddScanPackageService ----------- 2020-10-25 16:33:40:388 3568 cc8 COMAPI - ServiceName = Eigenständiges Windows-Updateinstallationsprogramm 2020-10-25 16:33:40:388 3568 cc8 COMAPI - ScanFileLocation = C:\703105c0b590cd5475\wsusscan.cab 2020-10-25 16:33:40:413 1180 dc0 Misc =========== Logging initialized (build: 7.6.7600.256, tz: +0100) =========== 2020-10-25 16:33:40:413 1180 dc0 Misc = Process: C:\Windows\system32\svchost.exe 2020-10-25 16:33:40:413 1180 dc0 Misc = Module: c:\windows\system32\wuaueng.dll 2020-10-25 16:33:40:413 1180 dc0 Service ************* 2020-10-25 16:33:40:413 1180 dc0 Service ** START ** Service: Service startup 2020-10-25 16:33:40:413 1180 dc0 Service ********* 2020-10-25 16:33:40:431 1180 dc0 Agent * WU client version 7.6.7600.256 2020-10-25 16:33:40:431 1180 dc0 Agent * Base directory: C:\Windows\SoftwareDistribution 2020-10-25 16:33:40:432 1180 dc0 Agent * Access type: No proxy 2020-10-25 16:33:40:433 1180 dc0 Agent * Network state: Connected 2020-10-25 16:33:40:502 1180 66c Report CWERReporter::Init succeeded 2020-10-25 16:33:40:502 1180 66c Agent *********** Agent: Initializing Windows Update Agent *********** 2020-10-25 16:33:40:502 1180 66c Agent *********** Agent: Initializing global settings cache *********** 2020-10-25 16:33:40:502 1180 66c Agent * WSUS server: <NULL> 2020-10-25 16:33:40:502 1180 66c Agent * WSUS status server: <NULL> 2020-10-25 16:33:40:502 1180 66c Agent * Target group: (Unassigned Computers) 2020-10-25 16:33:40:502 1180 66c Agent * Windows Update access disabled: No 2020-10-25 16:33:40:502 1180 66c DnldMgr Download manager restoring 0 downloads 2020-10-25 16:33:40:509 1180 66c Misc Validating signature for C:\Windows\SoftwareDistribution\ScanFile\6da38975-319b-4369-bcb6-68cf05a1a9b3\Source.cab: 2020-10-25 16:33:40:562 1180 66c Misc Microsoft signed: Yes 2020-10-25 16:33:40:580 1180 66c DtaStor Default service for AU is {7971F918-A847-4430-9279-4A52D1EFE18D} 2020-10-25 16:33:40:582 3568 cc8 COMAPI - Added scan package service, ServiceID = {6DA38975-319B-4369-BCB6-68CF05A1A9B3} Third party service 2020-10-25 16:33:40:583 3568 cc8 COMAPI ------------- 2020-10-25 16:33:40:583 3568 cc8 COMAPI -- START -- COMAPI: Search [ClientId = wusa] 2020-10-25 16:33:40:583 3568 cc8 COMAPI --------- 2020-10-25 16:33:40:589 3568 cc8 COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = wusa] 2020-10-25 16:33:40:721 1180 dc0 Report *********** Report: Initializing static reporting data *********** 2020-10-25 16:33:40:721 1180 dc0 Report * OS Version = 6.0.6003.2.0.65792 2020-10-25 16:33:40:721 1180 dc0 Report * OS Product Type = 0x00000001 2020-10-25 16:33:40:760 1180 dc0 Report * Computer Brand = Dell Inc. 2020-10-25 16:33:40:760 1180 dc0 Report * Computer Model = XPS M1330 2020-10-25 16:33:40:764 1180 dc0 Report * Bios Revision = A15 2020-10-25 16:33:40:764 1180 dc0 Report * Bios Name = Phoenix ROM BIOS PLUS Version 1.10 A15 2020-10-25 16:33:40:764 1180 dc0 Report * Bios Release Date = 2008-12-26T00:00:00 2020-10-25 16:33:40:764 1180 dc0 Report * Locale ID = 3079 2020-10-25 16:33:40:767 1180 3b0 Agent ************* 2020-10-25 16:33:40:767 1180 3b0 Agent ** START ** Agent: Finding updates [CallerId = wusa] 2020-10-25 16:33:40:767 1180 3b0 Agent ********* 2020-10-25 16:33:40:767 1180 3b0 Agent * Online = Yes; Ignore download priority = No 2020-10-25 16:33:40:767 1180 3b0 Agent * Criteria = "IsInstalled=0" 2020-10-25 16:33:40:767 1180 3b0 Agent * ServiceID = {6DA38975-319B-4369-BCB6-68CF05A1A9B3} Third party service 2020-10-25 16:33:40:767 1180 3b0 Agent * Search Scope = {Machine} 2020-10-25 16:33:40:990 1180 3b0 PT +++++++++++ PT: Synchronizing server updates +++++++++++ 2020-10-25 16:33:40:990 1180 3b0 PT + Offline serviceId = {6DA38975-319B-4369-BCB6-68CF05A1A9B3} 2020-10-25 16:33:40:990 1180 3b0 PT WARNING: Cached cookie has expired or new PID is available 2020-10-25 16:33:47:263 1180 3b0 PT +++++++++++ PT: Synchronizing extended update info +++++++++++ 2020-10-25 16:33:47:264 1180 3b0 PT + Offline serviceId = {6DA38975-319B-4369-BCB6-68CF05A1A9B3} 2020-10-25 16:33:47:396 1180 3b0 Agent * Added update {E38CA2E6-3086-4328-8037-282EB75BA2E0}.501 to search result 2020-10-25 16:33:47:396 1180 3b0 Agent * Found 1 updates and 58 categories in search; evaluated appl. rules of 127 out of 301 deployed entities 2020-10-25 16:33:47:399 1180 3b0 Agent ********* 2020-10-25 16:33:47:399 1180 3b0 Agent ** END ** Agent: Finding updates [CallerId = wusa] 2020-10-25 16:33:47:399 1180 3b0 Agent ************* 2020-10-25 16:33:47:401 3568 f04 COMAPI >>-- RESUMED -- COMAPI: Search [ClientId = wusa] 2020-10-25 16:33:47:406 1180 3b0 Report CWERReporter finishing event handling. (00000000) 2020-10-25 16:33:47:414 3568 f04 COMAPI - Updates found = 1 2020-10-25 16:33:47:415 3568 f04 COMAPI --------- 2020-10-25 16:33:47:415 3568 f04 COMAPI -- END -- COMAPI: Search [ClientId = wusa] 2020-10-25 16:33:47:415 3568 f04 COMAPI ------------- 2020-10-25 16:33:49:169 1180 66c DnldMgr *********** DnldMgr: Copy update to cache [UpdateId = {31CD24F7-1593-41FF-AD6F-4748C34C897E}.501] *********** 2020-10-25 16:33:49:235 1180 66c DnldMgr Asking handler to generate non-range requests. 2020-10-25 16:33:49:235 1180 66c Handler Generating request for CBS update 31CD24F7-1593-41FF-AD6F-4748C34C897E in sandbox C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b_ctc 2020-10-25 16:33:49:236 1180 66c Handler Selecting self-contained because update does not have express payload. 2020-10-25 16:33:49:236 1180 66c Handler Selected payload type is ptSelfContained 2020-10-25 16:33:49:236 1180 66c Handler Detected download state is dsStart 2020-10-25 16:33:49:236 1180 66c Handler Adding Windows6.0-KB4580385-x86.cab (entire file) to request list. 2020-10-25 16:33:49:236 1180 66c Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 2020-10-25 16:33:49:436 1180 66c Misc Validating signature for C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b_ctc\Windows6.0-KB4580385-x86.cab: 2020-10-25 16:33:50:340 1180 66c Misc Microsoft signed: Yes 2020-10-25 16:33:50:341 1180 66c DnldMgr Asking handler to generate non-range requests. 2020-10-25 16:33:50:341 1180 66c Handler Generating request for CBS update 31CD24F7-1593-41FF-AD6F-4748C34C897E in sandbox C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b_ctc 2020-10-25 16:33:50:341 1180 66c Handler Selecting self-contained because update does not have express payload. 2020-10-25 16:33:50:341 1180 66c Handler Selected payload type is ptSelfContained 2020-10-25 16:33:50:341 1180 66c Handler Detected download state is dsHavePackage 2020-10-25 16:33:50:341 1180 66c Handler Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 2020-10-25 16:33:50:363 3568 cc8 COMAPI ------------- 2020-10-25 16:33:50:363 3568 cc8 COMAPI -- START -- COMAPI: Install [ClientId = wusa] 2020-10-25 16:33:50:363 3568 cc8 COMAPI --------- 2020-10-25 16:33:50:363 3568 cc8 COMAPI - Allow source prompts: Yes; Forced: No; Force quiet: No 2020-10-25 16:33:50:363 3568 cc8 COMAPI - Updates in request: 1 2020-10-25 16:33:50:363 3568 cc8 COMAPI - ServiceID = {6DA38975-319B-4369-BCB6-68CF05A1A9B3} Third party service 2020-10-25 16:33:50:366 3568 cc8 COMAPI - Updates to install = 1 2020-10-25 16:33:50:366 1180 3d8 Agent ************* 2020-10-25 16:33:50:366 3568 cc8 COMAPI <<-- SUBMITTED -- COMAPI: Install [ClientId = wusa] 2020-10-25 16:33:50:366 1180 3d8 Agent ** START ** Agent: Installing updates [CallerId = wusa] 2020-10-25 16:33:50:366 1180 3d8 Agent ********* 2020-10-25 16:33:50:366 1180 3d8 Agent * Updates to install = 1 2020-10-25 16:33:50:370 1180 3d8 Agent * Title = Sicherheitsupdate für Windows (KB4580385) 2020-10-25 16:33:50:370 1180 3d8 Agent * UpdateId = {E38CA2E6-3086-4328-8037-282EB75BA2E0}.501 2020-10-25 16:33:50:370 1180 3d8 Agent * Bundles 1 updates: 2020-10-25 16:33:50:370 1180 3d8 Agent * {31CD24F7-1593-41FF-AD6F-4748C34C897E}.501 2020-10-25 16:33:50:559 1180 3d8 Handler Attempting to create remote handler process as DELL\Besitzer in session 1 2020-10-25 16:33:50:632 1180 3d8 DnldMgr Preparing update for install, updateId = {31CD24F7-1593-41FF-AD6F-4748C34C897E}.501. 2020-10-25 16:33:50:640 2396 b28 Misc =========== Logging initialized (build: 7.6.7600.256, tz: +0100) =========== 2020-10-25 16:33:50:640 2396 b28 Misc = Process: C:\Windows\system32\wuauclt.exe 2020-10-25 16:33:50:640 2396 b28 Misc = Module: C:\Windows\system32\wuaueng.dll 2020-10-25 16:33:50:639 2396 b28 Handler ::::::::::::: 2020-10-25 16:33:50:640 2396 b28 Handler :: START :: Handler: CBS Install 2020-10-25 16:33:50:640 2396 b28 Handler ::::::::: 2020-10-25 16:33:50:642 2396 b28 Handler Starting install of CBS update 31CD24F7-1593-41FF-AD6F-4748C34C897E 2020-10-25 16:33:50:800 2396 b28 Handler CBS package identity: Package_for_KB4580385~31bf3856ad364e35~x86~~6.0.1.10 2020-10-25 16:33:50:801 2396 b28 Handler Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b\Windows6.0-KB4580385-x86.cab, workingdir=C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b\inst 2020-10-25 16:34:25:483 1180 dc0 AU ########### AU: Initializing Automatic Updates ########### 2020-10-25 16:34:25:484 1180 dc0 AU # Approval type: Pre-download notify (User preference) 2020-10-25 16:34:25:484 1180 dc0 AU # Will interact with non-admins (Non-admins are elevated (User preference)) 2020-10-25 16:34:25:484 1180 dc0 AU # Will display featured software notifications (User preference) 2020-10-25 16:34:25:484 1180 dc0 AU Initializing featured updates 2020-10-25 16:34:25:484 1180 dc0 AU Found 0 cached featured updates 2020-10-25 16:34:25:485 1180 dc0 AU AU setting pending client directive to 'Unable To Detect' 2020-10-25 16:34:25:485 1180 dc0 AU AU finished delayed initialization 2020-10-25 16:34:25:485 1180 dc0 AU ############# 2020-10-25 16:34:25:485 1180 dc0 AU ## START ## AU: Search for updates 2020-10-25 16:34:25:485 1180 dc0 AU ######### 2020-10-25 16:34:25:487 1180 dc0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {8DE9D592-19BD-4632-8800-518343E03C23}] 2020-10-25 16:34:25:487 1180 3b0 Agent ************* 2020-10-25 16:34:25:487 1180 3b0 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates] 2020-10-25 16:34:25:487 1180 3b0 Agent ********* 2020-10-25 16:34:25:488 1180 3b0 Agent * Online = No; Ignore download priority = No 2020-10-25 16:34:25:488 1180 3b0 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1" 2020-10-25 16:34:25:488 1180 3b0 Agent * ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service 2020-10-25 16:34:25:488 1180 3b0 Agent * Search Scope = {Machine} 2020-10-25 16:34:27:686 1180 3b0 Agent * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities 2020-10-25 16:34:27:689 1180 3b0 Agent ********* 2020-10-25 16:34:27:689 1180 3b0 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates] 2020-10-25 16:34:27:689 1180 3b0 Agent ************* 2020-10-25 16:34:27:689 1180 3e4 AU >>## RESUMED ## AU: Search for updates [CallId = {8DE9D592-19BD-4632-8800-518343E03C23}] 2020-10-25 16:34:27:689 1180 3e4 AU # 0 updates detected 2020-10-25 16:34:27:689 1180 3e4 AU ######### 2020-10-25 16:34:27:689 1180 3e4 AU ## END ## AU: Search for updates [CallId = {8DE9D592-19BD-4632-8800-518343E03C23}] 2020-10-25 16:34:27:689 1180 3e4 AU ############# 2020-10-25 16:34:27:689 1180 3e4 AU No featured updates notifications to show 2020-10-25 16:34:30:485 1180 3b0 Report REPORT EVENT: {EAC1BB5C-F273-4077-A2DC-2929E53B9FD3} 2020-10-25 16:34:25:485+0100 1 202 102 {00000000-0000-0000-0000-000000000000} 0 0 AutomaticUpdates Success Content Install Reboot completed. 2020-10-25 16:34:30:486 1180 3b0 Report CWERReporter finishing event handling. (00000000) 2020-10-25 16:34:40:501 1180 dc0 AU Launched new AU client for directive 'Unable To Detect', session id = 0x1 2020-10-25 16:34:43:486 2396 ae8 Handler FATAL: CBS called Error with 0x80070490, 2020-10-25 16:34:44:074 2396 b28 Handler FATAL: Completed install of CBS update with type=0, requiresReboot=0, installerError=1, hr=0x80070490 2020-10-25 16:34:44:092 2396 b28 Handler ::::::::: 2020-10-25 16:34:44:092 2396 b28 Handler :: END :: Handler: CBS Install 2020-10-25 16:34:44:092 2396 b28 Handler ::::::::::::: 2020-10-25 16:34:44:096 1180 3d8 Agent ********* 2020-10-25 16:34:44:096 1180 3d8 Agent ** END ** Agent: Installing updates [CallerId = wusa] 2020-10-25 16:34:44:096 1180 3d8 Agent ************* 2020-10-25 16:34:44:096 1180 dc0 AU Triggering Offline detection (non-interactive) 2020-10-25 16:34:44:096 1180 dc0 AU ############# 2020-10-25 16:34:44:096 1180 dc0 AU ## START ## AU: Search for updates 2020-10-25 16:34:44:096 1180 dc0 AU ######### 2020-10-25 16:34:44:098 3568 cc4 COMAPI >>-- RESUMED -- COMAPI: Install [ClientId = wusa] 2020-10-25 16:34:44:098 3568 cc4 COMAPI - Install call complete (succeeded = 0, succeeded with errors = 0, failed = 1, unaccounted = 0) 2020-10-25 16:34:44:098 3568 cc4 COMAPI - Reboot required = No 2020-10-25 16:34:44:098 3568 cc4 COMAPI - WARNING: Exit code = 0x00000000; Call error code = 0x80240022 2020-10-25 16:34:44:098 3568 cc4 COMAPI --------- 2020-10-25 16:34:44:098 3568 cc4 COMAPI -- END -- COMAPI: Install [ClientId = wusa] 2020-10-25 16:34:44:098 1180 dc0 AU <<## SUBMITTED ## AU: Search for updates [CallId = {847AF9C6-E777-4F25-A2D1-DE10A9FE16BF}] 2020-10-25 16:34:44:098 3568 cc4 COMAPI ------------- 2020-10-25 16:34:44:099 1180 3b0 Agent ************* 2020-10-25 16:34:44:099 1180 3b0 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates] 2020-10-25 16:34:44:099 1180 3b0 Agent ********* 2020-10-25 16:34:44:099 1180 3b0 Agent * Online = No; Ignore download priority = No 2020-10-25 16:34:44:099 1180 3b0 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1" 2020-10-25 16:34:44:099 1180 3b0 Agent * ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service 2020-10-25 16:34:44:099 1180 3b0 Agent * Search Scope = {Machine} 2020-10-25 16:34:44:719 1180 3b0 Agent * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities 2020-10-25 16:34:44:722 1180 3b0 Agent ********* 2020-10-25 16:34:44:722 1180 3b0 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates] 2020-10-25 16:34:44:722 1180 3b0 Agent ************* 2020-10-25 16:34:44:723 1180 3e4 AU >>## RESUMED ## AU: Search for updates [CallId = {847AF9C6-E777-4F25-A2D1-DE10A9FE16BF}] 2020-10-25 16:34:44:723 1180 3e4 AU # 0 updates detected 2020-10-25 16:34:44:723 1180 3e4 AU ######### 2020-10-25 16:34:44:723 1180 3e4 AU ## END ## AU: Search for updates [CallId = {847AF9C6-E777-4F25-A2D1-DE10A9FE16BF}] 2020-10-25 16:34:44:723 1180 3e4 AU ############# 2020-10-25 16:34:44:723 1180 3e4 AU No featured updates notifications to show 2020-10-25 16:34:49:098 1180 3b0 Report REPORT EVENT: {F026D04C-83C1-4CFA-BB51-FC1FE8E32D3C} 2020-10-25 16:34:44:093+0100 1 182 101 {E38CA2E6-3086-4328-8037-282EB75BA2E0} 501 80070490 wusa Failure Content Install Installation Failure: Windows failed to install the following update with error 0x80070490: Sicherheitsupdate für Windows (KB4580385). 2020-10-25 16:34:49:105 1180 3b0 Report WARNING: CWERReporter::HandleEvents - Failed to queue WER report with 0x800700a1 2020-10-25 16:34:49:105 1180 3b0 Report CWERReporter finishing event handling. (800700a1) both fail with error 0x80070490, any idea? Edited October 25, 2020 by freakedenough
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now