Jump to content
MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. ×

Server 2008 Updates on Windows Vista


Recommended Posts


On 7/21/2020 at 9:42 PM, Vistapocalypse said:

Unlike patches for Windows 6.0 per se, the Server 2008 security updates for IE9 never listed Vista as an applicable OS in the extractable text document. It does not follow that installation is blocked on Vista. However, installation might very well be blocked unless sha2 support has been properly installed.

This method works: https://forums.mydigitallife.net/threads/bypass-windows-7-extended-security-updates-eligibility.80606/page-123#post-1585640

The last working update for IE9 is KB4534251

Edited by wiktorynka
Link to post
Share on other sites
On 7/15/2019 at 5:09 AM, greenhillmaniac said:

...BTW, I've seen demand for it, so I'm thinking of posting my Vista update repository that holds all of Vista's x86 and x64 updates from the beginning until its EOL (April 2017). Useful if you want to update your system offline without using WU. It's completely separate from this repository I'm updating every other month. Is there any interest?

I suspect that there might be more interest very soon. See my post here, and BTW posting there might be better than of flurry of OT posts in this Server 2008 thread such as we saw last summer.

Edit: See new Windows Vista Update Repository thread! :thumbup

Edited by Vistapocalypse
  • Upvote 1
Link to post
Share on other sites
7 hours ago, Vistapocalypse said:

BTW posting there might be better than of flurry of OT posts in this Server 2008 thread

... Considering that the title of that thread on the Windows XP subforum is

"On decommissioning of update servers for 2000, XP, (and Vista?) as of July 2019"

i.e. our beloved OS is inside parentheses and with a question mark, and given the, admittedly, low respect XP-diehards hold for Vista (:(), I would suggest a separate dedicated (pinned?) thread/post be posted in the main Vista subforum, wouldn't you agree @greenhillmaniac ;) ?

FWIW, a casual search on the Vista subforum has revealed an entry that hasn't (till now...) attracted much attention,

On 8/2/2019 at 2:19 AM, daniel_k said:

1) Download all files from Main_URLs.txt to the same folder.

Should be helpful for the duration Vista .msus are kept online in the catalog by evil M$... :angry:

There's also another thread with a very promising title

https://msfn.org/board/topic/179120-windows-vista-post-sp2-updates/

but, sadly :(, NOT the content one would expect going by that title...

===========================================

Semi-OT: Vista SP2 reached its EoS without ever getting support for either TLS 1.2 nor SHA-2 code signing :realmad: ; so I am inclined to believe that all Vista SP2 created MS updates were sha1 code-signed; in 

https://support.microsoft.com/en-us/help/4569557/windows-update-sha-1-based-endpoints-discontinued

Quote

connections to Windows Update service endpoints use a more modern algorithm (SHA-256). Older versions of Windows connect to Windows Update service endpoints by using the less secure SHA-1 algorithm.

so what breaks WU for Vista SP2 is the secure connection negotiation to those WUS SHA-2 endpoints (CDNs); connections which, and this isn't said explicitly, have been probably updated to use TLS 1.2 ... I don't think MS will touch and re-sign with SHA-2 sigs existing WS2008SP2 sha1 update packages (and certainly not the Vista ones...); but we, Vista users, are extremely unlucky :(:
While we can implement postEoS TLS 1.2 support, installing KB4474419 (even v1 with a digital sig of 16/04/2019) + KB4493730 will, as pointed out elsewhere by @Vistapocalypse , change the kernel version to 6.0.6003.205xx; while that is fine with WS2008SP2 and WU, the latter had been probably configured in a way to only serve Vista with a 6.0.6002.xxxxx kernel version... :realmad: And no-one has found (yet?) a way to (cheat :P and) make Vista appear in the eyes of WU as WS2008...

Another question that comes up is
if the Vista MS updates were hosted on special "outdated (SHA-1) Windows Update service endpoints used only for older platforms" that are "now being discontinued", does that mean that the update packages themselves will cease being on line on WU servers?
If so, any (theoretical) discussion about re-enabling connections to WU from Vista will be a moot one... :(

... As The Doors sang many decades ago:

Quote

This is the end, beautiful friend
This is the end, my only friend
The end of our elaborate plans
The end of ev'rything that stands
The end

No safety or surprise
The end

:dubbio::}

Edited by VistaLover
  • Like 1
Link to post
Share on other sites

[Imagine a quote of my friend VistaLover’s entire post :)]

It might be wise for greenhillmaniac to consult with MSFN administrators before proceeding. (A couple of posts pertaining to XP seem to have vanished from the above-mentioned thread.)

As mentioned, download links could be helpful as long as content remains in the catalog - but I’m afraid another link might be construed as saying that content will be removed from the catalog soon...:realmad:

https://techcommunity.microsoft.com/t5/windows-it-pro-blog/sha-1-windows-content-to-be-retired-august-3-2020/ba-p/1544373

 

Link to post
Share on other sites
52 minutes ago, Vistapocalypse said:

but I’m afraid another link might be construed as saying that content will be removed from the catalog soon

... For the time being at least, ONLY Microsoft Download Center content will be affected:

Quote

Microsoft will retire content that is Windows-signed for Secure Hash Algorithm 1 (SHA-1) from the Microsoft Download Center on August 3, 2020.

Microsoft Download Center != Microsoft Update Catalog

The Windows XP communities had been preparing for a good while now for the (inevitable) event M$ busts the WU service on fresh XP (SP2/3) installations; I might be wrong, but I haven't witnessed (at least here in MSFN) a similar impetus for salvaging all Vista updates off of WU/MUC come to fruition... :dubbio:

Link to post
Share on other sites

Hmm, it seems unlikely that M$ will remove all the old updates for Server 2008 SP2 (or Windows 7 for that matter) while it is under ESU. Patching Vista SP2 with Server 2008 updates all the way back might be a possibility (and brings this thread back toward topic). I would imagine that Vista had more patches than 2008 though, since it had more features. But what if M$ replaces old patches with sha2 versions? In that case, the April 2019 SSU (which was dual-signed) becomes the single most important patch to stockpile. But what if M$ decides to block installation on Vista while they’re at it? We need a repository!

Link to post
Share on other sites
15 hours ago, Vistapocalypse said:

I suspect that there might be more interest very soon. See my post here, and BTW posting there might be better than of flurry of OT posts in this Server 2008 thread such as we saw last summer.

Would help making a custom updated ISO much easier

Link to post
Share on other sites
  • 2 weeks later...
Quote

2020-08 Servicing Stack Update für Windows Server 2008 für x86-basierte Systeme(KB4572374).msu
2020-08 Sicherheits- und Qualitätsrollup für .NET Framework 2.0, 3.0 unter Windows Server 2008 SP2 (KB4569766).msu
2020-08 Sicherheitsupdate für .NET Framework 2.0, 3.0 unter Windows Server 2008SP2 (KB4569735).msu
2020-08 – Monatliches Sicherheitsqualitätsrollup für Windows Server 2008 für x86-basierte Systeme (KB4571730).msu
2020-08 – Sicherheitsqualitätsupdate für Windows Server 2008 für x86-basierte Systeme (KB4571746).msu
2020-08 Kumulatives Sicherheitsupdate für Internet Explorer 9 für Windows Server 2008 für x86-basierte System (KB4571687).msu

august 2020 updates work too.

Link to post
Share on other sites
On 8/15/2020 at 9:11 AM, freakedenough said:

august 2020 updates work too.

Except IE9 on vista x64. It needs some extra procedures to install. On x86 there is no problem

  • Like 1
Link to post
Share on other sites
  • 1 month later...
  • 1 month later...

2020-10 – Monatliches Sicherheitsqualitätsrollup für Windows Server 2008 für x86-basierte Systeme (KB4580378)

2020-10 – Sicherheitsqualitätsupdate für Windows Server 2008 für x86-basierte Systeme (KB4580385)

2020-10-25	16:30:05:772	1192	f4c	Shutdwn	user declined update at shutdown
2020-10-25	16:30:05:772	1192	f4c	AU	AU initiates service shutdown
2020-10-25	16:30:05:772	1192	f4c	AU	###########  AU: Uninitializing Automatic Updates  ###########
2020-10-25	16:30:05:803	1192	f4c	Report	CWERReporter finishing event handling. (00000000)
2020-10-25	16:30:05:803	1192	f4c	Service	*********
2020-10-25	16:30:05:803	1192	f4c	Service	**  END  **  Service: Service exit [Exit code = 0x240001]
2020-10-25	16:30:05:803	1192	f4c	Service	*************
2020-10-25	16:33:40:387	3568	cc8	Misc	===========  Logging initialized (build: 7.6.7600.256, tz: +0100)  ===========
2020-10-25	16:33:40:388	3568	cc8	Misc	  = Process: C:\Windows\system32\wusa.exe
2020-10-25	16:33:40:388	3568	cc8	Misc	  = Module: C:\Windows\system32\wuapi.dll
2020-10-25	16:33:40:386	3568	cc8	COMAPI	-----------  COMAPI: IUpdateServiceManager::AddScanPackageService  -----------
2020-10-25	16:33:40:388	3568	cc8	COMAPI	  - ServiceName = Eigenständiges Windows-Updateinstallationsprogramm
2020-10-25	16:33:40:388	3568	cc8	COMAPI	  - ScanFileLocation = C:\703105c0b590cd5475\wsusscan.cab
2020-10-25	16:33:40:413	1180	dc0	Misc	===========  Logging initialized (build: 7.6.7600.256, tz: +0100)  ===========
2020-10-25	16:33:40:413	1180	dc0	Misc	  = Process: C:\Windows\system32\svchost.exe
2020-10-25	16:33:40:413	1180	dc0	Misc	  = Module: c:\windows\system32\wuaueng.dll
2020-10-25	16:33:40:413	1180	dc0	Service	*************
2020-10-25	16:33:40:413	1180	dc0	Service	** START **  Service: Service startup
2020-10-25	16:33:40:413	1180	dc0	Service	*********
2020-10-25	16:33:40:431	1180	dc0	Agent	  * WU client version 7.6.7600.256
2020-10-25	16:33:40:431	1180	dc0	Agent	  * Base directory: C:\Windows\SoftwareDistribution
2020-10-25	16:33:40:432	1180	dc0	Agent	  * Access type: No proxy
2020-10-25	16:33:40:433	1180	dc0	Agent	  * Network state: Connected
2020-10-25	16:33:40:502	1180	66c	Report	CWERReporter::Init succeeded
2020-10-25	16:33:40:502	1180	66c	Agent	***********  Agent: Initializing Windows Update Agent  ***********
2020-10-25	16:33:40:502	1180	66c	Agent	***********  Agent: Initializing global settings cache  ***********
2020-10-25	16:33:40:502	1180	66c	Agent	  * WSUS server: <NULL>
2020-10-25	16:33:40:502	1180	66c	Agent	  * WSUS status server: <NULL>
2020-10-25	16:33:40:502	1180	66c	Agent	  * Target group: (Unassigned Computers)
2020-10-25	16:33:40:502	1180	66c	Agent	  * Windows Update access disabled: No
2020-10-25	16:33:40:502	1180	66c	DnldMgr	Download manager restoring 0 downloads
2020-10-25	16:33:40:509	1180	66c	Misc	Validating signature for C:\Windows\SoftwareDistribution\ScanFile\6da38975-319b-4369-bcb6-68cf05a1a9b3\Source.cab:
2020-10-25	16:33:40:562	1180	66c	Misc	 Microsoft signed: Yes
2020-10-25	16:33:40:580	1180	66c	DtaStor	Default service for AU is {7971F918-A847-4430-9279-4A52D1EFE18D}
2020-10-25	16:33:40:582	3568	cc8	COMAPI	  - Added scan package service, ServiceID = {6DA38975-319B-4369-BCB6-68CF05A1A9B3} Third party service
2020-10-25	16:33:40:583	3568	cc8	COMAPI	-------------
2020-10-25	16:33:40:583	3568	cc8	COMAPI	-- START --  COMAPI: Search [ClientId = wusa]
2020-10-25	16:33:40:583	3568	cc8	COMAPI	---------
2020-10-25	16:33:40:589	3568	cc8	COMAPI	<<-- SUBMITTED -- COMAPI: Search [ClientId = wusa]
2020-10-25	16:33:40:721	1180	dc0	Report	***********  Report: Initializing static reporting data  ***********
2020-10-25	16:33:40:721	1180	dc0	Report	  * OS Version = 6.0.6003.2.0.65792
2020-10-25	16:33:40:721	1180	dc0	Report	  * OS Product Type = 0x00000001
2020-10-25	16:33:40:760	1180	dc0	Report	  * Computer Brand = Dell Inc.
2020-10-25	16:33:40:760	1180	dc0	Report	  * Computer Model = XPS M1330                       
2020-10-25	16:33:40:764	1180	dc0	Report	  * Bios Revision = A15
2020-10-25	16:33:40:764	1180	dc0	Report	  * Bios Name = Phoenix ROM BIOS PLUS Version 1.10 A15
2020-10-25	16:33:40:764	1180	dc0	Report	  * Bios Release Date = 2008-12-26T00:00:00
2020-10-25	16:33:40:764	1180	dc0	Report	  * Locale ID = 3079
2020-10-25	16:33:40:767	1180	3b0	Agent	*************
2020-10-25	16:33:40:767	1180	3b0	Agent	** START **  Agent: Finding updates [CallerId = wusa]
2020-10-25	16:33:40:767	1180	3b0	Agent	*********
2020-10-25	16:33:40:767	1180	3b0	Agent	  * Online = Yes; Ignore download priority = No
2020-10-25	16:33:40:767	1180	3b0	Agent	  * Criteria = "IsInstalled=0"
2020-10-25	16:33:40:767	1180	3b0	Agent	  * ServiceID = {6DA38975-319B-4369-BCB6-68CF05A1A9B3} Third party service
2020-10-25	16:33:40:767	1180	3b0	Agent	  * Search Scope = {Machine}
2020-10-25	16:33:40:990	1180	3b0	PT	+++++++++++  PT: Synchronizing server updates  +++++++++++
2020-10-25	16:33:40:990	1180	3b0	PT	  + Offline serviceId = {6DA38975-319B-4369-BCB6-68CF05A1A9B3}
2020-10-25	16:33:40:990	1180	3b0	PT	WARNING: Cached cookie has expired or new PID is available
2020-10-25	16:33:47:263	1180	3b0	PT	+++++++++++  PT: Synchronizing extended update info  +++++++++++
2020-10-25	16:33:47:264	1180	3b0	PT	  + Offline serviceId = {6DA38975-319B-4369-BCB6-68CF05A1A9B3}
2020-10-25	16:33:47:396	1180	3b0	Agent	  * Added update {E38CA2E6-3086-4328-8037-282EB75BA2E0}.501 to search result
2020-10-25	16:33:47:396	1180	3b0	Agent	  * Found 1 updates and 58 categories in search; evaluated appl. rules of 127 out of 301 deployed entities
2020-10-25	16:33:47:399	1180	3b0	Agent	*********
2020-10-25	16:33:47:399	1180	3b0	Agent	**  END  **  Agent: Finding updates [CallerId = wusa]
2020-10-25	16:33:47:399	1180	3b0	Agent	*************
2020-10-25	16:33:47:401	3568	f04	COMAPI	>>--  RESUMED  -- COMAPI: Search [ClientId = wusa]
2020-10-25	16:33:47:406	1180	3b0	Report	CWERReporter finishing event handling. (00000000)
2020-10-25	16:33:47:414	3568	f04	COMAPI	  - Updates found = 1
2020-10-25	16:33:47:415	3568	f04	COMAPI	---------
2020-10-25	16:33:47:415	3568	f04	COMAPI	--  END  --  COMAPI: Search [ClientId = wusa]
2020-10-25	16:33:47:415	3568	f04	COMAPI	-------------
2020-10-25	16:33:49:169	1180	66c	DnldMgr	***********  DnldMgr: Copy update to cache [UpdateId = {31CD24F7-1593-41FF-AD6F-4748C34C897E}.501]  ***********
2020-10-25	16:33:49:235	1180	66c	DnldMgr	Asking handler to generate non-range requests.
2020-10-25	16:33:49:235	1180	66c	Handler	Generating request for CBS update 31CD24F7-1593-41FF-AD6F-4748C34C897E in sandbox C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b_ctc
2020-10-25	16:33:49:236	1180	66c	Handler	Selecting self-contained because update does not have express payload.
2020-10-25	16:33:49:236	1180	66c	Handler	Selected payload type is ptSelfContained
2020-10-25	16:33:49:236	1180	66c	Handler	Detected download state is dsStart
2020-10-25	16:33:49:236	1180	66c	Handler	Adding Windows6.0-KB4580385-x86.cab (entire file) to request list.
2020-10-25	16:33:49:236	1180	66c	Handler	Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 
2020-10-25	16:33:49:436	1180	66c	Misc	Validating signature for C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b_ctc\Windows6.0-KB4580385-x86.cab:
2020-10-25	16:33:50:340	1180	66c	Misc	 Microsoft signed: Yes
2020-10-25	16:33:50:341	1180	66c	DnldMgr	Asking handler to generate non-range requests.
2020-10-25	16:33:50:341	1180	66c	Handler	Generating request for CBS update 31CD24F7-1593-41FF-AD6F-4748C34C897E in sandbox C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b_ctc
2020-10-25	16:33:50:341	1180	66c	Handler	Selecting self-contained because update does not have express payload.
2020-10-25	16:33:50:341	1180	66c	Handler	Selected payload type is ptSelfContained
2020-10-25	16:33:50:341	1180	66c	Handler	Detected download state is dsHavePackage
2020-10-25	16:33:50:341	1180	66c	Handler	Request generation for CBS update complete with hr=0x0 and pfResetSandbox=0 
2020-10-25	16:33:50:363	3568	cc8	COMAPI	-------------
2020-10-25	16:33:50:363	3568	cc8	COMAPI	-- START --  COMAPI: Install [ClientId = wusa]
2020-10-25	16:33:50:363	3568	cc8	COMAPI	---------
2020-10-25	16:33:50:363	3568	cc8	COMAPI	  - Allow source prompts: Yes; Forced: No; Force quiet: No
2020-10-25	16:33:50:363	3568	cc8	COMAPI	  - Updates in request: 1
2020-10-25	16:33:50:363	3568	cc8	COMAPI	  - ServiceID = {6DA38975-319B-4369-BCB6-68CF05A1A9B3} Third party service
2020-10-25	16:33:50:366	3568	cc8	COMAPI	  - Updates to install = 1
2020-10-25	16:33:50:366	1180	3d8	Agent	*************
2020-10-25	16:33:50:366	3568	cc8	COMAPI	<<-- SUBMITTED -- COMAPI: Install [ClientId = wusa]
2020-10-25	16:33:50:366	1180	3d8	Agent	** START **  Agent: Installing updates [CallerId = wusa]
2020-10-25	16:33:50:366	1180	3d8	Agent	*********
2020-10-25	16:33:50:366	1180	3d8	Agent	  * Updates to install = 1
2020-10-25	16:33:50:370	1180	3d8	Agent	  *   Title = Sicherheitsupdate für Windows (KB4580385)
2020-10-25	16:33:50:370	1180	3d8	Agent	  *   UpdateId = {E38CA2E6-3086-4328-8037-282EB75BA2E0}.501
2020-10-25	16:33:50:370	1180	3d8	Agent	  *     Bundles 1 updates:
2020-10-25	16:33:50:370	1180	3d8	Agent	  *       {31CD24F7-1593-41FF-AD6F-4748C34C897E}.501
2020-10-25	16:33:50:559	1180	3d8	Handler	Attempting to create remote handler process as DELL\Besitzer in session 1
2020-10-25	16:33:50:632	1180	3d8	DnldMgr	Preparing update for install, updateId = {31CD24F7-1593-41FF-AD6F-4748C34C897E}.501.
2020-10-25	16:33:50:640	2396	b28	Misc	===========  Logging initialized (build: 7.6.7600.256, tz: +0100)  ===========
2020-10-25	16:33:50:640	2396	b28	Misc	  = Process: C:\Windows\system32\wuauclt.exe
2020-10-25	16:33:50:640	2396	b28	Misc	  = Module: C:\Windows\system32\wuaueng.dll
2020-10-25	16:33:50:639	2396	b28	Handler	:::::::::::::
2020-10-25	16:33:50:640	2396	b28	Handler	:: START ::  Handler: CBS Install
2020-10-25	16:33:50:640	2396	b28	Handler	:::::::::
2020-10-25	16:33:50:642	2396	b28	Handler	Starting install of CBS update 31CD24F7-1593-41FF-AD6F-4748C34C897E
2020-10-25	16:33:50:800	2396	b28	Handler	CBS package identity: Package_for_KB4580385~31bf3856ad364e35~x86~~6.0.1.10
2020-10-25	16:33:50:801	2396	b28	Handler	Installing self-contained with source=C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b\Windows6.0-KB4580385-x86.cab, workingdir=C:\Windows\SoftwareDistribution\Download\8437763486ccfb1587bf58f999acfa8b\inst
2020-10-25	16:34:25:483	1180	dc0	AU	###########  AU: Initializing Automatic Updates  ###########
2020-10-25	16:34:25:484	1180	dc0	AU	  # Approval type: Pre-download notify (User preference)
2020-10-25	16:34:25:484	1180	dc0	AU	  # Will interact with non-admins (Non-admins are elevated (User preference))
2020-10-25	16:34:25:484	1180	dc0	AU	  # Will display featured software notifications (User preference)
2020-10-25	16:34:25:484	1180	dc0	AU	Initializing featured updates
2020-10-25	16:34:25:484	1180	dc0	AU	Found 0 cached featured updates
2020-10-25	16:34:25:485	1180	dc0	AU	AU setting pending client directive to 'Unable To Detect'
2020-10-25	16:34:25:485	1180	dc0	AU	AU finished delayed initialization
2020-10-25	16:34:25:485	1180	dc0	AU	#############
2020-10-25	16:34:25:485	1180	dc0	AU	## START ##  AU: Search for updates
2020-10-25	16:34:25:485	1180	dc0	AU	#########
2020-10-25	16:34:25:487	1180	dc0	AU	<<## SUBMITTED ## AU: Search for updates [CallId = {8DE9D592-19BD-4632-8800-518343E03C23}]
2020-10-25	16:34:25:487	1180	3b0	Agent	*************
2020-10-25	16:34:25:487	1180	3b0	Agent	** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2020-10-25	16:34:25:487	1180	3b0	Agent	*********
2020-10-25	16:34:25:488	1180	3b0	Agent	  * Online = No; Ignore download priority = No
2020-10-25	16:34:25:488	1180	3b0	Agent	  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2020-10-25	16:34:25:488	1180	3b0	Agent	  * ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service
2020-10-25	16:34:25:488	1180	3b0	Agent	  * Search Scope = {Machine}
2020-10-25	16:34:27:686	1180	3b0	Agent	  * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
2020-10-25	16:34:27:689	1180	3b0	Agent	*********
2020-10-25	16:34:27:689	1180	3b0	Agent	**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2020-10-25	16:34:27:689	1180	3b0	Agent	*************
2020-10-25	16:34:27:689	1180	3e4	AU	>>##  RESUMED  ## AU: Search for updates [CallId = {8DE9D592-19BD-4632-8800-518343E03C23}]
2020-10-25	16:34:27:689	1180	3e4	AU	  # 0 updates detected
2020-10-25	16:34:27:689	1180	3e4	AU	#########
2020-10-25	16:34:27:689	1180	3e4	AU	##  END  ##  AU: Search for updates [CallId = {8DE9D592-19BD-4632-8800-518343E03C23}]
2020-10-25	16:34:27:689	1180	3e4	AU	#############
2020-10-25	16:34:27:689	1180	3e4	AU	No featured updates notifications to show
2020-10-25	16:34:30:485	1180	3b0	Report	REPORT EVENT: {EAC1BB5C-F273-4077-A2DC-2929E53B9FD3}	2020-10-25 16:34:25:485+0100	1	202	102	{00000000-0000-0000-0000-000000000000}	0	0	AutomaticUpdates	Success	Content Install	Reboot completed.
2020-10-25	16:34:30:486	1180	3b0	Report	CWERReporter finishing event handling. (00000000)
2020-10-25	16:34:40:501	1180	dc0	AU	Launched new AU client for directive 'Unable To Detect', session id = 0x1
2020-10-25	16:34:43:486	2396	ae8	Handler	FATAL: CBS called Error with 0x80070490, 
2020-10-25	16:34:44:074	2396	b28	Handler	FATAL: Completed install of CBS update with type=0, requiresReboot=0, installerError=1, hr=0x80070490
2020-10-25	16:34:44:092	2396	b28	Handler	:::::::::
2020-10-25	16:34:44:092	2396	b28	Handler	::  END  ::  Handler: CBS Install
2020-10-25	16:34:44:092	2396	b28	Handler	:::::::::::::
2020-10-25	16:34:44:096	1180	3d8	Agent	*********
2020-10-25	16:34:44:096	1180	3d8	Agent	**  END  **  Agent: Installing updates [CallerId = wusa]
2020-10-25	16:34:44:096	1180	3d8	Agent	*************
2020-10-25	16:34:44:096	1180	dc0	AU	Triggering Offline detection (non-interactive)
2020-10-25	16:34:44:096	1180	dc0	AU	#############
2020-10-25	16:34:44:096	1180	dc0	AU	## START ##  AU: Search for updates
2020-10-25	16:34:44:096	1180	dc0	AU	#########
2020-10-25	16:34:44:098	3568	cc4	COMAPI	>>--  RESUMED  -- COMAPI: Install [ClientId = wusa]
2020-10-25	16:34:44:098	3568	cc4	COMAPI	  - Install call complete (succeeded = 0, succeeded with errors = 0, failed = 1, unaccounted = 0)
2020-10-25	16:34:44:098	3568	cc4	COMAPI	  - Reboot required = No
2020-10-25	16:34:44:098	3568	cc4	COMAPI	  - WARNING: Exit code = 0x00000000; Call error code = 0x80240022
2020-10-25	16:34:44:098	3568	cc4	COMAPI	---------
2020-10-25	16:34:44:098	3568	cc4	COMAPI	--  END  --  COMAPI: Install [ClientId = wusa]
2020-10-25	16:34:44:098	1180	dc0	AU	<<## SUBMITTED ## AU: Search for updates [CallId = {847AF9C6-E777-4F25-A2D1-DE10A9FE16BF}]
2020-10-25	16:34:44:098	3568	cc4	COMAPI	-------------
2020-10-25	16:34:44:099	1180	3b0	Agent	*************
2020-10-25	16:34:44:099	1180	3b0	Agent	** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
2020-10-25	16:34:44:099	1180	3b0	Agent	*********
2020-10-25	16:34:44:099	1180	3b0	Agent	  * Online = No; Ignore download priority = No
2020-10-25	16:34:44:099	1180	3b0	Agent	  * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
2020-10-25	16:34:44:099	1180	3b0	Agent	  * ServiceID = {7971F918-A847-4430-9279-4A52D1EFE18D} Third party service
2020-10-25	16:34:44:099	1180	3b0	Agent	  * Search Scope = {Machine}
2020-10-25	16:34:44:719	1180	3b0	Agent	  * Found 0 updates and 0 categories in search; evaluated appl. rules of 0 out of 0 deployed entities
2020-10-25	16:34:44:722	1180	3b0	Agent	*********
2020-10-25	16:34:44:722	1180	3b0	Agent	**  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
2020-10-25	16:34:44:722	1180	3b0	Agent	*************
2020-10-25	16:34:44:723	1180	3e4	AU	>>##  RESUMED  ## AU: Search for updates [CallId = {847AF9C6-E777-4F25-A2D1-DE10A9FE16BF}]
2020-10-25	16:34:44:723	1180	3e4	AU	  # 0 updates detected
2020-10-25	16:34:44:723	1180	3e4	AU	#########
2020-10-25	16:34:44:723	1180	3e4	AU	##  END  ##  AU: Search for updates [CallId = {847AF9C6-E777-4F25-A2D1-DE10A9FE16BF}]
2020-10-25	16:34:44:723	1180	3e4	AU	#############
2020-10-25	16:34:44:723	1180	3e4	AU	No featured updates notifications to show
2020-10-25	16:34:49:098	1180	3b0	Report	REPORT EVENT: {F026D04C-83C1-4CFA-BB51-FC1FE8E32D3C}	2020-10-25 16:34:44:093+0100	1	182	101	{E38CA2E6-3086-4328-8037-282EB75BA2E0}	501	80070490	wusa	Failure	Content Install	Installation Failure: Windows failed to install the following update with error 0x80070490: Sicherheitsupdate für Windows (KB4580385).
2020-10-25	16:34:49:105	1180	3b0	Report	WARNING: CWERReporter::HandleEvents - Failed to queue WER report with 0x800700a1
2020-10-25	16:34:49:105	1180	3b0	Report	CWERReporter finishing event handling. (800700a1)

both fail with error 0x80070490, any idea?

 

Edited by freakedenough
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...