Skip to content

Commit 8f8cbb6

Browse files
committed
remove reviewer metadata
1 parent 1577572 commit 8f8cbb6

17 files changed

+165
-165
lines changed

support/mem/configmgr/client-management/configmgr-client-left-in-provisioning-mode.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Configuration Manager client left in provisioning mode after an upgrade to Windows 10
33
description: Describes an issue that causes the Configuration Manager client to be left in provisioning mode after an upgrade to Windows 10. Provides a resolution.
44
ms.date: 02/11/2025
5-
ms.reviewer: kaushika, brianhun, aaroncz, mikecure, cmkbreview
5+
ms.reviewer: kaushika, brianhun, mikecure, cmkbreview
66
ms.custom: sap:Client Operations\Other
77
---
88
# Configuration Manager client left in provisioning mode after upgrade to Windows 10
99

1010
This article solves the issue that the Configuration Manager client is left in provisioning mode after performing an in-place upgrade to Windows 10.
1111

12-
_Original product version:_   Configuration Manager (current branch)
12+
_Original product version:_   Configuration Manager (current branch)
1313
_Original KB number:_   4021950
1414

1515
## Symptoms

support/windows-client/installing-updates-features-roles/additional-resources-for-windows-update.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.collection: highpri
88
ms.custom:
99
- sap:windows servicing,updates and features on demand\windows update configuration,settings and management
1010
- pcy:WinComm Devices Deploy
11-
ms.reviewer: dougeby,aaroncz
11+
ms.reviewer: dougeby
1212
audience: itpro
1313
---
1414
# Windows Update - additional resources
@@ -50,7 +50,7 @@ If all else fails, try resetting the Windows Update Agent by running these comma
5050
``` console
5151
net stop bits
5252
net stop wuauserv
53-
net stop cryptsvc
53+
net stop cryptsvc
5454
```
5555

5656
3. Delete the *qmgr\*.dat* files. Type the following command at a command prompt, and then press Enter:
@@ -148,8 +148,8 @@ If all else fails, try resetting the Windows Update Agent by running these comma
148148

149149
``` console
150150
net start bits
151-
net start wuauserv
152-
net start cryptsvc
151+
net start wuauserv
152+
net start cryptsvc
153153
```
154154

155155
10. If you're running Windows Vista or Windows Server 2008, clear the BITS queue. Type the following command at a command prompt, and then press Enter:

support/windows-client/installing-updates-features-roles/windows-update-issues-troubleshooting.md

Lines changed: 44 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.custom:
88
- sap:windows servicing,updates and features on demand\windows update fails - installation rolls back
99
- pcy:WinComm Devices Deploy
1010
ms.collection: highpri
11-
ms.reviewer: dougeby, aaroncz, warrenw, astoica
11+
ms.reviewer: dougeby, warrenw, astoica
1212
audience: itpro
1313
---
1414
# Windows Update issues troubleshooting
@@ -29,36 +29,36 @@ If you run into problems when using Windows Update, start with the following ste
2929
- [Windows 10, version 1909 and Windows Server, version 1909](https://support.microsoft.com/help/4529964)
3030
- [Windows 10, version 1903 and Windows Server, version 1903](https://support.microsoft.com/help/4498140)
3131
- [Windows 10, version 1809 and Windows Server 2019](https://support.microsoft.com/help/4464619/windows-10-update-history)
32-
- [Windows 10, version 1803](https://support.microsoft.com/help/4099479/windows-10-update-history)
33-
- [Windows 10, version 1709](https://support.microsoft.com/help/4043454)
34-
- [Windows 10, version 1703](https://support.microsoft.com/help/4018124)
35-
- [Windows 10 and Windows Server 2016](https://support.microsoft.com/help/4000825/windows-10-windows-server-2016-update-history)
36-
- [Windows 8.1 and Windows Server 2012 R2](https://support.microsoft.com/help/4009470/windows-8-1-windows-server-2012-r2-update-history)
37-
- [Windows Server 2012](https://support.microsoft.com/help/4009471/windows-server-2012-update-history)
38-
- [Windows 7 SP1 and Windows Server 2008 R2 SP1](https://support.microsoft.com/help/4009469/windows-7-sp1-windows-server-2008-r2-sp1-update-history)
32+
- [Windows 10, version 1803](https://support.microsoft.com/help/4099479/windows-10-update-history)
33+
- [Windows 10, version 1709](https://support.microsoft.com/help/4043454)
34+
- [Windows 10, version 1703](https://support.microsoft.com/help/4018124)
35+
- [Windows 10 and Windows Server 2016](https://support.microsoft.com/help/4000825/windows-10-windows-server-2016-update-history)
36+
- [Windows 8.1 and Windows Server 2012 R2](https://support.microsoft.com/help/4009470/windows-8-1-windows-server-2012-r2-update-history)
37+
- [Windows Server 2012](https://support.microsoft.com/help/4009471/windows-server-2012-update-history)
38+
- [Windows 7 SP1 and Windows Server 2008 R2 SP1](https://support.microsoft.com/help/4009469/windows-7-sp1-windows-server-2008-r2-sp1-update-history)
3939

40-
Advanced users can also refer to the [log](/windows/deployment/update/windows-update-logs) generated by Windows Update for further investigation.
40+
Advanced users can also refer to the [log](/windows/deployment/update/windows-update-logs) generated by Windows Update for further investigation.
4141

4242
You might encounter the following scenarios when using Windows Update.
4343

4444
## Why am I offered an older update?
4545

46-
The update that is offered to a device depends on several factors. The following are some of the most common attributes:
46+
The update that is offered to a device depends on several factors. The following are some of the most common attributes:
4747

4848
- OS Build
4949
- OS Branch
5050
- OS Locale
5151
- OS Architecture
5252
- Device update management configuration
5353

54-
If the update you're offered isn't the most current available, it might be because your device is being managed by a WSUS server, and you're being offered the updates available on that server. It's also possible, if your device is part of a deployment group, that your admin is intentionally slowing the rollout of updates. Since the deployment is slow and measured to begin with, all devices won't receive the update on the same day.
54+
If the update you're offered isn't the most current available, it might be because your device is being managed by a WSUS server, and you're being offered the updates available on that server. It's also possible, if your device is part of a deployment group, that your admin is intentionally slowing the rollout of updates. Since the deployment is slow and measured to begin with, all devices won't receive the update on the same day.
5555

5656
## My device is frozen at scan. Why?
5757

58-
The Settings UI communicates with the Update Orchestrator service that in turn communicates with to Windows Update service. If these services stop unexpectedly, then you might see this behavior. In such cases, follow these steps:
58+
The Settings UI communicates with the Update Orchestrator service that in turn communicates with to Windows Update service. If these services stop unexpectedly, then you might see this behavior. In such cases, follow these steps:
5959

60-
1. Close the Settings app and reopen it.
61-
2. Start Services.msc and check if the following services are running:
60+
1. Close the Settings app and reopen it.
61+
2. Start Services.msc and check if the following services are running:
6262

6363
- Update State Orchestrator
6464
- Windows Update
@@ -110,17 +110,17 @@ Windows Update uses WinHttp with Partial Range requests (RFC 7233) to download u
110110
To fix this issue, configure a proxy in WinHTTP by using the following netsh command:
111111

112112
```console
113-
netsh winhttp set proxy ProxyServerName:PortNumber
113+
netsh winhttp set proxy ProxyServerName:PortNumber
114114
```
115115

116116
>[!NOTE]
117117
> You can also import the proxy settings from Internet Explorer by using the following command: `netsh winhttp import proxy source=ie`.
118118
119-
If downloads through a proxy server fail with a 0x80d05001 DO_E_HTTP_BLOCKSIZE_MISMATCH error, or if you notice high CPU usage while updates are downloading, check the proxy configuration to permit HTTP RANGE requests to run.
119+
If downloads through a proxy server fail with a 0x80d05001 DO_E_HTTP_BLOCKSIZE_MISMATCH error, or if you notice high CPU usage while updates are downloading, check the proxy configuration to permit HTTP RANGE requests to run.
120120

121121
You might choose to apply a rule to permit HTTP RANGE requests for the following URLs:
122122

123-
- `*.download.windowsupdate.com`
123+
- `*.download.windowsupdate.com`
124124
- `*.dl.delivery.mp.microsoft.com`
125125
- `*.delivery.mp.microsoft.com`
126126

@@ -144,19 +144,19 @@ You observe that the download for updates is stuck at 0%, especially in Windows
144144
Error that you might see in Windows Update logs:
145145

146146
```output
147-
DownloadManager Error 0x800706d9 occurred while downloading update; notifying dependent calls.
147+
DownloadManager Error 0x800706d9 occurred while downloading update; notifying dependent calls.
148148
```
149149

150150
Or
151151

152152
```output
153-
[DownloadManager] BITS job {A4AC06DD-D6E6-4420-8720-7407734FDAF2} hit a transient error, updateId = {D053C08A-6250-4C43-A111-56C5198FE142}.200 <NULL>, error = 0x800706D9
153+
[DownloadManager] BITS job {A4AC06DD-D6E6-4420-8720-7407734FDAF2} hit a transient error, updateId = {D053C08A-6250-4C43-A111-56C5198FE142}.200 <NULL>, error = 0x800706D9
154154
```
155155

156156
Or
157157

158158
```output
159-
DownloadManager [0]12F4.1FE8::09/29/2017-13:45:08.530 [agent]DO job {C6E2F6DC-5B78-4608-B6F1-0678C23614BD} hit a transient error, updateId = 5537BD35-BB74-40B2-A8C3-B696D3C97CBA.201 <NULL>, error = 0x80D0000A
159+
DownloadManager [0]12F4.1FE8::09/29/2017-13:45:08.530 [agent]DO job {C6E2F6DC-5B78-4608-B6F1-0678C23614BD} hit a transient error, updateId = 5537BD35-BB74-40B2-A8C3-B696D3C97CBA.201 <NULL>, error = 0x80D0000A
160160
```
161161

162162
Go to **Services.msc** and ensure that the **Windows Defender Firewall** service is enabled. Stopping the service associated with Windows Firewall with Advanced Security isn't supported by Microsoft. For more information, see [I need to disable Windows Firewall](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc766337(v=ws.10)).
@@ -194,7 +194,7 @@ Windows client devices can receive updates from various sources, including Windo
194194
2. Run the cmdlet:
195195

196196
```powershell
197-
197+
198198
$MUSM = New-Object -ComObject "Microsoft.Update.ServiceManager"
199199
```
200200
@@ -210,7 +210,7 @@ Check the output for the Name and OffersWindowsUPdates parameters, which you can
210210
|-|-|
211211
|- Name: Microsoft Update <br>-OffersWindowsUpdates: True| - The update source is Microsoft Update, which means that updates for other Microsoft products besides the operating system could also be delivered.<br>- Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.) |
212212
|- <a name="BKMK_DCAT"></a>Name: DCat Flighting Prod <br>- OffersWindowsUpdates: True |- Starting with Windows 10, version 1709, feature updates are always delivered through the DCAT service.<br>- Indicates that the client is configured to receive feature updates from Windows Update. |
213-
|- Name: Windows Store (DCat Prod) <br>- OffersWindowsUpdates: False |-The update source is Insider Updates for Store Apps.<br>- Indicates that the client won't receive or isn't configured to receive these updates.|
213+
|- Name: Windows Store (DCat Prod) <br>- OffersWindowsUpdates: False |-The update source is Insider Updates for Store Apps.<br>- Indicates that the client won't receive or isn't configured to receive these updates.|
214214
|- Name: Windows Server Update Service <br>- OffersWindowsUpdates: True |- The source is a Windows Server Updates Services server. <br>- The client is configured to receive updates from WSUS. |
215215
|- Name: Windows Update<br>- OffersWindowsUpdates: True|- The source is Windows Update. <br>- The client is configured to receive updates from Windows Update Online.|
216216
@@ -219,40 +219,40 @@ Check the output for the Name and OffersWindowsUPdates parameters, which you can
219219
In this example, per the Group Policy set through registry, the system is configured to use WSUS to download updates (note the second line):
220220
221221
```console
222-
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
222+
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
223223
"UseWUServer"=dword:00000001
224224
```
225225

226226
From Windows Update logs:
227227

228228
```output
229-
2018-08-06 09:33:31:085 480 1118 Agent ** START ** Agent: Finding updates [CallerId = OperationalInsight Id = 49]
230-
2018-08-06 09:33:31:085 480 1118 Agent *********
231-
2018-08-06 09:33:31:085 480 1118 Agent * Include potentially superseded updates
232-
2018-08-06 09:33:31:085 480 1118 Agent * Online = No; Ignore download priority = No
233-
2018-08-06 09:33:31:085 480 1118 Agent * Criteria = "IsHidden = 0 AND DeploymentAction=*"
234-
2018-08-06 09:33:31:085 480 1118 Agent * ServiceID = {00000000-0000-0000-0000-000000000000} Third party service
235-
2018-08-06 09:33:31:085 480 1118 Agent * Search Scope = {Machine}
236-
2018-08-06 09:33:32:554 480 1118 Agent * Found 83 updates and 83 categories in search; evaluated appl. rules of 517 out of 1473 deployed entities
237-
2018-08-06 09:33:32:554 480 1118 Agent *********
238-
2018-08-06 09:33:32:554 480 1118 Agent ** END ** Agent: Finding updates [CallerId = OperationalInsight Id = 49]
229+
2018-08-06 09:33:31:085 480 1118 Agent ** START ** Agent: Finding updates [CallerId = OperationalInsight Id = 49]
230+
2018-08-06 09:33:31:085 480 1118 Agent *********
231+
2018-08-06 09:33:31:085 480 1118 Agent * Include potentially superseded updates
232+
2018-08-06 09:33:31:085 480 1118 Agent * Online = No; Ignore download priority = No
233+
2018-08-06 09:33:31:085 480 1118 Agent * Criteria = "IsHidden = 0 AND DeploymentAction=*"
234+
2018-08-06 09:33:31:085 480 1118 Agent * ServiceID = {00000000-0000-0000-0000-000000000000} Third party service
235+
2018-08-06 09:33:31:085 480 1118 Agent * Search Scope = {Machine}
236+
2018-08-06 09:33:32:554 480 1118 Agent * Found 83 updates and 83 categories in search; evaluated appl. rules of 517 out of 1473 deployed entities
237+
2018-08-06 09:33:32:554 480 1118 Agent *********
238+
2018-08-06 09:33:32:554 480 1118 Agent ** END ** Agent: Finding updates [CallerId = OperationalInsight Id = 49]
239239
```
240240

241241
In the above log snippet, we see that the `Criteria = "IsHidden = 0 AND DeploymentAction=*"`. "*" means there is nothing specified from the server. So, the scan happens but there is no direction to download or install to the agent. So it just scans the update and provides the results.
242242

243-
As shown in the following logs, automatic update runs the scan and finds no update approved for it. So it reports there are no updates to install or download. This is due to an incorrect configuration. The WSUS side should approve the updates for Windows Update so that it fetches the updates and installs them at the specified time according to the policy. Since this scenario doesn't include Configuration Manager, there's no way to install unapproved updates. You're expecting the operational insight agent to do the scan and automatically trigger the download and installation but that won't happen with this configuration.
243+
As shown in the following logs, automatic update runs the scan and finds no update approved for it. So it reports there are no updates to install or download. This is due to an incorrect configuration. The WSUS side should approve the updates for Windows Update so that it fetches the updates and installs them at the specified time according to the policy. Since this scenario doesn't include Configuration Manager, there's no way to install unapproved updates. You're expecting the operational insight agent to do the scan and automatically trigger the download and installation but that won't happen with this configuration.
244244

245245
```output
246-
2018-08-06 10:58:45:992 480 5d8 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates Id = 57]
247-
2018-08-06 10:58:45:992 480 5d8 Agent *********
248-
2018-08-06 10:58:45:992 480 5d8 Agent * Online = Yes; Ignore download priority = No
249-
2018-08-06 10:58:45:992 480 5d8 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
250-
251-
2018-08-06 10:58:46:617 480 5d8 PT + SyncUpdates round trips: 2
252-
2018-08-06 10:58:47:383 480 5d8 Agent * Found 0 updates and 83 categories in search; evaluated appl. rules of 617 out of 1473 deployed entities
253-
2018-08-06 10:58:47:383 480 5d8 Agent Reporting status event with 0 installable, 83 installed, 0 installed pending, 0 failed and 0 downloaded updates
254-
2018-08-06 10:58:47:383 480 5d8 Agent *********
255-
2018-08-06 10:58:47:383 480 5d8 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates Id = 57]
246+
2018-08-06 10:58:45:992 480 5d8 Agent ** START ** Agent: Finding updates [CallerId = AutomaticUpdates Id = 57]
247+
2018-08-06 10:58:45:992 480 5d8 Agent *********
248+
2018-08-06 10:58:45:992 480 5d8 Agent * Online = Yes; Ignore download priority = No
249+
2018-08-06 10:58:45:992 480 5d8 Agent * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1 or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
250+
251+
2018-08-06 10:58:46:617 480 5d8 PT + SyncUpdates round trips: 2
252+
2018-08-06 10:58:47:383 480 5d8 Agent * Found 0 updates and 83 categories in search; evaluated appl. rules of 617 out of 1473 deployed entities
253+
2018-08-06 10:58:47:383 480 5d8 Agent Reporting status event with 0 installable, 83 installed, 0 installed pending, 0 failed and 0 downloaded updates
254+
2018-08-06 10:58:47:383 480 5d8 Agent *********
255+
2018-08-06 10:58:47:383 480 5d8 Agent ** END ** Agent: Finding updates [CallerId = AutomaticUpdates Id = 57]
256256
```
257257

258258
## High bandwidth usage on Windows client by Windows Update

support/windows-client/networking/802-1x-authentication-issues-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.collection: highpri
88
ms.custom:
99
- sap:network connectivity and file sharing\wireless (802.1x,bluetooth,miracast,mobile broadband)
1010
- pcy:WinComm Networking
11-
ms.reviewer: dougeby,aaroncz
11+
ms.reviewer: dougeby
1212
audience: itpro
1313
---
1414
# Advanced troubleshooting 802.1X authentication

0 commit comments

Comments
 (0)