Updates not requested

BatchPatch Forums Home Forums BatchPatch Support Forum Updates not requested

Viewing 5 posts - 1 through 5 (of 5 total)
  • Author
    Posts
  • #8722
    Anonymous
    Inactive

    Why does batchpatch download unrequested updates, even though the settings states that classifications apply to DOWNLOADS and INSTALLATION

    Had the correct updates installed, but more than we needed downloaded.

    Please see below

    What server downloaded

    1> Update for Windows Server 2012 R2 (KB4339284) (660 KB) (2018-07-24) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4339284

    2> Update for Windows Server 2012 R2 (KB4462901) (652 KB) (2018-10-18) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4462901

    3> Update for Windows Server 2012 R2 (KB4468323) (651 KB) (2018-11-27) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4468323

    4> Update for Microsoft Silverlight (KB4481252) (12 MB) (2019-01-15) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-FALSE)

    http://support.microsoft.com/kb/4481252

    5> Windows Malicious Software Removal Tool x64 – February 2019 (KB890830) (42 MB) (2019-02-12) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/890830

    6> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123) (5 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487123

    7> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080) (76 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487080

    8> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474) (54 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4486474

    9> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028) (24 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487028

    10> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000) (367 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487000

    What server installed

    6> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123) (5 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487123

    7> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080) (76 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487080

    8> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474) (54 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4486474

    9> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028) (24 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487028

    10> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000) (367 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487000

    #9884
    doug
    Moderator

    Are you sure that BatchPatch is what downloaded the updates in question? The log snippets you provided show that the updates were downloaded on the server, but they don’t show that BatchPatch was responsible for downloading them. For that matter your log snippet doesn’t even show that BatchPatch installed them. Can you provide the complete log that backs up your assertion? I’d like to see the log that shows the entire filter + download + install operation. Also what version of BP are you using? Version number is displayed under ‘Help > About’

    #9885
    Anonymous
    Inactive

    Apologies for all the long windedness.. Trying to be as specific as possible

    These are the steps we have followed and the settings we have used, and our understanding of how the Batchpatch app works in Offline + Cached mode. There is a caveat to this explanation that might confuse things: There are actually 12 downloaded updates, even though the Client01 in the following scenario only finds 10 updates. I assume this is something to do with the second question we have for you, which can be found at the bottom of this wall of text.

    We have a single client machine “Client01” and a single Batchpatch server “Server01”

    The Batchpatch server is configured in Cached + Offline mode. Also in the windows update settings tab we have the following tick boxes ticked to the exclusion of all else

    – Search for *Only* important updates

    – Include “Critical Updates”

    – Include “Security Updates”

    – Auto Accept EULAs during installation. If required

    – Enable ‘Cached Mode’

    – Enable ‘Offline Mode’

    – Local update cache directory “C:Temp”

    We initiate a Windows update check on Client01 from the Batchpatch grid on Server01. Server01 downloads the wsusscn2.cab then copies it over to Client01.

    C:Program FilesBatchPatchwsusscn2.cab

    Client01 checks against the .cab for applicable updates, and locally creates the following files:

    C:Program FilesBatchPatchBatchPatch.log

    C:Program FilesBatchPatchBatchPatchTempAvailableUpdates.log

    We then initiate a download. Batchpatch downloads the updates from the previously created list file on Client01 (10 in total) to the local cache of Server01 “c:temp” as dictated in the Batchpatch settings under the Windows update tab.

    We then initiate an “install downloaded updates + reboot if required”. Again we do this from the Batchpatch grid, right clicking on Client01 and selecting “Windows Update > Install downloaded updates + reboot if required”

    After this is completed the server reboots, and upon checking windows update log on Client01 (using the “View Update History” link in the Control Panel > Windows Update screen) we see that only 5 of the 10 updates that were downloaded have actually installed.

    Now, what was installed is actually what we wanted to be installed which means the update classifications are working. The problem we are seeing is that under Tools > Settings > Windows update Tab, above the classifications tick boxes there is a little note that reads “Update Classification filtering (applies only to download / Installation)”. So the classification is applying to installation, but not download, so we end up with a bunch of downloaded updates that we don’t need.

    A second question: When using offline mode, the client computers create their own download lists for use by the Batchpatch server, for the purpose of downloading updates:

    C:Program FilesBatchPatchBatchPatch.log

    C:Program FilesBatchPatchBatchPatchTempAvailableUpdates.log

    My question is, do these lists get amalgamated on the Batchpatch server somewhere? Or does Batchpatch reach out to each client to check the contents of these lists prior to downloading require updates

    As requested please see logs below

    Client01

    Ping Reply

    Reply from 10.0.0.2 time=0ms

    Reboot Messages

    Reboot (force) initiated successfully – 11:19:16

    Windows Update Messages

    Reboot Required. Overall Installation Result: Succeeded – 11:19:15

    Local Agent Log

    ::Begin download – 2019-02-18 10:46:21

    Microsoft Offline Scan File

    1> wsusscn2.cab :: Skipped: File already exists in cache

    ::End download – 2019-02-18 10:46:22

    Files downloaded: 0

    Files located in cache: 1

    Files excluded by filter: 0

    Files initiated by another row: 0

    Failures: 0

    ::Begin file copy operation – 2019-02-18 10:46:22

    1> WsusScn2.cab :: File already exists in destination

    ::End file copy operation – 2019-02-18 10:46:22

    ::Begin download – 2019-02-18 10:48:39

    Update for Windows Server 2012 R2 (KB4339284)

    1> windows8.1-kb4339284-x64_6c6de13ba3b4f098d6601db41c4d3e346fb75171.cab :: Success

    Update for Windows Server 2012 R2 (KB4462901)

    2> windows8.1-kb4462901-x64_e4c74c7408fed9b2a35ae78b9ca7e565fcb44a83.cab :: Success

    Update for Windows Server 2012 R2 (KB4468323)

    3> windows8.1-kb4468323-x64_3a350e3c225374123008438223f05fddd19c8955.cab :: Success

    Update for Microsoft Silverlight (KB4481252)

    4> silverlight_x64_16cfdfe075ee9249845eccff913acc4386a0a1e6.exe :: Success

    Windows Malicious Software Removal Tool x64 – February 2019 (KB890830)

    5> windows-kb890830-x64-v5.69_65c649c5777c8109ad9ef62da7d1191676b524c6.exe :: Success

    2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123)

    6> windows8.1-kb4483484-x64_e46aaf18c5b6382dc93a62b6db803f1a693477a0.cab :: Success

    7> windows8.1-kb4483469-x64_c5ac17fdca18f3813de5747a7bbae268cce70577.cab :: Success

    2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080)

    8> windows8.1-kb4483459-x64_e986e7f8d6708190a0f0f35f2a65eb5fb6051ee7.cab :: Success

    9> windows8.1-kb4483450-x64_ef404e2976341ec4e3783e8ff9bc7e9c7a9f70fa.cab :: Success

    2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474)

    10> windows8.1-kb4486474-x64_5c9b4826d37000f5d0906afd6dee50f9fb17ba9a.cab :: Success

    2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028)

    11> windows8.1-kb4487028-x64_df7ee5a6e41607e66103a8331356ee8f28263785.cab :: Success

    2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000)

    12> windows8.1-kb4487000-x64_32763bce1645d2d535b32aafd06615e228e14ff7.cab :: Success

    ::End download – 2019-02-18 10:51:16

    Files downloaded: 12

    Files located in cache: 0

    Files excluded by filter: 0

    Files initiated by another row: 0

    Failures: 0

    ::Begin file copy operation – 2019-02-18 10:51:16

    Update for Windows Server 2012 R2 (KB4339284)

    1> windows8.1-kb4339284-x64_6c6de13ba3b4f098d6601db41c4d3e346fb75171.cab :: Skipped: File already cached on target host

    Update for Windows Server 2012 R2 (KB4462901)

    2> windows8.1-kb4462901-x64_e4c74c7408fed9b2a35ae78b9ca7e565fcb44a83.cab :: Skipped: File already cached on target host

    Update for Windows Server 2012 R2 (KB4468323)

    3> windows8.1-kb4468323-x64_3a350e3c225374123008438223f05fddd19c8955.cab :: Skipped: File already cached on target host

    Update for Microsoft Silverlight (KB4481252)

    4> silverlight_x64_16cfdfe075ee9249845eccff913acc4386a0a1e6.exe :: Skipped: File already cached on target host

    Windows Malicious Software Removal Tool x64 – February 2019 (KB890830)

    5> windows-kb890830-x64-v5.69_65c649c5777c8109ad9ef62da7d1191676b524c6.exe :: Skipped: File already cached on target host

    2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123)

    6> windows8.1-kb4483484-x64_e46aaf18c5b6382dc93a62b6db803f1a693477a0.cab :: Skipped: File already cached on target host

    7> windows8.1-kb4483469-x64_c5ac17fdca18f3813de5747a7bbae268cce70577.cab :: Skipped: File already cached on target host

    2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080)

    8> windows8.1-kb4483459-x64_e986e7f8d6708190a0f0f35f2a65eb5fb6051ee7.cab :: Skipped: File already cached on target host

    9> windows8.1-kb4483450-x64_ef404e2976341ec4e3783e8ff9bc7e9c7a9f70fa.cab :: Skipped: File already cached on target host

    2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474)

    10> windows8.1-kb4486474-x64_5c9b4826d37000f5d0906afd6dee50f9fb17ba9a.cab :: Skipped: File already cached on target host

    2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028)

    11> windows8.1-kb4487028-x64_df7ee5a6e41607e66103a8331356ee8f28263785.cab :: Skipped: File already cached on target host

    2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000)

    12> windows8.1-kb4487000-x64_32763bce1645d2d535b32aafd06615e228e14ff7.cab :: Skipped: File already cached on target host

    ::End file copy operation – 2019-02-18 10:51:17

    Files copied: 0

    Files skipped: 12

    Failures: 0

    Remote Agent Log

    Client01 02/18/2019 11:03:59

    ::Begin ‘offline sync service’ search

    The search query “ImportantOnly” returned 10 update(s):

    1> Update for Windows Server 2012 R2 (KB4339284) (660 KB) (2018-07-24) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4339284

    2> Update for Windows Server 2012 R2 (KB4462901) (652 KB) (2018-10-18) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4462901

    3> Update for Windows Server 2012 R2 (KB4468323) (651 KB) (2018-11-27) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4468323

    4> Update for Microsoft Silverlight (KB4481252) (12 MB) (2019-01-15) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-FALSE)

    http://support.microsoft.com/kb/4481252

    5> Windows Malicious Software Removal Tool x64 – February 2019 (KB890830) (42 MB) (2019-02-12) – Update Rollups

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/890830

    6> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123) (5 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487123

    7> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080) (76 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487080

    8> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474) (54 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4486474

    9> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028) (24 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487028

    10> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000) (367 MB) (2019-02-12) – Security Updates

    (Type-SoftwareUpdate | Downloaded-TRUE | RebootRequired-MAYBE)

    http://support.microsoft.com/kb/4487000

    ::End search

    ::Begin filtering collection

    skipped> Update for Windows Server 2012 R2 (KB4339284) – Reason: UpdateClassification-UpdateRollups

    skipped> Update for Windows Server 2012 R2 (KB4462901) – Reason: UpdateClassification-UpdateRollups

    skipped> Update for Windows Server 2012 R2 (KB4468323) – Reason: UpdateClassification-UpdateRollups

    skipped> Update for Microsoft Silverlight (KB4481252) – Reason: UpdateClassification-UpdateRollups

    skipped> Windows Malicious Software Removal Tool x64 – February 2019 (KB890830) – Reason: UpdateClassification-UpdateRollups

    adding> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123)

    adding> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080)

    adding> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474)

    adding> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028)

    adding> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000)

    ::End filtering collection

    ::Begin adding downloaded items to installer collection

    adding> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123)

    adding> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080)

    adding> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474)

    adding> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028)

    adding> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000)

    ::End adding downloaded items to installer collection

    ::Begin installation

    1> 2019-02 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487123) – Installation Result: Succeeded. Reboot Required: TRUE

    2> 2019-02 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Server 2012 R2 for x64 (KB4487080) – Installation Result: Succeeded. Reboot Required: TRUE

    3> 2019-02 Cumulative Security Update for Internet Explorer 11 for Windows Server 2012 R2 for x64-based systems (KB4486474) – Installation Result: Succeeded. Reboot Required: TRUE

    4> 2019-02 Security Only Quality Update for Windows Server 2012 R2 for x64-based Systems (KB4487028) – Installation Result: Succeeded. Reboot Required: TRUE

    5> 2019-02 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4487000) – Installation Result: Succeeded. Reboot Required: TRUE

    ::End installation

    Overall Installation Result: Succeeded

    Reboot Required: TRUE

    Client01 02/18/2019 11:19:11

    Job Queue

    * * Post Update Check * *

    . . . . . . . . . .

    Start pinging

    Get last boot time

    Get C: disk space

    Get stopped automatic services

    Get pending reboot status

    Get last boot time

    Check for available updates

    Wait 10 minutes

    Stop pinging

    Send email notification

    Schd Task – Action

    Job queue (Post Update Check):: Start pinging

    Get last boot time

    Get C: disk space

    Get stopped automatic services

    Get pending reboot status

    Get last boot time

    Check for available updates

    Wait 10 minutes

    Stop pinging

    Send email notification

    Schd Task – Next Run Time

    Thursday – 04/18/19 – 11:07

    Schd Task – Recurrence

    None

    Schd Task – Multiple Tasks Schedule

    Monday – 02/18/19 – 11:03

    Install downloaded updates + reboot if required

    Thursday – 04/18/19 – 11:07

    Job queue (Post Update Check):: Start pinging

    Get last boot time

    Get C: disk space

    Get stopped automatic services

    Get pending reboot status

    Get last boot time

    Check for available updates

    Wait 10 minutes

    Stop pinging

    Send email notification

    All Messages

    Mon-11:23:18> Client01 ONLINE

    Mon-11:23:05> Client01 OFFLINE

    Mon-11:19:16> Reboot/Shutdown: Reboot (force) initiated successfully

    Mon-11:19:15> Reboot/Shutdown: Attempting to initiate reboot (force)…

    Mon-11:19:15> Reboot/Shutdown: Failed to initiate reboot. User is logged on.

    Mon-11:19:15> Reboot/Shutdown: Attempting to initiate reboot…

    Mon-11:19:15> Windows Update: Reboot Required. Overall Installation Result: Succeeded

    Mon-11:03:58> Windows Update: Executing BatchPatchRemoteAgent.exe…

    Mon-11:03:58> Windows Update: Attempting to initiate Windows Update (Action: Install downloaded updates: ‘ImportantOnly’) …

    Mon-11:03:57> Windows Update: Establishing connection…

    Mon-11:03:57> Windows Update: Initializing…

    Mon-11:03:57> Windows Update: Queued…

    Mon-11:03:57> Scheduled Task: Initiating ‘Install downloaded updates + reboot if required’ – Monday – 02/18/19 – 11:03.

    Mon-10:53:24> Windows Update: END (Offline mode: Download available updates)

    Mon-10:53:24> Windows Update: 10 update(s) found

    Mon-10:51:17> Windows Update: Executing BatchPatchRemoteAgent.exe…

    Mon-10:51:17> Windows Update: Attempting to initiate Windows Update (Action: Copy files to Windows Update cache: ‘ImportantOnly’ | Server selection: Offline sync service) …

    Mon-10:51:17> Windows Update: Establishing connection…

    Mon-10:51:17> Windows Update: Initializing…

    Mon-10:51:17> Windows Update: File copy complete (Files copied: 0. Failures: 0)

    Mon-10:51:17> Windows Update: Copying file(s) from local cache to target working directory…

    Mon-10:51:16> Windows Update: Attempting to copy file(s) from local cache to target working directory…

    Mon-10:51:16> Windows Update: Local download complete (Files downloaded: 12. Files located in cache: 0. Files excluded by filter: 0. Files initiated by another row: 0. Failures: 0)

    Mon-10:48:39> Windows Update: Executing local downloader…

    Mon-10:48:39> Windows Update: Queued local downloader…

    Mon-10:48:39> Windows Update: 10 update(s) found

    Mon-10:46:22> Windows Update: Executing BatchPatchRemoteAgent.exe…

    Mon-10:46:22> Windows Update: Attempting to initiate Windows Update (Action: Search for updates and retrieve url list: ‘ImportantOnly’ | Server selection: Offline sync service) …

    Mon-10:46:22> Windows Update: Establishing connection…

    Mon-10:46:22> Windows Update: Initializing…

    Mon-10:46:22> Windows Update: WsusScn2.cab file copy complete

    Mon-10:46:22> Windows Update: Copying WsusScn2.cab file from local cache to target working directory…

    Mon-10:46:22> Windows Update: Queued WsusScn2.cab file copy from local cache to target working directory…

    Mon-10:46:22> Windows Update: Initializing copy of WsusScn2.cab file from local cache to target working directory…

    Mon-10:46:22> Windows Update: Local download complete (Files downloaded: 0. Files located in cache: 1. Files excluded by filter: 0. Files initiated by another row: 0. Failures: 0)

    Mon-10:46:21> Windows Update: Executing WsusScn2.cab downloader…

    Mon-10:46:21> Windows Update: Queued WsusScn2.cab downloader…

    Mon-10:46:21> Windows Update: BEGIN (Offline mode: Download available updates)

    Mon-10:46:21> Windows Update: Queued…

    Mon-10:40:11> Windows Update: END (Offline mode: Check for available updates)

    Mon-10:40:11> Windows Update: 10 update(s) found

    Mon-10:37:48> Windows Update: Executing BatchPatchRemoteAgent.exe…

    Mon-10:37:48> Windows Update: Attempting to initiate Windows Update (Action: Search for updates and retrieve url list: ‘ImportantOnly’ | Server selection: Offline sync service) …

    Mon-10:37:48> Windows Update: Establishing connection…

    Mon-10:37:47> Windows Update: Initializing…

    Mon-10:37:47> Windows Update: WsusScn2.cab file copy complete

    Mon-10:37:41> Windows Update: Copying WsusScn2.cab file from local cache to target working directory…

    Mon-10:37:41> Windows Update: Queued WsusScn2.cab file copy from local cache to target working directory…

    Mon-10:37:41> Windows Update: Initializing copy of WsusScn2.cab file from local cache to target working directory…

    Mon-10:37:41> Windows Update: Local download complete (Files downloaded: 1. Files located in cache: 0. Files excluded by filter: 0. Files initiated by another row: 0. Failures: 0)

    Mon-10:37:41> Windows Update: WsusScn2.cab signature validation successful

    Mon-10:37:35> Windows Update: Validating digital signature on WsusScn2.cab…

    Mon-10:35:17> Windows Update: Executing WsusScn2.cab downloader…

    Mon-10:35:17> Windows Update: Queued WsusScn2.cab downloader…

    Mon-10:35:17> Windows Update: BEGIN (Offline mode: Check for available updates)

    Mon-10:35:17> Windows Update: Queued…


    #9881
    Anonymous
    Inactive

    Sorry for forgot to mention, we are running version 2018.10.4.13.0

    #9882
    doug
    Moderator

    The update classification filters are applied by the batchpatchremoteagent process that runs on the target computer. In normal (non-cached) mode, the target computer is responsible for downloading/installing updates, and since the update classification filters process runs on the target computer, update classifications that are UNchecked do not get downloaded or installed. However, in cached mode the BatchPatch computer is responsible for downloading the updates. It downloads all of the updates found in the search, even if they are UNchecked in the update classification filters. The BatchPatch computer then copies these files to the target computer’s BatchPatch remote working directory cache folder. Then the target computer processes everything according to the filtering that has been applied, and so it sees that the files are filtered by the update classification filters being UNchecked, and so the target computer does not copy the files from the BatchPatch remote working directory cache folder to the Windows Update cache folder. So, to the Windows Update agent, the files never get a status of ‘Downloaded-TRUE’. They are effectively never “downloaded” by the target computer. So to reiterate how the process works, the BatchPatch computer puts the files on the target computer into the BatchPatch remote working cache directory, and then the target computer performs a scan and only runs the copy to cache (this method copies files from the BatchPatch remote working directory cache folder to the Windows Update cache folder) for updates that are included (or NOT excluded) by the filter. We are aware of this behavior. We need to modify it to either not copy files to the target that will never be cached on the target, or to delete files on the target (in the remote working dir cache folder. default is C:Program FilesBatchPatchcache) that were copied there but were not cached into the Windows Update cache location (in C:WindowsSoftwareDistribution) due to being excluded by the filter.

    In the log that you shared we can see a status of ‘Downloaded-TRUE’ for *all* of the updates, even the ones that should be excluded by your update classification filters set. This means that either you downloaded *all* of the updates on that machine prior to the session that you created to obtain the log file by using BatchPatch *without* UNchecking the update classifications filters, or you had a different process perform the download of updates, and so the BatchPatch filters were not observed by that other process. The log that you pasted does not show BatchPatch running copy to cache for the files that would be excluded by having the update classification filters UNchecked. Rather it shows the files *already* have a status of ‘Downloaded-TRUE’ before the log you included was created.

    All that said, everything appears to be working properly, based on what you have shown me, and based on my testing here to confirm that the behavior is what I described. I realize that it’s not completely what one would expect to have happen, considering the language about “applies only to download / installation” but in reality the “applies only to download / installation” is from the perspective of the target computer remote agent, not from the BatchPatch computer. When running in cached mode things are a bit different, and so you’ll see the BatchPatch computer download updates that are UNchecked in the update classification filters, but when they go for processing on the target computer, the target computer excludes them properly and never caches them (never copies them from the BatchPatch cache folder to the Windows Update cache folder) and hence they never obtain a status of ‘Downloaded-TRUE’ as a result of a BatchPatch action, unless the BatchPatch action is executed with filters applied that do enable the updates to be copied to the Windows Update cache. In your case I can’t tell you how the updates got to a point where status would show ‘Downloaded-TRUE’. I can only tell you that it was not due to BatchPatch unless at an earlier time you ran BatchPatch with the update classification boxes *checked* for the updates in question, and then you subsequently unchecked the boxes at a later time to run the action that produced the logs that you shared.

    You asked “A second question: When using offline mode, the client computers create their own download lists for use by the Batchpatch server, for the purpose of downloading updates:

    C:Program FilesBatchPatchBatchPatch.log

    C:Program FilesBatchPatchBatchPatchTempAvailableUpdates.log

    My question is, do these lists get amalgamated on the Batchpatch server somewhere? Or does Batchpatch reach out to each client to check the contents of these lists prior to downloading require updates”

    The two files that you mentioned are not “download lists for use by the Batchpatch server, for the purpose of downloading updates.” BatchPatch instructs the target computer batchpatchremoteagent process to create these files, and then BatchPatch consumes these files for a variety of purposes.

    For any further questions on this matter, please contact us directly for support.

Viewing 5 posts - 1 through 5 (of 5 total)
  • You must be logged in to reply to this topic.