Post by Special AccessPost by Lawrence Garvin [MVP]For one /a is not a valid parameter.
interesting, as technet article
http://technet.microsoft.com/en-us/library/cc720477(WS.10).aspx
states the /a is shorthand for the /resetauthorization switch.
Yeah.. it does ... it also has an incorrect description for the
/resetauthorization switch.
So either the description is for the /a switch, which has nothing at all do
to with /resetauthorization,
or if /a and /resetauthorization are the same (which I don't believe they
are) then the page entirely misrepresents the functionality of the
/resetauthorization switch.
In fact, to execute "an asynchronous background search for applicable
updates", you would use the /detectnow switch, not /resetauthorization.
Furthermore, /resetauthorization won't even work by itself, it must be
combined with /detectnow, and the only thing that /resetauthorization does
is delete the cached targeting cookie.
I also note, sadly, that the /detectnow switch is not even documented in
this article.
Short answer: this Appendix is one of the more notable blights on the
otherwise good documentation provided for WSUS.
Post by Special AccessWe have started stopping BITS, WUAUSERV, removing the SUSid and the
AccountID from the registry, deleting the 'softwareupdate' folder,
restarting WUAUSERV and BITS, and finally running wuauclt /a
/detectnow. So far, so good. 4 computers that were in and out seem
to like it enough to stay in all day today.
So.. would you like to know which *two* steps of the above procedure is
producing all of your positive results, and which of the other SIX steps you
could completely ignore?
1. Stopping services -- totally unnecessary.
2. Removing SusClientID -- one of two constructive steps.
3. Removing AccountID -- not the correct key name and deprecated in the WUA
v7 product anyway -- if it still exists, it's left over from the WSUS v2
installations you used to have.
4. Deleting the 'softwareupdate' folder -- an excessively destructive step
which destroys the client-side datastore containing the machine's complete
update history, as well as the ReportingEvents.log file which is the *only*
true and complete history of all activity of the WUAgent for the lifetime
of that machine.
5. Restarting services -- only necessary if Step #1 was performed.
6. Running the indicated command -- wuauclt /resetauthorization /detectnow
Ergo....
These are the only required steps to resolve your duplicate SusClientID
issues:
1. Delete the SusClientID and SusClientValidationID (as documented in
KB903262).
2. Run wuauclt /resetauthorization /detectnow
Post by Special AccessThank you, Lawrence, for your replies. I am slowly learning more than
I ever wanted to about WSUS heheh
:-)
--
Lawrence Garvin, M.S., MCITP:EA, MCDBA, MCSA
Principal/CTO, Onsite Technology Solutions, Houston, Texas
Microsoft MVP - Software Distribution (2005-2010)
My Blog: http://onsitechsolutions.spaces.live.com
Microsoft WSUS Website: http://www.microsoft.com/wsus
My MVP Profile: http://mvp.support.microsoft.com/profile/Lawrence.Garvin