Thanks for the update! If
NetworkService
is the default identity for the
WsusPool, there might not be a need to change it to
ApplicationPoolIdentity
unless you’re troubleshooting or following specific best practices and custom setups. For now, we’ll focus on resolving the core problem:
clients downloading updates as 0 KB files. Since
everything else looks OK, let’s refine the focus on what might still cause the failure.
Next Steps to Resolve WSUS Client’s 0 KB File Issue
Focus on Key Sources of the Problem
Given that the
updates display as 0 KB in the SoftwareDistribution folder, it typically points to:
- WSUS not properly serving the file (IIS content or file access issue).
- WSUS database inconsistencies (incorrect metadata about the updates).
- Client-side cache or communication issues (even if logs currently show no client errors).
Let’s drill deeper into the
server servicing aspects and recheck the
client-side download path.
Step 1: Test Content Access from the Client via Browser
Since the client can download updates manually, we need to double-check
automated accessibility.
- Open a browser on the client machine.
- Navigate to the expected content path using the WSUS server URL. For example:
Code:
http://<WSUS-Server>:8530/Content/<GUID>.cab
- Replace
<WSUS-Server>
with your server name or IP.
- Replace
<GUID>.cab
with the actual file GUID (corresponding to KB5047486 or similar) from the WSUSContent folder.
- Results:
- File Successfully Downloads: Proceed to Step 2 to confirm WSUS fulfills HTTP/HTTPS requests correctly.
- File Fails or Errors: Check IIS or permissions for serving WSUS content.
Step 2: Double-Check IIS Directory Browsing
WSUS relies on proper IIS folder permissions and configuration to serve files.
Verify WSUS Content Folder in IIS:
- Open IIS Manager (
inetmgr
).
- Expand WSUS Administration > Content.
- Test virtual directory permissions:
- Select Content, click Browse in the right-side Actions pane.
- Ensure it loads the directory.
- If Permissions Seem Fine:
- Check the
C:\inetpub\logs\LogFiles
IIS log files for entries related to requests for WSUS content.
- Look for HTTP error codes like 403 (Forbidden) or 401 (Unauthorized).
Step 3: Test the File’s Database Metadata in WSUS
Sometimes clients receive
metadata-only access but can’t get the actual file delivered. This can happen if WSUS's internal database references the update incorrectly.
- Resynchronize WSUS Updates:
- From the WSUS console:
- Go to Options > Synchronization.
- Click Syncronize Now to fetch metadata again.
- Test whether clients download updates after metadata refresh.
- Verify Update Approval:
- Go to the WSUS console > Updates.
- Find KB5047486 in the update list.
- Ensure the update is approved for the matching target group of the client.
- If necessary, select the update, and click Approve for All Computers (or the correct group).
- Click "Run Server Cleanup Wizard" under Options to remove old/unused update metadata.
- Test Client Resync:
On the affected client:
Code:
bash
wuauclt /reportnow
wuauclt /detectnow
Step 4: Manually Reindex SUSDB
Database fragmentation can cause WSUS content delivery failures.
- Open SQL Server Management Studio (SSMS).
- Connect to the WID instance (or SQL Server instance hosting WSUS):
- Use:
Code:
\\.\pipe\MICROSOFT##WID\tsql\query
Or your SQL instance (e.g., MY-SQLINSTANCE\WSUS
).
- Run the Standard Reindex SQL Script:
Code:
sql
USE SUSDB;
EXEC spReindexAllIndexes;
- Restart IIS and Test:
Step 5: Clear the Client SoftwareDistribution Folder and Retry
Ensure the client starts with a clean slate for downloads.
- Stop Update Services:
On the client, run:
Code:
bash
net stop wuauserv
net stop cryptsvc
- Clear Caching Folders:
- Delete contents of:
Code:
bash
C:\Windows\SoftwareDistribution
C:\Windows\System32\catroot2
- Restart Services:
Code:
bash
net start wuauserv
net start cryptsvc
- Retry the Update:
- Force detection and reporting:
Code:
bash
wuauclt /resetauthorization /detectnow
Step 6: Check WSUS Logs
If the updates still aren’t downloading, deeper analysis of
WSUS logs on the server is the next step.
- WSUS Logs on the Server:
- Check the following:
Code:
C:\Program Files\Update Services\LogFiles\SoftwareDistribution.log
- Look for errors related to:
- Database querying issues (e.g., missing files or update ID).
- Access failures.
- Client Logs:
- Inspect the client logs for download errors:
- Use:
Code:
bash
wuauclt /reportnow
wuauclt /detectnow
0
- Look for errors like network timeouts or file request failures.
Step 7: Test WSUS with Another Client
Sometimes WSUS issues are isolated to a specific group policy or client device misconfiguration. Use a different client to test updates to rule out server issues entirely:
- Set the Same WSUS Settings and Test:
- Temporarily point another client to the same WSUS server.
- Resynchronize the updates as done before.
If the second client works, the issue lies with the original client's local software or policies. If the second client also experiences 0 KB downloads, this confirms the issue is
server-side.
Next Steps
Let me know how these additional steps go, especially:
- After Step 4 (Reindex) or Step 5 (SoftwareDistribution reset).
- Any specific log errors or behavior changes.
If updates are still failing, we’ll pivot to deeper IIS or WSUS database diagnostics!
