Skip to main content

Posts

Showing posts from March, 2018

VMware 2008 R2 servers losing network after installing KB4088875 / KB4088878 and rebooting

For patching issues caused by Mar 2018 KB's on Server 2008 This is what have worked for us for now: Create a sccm package to deploy the following vbs script on all 2008 R2 servers collection Run it before the patches are applied (it will delete SlotPersistentInfo key if that exists under HKLM\System\CurrentControlSet\Enum\PCI\<deviceid>\<subdeviceid>\Device Parameters Let patches install Reboot The key will be recreated automatically after the reboot ************************** Script: Dim strPciFileVersion Dim WindirFilePath set WshShell = WScript.CreateObject("WScript.Shell") WindirFilePath = WshShell.ExpandEnvironmentStrings("%WinDir%")   Dim fs Set fs = CreateObject("Scripting.FileSystemObject")   strPciFileVersion = fs.getfileversion(WindirFilePath & "\\system32\\drivers\\pci.sys") Dim strAryFileVersion1 strAryFileVersion1 = Split(strPciFileVersion, ".") If (strAryFileVersion1(0) = 6

SCCM ERROR: DownloadContentFiles() failed with hr=0x80070193 Patchmanger.log

Was facing a strange issue where in some of the patches were failing to download . When checked the patchmanager.log found the follwoing error message Download destination = \\sccmshare\patches\ebbbd800-1e36-4aa5-8b61-8c7f049ba548.1\EnableTask.exe . Software Updates Patch Downloader 3/14/2018 5:01:20 PM 7716 (0x1E24) Contentsource = http://download.windowsupdate.com/d/msdownload/update/software/updt/2018/02/enabletask_ca8afac7f3ba90ff72a10a27fcfa3a67edcb83a3.exe . Software Updates Patch Downloader 3/14/2018 5:01:20 PM 7716 (0x1E24) Downloading content for ContentID = 16798547,  FileName = EnableTask.exe. Software Updates Patch Downloader 3/14/2018 5:01:20 PM 7716 (0x1E24) HttpSendRequest failed HTTP_STATUS_FORBIDDEN or HTTP_STATUS_DENIED Software Updates Patch Downloader 3/14/2018 5:01:20 PM 5440 (0x1540) Download http://download.windowsupdate.com/d/msdownload/update/software/updt/2018/02/enabletask_ca8afac7f3ba90ff72a10a27fcfa3a67edcb83a3.exe to It was specifical