Announcement

Collapse
No announcement yet.

Read the windowsupdate.log file remotely

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Read the windowsupdate.log file remotely

    Nice and simple script to open the Windowsupdate.log on a remote client.

    To be used in Tools


    notepad.exe \\%E%\Admin$\windowsupdate.log

  • #2
    Re: Read the windowsupdate.log file remotely

    nice.. works like a charm

    Comment


    • #3
      Re: Read the windowsupdate.log file remotely

      I know this is an old "How to" but I have found using Trace32.exe works the best. Here is my custom tool command.

      "C:\Program Files\SMS 2003 Toolkit 2\trace32.exe" \\%E%\c$\windows\windowsupdate.log

      Trace32.exe is from the SMS tools. It gives you a live look at the log file. You can scroll through and see what is going on. If you use Ctrl + end it will auto-scroll while running.

      Also, a couple of WSUS custom tools I find very useful in Hyena are as follows. Many older systems have duplicated windows update SIDs and the first tool is great to clear up an older system. The second tool is great for deleting the cookie and forcing the client to check back in for updates. Having the windowsupdate.log open in Trace32.exe really shows what is happening in the background.

      1. WSUS - Delete SID
      command = \\Domain\engineering\HyenaTools\Pstools\psexec.exe \\%E% -u domain\username -p Password -c -f "\\Domain-Name\engineering\HyenaTools\Scripts\Delete-WSUS-SID.bat"

      ***Batch File***
      @echo on
      net stop wuauserv
      REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Wi ndowsUpdate" /v AccountDomainSid /f
      REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Wi ndowsUpdate" /v PingID /f
      REG DELETE "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Wi ndowsUpdate" /v SusClientId /f
      net start wuauserv
      wuauclt /resetauthorization /detectnow
      ***End Batch***

      2. WSUS wuauclt /detectnow
      command = \\Domain\engineering\HyenaTools\Pstools\psexec.exe \\%E% -u Domain\Username -p Password -c -f "\\Domain\engineering\HyenaTools\Scripts\wuauclt.b at"

      ***Batch File***
      @ECHO OFF

      ECHO Performing wuauclt /resetauthorization /detectnow

      %windir%\system32\wuauclt /resetauthorization /detectnow

      Pause
      ***End Batch***

      Comment

      Working...
      X