Category Archives: Troubleshooting

Update Download Stuck Forces Interesting Maneuvers

Here’s something I’ve not run into before. In trying to update my production PC to KB5001391 I found the download phase of the update stuck at 0% indefinitely. “No problem,” thought I, “I’ll download the .MSU file from the Microsoft Catalog.” Yeah, right!

Update Download Stuck Forces Interesting Maneuvers.stuck-at-zero
Update Download Stuck Forces Interesting Maneuvers.stuck-at-zero

I guess the Catalog is smart enough to avoid duplicate, parallel downloads. It wouldn’t let me download the MSU file to that PC. So I jumped on one of my test machines, and downloaded the file there. Then I copied it over the network, and installed it by double-clicking its MSU file. This took a while longer than I was expecting (around 5 minutes or so) but it did work.

Why Update Download Stuck Forces Interesting Maneuvers

I can only speculate that WU informs the OS that it’s already downloading the requested KB item on that PC. Thus, clicking the download link from the catalog does nothing. That said, it worked as expected on a different PC, so I found a two-step workaround where a single step wouldn’t cut it. Please keep that in mind if you ever find yourself in this boat.

More Update Weirdness Follows

After the reboot to install KB5001391, I see it is installed in Update History. Nevertheless, Windows Update still shows me it’s available as an “Optional quality update…” (see screencap following).

Update Download Stuck Forces Interesting Maneuvers.2nd offer

Even though it’s already installed (and showing in Update History), I get another offer anyway. Sigh.

Of course, I am compelled to click the “Download and install” button to see what happens. When I do that, the Windows Update page comes back in about 30 seconds with nothing to download nor any status or error message to explain itself, either. I guess it figured out the update was already installed, and withdrew the offer. That’s a reasonably intelligent thing to do. Checking Reliability Monitor, I see no error reports about this there, either. So it looks like a clean save, so to speak. I’m glad!

Facebooklinkedin
Facebooklinkedin

Defender Update Download Circumvents Stuck 21364

It’s been a struggle to get the latest Dev Channel Insider Build updated lately. I’ve already described how KB 5001030 and KB5003397 aren’t working on my test machines. Lately, Defender has been stuck as well. That’s how I learned that a Defender update download circumvents stuck 21364.

Normally, you can simply open the Windows Security item in Settings → Windows Update. Next,  you can forcibly get Defender to update by clicking “Protection updates” under “Virus & threat protection updates.” Not this time! This mostly-infallible workaround throws an “update failed” error. It explains further it “can’t check for definition updates” (see lead-in graphic).

Shoot! I even tried the command line program MpCmdRun.exe. First, I cleared the Defender signatures (that worked). Then I tried to download a new set (that failed). This time, apparently update downloads are well and truly stuck. For the record neither the Update Troubleshooter, nor the TenForums WU Reset batch file worked, either.

Thus: Defender Update Download Circumvents Stuck 21364

Relief is available from the “Latest Security Intelligence…”  MS Security Intelligence web page for Defender. I provide its URL because it’s more informative than that title: https://www.microsoft.com/en-us/wdsi/defenderupdates. If you scroll down this page, you’ll find a section entitled “Manually Download the Update.” Follow the link that matches your Windows 10 version and you’ll download a program named mpam-fe.exe.

If you run this program it will (a) update your Defender signatures, but (b) provide no interaction or feedback. That holds, even if you run the program as administrator. The only way to tell it worked is to check the timestamp for Last Update in Windows Security → Virus & threat protection under the “Virus & threat protection settings.” After you run this program, you’ll see a timestamp that reflects a the recent past. It’s too stealthy for my sensibilities, but it does work.

I’m OK without CUs and Such, But…

When update trouble rears its head on Insider Previews, I’ve learned to cope. I’ve also learned it’s essential to be patient when MS goes into “break-fix” mode. That is, when they acknowledge something is broken and promise to fix it “soon.” And to the Insider Team’s credit most such fixes come sooner rather than later.

But I can’t accept an inability to update Defender on my test machines, where’s its my only anti-malware defense. That’s why I’m glad I’ve now learned how to manually download and install signatures to keep safe, even when updates gets stuck, as they sometime do. So while they’re still stuck for 21364, I’ll use this web page to update daily just to be safe…

Note Added 6 Hours Later

Just for grins, I tried out the old Windows Update MiniTool (WUMT) on my stuck test machines. It was happy to download and install the Defender updates for me. But it did not “see” the two problem KBs until I resumed updates in WU. Acting on advice from the Insider Team that I should be able to install the .NET update, I tried that inside WUMT on my Lenovo X220 Tablet and X380 Yoga It reported it was downloading, then installing, for each of the two problem updates. But alas while KB5003397 succeeded on the X220 Tablet, it failed on the X380 Yoga. And KB5001030 worked on neither machine, even using WUMT. Go figure!

Facebooklinkedin
Facebooklinkedin

21364 Update Woes Continue

OK, then: i’ve recently reported a documented issue with KB5001030. It’s a CU Preview for .NET 3.5 and 4.8 and has been documented in the 21364 release announcement as a “known issue.” But now, a new cumulative update KB5003397 — a so-called “do-nothing update” which “does not include anything new and is designed to test our servicing pipeline” is out. However, my 21364 update woes continue because now I can’t install either one of these new updates. Sigh.

Nothing happens, in fact, when I try to update my Lenovo X220 Tablet. As the lead-in graphic above shows, it hangs while downloading at 0% completion. Running the update troubleshooter or even the TenForums Update Reset Batch Script doesn’t help either. Thus I say: my Dev Channel machines are stuck, going nowhere fast!

What Does 21364 Update Woes Continue Mean?

It means I can’t update either of my Dev Channel Insider Preview test machines successfully right now. I also think it means that I’m waiting on the next Feature Upgrade (a new version, in other words) to get things moving again. It’s a little hard to tell.

My gut feeling is the update pipeline is currently blocked for Dev Channel images (on my two test machines, at least). Usually, when things go sideways with Insider Preview updates I can figure out some way to get around the roadblock, though.

Later on today, or perhaps tomorrow, I’ll visit UUPdump.ml and see if they’ve got a 21364 image that can slipstream in those two troublesome updates. If so, I’ll build an ISO and use it to perform an in-place repair upgrade as a workaround. Right now, I’m increasingly convinced it might be my only way around this roadblock.

Stay tuned! I’ll report back and let you know if that works. It’s possible that working offline on the image might get around whatever is interfering online (it often does). We’ll see…

Facebooklinkedin
Facebooklinkedin

RTFM Illuminates 21364 Install Error

If you’re going to walk the Windows Insider path, it really, really, really helps to read Build announcement blog posts. These pop up like clockwork on the Windows Blogs. Thus it was for Build 21364, the latest Dev Channel Insider Build released April 21. Although my problem didn’t make the first cut of that blog post, the Insider Team quickly added a note about it when reports started flooding in. It shows up as the lead-in graphic above, in fact. And indeed it shows that RTFM Illuminates 21364 Install Error by taking responsibility for install issues with KB5001030, and promising a forthcoming fix.

After I got through the upgrade install, a notice to install KB5001030 Cumulative Update Preview for .NET Framework 3.5 and 4.8 appeared on my two Dev Channel PCs. On one of them, it sailed through to completion (the Lenovo X220 Tablet, vintage 2012). On the other (the Lenovo X380 Yoga vintage 2018) it failed repeatedly. Here’s what WU says about this on the X380:

RTFM Illuminates 21364 Install Error.WUerror

Even after a complete WU reset, the error persists. That’s when I re-checked the announcement post…

How RTFM Illuminates 21364 Install Error

You’ve already seen what I found in the blog post when I went back to check again. This terminated my WU troubleshooting immediately. Thanks to this text “We are working on a fix for a future build.” I knew this was not something I could fix on my own.

I must say the Insider Team is doing a bang-up job lately in acknowledging and responding to issues as they break. In that same vein, the issue I reported here in my Tuesday item about “News & Interests Follies” has already been fixed. Both of my Dev Channel test machines now have a working News & Interests item that behaves as it should. Still waiting on same on my Beta and Release Preview channel test machines, though…

In closing, I will say I’ve learned through experience to read announcement blogs for new Insider releases carefully. This is the first time that a return to said announcement has conferred additional illumination. But it’s emphatically not the first time such an announcement has informed me of pending issues, so I can steer clear or work around them. Good stuff!

Facebooklinkedin
Facebooklinkedin

News & Information Insider Follies Continue

OK, then. It was supposed to be easy. For both Beta Channnel (Build 19043.962) and Release Preview (19042.962) recent CUs are supposed to include News & Interests, too. (See the lead-in graphic for the release announcement blog post.) As I reported here last Friday, all Dev Channel Insiders who installed Build 21359 were finally on equal footing for this nifty notification bar widget. But alas, it seems that News & Information Insider follies continue. In other words, I updated to these latest versions but see no sign of N&I on either Taskbar. Sigh.

To What End Do News & Information Insider Follies Continue?

No good end, I suppose. But it’s not like I haven’t seen this before. And it’s not just me, either: I see other Insiders reporting similar experiences in the WIMVP  Yammer forums and on Feedback Hub. Obviously, there’s something interesting going on here. I’m not sure if it’s pervasive or spotty, but at least it’s widespread enough that others have noticed the same thing I did.

Gosh, though: I’m a little disappointed. I’d been getting ready to start messing with the manage interests controls in Edge. The My Interests page, Discover Interests settings govern what shows up in the supporting News & Interests detail. I’d hoped to do some tweaking on my Beta Channel and Release Preview test machines.

Hoping for Response or Help Soon!

Given that the Insider Team is already aware of this issue, I’m guessing it will be addressed soon. Whether it’s in a forthcoming CU or quality update sometime remains TBD.

All I can say at this point is that N&I has proved a great deal more interesting to install and use than I’d expected it to be. I’m wondering if its Edge tie-in isn’t somehow connected to its MIA status. When I saw I needed to update Edge to Version 90.0.818.42 this morning, I was half-way convinced this would make N&I visible. But alas, the pessimistic half of that sentiment proved true.

Stay tuned! I’ll update this post when a fix, or some other official response, appears. And today, that’s how things go in Windows World.

Note Added April 21 (1 Day After Original Post)

In response to my inquiry to the Insider Team, I got a tweet back that reads “It’s slowly rolling out for those builds. Appreciate your patience. :)” Now we know that it should show up on all 19042 and 19043 (Release Preview and Beta Channel builds, respectively) sometime soon, but not just yet. Better to know, than to wonder fruitlessly!

My Insider contact clarified further that “rolling out” means a gradual, incremental release, not an all-at-once available-to-everybody release. Helps to understand the terminology, right? Now I know, and hopefully you do too (if you didn’t know already).

Facebooklinkedin
Facebooklinkedin

News & Interests Gets General Dev Channel Release

Just over a week ago, I wrote a post here bemoaning my Dev Channel test PCs’ lack of the News & Interests notification bar feature. It has been in A/B test mode — that is, available to some but not all Dev Channel PCs — for months. It’s a gamble of sorts whether one gets such features or not, and explains that post’s title: Losing Win10 A/B Testing Wagers. But with the release of Build 21359, News & Interests gets general Dev Channel release. My two Lenovo ThinkPad test machines — the X380 Yoga and the X220 Tablet — now sport this new feature, fully-realized.

When News & Interests Gets General Dev Channel Release, Contortions Follow

The first I noticed after rebooting into 21359 was that N&I (my shorthand for News & Interests) was still MIA. A quick check on the Windows Insider MVP Yammer community told me two things:

  1. I was not alone in this experience
  2. Another reboot would put N&I in its rightful place

This worked perfectly on my X220 Tablet where I’d left hidden feature tweaking alone. My X380 was another story…

ViVeTool Rears Its Vexing Head

I’m not the world’s most patient guy. When I learn about A/B feature testing in Windows 10 and I’m not on the receiving side, I’ve been known to turn to hacking tools to turn them on anyway. One such item, named ViVeTool, comes from developer Albacore aka thebookisclosed whose work I’ve been following for years. Here’s how he describes this offering “ViVeTool is … a straightforward tool for power users which want to use the new APIs instantly … to interact with Windows 10’s A/B feature mechanism.” In other words, it lets you turn on what might be turned off in your image, or vice-versa.

I’d done that on the X380 Yoga some while back. But this tweaked N&I did not work properly on that machine. “Hmmm” I wondered “could ViveTool be responsible?” It seems to have been. Once I enabled, then disabled the ViveTool settings for N&I, then rebooted again, it worked perfectly on the X380 Yoga, too.

Tweaking Requires Self-Cleanup

I’ve learned a lesson from this. From now on, if I want to mess with the base test image for Windows 10 that MS gives me, I’m doing it in a VM. I can use snapshotting mechanisms to roll back tweaks quickly and easily. I feel lucky that do/redo with ViveTool in 21359 set things back to rights so that N&I could work as designed. Otherwise, I’d have been forced to clean install that build to heal my own self-inflicted wounds.

If you want to play or tweak, I recommend you do so in a safe and pseudo-sandboxed way. That’s my approach from now on. It comes with the ability to fool around as one likes, without having to live permanently with the results afterward. Please learn from my mis-steps and do likewise!

Facebooklinkedin
Facebooklinkedin

Dell BIOS Update Covers Many Sins

I’ve got a pretty new Dell OptiPlex 7080 Micro SFF PC here at the house. Today, I went through the first BIOS upgrade since I first obtained that machine. When I opine that a Dell BIOS update covers many sins, I mean there was a lot more going on and involved than I expected. The so-called BIOS update was, in fact, 5 updates rolled into one update package. I used the Dell Command | Update utility to handle this, and am climbing its learning curve as well.

How I Learned That Dell BIOS Update Covers Many Sins

At first, because the utility also found a couple of other items to update, I couldn’t get the Command | Update utility to work. Then it dawned on me: perhaps the BIOS update needs to be run by itself? Indeed, that proved to be the ticket to eventual success. It also showed me 5 separate items being updated as the so-called “BIOS Update” was applied:

  1. BIOS
  2. USB-C firmware
  3. Intel Management Engine (IME) firmware
  4. Primary BIOS EC (Embedded Controller) update
  5. Backup BIOS EC update

Thus, where I’d been thinking this was a straight-up, in-and-out BIOS update, it was actually a whole bunch of chained updates that included other device controllers, IME, and embedded controllers. Not having a lot of experience in dealing with such updates from Dell lately, this came as a surprise.

All’s Well That Ends That Way

But once I put my thinking cap on, it became obvious that BIOS updates — which invariably require a restart to be applied, and another to take effect — are best handled separately from other updates. That seems to reflect recent experience with Lenovo updates too, now that I think upon the subject.

In fact, I wrote about a similar situation on March 24 in a post entitled Lenovo Vantage Updates Take Patience. Maybe I should try that thinking cap more often: it seems to work reasonably well!

 

Facebooklinkedin
Facebooklinkedin

New Device May Require Second Reboot

In installing the Kioxia (Toshiba) M.2 SSD late last week, I was reminded of something interesting. Hence this article title: new device may require second reboot. In my rush to set up and learn more about the drive, I was initially surprised to find it absent when I first ran Disk Management (diskmgmt.msc) to get that process going. Then it hit me: maybe it’s not showing up in UEFI.

But to access UEFI, another reboot was required. And by the time i did that, sure enough the device appeared in the list of drives present in the 7080. However, I had to reboot a second time to see the UEFi/BIOS settings and that produced the results I was after.

Why New Device May Require Second Reboot

Sure enough, when I rebooted a third time to get into Windows, the drive appeared in the Disk Management utility. I was able to choose GPT disk layout, and to format the drive as a single contiguous volume named Tosh1TB. It shows up as “Disk 1” in the lead-in graphic for this story, in fact.

What sometimes makes a second boot necessary is the way that UEFI/BIOS supports device enumeration. On many laptops, certain changes to the hardware — especially RAM changes — automatically trigger a trip into the BIOS interface upon the next reboot. This gives admins a chance to make and review config changes before booting back into the OS.

Adding the Kioxia (Toshiba) 1 TB SSD didn’t trigger the UEFI on its own. But when I rebooted and forced a trip into that environment, the Toshiba device (identified as such in BIOS, not as Kioxia) appeared along with the primary SSD. The second trip was enough to see the device recognized in BIOS/UEFI. In turn this made it accessible to Windows when I returned to that environment. That’s how I was able to choose GPT layout, format the drive, and give it the name that appears in the screenshot above. Case closed!

Don’t Panic: Boot Again

If you find yourself in similar straits sometime, try another reboot (or two, actually). That will probably get the device recognized and make it available to Windows. Only if this fails should further troubleshooting be needed.  In that case, I’d start looking into possible SATA lane conflicts next.

Facebooklinkedin
Facebooklinkedin

So Long Adobe Add-ons Shockwave & Air

At the end of last year, the Adobe Flash Player hit end of life (EOL). Yet today, when I ran the excellent free Patch My PC Updater on one of my test machines, I noted that Adobe Air was still present, plus Shockwave. too. My thought was; “Time to say so long Adobe add-ons Shockwave & Air!” Upon checking into both, my presumption proved valid. When I checked for Adobe elements on my 2012 Vintage X220 Tablet, I found serveral related elements, all of which I’m removing post-haste (see lead-in graphic).

Why say: “So long Adobe Add-ons Shockwave & Air?”

Both Shockwave and Air are at End-of-Life, at least as far as Adobe is concerned. HARMAN International has taken over Adobe Air support. But I hardly ever use this, so I’ve decided to uninstall on PCs where it’s still present. Not surprisingly it’s absent on all of my PCs acquired in 2018 or later, including 2xLenovo X1 Yoga 380, X1 Yoga 390, and X1 Extreme, among others. The free version of Revo Uninstaller is more than equal to this task. That’s why I used it to generate the lead-in screencap for this story, and to remove Air and Shockwave from machines where they’re still hanging ’round.

For the record, uninstalling Air left 2 registry keys and one value behind, as well as 3 files. Revo happily cleaned those up. Shockwave left 1 key with 13 values and no files behind, and took care of two entries (the one I selected, plus another) on its own.

More Info on Air & Shockwave

Read more about the future and status of these Adobe components online. Check out “The future of Adobe AIR” (5/30/2019) and “End of life/…Shockwave Player” (April 9, 2019). Going, going gone, and (hopefully) soon forgotten. Don’t need ’em or want ’em anymore. Sayonara!

 

 

Facebooklinkedin
Facebooklinkedin

Using Microsoft Safety Scanner MSERT.exe

With each Patch Tuesday, MS releases a new version of the Malicious Software Removal Tool (MSRT). Just yesterday, I learned about a similar but different tool named Microsoft Safety Scanner (MSERT.exe). At first, I did a double-take to make sure it wasn’t a typo. It’s not, as the Safety Scanner Docs page attests. (Here are live links to the 32-bit and 64-bit downloads mentioned in the lead-in graphic.) Here, I’ll explore what’s involved in using Microsoft Safety Scanner, aka MSERT.exe.

Explanation Precedes Using Microsoft Safety Scanner

MS explains the tool thusly “a scan tool designed to find and remove malware from Windows computers.”  It goes on to says “Simply download it and run a scan to find malware and try to reverse changes made by identified threats.” Like the MSRT, the MS Safety Scanner gets updates and new signatures all the time, so MS recommends that you always download a fresh copy any time you’d like to use it. They also observe that it’s only worth using for 10 days, after which one MUST download a new version.

Here’s how MS describes the MSRT on its download page:

Windows Malicious Software Removal Tool (MSRT) helps keep Windows computers free from prevalent malware. MSRT finds and removes threats and reverses the changes made by these threats. MSRT is generally released monthly as part of Windows Update or as a standalone tool available here for download.

I’ll be darned if I can tell much difference between them. Nor do I see much distinction in third-party coverage. That said, Explorer sees big differences in size between the two, to wit:

Using Microsoft Safety Scanner.sizesNotice that MSERT.exe shows up as itself, while MSRT shows up as KB890830, version 5.87. Because MSRT is released monthly through WU, it apparently keeps the same KB number, but gets a new version number with each release. MSERT is not so readily obliging but does show that information on its Properties/Details page. That’s where I learned that MSERT stands for “Microsoft Support Emergency Response Tool.”

Using Microsoft Safety Scanner.details

Full name plus file version info readily available here.
[Click image for full-sized view.]

Let’s just say this is another tool from MS you can run at your own discretion to check a Windows PC for malware, and attempt cleanup. All this makes me curious to understand why we have access to not one, but two, such tools. Even the best of third-party explanations/explorations tend to be a bit shaky, like this Tom’s Hardware Forums item. Even my home forums community at TenForums is pretty much mum on differences, to my consternation and regret.

Using Microsoft Safety Scanner

The .exe file is portable and runs from anywhere (including the Downloads folder). The Docs don’t say one should run the program as administrator, but I did so anyway. It presents a EULA to which you must agree before it does its thing. Next you get a welcome/disclosure screen:

Click Next, and you get your choice of scan types (quick, full, or customized).

Then, it scans your “most likely compromised” files under quick scan.

On my production PC, the whole process took about 3:00 and produced the following results.

Nothing to see here folks, please move along. A clean bill of health, in other words.

Upon completion,  the log file (named msert.log) shows nothing informative about cleanup or actions taken (probably because it found nothing to clean up). Here’s a NotePad++ view of its contents (click to view full-sized, as it’s a little hard to read in native WordPress resolution):

I’m still not sure if you and I really need this tool or not, but it’s nice to know it’s available on demand should you wish to make a malware scan and clean-up pass over your Windows PC. The whole thing still has me wondering…

 

Facebooklinkedin
Facebooklinkedin