Windows 7 Forums
Welcome to Windows 7 Forums. Our forum is dedicated to helping you find support and solutions for any problems regarding your Windows 7 PC be it Dell, HP, Acer, Asus or a custom build. We also provide an extensive Windows 7 tutorial section that covers a wide range of tips and tricks.



Windows 7: Installing Updates Failure

05 Dec 2012   #51

Windows 7
 
 

Can you explain how to run these please Noel?
Thank you

My System SpecsSystem Spec
.

05 Dec 2012   #52

Microsoft Community Contributor Award Recipient

Win 7 x64 Home Premium (and x86 VirtualBox VM)
 
 

Sorry -

Open an Elevated Command prompt, and copy/paste the commands in, and copy/paste the resonses to your reply.



1) To open an Elevated Command Prompt Window (the ECP window), click on Start, All Programs, Accessories – then right-click on Command Prompt, and select Run as Administrator. Accept the UAC prompt.
2) To run the commands easier, highlight the block of commands, and right-click on the highlight – select Copy. In the CP Window, click on the black/white icon at top left – select Paste. The commands will run but may not complete the last command, so hit the Enter Key once.
3) To copy the results... click on the Black/White icon in the top left, and select Edit... 'Select All', and hit the Enter key - then use Ctrl+V or r-click+Paste to paste it into your response.
My System SpecsSystem Spec
05 Dec 2012   #53

Windows 7
 
 

operable program or batch file.

C:\Users\Burdett>ICACLS

ICACLS name /save aclfile [/T] [/C] [/L] [/Q]
stores the DACLs for the files and folders that match the name
into aclfile for later use with /restore. Note that SACLs,
owner, or integrity labels are not saved.

ICACLS directory [/substitute SidOld SidNew [...]] /restore aclfile
[/C] [/L] [/Q]
applies the stored DACLs to files in directory.

ICACLS name /setowner user [/T] [/C] [/L] [/Q]
changes the owner of all matching names. This option does not
force a change of ownership; use the takeown.exe utility for
that purpose.

ICACLS name /findsid Sid [/T] [/C] [/L] [/Q]
finds all matching names that contain an ACL
explicitly mentioning Sid.

ICACLS name /verify [/T] [/C] [/L] [/Q]
finds all files whose ACL is not in canonical form or whose
lengths are inconsistent with ACE counts.

ICACLS name /reset [/T] [/C] [/L] [/Q]
replaces ACLs with default inherited ACLs for all matching files.

ICACLS name [/grant[:r] Siderm[...]]
[/deny Siderm [...]]
[/remove[:g|:d]] Sid[...]] [/T] [/C] [/L] [/Q]
[/setintegritylevel Levelolicy[...]]

/grant[:r] Siderm grants the specified user access rights. With :r,
the permissions replace any previouly granted explicit permissions.
Without :r, the permissions are added to any previously granted
explicit permissions.

/deny Siderm explicitly denies the specified user access rights.
An explicit deny ACE is added for the stated permissions and
the same permissions in any explicit grant are removed.

/remove[:[g|d]] Sid removes all occurrences of Sid in the ACL. With
:g, it removes all occurrences of granted rights to that Sid. With
:d, it removes all occurrences of denied rights to that Sid.

/setintegritylevel [(CI)(OI)]Level explicitly adds an integrity
ACE to all matching files. The level is to be specified as one
of:
L[ow]
M[edium]
H[igh]
Inheritance options for the integrity ACE may precede the level
and are applied only to directories.

/inheritance:e|d|r
e - enables inheritance
d - disables inheritance and copy the ACEs
r - remove all inherited ACEs


Note:
Sids may be in either numerical or friendly name form. If a numerical
form is given, affix a * to the start of the SID.

/T indicates that this operation is performed on all matching
files/directories below the directories specified in the name.

/C indicates that this operation will continue on all file errors.
Error messages will still be displayed.

/L indicates that this operation is performed on a symbolic link
itself versus its target.

/Q indicates that icacls should supress success messages.

ICACLS preserves the canonical ordering of ACE entries:
Explicit denials
Explicit grants
Inherited denials
Inherited grants

perm is a permission mask and can be specified in one of two forms:
a sequence of simple rights:
N - no access
F - full access
M - modify access
RX - read and execute access
R - read-only access
W - write-only access
D - delete access
a comma-separated list in parentheses of specific rights:
DE - delete
RC - read control
WDAC - write DAC
WO - write owner
S - synchronize
AS - access system security
MA - maximum allowed
GR - generic read
GW - generic write
GE - generic execute
GA - generic all
RD - read data/list directory
WD - write data/add file
AD - append data/add subdirectory
REA - read extended attributes
WEA - write extended attributes
X - execute/traverse
DC - delete child
RA - read attributes
WA - write attributes
inheritance rights may precede either form and are applied
only to directories:
(OI) - object inherit
(CI) - container inherit
(IO) - inherit only
(NP) - don't propagate inherit
(I) - permission inherited from parent container

Examples:

icacls c:\windows\* /save AclFile /T
- Will save the ACLs for all files under c:\windows
and its subdirectories to AclFile.

icacls c:\windows\ /restore AclFile
- Will restore the Acls for every file within
AclFile that exists in c:\windows and its subdirectories.

icacls file /grant AdministratorD,WDAC)
- Will grant the user Administrator Delete and Write DAC
permissions to file.

icacls file /grant *S-1-1-0D,WDAC)
- Will grant the user defined by sid S-1-1-0 Delete and
Write DAC permissions to file.

C:\Users\Burdett>C:\Windows\winsxs\x86_microsoft-windows-v..cprovider.resources_
31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f
'C:\Windows\winsxs\x86_microsoft-windows-v..cprovider.resources_31bf3856ad364e35
_6.1.7600.16385_en-us_15e31a189a5e0c8f' is not recognized as an internal or exte
rnal command,
operable program or batch file.

C:\Users\Burdett>
C:\Users\Burdett>C:\Windows\winsxs\manifests\x86_microsoft-windows-v..cprovider.
resources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifest

C:\Users\Burdett>ICACLS

ICACLS name /save aclfile [/T] [/C] [/L] [/Q]
stores the DACLs for the files and folders that match the name
into aclfile for later use with /restore. Note that SACLs,
owner, or integrity labels are not saved.

ICACLS directory [/substitute SidOld SidNew [...]] /restore aclfile
[/C] [/L] [/Q]
applies the stored DACLs to files in directory.

ICACLS name /setowner user [/T] [/C] [/L] [/Q]
changes the owner of all matching names. This option does not
force a change of ownership; use the takeown.exe utility for
that purpose.

ICACLS name /findsid Sid [/T] [/C] [/L] [/Q]
finds all matching names that contain an ACL
explicitly mentioning Sid.

ICACLS name /verify [/T] [/C] [/L] [/Q]
finds all files whose ACL is not in canonical form or whose
lengths are inconsistent with ACE counts.

ICACLS name /reset [/T] [/C] [/L] [/Q]
replaces ACLs with default inherited ACLs for all matching files.

ICACLS name [/grant[:r] Siderm[...]]
[/deny Siderm [...]]
[/remove[:g|:d]] Sid[...]] [/T] [/C] [/L] [/Q]
[/setintegritylevel Levelolicy[...]]

/grant[:r] Siderm grants the specified user access rights. With :r,
the permissions replace any previouly granted explicit permissions.
Without :r, the permissions are added to any previously granted
explicit permissions.

/deny Siderm explicitly denies the specified user access rights.
An explicit deny ACE is added for the stated permissions and
the same permissions in any explicit grant are removed.

/remove[:[g|d]] Sid removes all occurrences of Sid in the ACL. With
:g, it removes all occurrences of granted rights to that Sid. With
:d, it removes all occurrences of denied rights to that Sid.

/setintegritylevel [(CI)(OI)]Level explicitly adds an integrity
ACE to all matching files. The level is to be specified as one
of:
L[ow]
M[edium]
H[igh]
Inheritance options for the integrity ACE may precede the level
and are applied only to directories.

/inheritance:e|d|r
e - enables inheritance
d - disables inheritance and copy the ACEs
r - remove all inherited ACEs


Note:
Sids may be in either numerical or friendly name form. If a numerical
form is given, affix a * to the start of the SID.

/T indicates that this operation is performed on all matching
files/directories below the directories specified in the name.

/C indicates that this operation will continue on all file errors.
Error messages will still be displayed.

/L indicates that this operation is performed on a symbolic link
itself versus its target.

/Q indicates that icacls should supress success messages.

ICACLS preserves the canonical ordering of ACE entries:
Explicit denials
Explicit grants
Inherited denials
Inherited grants

perm is a permission mask and can be specified in one of two forms:
a sequence of simple rights:
N - no access
F - full access
M - modify access
RX - read and execute access
R - read-only access
W - write-only access
D - delete access
a comma-separated list in parentheses of specific rights:
DE - delete
RC - read control
WDAC - write DAC
WO - write owner
S - synchronize
AS - access system security
MA - maximum allowed
GR - generic read
GW - generic write
GE - generic execute
GA - generic all
RD - read data/list directory
WD - write data/add file
AD - append data/add subdirectory
REA - read extended attributes
WEA - write extended attributes
X - execute/traverse
DC - delete child
RA - read attributes
WA - write attributes
inheritance rights may precede either form and are applied
only to directories:
(OI) - object inherit
(CI) - container inherit
(IO) - inherit only
(NP) - don't propagate inherit
(I) - permission inherited from parent container

Examples:

icacls c:\windows\* /save AclFile /T
- Will save the ACLs for all files under c:\windows
and its subdirectories to AclFile.

icacls c:\windows\ /restore AclFile
- Will restore the Acls for every file within
AclFile that exists in c:\windows and its subdirectories.

icacls file /grant AdministratorD,WDAC)
- Will grant the user Administrator Delete and Write DAC
permissions to file.

icacls file /grant *S-1-1-0D,WDAC)
- Will grant the user defined by sid S-1-1-0 Delete and
Write DAC permissions to file.

C:\Users\Burdett>C:\Windows\winsxs\manifests\x86_microsoft-windows-v..cprovider.
resources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifest

C:\Users\Burdett>
C:\Users\Burdett>C:\Windows\winsxs\manifests\x86_microsoft-windows-v..cprovider.
resources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifest

C:\Users\Burdett>

C:\Users\Burdett>C:\Windows\winsxs\manifests\x86_microsoft-windows-v..cprovider.
resources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifest

C:\Users\Burdett>

I followed your instructions, but it doesn't look like the last one ran?
My System SpecsSystem Spec
.


05 Dec 2012   #54

Microsoft Community Contributor Award Recipient

Win 7 x64 Home Premium (and x86 VirtualBox VM)
 
 

None of it ran properly - dunno why?
Close teh windows and reopen it - try with just one par of commands first.
You should get output that looks something like....

Code:
C:\Windows\system32>DIR C:\Windows\winsxs\manifests\x86_microsoft-windows-v..cpr
ovider.resources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifest
 Volume in drive C has no label.
 Volume Serial Number is 64B7-0512
 Directory of C:\Windows\winsxs\manifests
12/04/2011  08:16             2,498 x86_microsoft-windows-v..cprovider.resources
_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifest
               1 File(s)          2,498 bytes
               0 Dir(s)  27,410,100,224 bytes free
C:\Windows\system32>ICACLS  C:\Windows\winsxs\manifests\x86_microsoft-windows-v.
.cprovider.resources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.mani
fest
C:\Windows\winsxs\manifests\x86_microsoft-windows-v..cprovider.resources_31bf385
6ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifest NT SERVICE\TrustedInsta
ller:(I)(F)
                                                         BUILTIN\Administrators:
(I)(RX)
                                                         NT AUTHORITY\SYSTEM:(I)
(RX)
                                                         BUILTIN\Users:(I)(RX)
Successfully processed 1 files; Failed processing 0 files
C:\Windows\system32>
C:\Windows\system32>
My System SpecsSystem Spec
05 Dec 2012   #55

Windows 7
 
 

Um..... this what you mean?

Microsoft Windows [Version 6.1.7600]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.

C:\Users\Burdett>C:\Windows\winsxs\x86_microsoft-windows-v..cprovider.resources_
31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f
'C:\Windows\winsxs\x86_microsoft-windows-v..cprovider.resources_31bf3856ad364e35
_6.1.7600.16385_en-us_15e31a189a5e0c8f' is not recognized as an internal or exte
rnal command,
operable program or batch file.

C:\Users\Burdett>ICACLS C:\Windows\winsxs\x86_microsoft-windows-v..cprovider.res
ources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f
C:\Windows\winsxs\x86_microsoft-windows-v..cprovider.resources_31bf3856ad364e35_
6.1.7600.16385_en-us_15e31a189a5e0c8f NT SERVICE\TrustedInstallerI)(OI)(CI)(F)


BUILTIN\AdministratorsI)(OI)(CI)(RX)

NT AUTHORITY\SYSTEMI)(OI)(CI)(RX)

BUILTIN\UsersI)(OI)(CI)(RX)

Successfully processed 1 files; Failed processing 0 files

C:\Users\Burdett>C:\Windows\winsxs\manifests\x86_microsoft-windows-v..cprovider.
resources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifest

C:\Users\Burdett>ICACLS C:\Windows\winsxs\manifests\x86_microsoft-windows-v..cp
rovider.resources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifes
t
C:\Windows\winsxs\manifests\x86_microsoft-windows-v..cprovider.resources_31bf385
6ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f.manifest NT SERVICE\TrustedInsta
llerF)

NT AUTHORITY\SYSTEMRX
)

BUILTIN\Administrators:
(RX)

BUILTIN\UsersRX)

Successfully processed 1 files; Failed processing 0 files

C:\Users\Burdett>

Trevor
My System SpecsSystem Spec
05 Dec 2012   #56

Microsoft Community Contributor Award Recipient

Win 7 x64 Home Premium (and x86 VirtualBox VM)
 
 

That looks about right
don't worry about the smilies, I can work through them.
My System SpecsSystem Spec
05 Dec 2012   #57

Microsoft Community Contributor Award Recipient

Windows 8.1 Pro x64
 
 

Quote   Quote: Originally Posted by NoelDP View Post
YAY!
Well done, Tom and Trevor! Looks like that's sorted
I made a right mess of it to start off with, but we got there in the end! I really need to start doing .reg file fixes rather than hotswapping the components hive, I'm just asking for trouble.

Quote   Quote: Originally Posted by trevor burdett View Post
Thank you Guys.... have to admit that being some-one who has never ventured into the workings of my computer before, I feel strangely proud of my achievements!! lol
I will however, switch Auto Updates back on before I congratulate myself.....
You've done very well so far Trevor, keep up the good work! I'm a few pages behind on this thread so I can't really comment on the problems at the moment, but I'll join in when I've caught up!

Quote   Quote: Originally Posted by NoelDP View Post
That file is the archive history of all results - so you only need to look at the bottom one, which is clear.

Here's what I think is causing the problem....
Code:
Search "(F)" (16 hits in 1 files)
  C:\Users\NoelAsus\AppData\Local\Temp\Temp1_CBS (10).zip\CBS.log (16 hits)
 Line 20451: 2012-12-05 11:23:19, Error                 CSI    0000023d (F) Unable to load manifest for component [ml:280{140},l:198{99}]"x86_microsoft-windows-v..cprovider.resources_31bf3856ad364e35_6.1.7600.16385_en-us_15e31a189a5e0c8f"[gle=0x80004005]
 Line 20452: 2012-12-05 11:23:19, Error                 CSI    0000023e@2012/12/5:11:23:19.099 (F) d:\win7sp1_gdr\base\wcp\componentstore\storelayout.cpp(2714): Store corruption detected in function ComponentStore::CRawStoreLayout::FetchManifestContent expression: 0
 Line 20454: 2012-12-05 11:23:19, Error                 CSI    0000023f (F) HRESULT_FROM_WIN32(14098) #700913# from Windows::ServicingAPI::CCSITransaction::ICSITransaction_EnumMissingComponents(Flags = 0, ppe = NULL, disp = 0)[gle=0x80073712]
 Line 20455: 2012-12-05 11:23:19, Error                 CSI    00000240 (F) HRESULT_FROM_WIN32(14098) #700912# from Windows::ServicingAPI::CCSITransaction_ICSITransaction::EnumMissingComponents(flags = 0, enum = NULL, disp= 0)
 Line 80647: 2012-12-05 11:44:22, Error                 CSI    0000036d (F) STATUS_OBJECT_NAME_NOT_FOUND #2249164# from Windows::Rtl::SystemImplementation::DirectRegistryProvider::SysOpenKey(flg = (AllowAccessDenied), key = {provider=NULL, handle=0}, da = (KEY_READ|DELETE|KEY_WOW64_64KEY), oa = @0x299df30->OBJECT_ATTRIBUTES {s:48; rd:NULL; on:[187]"\Registry\Machine\COMPONENTS\DerivedData\VersionedIndex\6.1.7600.16385 (win7_rtm.090713-1255)\ComponentFamilies\amd64_mdmrock5.inf_31bf3856ad364e35_none_bcf7d89ebb046b79\f256!mdmrock5.inf"; a:(OBJ_CASE_INSENSITIVE)}, disp = Unmapped disposition: 43638480 (0x0299ded0))[gle=0xd0000034]
 Line 80648: 2012-12-05 11:44:22, Error                 CSI    0000036e@2012/12/5:11:44:22.912 (F) d:\win7sp1_gdr\base\wcp\sil\merged\ntu\ntsystem.cpp(3676): Error STATUS_OBJECT_NAME_NOT_FOUND originated in function Windows::Rtl::SystemImplementation::DirectRegistryProvider::SysOpenKey expression: (null)
 Line 80650: 2012-12-05 11:44:25, Error                 CSI    0000036f (F) STATUS_OBJECT_NAME_NOT_FOUND #2249163# from Windows::Rtl::SystemImplementation::DirectRegistryProvider::SysOpenKey(flg = 0, key = {provider=NULL, handle=0}, da = (KEY_READ|DELETE|KEY_WOW64_64KEY), oa = @0x299df30->OBJECT_ATTRIBUTES {s:48; rd:NULL; on:[187]"\Registry\Machine\COMPONENTS\DerivedData\VersionedIndex\6.1.7600.16385 (win7_rtm.090713-1255)\ComponentFamilies\amd64_mdmrock5.inf_31bf3856ad364e35_none_bcf7d89ebb046b79\f256!mdmrock5.inf"; a:(OBJ_CASE_INSENSITIVE)}, disp = Unmapped disposition: 43639544 (0x0299e2f8))[gle=0xd0000034]
 Line 80651: 2012-12-05 11:44:25, Error                 CSI    00000370@2012/12/5:11:44:25.190 (F) d:\win7sp1_gdr\base\wcp\sil\merged\ntu\ntsystem.cpp(3676): Error STATUS_OBJECT_NAME_NOT_FOUND originated in function Windows::Rtl::SystemImplementation::DirectRegistryProvider::SysOpenKey expression: (null)
 Line 80653: 2012-12-05 11:44:25, Error                 CSI    00000371 (F) STATUS_OBJECT_NAME_NOT_FOUND #2249162# from Windows::Rtl::SystemImplementation::CKey::OpenExistingKey(f = 2, da = (KEY_READ|DELETE), oa = @0x299e390, key = NULL, disp = (null))[gle=0xd0000034]
 Line 80654: 2012-12-05 11:44:25, Error                 CSI    00000372 (F) STATUS_OBJECT_NAME_NOT_FOUND #2249157# from Windows::Rtl::SystemImplementation::CKey::DeleteRecursively(...)[gle=0xd0000034]
 Line 80655: 2012-12-05 11:44:25, Error                 CSI    00000373 (F) STATUS_OBJECT_NAME_NOT_FOUND #2163010# from Windows::Rtl::SystemImplementation::CKey::DeleteRecursively(...)[gle=0xd0000034]
 Line 80656: 2012-12-05 11:44:25, Error                 CSI    00000374 (F) STATUS_OBJECT_NAME_NOT_FOUND #2162998# from Windows::Rtl::SystemImplementation::CKey::DeleteRecursively(...)[gle=0xd0000034]
 Line 80657: 2012-12-05 11:44:25, Error                 CSI    00000375 (F) STATUS_OBJECT_NAME_NOT_FOUND #1554363# from CCSDirectTransaction::OperateEnding at index 0 of 1 operations, disposition 0[gle=0xd0000034]
 Line 80658: 2012-12-05 11:44:25, Error                 CSI    00000376 (F) HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND) #1554297# from Windows::COM::CComponentStore::InternalTransact(...)[gle=0x80070002]
 Line 80659: 2012-12-05 11:44:25, Error                 CSI    00000377 (F) HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND) #1554295# from Windows::ServicingAPI::CCSITransaction::ICSITransaction_Commit(Flags = 22 (0x00000016), pSink = NULL, disp = 0, coldpatching = FALSE)[gle=0x80070002]
 Line 80660: 2012-12-05 11:44:25, Error                 CSI    00000378 (F) HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND) #1554294# 10749642 us from Windows::ServicingAPI::CCSITransaction_ICSITransaction::Commit(flags = 0x00000016, pSink = NULL, disp = 0)
Search "[F]" (0 hits in 0 files)
Search "[sr]" (0 hits in 0 files)
As to how to fix it.... dunno, yet!
I'll see what I can find out.
What did you use to process the CBS log? That looks really useful
My System SpecsSystem Spec
06 Dec 2012   #58

Microsoft Community Contributor Award Recipient

Win 7 x64 Home Premium (and x86 VirtualBox VM)
 
 

Notepad++ Notepad++ Home
*really* nifty alternative to notepad
My System SpecsSystem Spec
06 Dec 2012   #59

Microsoft Community Contributor Award Recipient

Windows 8.1 Pro x64
 
 

I use, and love, Notepad++ I'm just about getting to grips with the RegEx though.

Which search did you use to get it to output it like that? It looks much easier to read.

Found it!
My System SpecsSystem Spec
06 Dec 2012   #60

Microsoft Community Contributor Award Recipient

Win 7 x64 Home Premium (and x86 VirtualBox VM)
 
 

[sr] is teh most common one - also
Could
Cannot
(F)

for different failures
My System SpecsSystem Spec
Reply

 Installing Updates Failure





Thread Tools



Similar help and support threads for2: Installing Updates Failure
Thread Forum
Solved Cannot Complete Installing Updates, or Check for New Updates Windows Updates & Activation
Solved Windows Updates Not Installing : Error Unknown (Sits on Installing) Windows Updates & Activation
failure configuring updates Windows Updates & Activation
Cannot Complete Installing Updates, or Check for New Updates HELP Windows Updates & Activation
Windows 7 Updates keeps installing same 8 updates over and over Windows Updates & Activation
Failure Configuring Windows Updates Windows Updates & Activation
Installing Updates and Installing features part of windows setup menu Installation & Setup

Our Sites

Site Links

About Us

Find Us

Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd

All times are GMT -5. The time now is 06:38 AM.
Twitter Facebook Google+



Windows 7 Forums

Seven Forums Android App Seven Forums IOS App
  

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33