Category Archives: Troubleshooting

More Networking Trouble Manifests

Wouldn’t you know it? Today’s a busy day here at Chez Tittel. I’ve got multiple deliverables due, and it’s my son’s “A day” at school (8 classes, several of them challenging). “The Boss” needs her Internet access, too, for purposes both commercial and personal.  That’s no doubt why today, of all days, more networking trouble manifests here and now. For as long as two hours we had no access at all.

When More Networking Trouble Manifests, Then What?

Yesterday, I was inclined to blame my aging desktop when only its NIC stopped working. Today, we lost not just all of the wired connections, but wireless was popping in and out, too. Suddenly things were much clearer: the combination WAP/router from Spectrum was failing — or flailing — intermittently.

A quick call to tech support confirmed that (a) I have a first-gen WAP/router device for the company’s 1 Gbe service and (b) such behavior  happens often enough for team members to know about it. My friendly support guy “Jeff” suggested I drive over to the nearest Spectrum offices and trade in the current unit for a new one.

In the Land of the Blind…

Fortunately, the nearest such office is less than 15 minutes from the house. So I packed up the WAP/router, jumped in the car, drove over and swapped it for a replacement device. Surprise! It’s got a 2.5 GbE interface between cable modem and WAP/router, which I supposed is all to the good.

Even more fortunately, it proved to be (mostly) a matter of plug-and-play upon installing the new device. I did have to reboot the cable modem to get it to recognize and talk to the WAP/router (by getting its MAC address table updated, I assume). I will have to do some clean-up work (static IP assignments for my networked printers) later.

But for now, things are working more or less as they should be. I’m keeping my fingers crossed that they’ll stay that way. I’ve learned now that a failing switch can make NIC drivers go wonky, and have added to my store of troubleshooting lore and experience.

And that’s the way things go sometimes, here in Windows-World! Sigh.

Facebooklinkedin
Facebooklinkedin

GbE Adapter Driver Goes MIA

I had an interesting if unwanted surprise waiting for me when I returned to my production PC after taking a break this morning. Instead of my usual Internet connection, I had zilch. Domain names weren’t resolving. Running IPCONFIG I saw an APIPA address (starts with 169.x.x.x). I knew this meant my NIC had lost its connection with the primary network router, from whence DNS, DHCP and Internet access come. Upon checking the driver in Device Manager, I saw these dreaded words “No drivers are installed for this device” (see above). Indeed when a GbE adapter driver goes MIA, there isn’t much you can do with that device until the driver gets fixed.

If GbE Adapter Driver Goes MIA, Then What?

Fortunately my Asrock Extreme 7+ has two GbE adapters: an Intel I211 and an Intel I219-V. It was the I219-V that dropped off the network. But when I plugged in the I211, it immediately resumed operation. My suspicion: driver corruption in the I219-V driver. So I visited the Intel download site and grabbed a copy of the 26_2.zip Intel Ethernet Adapter Complete Driver Pack.

But then, things got interesting. The same thing that happened with the I219-V started up with the I211. It wasn’t until I reinstalled a new driver from the Intel pack linked above that the I219-V returned to normal operation. I ran DISM /checkhealth with nothing found, but SFC /scannow did report making some repairs. Something odd has definitely hit my production networking facilities.

Bracing for the Inevitable…

I’ve been pondering a new desktop PC build for some time now. This rig is built around an Asrock Extreme7+ and an i7-6700 Skylake processor . Both made their debut in Autumn 2015 (the chip in September, the board in November). As I recall I built this system in the Spring of 2016. That’s now more than 5 years ago. I’m inclined to think this may be fate’s way of telling me it’s time to replace my desktop. Time to revisit and revise my build plans, and get on the stick.

Note Added May 7 (One Day Later)

Today, the whole network here at Chez Tittel blew up. Weird wireless and wired LAN behavior convinced me the Spectrum-supplied WAP/Router/switch device was losing … something. A quick trip to the Spectrum store and a device swap set things right. Read all about it here: More Network Trouble Manifests.

Facebooklinkedin
Facebooklinkedin

Beware Potential Defender Engine 1.1.18100.5 Gotcha

Here’s an interesting item. Check your system/boot (usually C:) drive in Windows 10. If it’s filling up (or full), that may come from a (hopefully temporary) Windows Defender gotcha. The program starts creating loads of 2K binary files in the Scans/History/Store subfolder. Ghacks reports tens of thousands to nearly a million such files showing up on affected PCs. Normally, a healthy Defender installation has one or two files in this folder (shown in the lead-in graphic). That makes it easy to check if a system is subject to this potential Defender Engine 1.1.18100.5 gotcha.

How to Check For Potential Defender Engine 1.1.18100.5 Gotcha

The complete directory path to check is:
C:\ProgramData\Microsoft\Windows Defender\Scans\History\Store
If  you see more than a handful of files there, you may be subject to the gotcha. It it’s chock-full of files and your C: drive is filling up, the gotcha is active! It’s OK to delete those files (Defender will make more), according to Brinkmann.

Brinkmann theorizes that the current Defender Engine version — namely 1.1.18100.5 — is responsible. He says MS is aware of the gotcha, and is planning a  fix with the next engine update. That new version should carry an ID of 1.1.18100.6, and be ready as soon as Thursday, May 6.

FWIW, I checked all of my Windows 10 PCs. While all of them are indeed running Engine version 1.1.18500.5, none of them is showing symptoms indicative of the gotcha. Clearly, it’s out there. But it’s not clear how widespread or active this gotcha may be. And it sounds like MS is already working on a fix that should do away with it completely.

At least, we don’t have to wait too long to find out if a fix is forthcoming. As I write this item, it could be just over 24 hours from release. For the record, Microsoft updates usually hit the Internet at 9:00 AM Pacific Time on release days. That’s about 26.5 hours from now.

Note Added May 5 Afternoon

A new engine build is already out,  and should download automatically to all Windows 10 PCs running Defender. I just found it already installed on my test PCs, to wit:

Potential Defender Engine 1.1.18100.5 Gotcha.new-engine

Note the new engine is out: 1.1.18100.6. Problem solved!

That was quick! Glad MS is on the ball today. Thanks to @WindowsInsider and the whole Windows Team.

Facebooklinkedin
Facebooklinkedin

DevMgr Gets View Devices by Driver Option

Here’s something new and interesting. Dev Channel Insiders can see a new View menu option in Device manager. That’s right: with Build 21370, DevMgr gets View Devices by Driver option.

The menu element is shown in the lead-in graphic for this story, above. To the left, find a long version of that same screencap. It’s menu-free and shows just under half of the total listing that appears.

Please note: you can see all drivers listed using oemnnn.inf names. In fact, these are assigned as drivers get installed. To the right, you see the true driver name — e.g. netwbw02.inf for oem1.inf –which tells you it’s a Bluetooth networking driver of some kind.

This Lenovo ThinkPad X380 Yoga has 119 drivers installed. That’s a pretty normal count for a Windows 10 PC.

As I look at my other Windows 10 PCs, I see driver counts as low as the low 80s to as high as the low 200s. Actually, that number depends on how many devices (both Microsoft and third-party) are installed in some specific Windows 10 image. Indeed, what’s present and accounted for is what shows up in such tools and their listings.

Is DevMgr Gets View Devices by Driver Option Good?

The purpose of the change, according to Sergey Tkachenko at WinAero.com, is to “make it easier to see what hardware is using which drivers.” I’ve grown fond of the GitHub project DriverStore Explorer (RAPR.exe) for that same purpose, but it is nice to get easy access to the OEM numbers associated with drivers as in this view. Any device name with a carat to its left (e.g. oem11.inf) is actually the root of a device tree. Expand same by clicking the carat and you see various PCIe, LPC and PMC controllers for which it is a parent.

This view is pretty handy for understanding how some hardware elements in a PC are related to others. In fact, this makes for an interesting, informative and useful addition to Device Manager. It’s rumored to be targeted for inclusion in the 21H2 “Sun Valley” release of Windows 10. That’s far enough out that it could easily change. Stay tuned, and i”ll keep you informed. DevMgr has always been a fave tool for me, so I’m more than just a little interested.

Facebooklinkedin
Facebooklinkedin

In-Place Repair Upgrade Gotcha

If you’ve been following my recent adventures with Dev Channel feature upgrades and WU updates lately, you already know I’ve been struggling a bit. Yesterday, when the 21370 build emerged, it installed just fine on my 2018-vintage Lenovo X380 Yoga. Alas, it got stuck at 0% download on my 2012-vintage Lenovo X220 Tablet. I simply couldn’t get WU to download the file. So I built an ISO for 21371 from UUPdump.net. Then I installed it by mounting the ISO, and running setup.exe from its root directory. Only this morning did I notice an in-place repair upgrade gotcha bit me. You can see it in the lead-in graphic for this story.

What Is the In-Place Repair Upgrade Gotcha?

A common Windows 10 repair technique is to run setup.exe from the same version of Windows against itself. Hence the term: “in-place repair upgrade.” This is really running an upgrade from setup.exe inside the next version ISO, but works the same way.

The gotcha, as shown in the story’s lead-in graphic, is that the Feature Upgrade info is absent from Update History. You can plainly see at left that the X220 is running 21370.1. But there’s no record of that install in the Update History at the right. It shows the preceding build — 21364, dated 4/21/2021 — as the most recent Feature Upgrade.

A Return to Normal Behavior Beats the Gotcha

I’m guessing that because Windows Update did not handle that upgrade, it also didn’t record it in Update History, either. Stands to reason, I presume. This is a go-to strategy for me when I cannot use WU to perform a Feature Upgrade. So I’ll just have to learn to live with that missing history entry when I take that alternate route.

Now that I know it works this way, I can understand what’s going on. Hopefully, it will shed some light on an apparent anomaly to other Windows Insiders. I’ll also take this opportunity to make a request of the Insider Team: Please change Update History behavior to record ALL Feature Updates applied to a PC, whether manually or through WU. Sounds easy, but may be a huge PITA. We’ll see how they respond!

Facebooklinkedin
Facebooklinkedin

Update Download Stuck Forces Interesting Maneuvers

Here’s something I’ve not run into before. In trying to update my production PC to KB5001391 I found the download phase of the update stuck at 0% indefinitely. “No problem,” thought I, “I’ll download the .MSU file from the Microsoft Catalog.” Yeah, right!

Update Download Stuck Forces Interesting Maneuvers.stuck-at-zero
Update Download Stuck Forces Interesting Maneuvers.stuck-at-zero

I guess the Catalog is smart enough to avoid duplicate, parallel downloads. It wouldn’t let me download the MSU file to that PC. So I jumped on one of my test machines, and downloaded the file there. Then I copied it over the network, and installed it by double-clicking its MSU file. This took a while longer than I was expecting (around 5 minutes or so) but it did work.

Why Update Download Stuck Forces Interesting Maneuvers

I can only speculate that WU informs the OS that it’s already downloading the requested KB item on that PC. Thus, clicking the download link from the catalog does nothing. That said, it worked as expected on a different PC, so I found a two-step workaround where a single step wouldn’t cut it. Please keep that in mind if you ever find yourself in this boat.

More Update Weirdness Follows

After the reboot to install KB5001391, I see it is installed in Update History. Nevertheless, Windows Update still shows me it’s available as an “Optional quality update…” (see screencap following).

Update Download Stuck Forces Interesting Maneuvers.2nd offer

Even though it’s already installed (and showing in Update History), I get another offer anyway. Sigh.

Of course, I am compelled to click the “Download and install” button to see what happens. When I do that, the Windows Update page comes back in about 30 seconds with nothing to download nor any status or error message to explain itself, either. I guess it figured out the update was already installed, and withdrew the offer. That’s a reasonably intelligent thing to do. Checking Reliability Monitor, I see no error reports about this there, either. So it looks like a clean save, so to speak. I’m glad!

Facebooklinkedin
Facebooklinkedin

Defender Update Download Circumvents Stuck 21364

It’s been a struggle to get the latest Dev Channel Insider Build updated lately. I’ve already described how KB 5001030 and KB5003397 aren’t working on my test machines. Lately, Defender has been stuck as well. That’s how I learned that a Defender update download circumvents stuck 21364.

Normally, you can simply open the Windows Security item in Settings → Windows Update. Next,  you can forcibly get Defender to update by clicking “Protection updates” under “Virus & threat protection updates.” Not this time! This mostly-infallible workaround throws an “update failed” error. It explains further it “can’t check for definition updates” (see lead-in graphic).

Shoot! I even tried the command line program MpCmdRun.exe. First, I cleared the Defender signatures (that worked). Then I tried to download a new set (that failed). This time, apparently update downloads are well and truly stuck. For the record neither the Update Troubleshooter, nor the TenForums WU Reset batch file worked, either.

Thus: Defender Update Download Circumvents Stuck 21364

Relief is available from the “Latest Security Intelligence…”  MS Security Intelligence web page for Defender. I provide its URL because it’s more informative than that title: https://www.microsoft.com/en-us/wdsi/defenderupdates. If you scroll down this page, you’ll find a section entitled “Manually Download the Update.” Follow the link that matches your Windows 10 version and you’ll download a program named mpam-fe.exe.

If you run this program it will (a) update your Defender signatures, but (b) provide no interaction or feedback. That holds, even if you run the program as administrator. The only way to tell it worked is to check the timestamp for Last Update in Windows Security → Virus & threat protection under the “Virus & threat protection settings.” After you run this program, you’ll see a timestamp that reflects a the recent past. It’s too stealthy for my sensibilities, but it does work.

I’m OK without CUs and Such, But…

When update trouble rears its head on Insider Previews, I’ve learned to cope. I’ve also learned it’s essential to be patient when MS goes into “break-fix” mode. That is, when they acknowledge something is broken and promise to fix it “soon.” And to the Insider Team’s credit most such fixes come sooner rather than later.

But I can’t accept an inability to update Defender on my test machines, where’s its my only anti-malware defense. That’s why I’m glad I’ve now learned how to manually download and install signatures to keep safe, even when updates gets stuck, as they sometime do. So while they’re still stuck for 21364, I’ll use this web page to update daily just to be safe…

Note Added 6 Hours Later

Just for grins, I tried out the old Windows Update MiniTool (WUMT) on my stuck test machines. It was happy to download and install the Defender updates for me. But it did not “see” the two problem KBs until I resumed updates in WU. Acting on advice from the Insider Team that I should be able to install the .NET update, I tried that inside WUMT on my Lenovo X220 Tablet and X380 Yoga It reported it was downloading, then installing, for each of the two problem updates. But alas while KB5003397 succeeded on the X220 Tablet, it failed on the X380 Yoga. And KB5001030 worked on neither machine, even using WUMT. Go figure!

Facebooklinkedin
Facebooklinkedin

21364 Update Woes Continue

OK, then: i’ve recently reported a documented issue with KB5001030. It’s a CU Preview for .NET 3.5 and 4.8 and has been documented in the 21364 release announcement as a “known issue.” But now, a new cumulative update KB5003397 — a so-called “do-nothing update” which “does not include anything new and is designed to test our servicing pipeline” is out. However, my 21364 update woes continue because now I can’t install either one of these new updates. Sigh.

Nothing happens, in fact, when I try to update my Lenovo X220 Tablet. As the lead-in graphic above shows, it hangs while downloading at 0% completion. Running the update troubleshooter or even the TenForums Update Reset Batch Script doesn’t help either. Thus I say: my Dev Channel machines are stuck, going nowhere fast!

What Does 21364 Update Woes Continue Mean?

It means I can’t update either of my Dev Channel Insider Preview test machines successfully right now. I also think it means that I’m waiting on the next Feature Upgrade (a new version, in other words) to get things moving again. It’s a little hard to tell.

My gut feeling is the update pipeline is currently blocked for Dev Channel images (on my two test machines, at least). Usually, when things go sideways with Insider Preview updates I can figure out some way to get around the roadblock, though.

Later on today, or perhaps tomorrow, I’ll visit UUPdump.ml and see if they’ve got a 21364 image that can slipstream in those two troublesome updates. If so, I’ll build an ISO and use it to perform an in-place repair upgrade as a workaround. Right now, I’m increasingly convinced it might be my only way around this roadblock.

Stay tuned! I’ll report back and let you know if that works. It’s possible that working offline on the image might get around whatever is interfering online (it often does). We’ll see…

Facebooklinkedin
Facebooklinkedin

RTFM Illuminates 21364 Install Error

If you’re going to walk the Windows Insider path, it really, really, really helps to read Build announcement blog posts. These pop up like clockwork on the Windows Blogs. Thus it was for Build 21364, the latest Dev Channel Insider Build released April 21. Although my problem didn’t make the first cut of that blog post, the Insider Team quickly added a note about it when reports started flooding in. It shows up as the lead-in graphic above, in fact. And indeed it shows that RTFM Illuminates 21364 Install Error by taking responsibility for install issues with KB5001030, and promising a forthcoming fix.

After I got through the upgrade install, a notice to install KB5001030 Cumulative Update Preview for .NET Framework 3.5 and 4.8 appeared on my two Dev Channel PCs. On one of them, it sailed through to completion (the Lenovo X220 Tablet, vintage 2012). On the other (the Lenovo X380 Yoga vintage 2018) it failed repeatedly. Here’s what WU says about this on the X380:

RTFM Illuminates 21364 Install Error.WUerror

Even after a complete WU reset, the error persists. That’s when I re-checked the announcement post…

How RTFM Illuminates 21364 Install Error

You’ve already seen what I found in the blog post when I went back to check again. This terminated my WU troubleshooting immediately. Thanks to this text “We are working on a fix for a future build.” I knew this was not something I could fix on my own.

I must say the Insider Team is doing a bang-up job lately in acknowledging and responding to issues as they break. In that same vein, the issue I reported here in my Tuesday item about “News & Interests Follies” has already been fixed. Both of my Dev Channel test machines now have a working News & Interests item that behaves as it should. Still waiting on same on my Beta and Release Preview channel test machines, though…

In closing, I will say I’ve learned through experience to read announcement blogs for new Insider releases carefully. This is the first time that a return to said announcement has conferred additional illumination. But it’s emphatically not the first time such an announcement has informed me of pending issues, so I can steer clear or work around them. Good stuff!

Facebooklinkedin
Facebooklinkedin

News & Information Insider Follies Continue

OK, then. It was supposed to be easy. For both Beta Channnel (Build 19043.962) and Release Preview (19042.962) recent CUs are supposed to include News & Interests, too. (See the lead-in graphic for the release announcement blog post.) As I reported here last Friday, all Dev Channel Insiders who installed Build 21359 were finally on equal footing for this nifty notification bar widget. But alas, it seems that News & Information Insider follies continue. In other words, I updated to these latest versions but see no sign of N&I on either Taskbar. Sigh.

To What End Do News & Information Insider Follies Continue?

No good end, I suppose. But it’s not like I haven’t seen this before. And it’s not just me, either: I see other Insiders reporting similar experiences in the WIMVP  Yammer forums and on Feedback Hub. Obviously, there’s something interesting going on here. I’m not sure if it’s pervasive or spotty, but at least it’s widespread enough that others have noticed the same thing I did.

Gosh, though: I’m a little disappointed. I’d been getting ready to start messing with the manage interests controls in Edge. The My Interests page, Discover Interests settings govern what shows up in the supporting News & Interests detail. I’d hoped to do some tweaking on my Beta Channel and Release Preview test machines.

Hoping for Response or Help Soon!

Given that the Insider Team is already aware of this issue, I’m guessing it will be addressed soon. Whether it’s in a forthcoming CU or quality update sometime remains TBD.

All I can say at this point is that N&I has proved a great deal more interesting to install and use than I’d expected it to be. I’m wondering if its Edge tie-in isn’t somehow connected to its MIA status. When I saw I needed to update Edge to Version 90.0.818.42 this morning, I was half-way convinced this would make N&I visible. But alas, the pessimistic half of that sentiment proved true.

Stay tuned! I’ll update this post when a fix, or some other official response, appears. And today, that’s how things go in Windows World.

Note Added April 21 (1 Day After Original Post)

In response to my inquiry to the Insider Team, I got a tweet back that reads “It’s slowly rolling out for those builds. Appreciate your patience. :)” Now we know that it should show up on all 19042 and 19043 (Release Preview and Beta Channel builds, respectively) sometime soon, but not just yet. Better to know, than to wonder fruitlessly!

My Insider contact clarified further that “rolling out” means a gradual, incremental release, not an all-at-once available-to-everybody release. Helps to understand the terminology, right? Now I know, and hopefully you do too (if you didn’t know already).

Facebooklinkedin
Facebooklinkedin