Cannot Import Update to Azure IoT Hub Device Update: Internal Server Error

Matthew Farstad 5 Reputation points
2024-02-26T14:25:21.3233333+00:00

I'm attempting to import an update to device update service in IoT Hub. I'm getting an internal server error with this trace ID. What is the issue?

1a8f0229c7b24e0489ef64d4e9de397f

Azure IoT Hub
Azure IoT Hub
An Azure service that enables bidirectional communication between internet of things (IoT) devices and applications.
1,134 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Andrew Brown (W+D SERVICES) 5 Reputation points Microsoft Employee
    2024-02-29T16:48:19.4633333+00:00

    Thank you very much for reaching out regarding this issue. We had seen this week in telemetry that one of our customers had been encountering import failures due to anti-malware scanning, but we by design do not collect information that allow us to directly identify or contact customers. So I'm glad we can investigate this with you and hopefully resolve this issue.

    If possible, it would be great to get a copy of the update you are submitting which is causing what appears to be a false positive. I'd like to provide that directly to the anti-malware scan team so they can investigate in more detail (and, if benign, ensure that it no longer is flagged as malware). , is there a recommended approach for file sharing like this, if @Matthew Farstad consents?

    Another helpful thing would be to get additional error information. Can you take a look at the last entries on this documentation page: https://learn.microsoft.com/en-us/azure/iot-hub-device-update/device-update-error-codes#device-update-content-service, and in particular, the part about the error message containing the description of the malware signature, and a file hash for each file where the signature was detected? The file hash is intended to help our customers figure out which file(s) are being flagged, so I don't need that part, but the description of the malware signature can help us narrow down where the potential false positive is occurring on our side. That information should be present in the Azure portal UI in the Import History for any import attempts that fail due to anti-malware scan.

    One final note: we have considered in the past making anti-malware scan optional, for cases such as this. Our initial implementation biased towards being more secure at the potential cost of occasional false positives blocking import. However, we are now actively planning for how we could make anti-malware scan optional, though I don't yet have a timeline to share.

    1 person found this answer helpful.