Interpret Windows System Health Validator Entries in Log Files
Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012
When NPS is configured as a Network Access Protection (NAP) policy server, and one or more health policies are configured with the Windows Security Health Validator (WSHV), NPS logs statement of health responses (SoHRs) in the NPS log file or to a Microsoft® SQL Server™ database, depending on your accounting configuration.
You can use the information in this topic to interpret WSHV entries in NPS accounting logs.
Diagnostic codes
The WSHV entries contain elements that correspond to components that might be installed or enabled on client computers, such as firewalls, antivirus applications, and Windows Automatic Updates.
The WSHV log file entries always present the WSHV list of elements as diagnostic codes, and these codes are always presented in the following order:
Firewall (On/Off)
Antivirus - On/Off
Antivirus - Up-to-date status
Antispyware - On/Off
Antispyware - Up-to-date status
Automatic Updates (On/Off)
Security Updates - Compliance code
Security Updates - Severity
Security Updates - Legitimate Source (Windows Update, Windows Server Update Services, or Microsoft Update)
For item 9 above, the following codes are possible values in the log file.
Update source | Diagnostic code |
---|---|
Windows Update |
0x00004000 |
Windows Server Update Services (WSUS) |
0x00010000 |
Microsoft Update |
0x00020000 |
Important
If the configuration allows the receipt of updates from more than one source, the log file entry combines the codes. For example, if both Windows Update and Microsoft Update are legitimate sources, the log file code is 0x00024000.
When each of the other eight elements is evaluated as compliant by NPS, the diagnostic code is 0x0. When an element of the SHV is compliant, the corresponding component on the client computer is either on, as in the case of a firewall application, or it is up-to-date, as in the case of Windows Automatic Updates or signatures for an antispyware application. If the Windows SHV is not configured to enforce any specific element, such as Firewall or Security Updates, log entries for the element are not relevant and should be ignored.
The Security Updates element provides a severity rating. To interpret the severity rating when reviewing the NPS log file, you can use the following severity levels.
Severity level | Code in NPS log |
---|---|
Unspecified |
0x0040 |
Low |
0x0080 |
Moderate |
0x0100 |
Important |
0x0200 |
Critical |
0x0400 |
Error codes
On the client computer, the NAP agent can receive errors from the Windows System Health Agent, which monitors the components on the client operating system, such as firewalls and antivirus applications. When the NAP agent sends a statement of health (SoH) to NPS, the statement contains information about errors on the client computer.
In turn, NPS records the error in the NPS log file.
The following table provides the possible error codes that can be logged by NPS.
Error code | Description |
---|---|
0xC0FF0001 |
E_MSSHV_PRODUCT_NOT_ENABLED A system health component is not enabled. |
0xC0FF0002 |
E_MSSHAV_PRODUCT_NOT_INSTALLED A system health component is not installed. |
0xC0FF0003 |
E_MSSHAV_WSC_SERVICE_DOWN The Windows Security Center service is not running. |
0xC0FF0004 |
E_MSSHV_PRODUCT_NOT_UPTODATE The signatures for a specific system health component are not up to date. |
0x00FF0008 |
E_MSSHAV_WUA_SERVICE_NOT_STARTED_SINCE_BOOT The Windows Server Update Services has not started. An administrator must try to start the service manually. |
0xC0FF000C |
E_MSSHAV_NO_WUS_SERVER The Windows Update Agent on this computer is not configured to synchronize with a Windows Server Update Services server. An administrator must configure the Windows Update Agent service. Click the Try again button after configuration is done for the changes to take effect. |
0xC0FF000D |
E_MSSHAV_NO_CLIENT_ID Windows failed to determine the Windows Server Update Services client ID of this computer. |
0xC0FF000E |
E_MSSHAV_WUA_SERVICE_DISABLED The Windows Update Agent service has been disabled or not configured to start automatically. An administrator must enable the service. |
0xC0FF000F |
E_MSSHAV_WUA_COMM_FAILURE The periodic scan of this computer for security updates failed. An administrator must ensure that a Windows Server Update Services server is available and that the Windows Update Agent on this computer is configured to synchronize with the server. |
0xC0FF0010 |
E_MSSHAV_UPDATES_INSTALLED_REQUIRE_REBOOT Security updates have been installed and require this computer to be restarted. Please close all applications and restart this computer. |
0xC0FF0012 |
E_MSSHV_WUS_SHC_FAILURE The NPS server failed to validate the security update status of this computer. An administrator must ensure that a Windows Server Update Services server is available and that the Windows Update Agent on this computer is configured to synchronize with the server. |
0xC0FF0014 |
E_MSSHV_UNKNOWN_CLIENT Unknown client |
0xC0FF0017 |
E_MSSHV_INVALID_SOH The Windows Security Health Validator did not process the latest Statement of Health (SoH) because the SoH is not valid. |
0xC0FF0018 |
E_MSSHAV_WSC_SERVICE_NOT_STARTED_SINCE_BOOT The Windows Security Center service has not started. An administrator must try to start the service manually. |
0xC0FF0047 |
E_MSSHV_THIRD_PARTY_PRODUCT_NOT_ENABLED A third-party system health component is not enabled. |
0xC0FF0048 |
E_MSSHV_THIRD_PARTY_PRODUCT_NOT_UPTODATE The signatures for a specific third-party system health component are not up to date. |
0xC0FF004EL |
E_MSSHAV_BAD_UPDATE_SOURCE_MU This computer is not configured to receive security updates from a source approved for this network. An administrator must configure the Windows Update Agent service to receive updates from Microsoft Update. |
0xC0FF004FL |
E_MSSHAV_BAD_UPDATE_SOURCE_WUMU This computer is not configured to receive security updates from a source approved for this network. An administrator must configure the Windows Update Agent service to receive updates from Windows Update or Microsoft Update. |
0xC0FF0050L |
E_MSSHAV_BAD_UPDATE_SOURCE_MUWSUS This computer is not configured to receive security updates from a source approved for this network. An administrator must configure the Windows Update Agent service to receive updates from Windows Server Update Services or Microsoft Update. |
0xC0FF0051L |
E_MSSHAV_NO_UPDATE_SOURCE The Windows Update Agent on this computer is not configured to receive security updates. An administrator must configure the Windows Update Agent service. The NAP agent might have to be restarted for changes to take effect. |
Determining the client operating system
When you review Windows SHV entries in the NPS log file, you can determine whether the client computer is running Windows Vista or Windows XP in one of two ways:
Examine the field OS-Version in the NPS log.
Count the number of diagnostic codes recorded in the log file. If the client computer is running Windows Vista, NPS logs all eight diagnostic codes. If the client computer is running Windows XP, NPS logs only six diagnostic codes because the monitoring of antispyware status is not supported in WSHV for Windows XP.
Example log file entries
The first example log file entry depicts an entry for a client computer running Windows Vista that is not configured to synchronize with a Windows Server Update Services server. The text in italics is added to clarify the meaning of the diagnostic codes and does not normally appear in NPS log entries.
First example log file entry
Machine testclient was quarantined.
OS-Version = 6.0.5495 0.0 x86 Workstation
Fully-Qualified-Machine-Name = <undetermined>
Fully-Qualified-User-Name = <undetermined>
NAS-IP-Address = <not present>
NAS-IPv6-Address = fe80::e1dc:49f:af27:d0c1
NAS-Identifier = testserver
Called-Station-Identifier = <not present>
Calling-Station-Identifier = <not present>
Account-Session-Identifier = F1290E5E59241D44A57539224835F0FDC46427E9FBCAC601
Proxy-Policy-Name = Use Windows authentication for all users
Policy-Name = Access Denied
Quarantine-Session-Identifier =
{5E0E29F1-2459-441D-A575-39224835F0FD} - 2006-08-28 23:44:32.391Z
Quarantine-Help-URL = <undetermined>
Quarantine-System-Health-Result =
Windows Security Health Validator
NonCompliant
None
(0x0-) Firewall is compliant
(0x0-) Anti Virus is compliant
(0x0-) Anti Virus signatures are compliant
(0x0-) Anti Spyware is compliant
(0x0-) Anti Spyware signatures are compliant
(0x0-) Automatic Update is compliant
(0xc0ff000c-The Windows Update Agent on this computer is not
configured to synchronize with a Windows Server Update Services
server. An administrator must configure the Windows Update Agent
service. Please click the 'try again' button after configuration is
done for the changes to take effect.) Diagnostic code for Security Updates from Diagnostic Code table
(0x40-) Unspecified Severity Level from Severity level table
(0x00004000-) Legitimate update source is Windows Update
Second example log file entry
The second example log file entry depicts an entry for a client computer running Windows Vista that is configured to use the Windows Security Center for the firewall, antivirus, antispyware and Automatic Updates. Because Windows Security Center is disabled, as is detailed in the log file entry, the diagnostic codes for the Windows SHV do not have meaning and should be ignored.
Machine testclient was quarantined.
OS-Version = 6.0.5495 0.0 x86 Workstation
Fully-Qualified-Machine-Name = <undetermined>
Fully-Qualified-User-Name = <undetermined>
NAS-IP-Address = <not present>
NAS-IPv6-Address = fe80::e1dc:49f:af27:d0c1
NAS-Identifier = testserver
Called-Station-Identifier = <not present>
Calling-Station-Identifier = <not present>
Account-Session-Identifier = 32049473A12646448AB5DCFD9BF69271B0477E2E58CCC601
Proxy-Policy-Name = Use Windows authentication for all users
Policy-Name = Access Denied
Quarantine-Session-Identifier = {73940432-26A1-4446-8AB5-DCFD9BF69271} - 2006-08-30 17:17:33.585Z
Quarantine-Help-URL = <undetermined>
Quarantine-System-Health-Result =
Windows Security Health Validator
NonCompliant
None
(0xc0ff0003-The Windows Security Center service is not running.)
(0x0-)
(0x0-)
(0xc0ff0003-The Windows Security Center service is not running.)
(0x0-)
(0xc0ff0003-The Windows Security Center service is not running.)
(0xc0ff000c-The Windows Update Agent on this computer is not configured to synchronize with a Windows Server Update Services server. An administrator must configure the Windows Update Agent service. Please click the 'try again' button after configuration is done for the changes to take effect.)
(0x40-)