SCCM Client HTTP Error sending DAV request HTTP code 503 content download issue

This is a quick blog post on an issue that I recently looked at regarding the client issue with content download from the distribution point.

Clients in one specific boundary could not able to download the content from its assigned distribution point.

Though the client was healthy, the inventory cycle is up to date but content download from DP having issues.

Looking at the client logs, especially the DataTransferService.log which is responsible for tracking the information about the content download from the distribution point.

Following the error code from the DataTransferService.log

[CCMHTTP] ERROR INFO: StatusCode=503 StatusText=

GetDirectoryList_HTTP Error sending DAV request. HTTP code 503, status 'Service Unavailable'

[CCMHTTP] ERROR: URL=http://SGCM01:80/SMS_DP_SMSPKG$/Content_18138fe6-0b71-4590-b6ac-16d6af0ba673.1, Port=80, Options=1216, Code=0, Text=CCM_E_BAD_HTTP_STATUS_CODE

DTSJob({3DED9C85-4798-4D9B-A857-C9F933DF2C74}):CDTSJob::ProcessManifestCallback - Error retrieving manifest (0x800705b4).


I have tried accessing the URLhttp://SGCM01:80/SMS_DP_SMSPKG$/Content_18138fe6-0b71-4590-b6ac-16d6af0ba673.1 in the browser, but the request did not succeed.

Based on the above error codes and the URL connectivity, the issue seems to be related to IIS on the distribution point.

After logging to the distribution point, and looking at the IIS configuration, there are a couple of security prompts (bit9) on the server about the wmiprvse.exe and w3wp.exe process.

On the IIS server, application pools, SMS distribution points pool is stopped.


For clients to be able to download the content successfully, this application service pool must be running.

The application pool service will fail immediately after the start. Upon the investigation, looking at the event viewer, there was a security agent (bit9) installed on the server which was blocking the application pool.

Looking at the bit9 security agent, there were so many errors about this specific IIS pool issue.

After adding the following paths to the exclusion list in bit9, the function started working and clients were able to download the content as usual.

  • %windir%\System32\inetsrv\w3wp.exe
  • %windir%\SysWOW64\inetsrv\w3wp.exe

Microsoft has published an article on the Configuration Manager Current Branch Antivirus Exclusions . This is must read article to follow for a successful device management solution by SCCM.

Hope you find this blog useful.


Configuration Manager Current Branch Antivirus Exclusions

Recommended antivirus exclusions for Configuration Manager site servers, site systems, and clients

Leave a Reply