It took 36 hours, but they came clean. InfoWorld Woody on Windows Rod Trent notes on WindowsITPro that there’s a PowerShell script that will go out an
[See the full post at: Microsoft acknowledges permission problems with MS16-072 patches KB 3159398, 3163017, 3163018, 3163016]
![]() |
Patch reliability is unclear, but widespread attacks make patching prudent. Go ahead and patch, but watch out for potential problems. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Microsoft acknowledges permission problems with MS16-072 patches KB 3159398, 3163017, 3163018, 3163016
Home » Forums » Newsletter and Homepage topics » Microsoft acknowledges permission problems with MS16-072 patches KB 3159398, 3163017, 3163018, 3163016
- This topic has 43 replies, 5 voices, and was last updated 8 years, 10 months ago.
AuthorTopicwoody
ManagerJune 16, 2016 at 8:21 am #40748Viewing 42 reply threadsAuthorReplies-
ch100
AskWoody_MVPJune 16, 2016 at 8:51 am #40749Isn’t the resolution proposed what I said here that it has always been the recommended configuration?
-
woody
Manager -
Doug
Guest -
woody
Manager -
PkCano
GuestJune 16, 2016 at 12:47 pm #40753When people try to do too many things at once, the usual result is that they don’t do anything well. That seems to be the case with Microsoft in its desperate attempt to salvage itself.
All operating systems have some glitches at first, then things smooth out for the long run. But this chaos has been going on with MS every time they issue updates month after month. And its not only for its new operating system, but for its older ones that have been relatively stable over the years. The quality control has gone to heqq as the quantity of their “projects” has increased asymptotically.
This is one of the reasons (along with privacy issues some of us older people can’t deal with) I have been hesitant to move to Win10 with its forced bundled updates.
-
NotReallyBob(fromanothercomputer)
GuestJune 16, 2016 at 3:22 pm #40754I’ll quote one of my old posts:
Microsoft rapid fires OSes at us because XP was around too long resulting in bad Vista, 7 was good because:
microsoft: “We rushed a brand new OS in only 3 years!”
reality: “You fixed vista in SP1, and then you spent 3 whole years making Vista 2.0(Windows 7) on that progress, and lost the bad rep of the name vista”microsoft: “Windows 8 will be great because we waited 3 years, we remember last time, we don’t have to try at all, we are golden”
reality: “8 was bad because you changed everything and told people. ‘no you do not hate it you love it! remember?'”microsoft: “NEW OS, NOT WINDOWS 8! marketing data! (maniacal laughter) We brought back / mangled the start menu! (maniacal laughter) BING! (tracking sounds)”
reality: “Ugh… +(frustrated grinding sound almost like teeth)”microsoft: “We have too many different operating systems to support! How could this have happened??!”
reality: “duh!” -
ch100
AskWoody_MVPJune 16, 2016 at 3:37 pm #40755The KB article explains clearly what is the issue and that the Group Policies for those administrators who experience problems were not set according to the best practices in the first place.
The issue is that the security context for User Group Policy has changed from user (which can be an unpriviledged/non-admin account) to computer to enhance the security overall. A computer is a user in Active Directory, i.e has its own user account and a randomly generated password which by default changes every 30 days. Being a user, the computer account, commonly seen in the permissions as followed by the dollar $ sign, is a member of Authenticated Users which needs to be able to at least read the policy, not necessary to apply it, as this will still happen in the user context as normal.
It is not a faulty patch, it is enforcing security as I believe it was always meant to be. So in that sense it resolves an issue which was never addressed until now.
The recommendation was always that Authenticated Users should have Read access at minimum, but this can be worked around by adding the exact computer accounts and Domain Controllers instead which makes the configuration complex, required sometimes for compliance reasons.
I don’t think Microsoft has any reason to reissue the patch as it is not a faulty patch, unless it is for PR reasons. Technically Microsoft is not at fault.
The only thing that Microsoft could and should have done better was to post the information in the original revision of the article BEFORE administrators installing the update and experiencing problems. -
ch100
AskWoody_MVPJune 16, 2016 at 3:42 pm #40756@PKCano
“When people try to do too many things at once, the usual result is that they don’t do anything well. That seems to be the case with Microsoft in its desperate attempt to salvage itself.All operating systems have some glitches at first, then things smooth out for the long run. But this chaos has been going on with MS every time they issue updates month after month.”
Absolutely correct. Unfortunately it is the nature of the industry with fast pace changes which makes things as they are. Sometimes I am asking myself how the hardware manufacturers can keep up with the changes in the industry, offering in most cases reliable enough products.
Or how Woody is able to write a 1000 pages book every year, while at the same time writing for InfoWorld and maintaining this site so effectively -
ch100
AskWoody_MVP -
Doug
GuestJune 16, 2016 at 4:16 pm #40758Ridiculous? I’ve been saying that since December; they haven’t had a month go by without breaking things starting at least then.
I wish I could run into Satya Nadella and ask him two things:
1. Imagine people had plenty of choices between Microsoft and other vendors for an operating system and an Office app. What do you believe would make them choose you over others? And more importantly, what would be the reason you’d *want* them to choose you, not the reason you believe they would?
2. If I offered you the best meal in the world, money-no-option at the end of two months, could you make those two consecutive months go by without a broken patch for Windows/Office,and without shoving Windows 10 down the throats of those who have already declined it? Note: You can’t issue no patches and get around it that way.
-
Doug
GuestJune 16, 2016 at 4:19 pm #40759If it isn’t faulty, then at the end of the patch, Microsoft should add a subroutine that scans for the GPO issue within Active Directory, and resolves it automatically by correcting the necessary permissions. I would call *that* expected behavior.
I shouldn’t have to manually correct something like that; Microsoft has people with much higher IQs than mine working on their dev teams.
-
woody
Manager -
lizzytish
AskWoody LoungerJune 16, 2016 at 8:27 pm #40761Godonya Woody and CH100….. Well done! You know think perhaps MS are constantly watching and reading all this……… otherwise how could they have been able to come up with your exact fix, CH100?
Or have I missed something in my limited knowledge ?Know I’m certainly not up to your league, but most certainly appreciate knowing that you are around!!
Keep it up guys (ooops I believe that word is not politically correct in some parts of the world!)
We all need you! LT -
ch100
AskWoody_MVPJune 16, 2016 at 9:57 pm #40762 -
ch100
AskWoody_MVPJune 16, 2016 at 10:00 pm #40763@Doug If Microsoft would change permissions configured on purpose by administrators in a certain way, even if not optimally, then you watch the backlash. Maybe a notification would be more useful in this sense, inviting people to update the permissions. Their focus is elsewhere though…
-
ch100
AskWoody_MVPJune 16, 2016 at 10:17 pm #40764Maybe we should set the record straight about GPOs and their configuration, although this subject is more suitable for a Technet forum.
Back in 2000 when Windows 2000 Active Directory was released, Microsoft designed the Group Policies with the intention to have them filtered based on Security Groups and here is from where the name comes. Because most System Administrators preferred a different configuration which was to assign Group Policies based on Organizational Units with the default security configuration, which means Authenticated Users Read & Apply, Microsoft changed their advice since then in that sense which was less complex and less error-prone. The name remained though.
Some configurations do not work with only assigning GPOs based on OUs and there is a need for Group Security filtering, which means changing the default security from Authenticated Users Read & Apply to a different custom security group.
Here is the problem. Because of misunderstanding the “fine print”, Authenticated Users gets removed entirely by administrative action which removes the access to the policy from the computers requiring it. The computers are members of Authenticated Users but not members of the other group configured by administrators.
The correct approach is to remove Apply from Authenticated Users and leave Read access, while configuring Apply for the custom group. Alternatively, the administrator can identify the exact computers and include them in the custom group, but this is likely to generate errors and is labor intensive.
In addition, sometimes Domain Admins or other admin groups need to be configured with Deny Apply access, to avoid being locked out of the configuration.Microsoft worked around this limitation some time ago and included the Enterprise Domain Controllers in the ACLs for Group Policies, which in general is enough, but with the new security update for Group Policies, only giving access to the Domain Controllers appears not to be enough.
End of story, if there are no extreme restrictions related to compliance in the environment, Authenticated Users should NEVER have Read access removed from any Group Policy Object.
In case of doubt or political interference from management, maybe a Microsoft Support Call and a PFE opinion would resolve the issue to everyone’s satisfaction.
-
woody
Manager -
lizzytish
AskWoody Lounger -
toliver2112
GuestJune 17, 2016 at 7:45 am #40767Definitely remarkable. It sure would have been nice to know this up-front when the SB was released, instead of people finding out after-the-fact.
Microsoft claims this is a by-design behavior in the “known issues” section of the revised general announcement at https://technet.microsoft.com/en-us/library/security/ms16-jun but if this was by-design, why not disclose it before people started installing it and caused problems in their environment?
Not a good way to do business, but lately that’s been par-for-the-course with updates. Shame.
-
woody
Manager -
toliver2112
GuestJune 17, 2016 at 7:58 am #40769That is very well said, but I have a caveat to add:
When you use the “Security Filtering” section of GPMC’s “Scope” tab on a GPO to remove “Authenticated Users” and add a group to filter the GPO, doing so explicitly removes the Read permissions for AU from the GPO. This is evident when you look at the “Delegation” tab on the same object: In the “Allowed Permissions” column, whatever group (including AU) that is subject to the filter will show “Read (from Security Filtering)” in the list of permissions.
As a result, whether or not this was all by design and has now been corrected by the application of this update, many filtered GPOs have improper permissions assigned and, until now, this was not entirely well-documented by Microsoft (and it still isn’t, from what I’ve seen). Now people are scrambling to manually correct something that has been perpetuated by Microsoft’s own toolset.
I would propose that Microsoft should update the function of GPMC so that when a GPO is filtered, the administrator is warned that AU still needs explicit “Read” permissions granted to it or, better yet, GPMC ensures that permission is retained on the GPO unless the administrator wants it removed (and now, why would anyone want that at all?). Any chance someone at Microsoft is listening?
-
Doug
GuestJune 17, 2016 at 8:03 am #40770@ch100 – Perhaps some notification like the Sharepoint one that reminds you to run PSConfig, and includes an option letting you scan and fix what may be needed. Either way, there shouldn’t be a hidden “gotcha”, and Microsoft could totally leverage their patch announcements to note these things –I’m subscribed to their monthly announcements.
“Focus”. That’s an interesting word to note, because my wish over the past several years was that Microsoft would focus on listening more. Listen to IT people some, and you get evangelists. People only too happy to make sure people who trust them run your software, at home, in the enterprise; those recommendations go a long way. I also have no problem with them attempting to become “agile developers”, but when you let go a huge portion of your QA staff, that shows you’re expecting your company to (to use an arcane Biblical reference) “make bricks without straw”. Agility *requires* good QA.
-
d9
GuestJune 17, 2016 at 8:06 am #40771This is likely a silly question, but I thought I should still ask for the sake of clarification…
The situation created by installing KB3159398 has no bearing on policies that are configured directly on the local machine using gpedit– correct? My PCs are not on a domain, and they aren’t even really networked together (apart from sharing the same internet access from the router).
As far as gpedit is concerned, I’ve only made the change to disable the OS upgrade through WinUpdate on my Win7 PC. But Win10 is another story entirely, as I’ve used it on that machine to wrangle control of the PC back from MS.
Apart from the usual caveats about accepting the latest updates, I shouldn’t have to worry about breaking any changes made via gpedit on those machines since I’m not attached to a domain– correct?
-
Doug
GuestJune 17, 2016 at 8:08 am #40772I don’t know if it’s the quantity of their projects. However, that plan to let go 15,000 staff included a let go of a lot of QA folks; developers as I understand it are now required to QA their own code in a number of cases.
Here’s the problem with that scenario:
Dev doing QA: I looked at my code. I tested to ensure that when I perform function A, that it performs output B like desired.
QA doing QA: I looked at a description of what function A is supposed to do. I tested to ensure that what the user expects happens and then I also tried performing functions C, D, and E to ensure output B either happens, or provides clear output to the user on why things didn’t work, and that nothing broke. I also checked to ensure function A makes sense to the user so they aren’t going to try to do C, D, and E unless they’re fairly clueless.
I’m not a coder, so my language here isn’t precise (I’m a hardware guy with some CLI and scripting capabilities). But I can still see why a QA person and a dev are not the same things, and if you ask one person to do two jobs, you’ll probably experience a lot of pain, frustration and stress. -
Doug
Guest -
woody
Manager -
woody
Manager -
toliver2112
GuestJune 17, 2016 at 8:38 am #40776Hmm… Maybe adding Read permissions for Authenticated Users isn’t the best thing to do:
Lifted directly from the KB3163622 article, “Before MS16-072 is installed, user group policies were retrieved by using the user’s security context. After MS16-072 is installed, user group policies are retrieved by using the computer’s security context.”
“To resolve this issue, use the Group Policy Management Console (GPMC.MSC) and follow one of the following steps:
•Add the Authenticated Users group with Read Permissions on the Group Policy Object (GPO).
•If you are using security filtering, add the Domain Computers group with read permission.”Authenticated Users should already have Read permissions if Security Filtering is not employed, so that shouldn’t be an issue for most GPOs. However, for filtered GPOs, the Domain Computers should be used. I wonder how many people will just use the easy button (Authenticated Users) instead of the right way (Domain Computers).
-
toliver2112
GuestJune 17, 2016 at 8:41 am #40777“The only thing that Microsoft could and should have done better was to post the information in the original revision of the article BEFORE administrators installing the update and experiencing problems.”
The only thing? Perhaps. BEFORE? Most definitely! This is another example of Microsoft’s customer service at its infernal worst.
-
d9
Guest -
NotReallyBob(fromanothercomputer)
GuestJune 17, 2016 at 10:01 am #40779The under the hood changes to windows 10 (ignoring the GUI) are hardly worth a whole new OS. The under the hood changes 7 vs 8.x (again, ignoring the GUI) are huge.
My point is they are different dev branches and microsoft has trouble with how many there are and yet is the cause of the problem.
-
NotReallyBob(fromanothercomputer)
Guest -
Devin
GuestJune 17, 2016 at 2:40 pm #40781Exactly. GPMC ought to do the right thing. Why bother have a security filtering option if using it often (usually?) requires you then go to the delegation tab and do manual advanced cleanup. If GPO requires Authenticated Users have read access, then removing read access should be the advanced operation, at which point it’d be fine to go to the advanced tab to make that advanced customization. Or get rid of the security filtering screen altogether and use the delegation tab always.
-
ch100
AskWoody_MVPJune 17, 2016 at 4:39 pm #40782@toliver2112
You can see the full extent of the permissions only on the Advanced tab. Even there, if you reset the permissions to the schema default, you will see “Special” instead of Read & Apply for Authenticated Users. Read & Apply is documented in few KBs and is enough. I assume it is a GUI bug, as I tried to use command-line tools for AD ACLs to understand what is missing and there was nothing missing there.
The reason for the whole confusion which you mentioned is that GPMC shows something different under Delegation when compared with the Advanced tab. I don’t know if it is documented anywhere, but it is all over the place, on Technet, forums, own experience like a lot of things IT. -
ch100
AskWoody_MVP -
ch100
AskWoody_MVPJune 17, 2016 at 4:48 pm #40784@toliver2112
I explained in detail that Authenticated Users covers Domain Computers and if an admin wants to be even more strict than using Domain Computers, then the specific computer(s) can be used instead.
For ease of administration it is highly recommended to keep using Authenticated Users though. There is no security relaxation involved, or at least not a significant one.
Only environments which have high compliance requirements and likely the resources to afford it, should go into the detail of setting individual computers. -
SusanA
AskWoody LoungerJune 18, 2016 at 10:51 am #40785Hi Woody, I’m having a strange problem with security updates for .Net Framework 4.6. Recent updates KB3136000-v2, KB3142037, and KB3143693 all fail to install and display the following message –
Installation Did Not Succeed
Software update KB31xxxxx has not been installed
because:A certificate chain could not be built to a trusted root
authority.I looked up the KB articles but I can’t figure out what they really mean. I have a vague idea that the updates need to be installed while the computer is connected to the Internet even if you use the offline installer? That seems contradictory and two of the machines in our house are never online but still need to be updated. I just wondered if anybody else has this problem and maybe figured out a solution? Thanks!
-
woody
ManagerJune 18, 2016 at 11:22 am #40786Installing .NET patches are notoriously difficult.
I found this article about the 3136000 problem:
You may be having problems with your firewall. See
https://support.microsoft.com/en-us/kb/3149737
Do either of those help?
-
ch100
AskWoody_MVP -
blueboy714
GuestJune 18, 2016 at 3:13 pm #40788I’ve been reading Woody on InfoWorld for some time, and just recently found AskWoody during MS’s forced switch of users from Windows 7 to Windows 10. I have my Windows Updates set to “Let me choose to select Update” and now have 20 important updates and 7 optional.
I like AskWoody’s DefCon scale but I was curious if there is somewhere that has each update with a Defcon rating. I’d like to know what I can install and what I shouldn’t. I stopped installing things because right now the Defcon rating is “2”. I know I don’t need the Office 2010 updates because I have Office 2013 – I have just kept Office 2010 on my PC but I don’t use it.
Thanks
-
ch100
AskWoody_MVPJune 18, 2016 at 3:35 pm #40789Susan, I read again your post. I think you don’t have the root up to date which means you need access to the internet to update it. I think these days is more and more complicated to do anything without a continuous internet connection. Highly secure environments spend a lot of resources and time to achieve good functionality without internet access, which I think is not easily achievable for regular users.
-
woody
ManagerJune 19, 2016 at 5:39 am #40790The MS-DEFCON system is intended to apply to people who don’t want to sweat the details. I give people a blanket go-ahead when the coast seems clear. Recently, it’s gotten considerably more difficult to come up with a simple answer to an increasingly difficult question.
If you want a detailed list of each KB (there are more than a hundred each month nowadays, and sometimes 200), and whether it’s safe to install, I suggest you subscribe to Windows Secrets Newsletter and follow Susan Bradley’s advice.
Susan also maintains a server-oriented list here
Which is a key source of info.
-
SusanA
AskWoody LoungerJune 21, 2016 at 10:22 am #40791Thanks Woody and ch100 for your advice. I tried everything that made sense based on the links provided (as well as the links contained within!) and found that the TechNet suggestion to install KB2813430 was academic since that update had been installed two years ago. Another link to install MicRooCerAut2011_2011_03_22.crt apparently worked since I got a dialog that said it was successfully installed. However, I still got the offline install failures for the three .Net updates.
Now for what worked! As surmised, I needed to have my computer online while installing KB3136000-v2. It installed! I didn’t try installing the other two updates while online because our Internet is not fast or cheap. Later, while offline, I decided to try the remaining two updates again and was surprised to find that they installed correctly – while offline!
I don’t know if installing just KB3136000-v2 while online permanently fixed any root cert issues on my computer but it solved my immediate problem. BTW, I should have mentioned I’m running Windows 7.
Viewing 42 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Asking Again here (New User and Fast change only backups)
by
thymej
3 hours, 9 minutes ago -
How much I spent on the Mac mini
by
Will Fastie
3 hours, 16 minutes ago -
How to get rid of Copilot in Microsoft 365
by
Lance Whitney
3 hours, 7 minutes ago -
Spring cleanup — 2025
by
Deanna McElveen
9 hours, 1 minute ago -
Setting up Windows 11
by
Susan Bradley
2 hours, 3 minutes ago -
VLC Introduces Cutting-Edge AI Subtitling and Translation Capabilities
by
Alex5723
4 hours, 28 minutes ago -
Powershell version?
by
CWBillow
5 hours, 21 minutes ago -
SendTom Toys
by
CWBillow
1 minute ago -
Add shortcut to taskbar?
by
CWBillow
9 hours, 17 minutes ago -
Sycophancy in GPT-4o: What happened
by
Alex5723
1 day, 1 hour ago -
How can I install Skype on Windows 7?
by
Help
1 day ago -
Logitech MK850 Keyboard issues
by
Rush2112
7 hours, 17 minutes ago -
We live in a simulation
by
Alex5723
1 day, 15 hours ago -
Netplwiz not working
by
RetiredGeek
1 day, 2 hours ago -
Windows 11 24H2 is broadly available
by
Alex5723
2 days, 4 hours ago -
Microsoft is killing Authenticator
by
Alex5723
15 hours, 51 minutes ago -
Downloads folder location
by
CWBillow
2 days, 10 hours ago -
Remove a User from Login screen
by
CWBillow
1 day, 6 hours ago -
TikTok fined €530 million for sending European user data to China
by
Nibbled To Death By Ducks
2 days, 1 hour ago -
Microsoft Speech Recognition Service Error Code 1002
by
stanhutchings
2 days, 1 hour ago -
Is it a bug or is it expected?
by
Susan Bradley
3 hours, 55 minutes ago -
Image for Windows TBwinRE image not enough space on target location
by
bobolink
2 days ago -
Start menu jump lists for some apps might not work as expected on Windows 10
by
Susan Bradley
1 day ago -
Malicious Go Modules disk-wiping malware
by
Alex5723
2 days, 14 hours ago -
Multiple Partitions?
by
CWBillow
2 days, 15 hours ago -
World Passkey Day 2025
by
Alex5723
11 hours, 28 minutes ago -
Add serial device in Windows 11
by
Theodore Dawson
3 days, 23 hours ago -
Windows 11 users reportedly losing data due forced BitLocker encryption
by
Alex5723
2 days ago -
Cached credentials is not a new bug
by
Susan Bradley
4 days, 4 hours ago -
Win11 24H2 Slow!
by
Bob Bible
4 hours, 31 minutes ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.