• Patch Tuesday is rolling out

    Home » Forums » Newsletter and Homepage topics » Patch Tuesday is rolling out

    Author
    Topic
    #113648

    I count 243 updates in the Security Update Guide. Release Notes for May are out, too. I don’t see any vestiges of the promised “delta only” patches fo
    [See the full post at: Patch Tuesday is rolling out]

    4 users thanked author for this post.
    Viewing 61 reply threads
    Author
    Replies
    • #113649

      Woody, remember the odd prefix labeling we saw last week for KB3150513?  We’re seeing that label on the Windows 10 Adobe Flash patch today.  And yes, it’s really messing with my lists while I go through to decide what’s getting approved or not . . .

      I suspect MS has a new hire in the documentation department that’s not yet gotten fully integrated into the concept of standardization.  Consistency would be golden . . .

       

      2017-05 Security Update for Adobe Flash Player for Windows 10 Version 1607 for x64-based Systems (KB4020821)

       

       

      ~ Group "Weekend" ~

    • #113655

      It’s showing up on Win7/8.1 Rollups also – the new naming convention

    • #113664

      The “delta only” patch for Win10 1607? you mean this?
      http://www.catalog.update.microsoft.com/Search.aspx?q=KB4019472

      Win10 1703 also got one

      1 user thanked author for this post.
    • #113665

      4 Microsoft Security Advisories were released within the past few days.

      2 users thanked author for this post.
    • #113686
      1 user thanked author for this post.
    • #113688

      The May 2017 security-only updates for Windows 7 and 8.1 include an updated version of file msado15.dll. File msado15.dll is referenced as a non-security fix for Windows 7 and 8.1 in the May 2017 monthly rollups (“Addressed issue where, after installing security update KB______, applications that use msado15.dll stop working.”)

    • #113694

      From Coming together to address Encapsulated PostScript (EPS) attacks:

      “Today’s security updates include three updates that exemplify how the security ecosystem can come together to help protect consumers and enterprises. We would like to thank FireEye and ESET for working with us.

      Customers that have the latest security updates installed are protected against the attacks described below. As a best practice to ensure customers have the latest protections, we recommend they upgrade to the most current versions.”

    • #113699

      From Announcing the .NET Framework 4.7 General Availability (May 2, 2017):

      “Today, we are announcing the general availability of the .NET Framework 4.7. The .NET Framework 4.7 was released as part of Windows 10 Creators Update a month ago. You can now install the .NET Framework 4.7 on other versions of Windows.”

      1 user thanked author for this post.
      • #113779

        A few caveats about .NET Framework 4.7 MrBrian – you can only find this download at the Microsoft Download Center (just like with the full .NET 4.6.2 package):

        (web installer)
        https://www.microsoft.com/en-us/download/details.aspx?id=55170

        (full offline installer)
        https://www.microsoft.com/en-us/download/details.aspx?id=55167

        .NET Framework 4.7 WPF features take a dependency on D3DCompiler_47.dll . This D3DCompiler_47.dll is not present by default in Windows 7 SP1, Windows 2008 R2 SP1 and Windows 2012 OS platforms. Hence these OS platforms require D3DCompiler_47.dll to be installed for .NET Framework 4.7 WPF features to work as expected. Please see known issues article for D3DCompiler_47.dll install information details.

        You will need the KB4019990 D3DCompiler_47.dll update for Win7 SP1 if you want to install .NET Framework 4.7 under Windows 7.

        2 users thanked author for this post.
    • #113698

      I’m noticing on my WSUS server that all of the Win server 2016 patches are missing for May.  Meaning that any patch for any product targeted for Win 2016 was not synchronized.  Such as the OS patch, .NET, etc. I’ve rechecked all of the long-standing settings and they are as they should be.

      Is anyone else seeing this?

      Thanks,

      A non-moose cow-herd

      • #113737

        Yes.

      • #113742

        I’m noticing on my WSUS server that all of the Win server 2016 patches are missing for May. Meaning that any patch for any product targeted for Win 2016 was not synchronized. Such as the OS patch, .NET, etc. I’ve rechecked all of the long-standing settings and they are as they should be. Is anyone else seeing this? Thanks, A non-moose cow-herd

        Yes, and this has happened several times in the past for us for Server 2016 and Server 2012 R2.  I’m expecting them to hit WSUS later this week.

        ~ Group "Weekend" ~

        1 user thanked author for this post.
    • #113702

      ? says:

      Sheesh

      my MSE engine has been hanging in the breeze for 90 days?

      thanks guys

    • #113711

      Sorry for posting as “anonymous”, but there is a question that is worrying me and which answer, I suspect, might be also of more general interest:
      I have Windows 7 Professional x64, with Windows Update set to “tell me but do not install”, and these two options:
      (1) To install the “Security Monthly Quality Rollup” I am being offered right now through Windows Update (after waiting a few days to hear about any problems that might crop up.)
      (2) Manually install the “Security Only Quality Update” plus the “Cumulative Security Update for Internet Explorer 11”, which I have downloaded already, just in case (1) turns out to be a worse idea.
      Both, of course “for Windows 7 x64.”

      What, if any, is the difference between both options?
      For example:
      Would the “Security Monthly Quality Rollup” include also nagware and telemetry software?

      Thank you all in advance.

      Oscar L. Colombo

      • #113723

        1) To install the “Security Monthly Quality Rollup” I am being offered right now through Windows Update (after waiting a few days to hear about any problems that might crop up.)

        The “Security Monthly Quality ROLLUP” contains three parts – the non-security patch, the security patch, and the cumulative patch for IE11. It is cumulative.
        The “Security Only Quality UPDATE” contains only security patches and is is NOT cumulative.
        If yoy have been installing the “Security Monthly Quality ROLLUP” through Windows Update each month since November 2016, you should go ahead and install the May ROLLUP.
        If you have NOT been installing the ROLLUPS, and this is the one for October or November 2016, let us know and we can provide instructions for using the ‘Security Only Quality UPDATES.”

      • #113727

        Right now, don’t do anything.

        It’s much, much too early to tell  if there are any problems with this enormous crop of patches.

        Watch the MS-DEFCON level. When the time comes, your options should be more obvious.

        A bit of a spoiler, though: I’m coming around to the idea that most people should be installing the Monthly Rollup, then wiping out as much of the snooping as they can, after the fact.

        Note that I don’t say “everybody.” But for a whole lot of people, Group B has become difficult.

        8 users thanked author for this post.
        • #113757

          A bit of a spoiler, though: I’m coming around to the idea that most people should be installing the Monthly Rollup, then wiping out as much of the snooping as they can, after the fact.

          Is this even possible, and how?
          I was under the impression that because of how these are structured, it’s “take it or leave it”. You get the update, it’s 1 KB, it installs everything. Or, you refuse it, and grab Security-Only which is also 1 KB file, but without the wicked aftertaste.

          I’ve relegated to Security-Only, and I’m starting to lean to “nothing” (group W) anyway.

          1 user thanked author for this post.
        • #113785

          I wish I could understand what is supposed to be difficult about updating Group B-style. For me, updating has never been so quick and easy as it is now – largely thanks to the guidance I have found on this site, of course. On the other hand, the thought of installing monthly rollups and then trying to pick out the telemetry makes my hair stand on end. Is there any way of knowing whether extracting elements of a composite kb is not going to cause problems – possibly massive problems – further down the line?

          6 users thanked author for this post.
          • #114642

            There is simply no parallel universe in which having a 5-10 email conversation with everyone on my network about when it’s safe to let Windows Update patch and hand holding step by steps on what needs to be dug into and disabled is going to be EASIER for me than to upload patches as I install them for myself and ask everyone once to check their network folder once a day for anything new to install on their end.

        • #113895

          A bit of a spoiler, though: I’m coming around to the idea that most people should be installing the Monthly Rollup, then wiping out as much of the snooping as they can, after the fact.

          Me too.  I’d been doing the security-only updates since the first rollup with snooping rolled out, but I do want the bug fixes too.  It’s not that the security-only updates are difficult, per se… they’re less convenient than the rollups since those are handled automatically by Windows Update, but it’s not hard to see this month’s rollup arrive in Windows Update, click the link for more information, then follow the link in that page to the equivalent security-only update.  Install it, and only then hide the rollup (sort of like checking that month off the list). I haven’t had any issues doing it that way, though I must also add that I only did that for about five patch Tuesdays.

          I switched to downloading the full rollups a month or two ago (8.1), then obliterated the telemetry stuff the best I could using abbodi86’s guide.  After that, I’ve watched on Wireshark to see if there is any telemetry left, and so far I have not seen anything that definitely seems like it is.  Some connections to MS I do want, like CRL download requests, Windows update checks, stuff like that, and I do see those happening.   The volume of data sent to MS is quite low, so if there is still telemetry going on, it’s very sparse.  If I had to guess, I’d say that the unwanted telemetry isn’t happening.

           

          Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
          XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
          Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)

          1 user thanked author for this post.
          • #113900

            @abbodi86 knows the internals of Windows components better than anyone else and this is not only here on this forum 🙂

    • #113729

      We are in for a big treat this month.
      Huge rollups superseding tons of older updates.
      Looks like the rollup of exactly 1 year ago for Windows 7/2008 R2 in a new version, this time released for Windows 8.1/2012 R2 in addition to Windows 7/2008 R2.
      Hope it will all work well for everyone.
      Just do not install yet if you are not confident enough that you can recover from any undesired side-effects.

      4 users thanked author for this post.
      • #113899

        I did a bit more testing with the current patches for Windows 7/2008R2 and 8.1/2012R2.
        Each of them, but in particular the Windows 8.1/2012R2 versions supersede a very large number of older patches. Add to this the recent maintenance done by Microsoft on the update servers when they expired about 300 old updates from each operating system discussed here – nothing in this post applies to Windows 10.
        However, there is a subtle difference between current patches and KB3125574.
        After installing KB3125574 on a fully patched system and running Disk Cleanup, the number of installed patches on a typical Windows 7 system drops from about 200 to between 80-100.
        After installing the current patches, only less than 10 older updates are removed by Disk Cleanup and the total number stays somewhere in the range of 190 for each operating system. I don’t know why if so many old patches are claimed to be superseded.
        Anyway, the rollup system started in October 2016 (according to Microsoft it is in fact in place since July 2016) is getting traction slowly, but it needs more work to be completed.
        https://support.microsoft.com/en-us/help/4009469/windows-7-sp1-windows-server-2008-r2-sp1-update-history
        https://support.microsoft.com/en-us/help/4009470/windows-8-1-windows-server-2012-r2-update-history

        On the positive side, after the massive maintenance done few days ago and another big round of expiring patches done few months ago, I think there should be no more issues with slow Windows Update on systems installed cleanly from the ISO with the relevant SP or Updates, or even from the very original gold images.

        3 users thanked author for this post.
      • #113901

        Just do not install yet if you are not confident enough that you can recover from any undesired side-effects.

        Backups… always backups!

        I’m pretty fanatical about my backups.  I’ve used Norton Ghost, and I’ve probably got about nine Acronis True Image licenses accumulated by now, and I’ve used free ones too (Macrium Reflect’s free version remains a great choice).  Prior to that, I used to have a Jumbo 350 tape backup drive, and before that… 1.44MB floppies and pkzip.exe.

        I’ve only had to use backups for disaster recovery a handful of times (keeping in mind that I’ve been using PCs since 1990):  Once when a laptop was stolen (by people I was trying to help… grrrr), a few times when hard drives failed, and maybe once or twice that I managed to foul something up badly.

        That would be reason enough to insist on backups, but I use them for things beyond recovering from catastrophic loss.  If something goes wrong and Windows starts acting funny, it’s easier to just restore the system partition (data is on another volume) and not worry about it.  I could fix it, but restoring the system partition takes about 9 minutes on my laptop and less than that on my desktop, and I can do something else while it’s going on.

        I have also used backups for non-catastrophic hard drive/SSD replacement, and for setting up test cases that I want to do on a specific machine (and thus not something that would lend itself to a VM).  Just grab my most recent backup image, stick it on whatever spare hard drive I want to use (if you’re like me, you’ve accumulated a bunch of them that are too small to be primary drives anymore, but they still work), install that (or pop it into my USB 3 external enclosure), and do whatever I want without concern for messing up my “real” drive.

         

         

         

        Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
        XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
        Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)

        4 users thanked author for this post.
        • #113904

          Sometimes is useful to “burn your bridges” to move ahead because of not having any other alternative. The expression comes from an ancient event when a military commander physically burnt the return bridges (or the boats on which himself and his soldiers arrived at the destination according to other sources) to convince his soldiers that there is no other way than winning. 🙂
          Not recommended for everyone though…

          1 user thanked author for this post.
          • #113907

            🙂

            Desperate times call for desperate action.

            1 user thanked author for this post.
        • #113926

          If something goes wrong and Windows starts acting funny, it’s easier to just restore the system partition (data is on another volume) and not worry about it. I could fix it, but restoring the system partition takes about 9 minutes on my laptop and less than that on my desktop, and I can do something else while it’s going on.

          I have also used backups for non-catastrophic hard drive/SSD replacement, and for setting up test cases that I want to do on a specific machine (and thus not something that would lend itself to a VM).

          Yeah, I agree that if Windows starts having obscure problems, it is easiest to just restore from a recently created image known to be problem-free, instead of trying to find what problems there are. Images are also useful for transferring Windows installations from one drive to another. With a SSD as boot drive the restore process is quick.

          I use Acronis True Image (2011 to 2016) myself. For the X99 systems I am using, I find that only Boot CDs created by the 2016 version are able to recognize the hardware and successfuly launch the program. For the older Sandy Bridge and Ivy Bridge hardware I use a Boot CD created by the 2011 version. I keep the CD isos created by Acronis so that if the CDs fail I can recreate one easily.

          Hope for the best. Prepare for the worst.

    • #113754

      Would anyone mind summarizing whether KB4020513 is necessary to install or not? I can’t get the https://support.microsoft.com/kb/4020513 page to load on this computer. They always come up as a blank white page and I have been unable to figure out the cause in order to read that site myself.

      It is listed as non-security related to .Net 3.5.1. Only a small file.

      Thank you.

      • #113849

        The page you link gives this information:

        This article describes an update for the .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2. The update fixes the issue that is described in Knowledge Base article 4020459 for customers who experience “privilege not held” errors after the April 2017 security updates from CVE-2017-0160 are applied.

        I have found occasional problems loading MS Support pages in Firefox ESR, but find if I try again, it usually works, eventually 🙂

    • #113756

      About that patch MS says
      “This article describes an update for the .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2. The update fixes the issue that is described in Knowledge Base article 4020459 for customers who experience “privilege not held” errors after the April 2017 security updates from CVE-2017-0160 are applied.”

      KB4020459 says
      “After you apply the April 2017 security updates described in Microsoft security update guidance <u>CVE-2017-0160</u>, the PowerShell v3.0+ stop-computer command fails. You get a  “Privilege not held” error message.”

       

    • #113774

      I know it is an extremely small cohort, those running Windows XP in LTSB, but there appears to be, at least with my XPLTSB running in a virtual machine, a problem with: May, 2017 Security and Quality Rollup for .NET Framework 4 on WES09 and POSReady 2009 (KB4014605).  It will neither install with WU or as a download of the file to be executed manually from the hard drive: http://www.catalog.update.microsoft.com/Search.aspx?q=kb4014605 .  If you have Win XPLTSB set to load automatically, consider disabling and going to notify me of updates.  Then download the updates, select custom install, and deselect KB4014605.  Installation should proceed normally thereafter of the other XPLTSB updates and then you can see if your experience matches mine with regard to KB 4014605.

      • #114663

        @JPN – I’m running Win XP on a computer with the registry hack to get POS2009 Updates and had no problem getting and installing May, 2017 Security and Quality Rollup for .NET Framework 4 on WES09 and POSReady 2009 (KB4014605) – using the regular Windows Update process.

    • #113786

      Once more as “anonymous”:

      Thanks, particularly to PKCano for listing the three components of the Security Monthly Quality Rollup, and for his offer:
      “If you have NOT been installing the ROLLUPS, and this is the one for October or November 2016, let us know and we can provide instructions for using the ‘Security Only Quality UPDATES.”
      Well, I have NOT installed any of the Rollups so far, but I am being offered the May 2017 one through Windows Update.

      Concretely now: what does one might gain by installing the Rollup rather than the Security Only plus the Explorer 11 Security Updates, and what might be lost?

      Finally, let me try this once more: Is the “Non Security” component of the Rollup likely to include nagware and MS spy-telemetry software, or only harmless if, to many of us, largely useless tweaks to obscure features, such as correcting the setting for the time of day in Uttar Pradesh?

      Thanks,

      Oscar L. Colombo

      • #113790

        Woody has created “Groups” related to the telemetry in Windows Update.
        Group A accepts whatever Microsoft offers. Group B doesn’t install the telemetry-containing updates and opts to instead manually install the Security-Only Updates. This started in October os 2016 when MS started rolling up all the patches into one ROLLUP.

        The Security Only Updates are not cumulative, so you have to manually install a new one each month. In addition, since March 2017 there is an additional update for IE11 that has to be installed manually. Then, you avoid the Monthly Rollup by UNCHECKING it, and install the rest of the updates (waiting until Woody gives the go-ahead that they are safe by changing the DEFCON number to 3 or above). You can read about this system in  AKB2000003

        Security Only patches and those for IE11 from Oct 2016 through April 2017 are safe to install. The May patches are on hold until the DEFCON number is 3 or above.

        1 user thanked author for this post.
    • #113763

      Since many people had issues with figuring out what .NET updates they need, here is my methodology to help you out.

      What is the main article describing .NET Framework Patches?

      For this month it’s 4019108.

      OK, what version of .NET do I have installed on my Windows 7 x64 Machine?

      For my case it’s 3.5.1 and 4.6.2. If you are unsure about this you can use Asoft’s .NET Version Detector.

      What Updates from that list do I need then?

      KB4014579 and KB4014588.

      Noted. Onto the Microsoft Catalog and search has to be done on the initial KB, KB4019108.

      Clicking on the download button brings up the list of 4 hotfixes out of which I only need the 2 compatible with my machine’s .NET Framework versions: KB4014579 and KB4014588.

      And that’s it 🙂 Granted if you have updated from 4.6.2 to 4.7 you will only need 1 update since there are no security hotfixes for 4.7 released. Yet 🙂 This methodology can easily be extrapolated for any other Windows version, like 8.1. As long as you know your correct KB starting point and properly identify your .NET versions, it should be a breeze if you follow the guidelines above.

      2 users thanked author for this post.
    • #113803

      Three of the vulnerabilities fixed today are being exploited according to Microsoft’s data as summarized by this page.

      This page breaks down the vulnerabilities by severity. There are critical vulnerabilities in SMB again.

      1 user thanked author for this post.
    • #113827

      My solution these days …

      Windows 7 – if it’s optional, don’t install.

      Windows 10 – hold nose and open up the chute!  🙂

      Windows 10 Pro 22H2

      1 user thanked author for this post.
    • #113836

      In early April I was catching up on updates and installed these two
      with no problems:

      Security Update for Windows March -(KB4012212)
      Windows Malicious Software Removal Tool (KB890830)

      I checked your blog for info on the .Net patch and saw the “lockdown”
      notice advising people to hold off patching so I waited. I then got
      called away on important business and am now catching up again.

      I will hold off on the May updates but can you give me the links to the
      Win 7 updates for March and April I need. I imagine the .Net for both
      and the Security only for April.
      Thanks
      – firemind.

    • #113856

      I wish I could understand what is supposed to be difficult about updating Group B-style. For me, updating has never been so quick and easy as it is now – largely thanks to the guidance I have found on this site, of course. On the other hand, the thought of installing monthly rollups and then trying to pick out the telemetry makes my hair stand on end.

      Agreed. I think a lot of habitual non-techie visitors to this site have come to understand and be comfortable with the Group B system. This was well-demonstrated on a different thread. We’re happy with it, our computers are working well, don’t change it.

      Windows 10 Home 22H2, Acer Aspire TC-1660 desktop + LibreOffice, non-techie

      4 users thanked author for this post.
    • #113908

      With the release of the May patches, I decided to do some experiment.

      (1) Windows Defender needs to be updated to 1.1.13704 or later in order to fix the just-revealed serious code execution vulnerability. I launched a virtual machine running Windows Vista x64, with IE9 installed and fully patched to April 2017, and proceeded to see if I can download the update in Vista. I reenable Windows Defender (I said before it was my policy to disable Windows Defender as soon as Windows had been installed), and then asked it to check for updates. After a while Windows Defender was updated to mpengine.dll version 1.1.13704. So it seems that even though Vista’s support had ended in April, Windows Defender updates are still available. For how long I don’t know.

      (2) I downloaded the Windows Server 2008 x64 version of KB4018271 (the May 2017 IE9 cumulative security update). Then I attempted to install the update in the same Vista virtual machine. Guess what? The installation was successful and IE9 was updated. I have not tried other security updates yet but I have no reason to believe that they will fail to install. It seems to me that I can continue to patch Windows Vista by manually downloading the corresponding Windows Server 2008 updates, at least for this month.

      Vista with KB4018271

      Hope for the best. Prepare for the worst.

      2 users thanked author for this post.
      • #113942

        Windows Client x64 shares the same updates with the corresponding Server version
        except very few individual updates

        luckily for Vista, Server 2008 have x86 edition, so both Vista 32/64 bit should be able to get use of Server 2008 updates

        Windows 8 has similar experience, there are Server 2012 updates for 64 bit, and Embedded 8 for 32 bit

        • #114014

          Windows Client x64 shares the same updates with the corresponding Server version except very few individual updates.

          Luckily for Vista, Server 2008 have x86 edition, so both Vista 32/64 bit should be able to get use of Server 2008 updates.

          Windows 8 has similar experience, there are Server 2012 updates for 64 bit, and Embedded 8 for 32 bit.

          Yeah, I know that Windows Vista and Windows Server 2008 are basically based on the same code, so Vista “should be able to” make use of Server 2008 updates. But with Vista out of support, there is no way to know if that is still true unless we try to install them on Vista.

          When it was discovered that Windows XP can continue to receive updates by adopting the “POSReady hack”, Microsoft has this to say “The security updates that could be installed are intended for Windows Embedded and Windows Server 2003 customers and do not fully protect Windows XP customers. Windows XP customers also run a significant risk of functionality issues with their machines if they install these updates, as they are not tested against Windows XP. The best way for Windows XP customers to protect their systems is to upgrade to a more modern operating system, like Windows 7 or Windows 8.1.”

          So now Microsoft can say “The security updates that could be installed are intended for Windows Windows Server 2008 customers and do not fully protect Windows Vista customers. Windows Vista customers also run a significant risk of functionality issues with their machines if they install these updates, as they are not tested against Windows Vista. The best way for Windows Vista customers to protect their systems is to upgrade to Windows 10.” Haha.

          Anyway, Vista customers can continue to patch, at least for this month, provided they know what updates to download.

          Hope for the best. Prepare for the worst.

          1 user thanked author for this post.
          • #114209

            So now Microsoft can say “The security updates that could be installed are intended for Windows Windows Server 2008 customers and do not fully protect Windows Vista customers. Windows Vista customers also run a significant risk of functionality issues with their machines if they install these updates, as they are not tested against Windows Vista. The best way for Windows Vista customers to protect their systems is to upgrade to Windows 10.”

            I appreciate the humor.  But I would suggest one small change to the last sentence.  How about “The best way for Windows Vista customers to protect their systems is to upgrade to Linux.”

            I have several Vista (x86 & x64) real and virtual systems.  I may try the Windows Server 2008 updates on the VMs where I can easily roll back a snapshot.  But when it comes to the real systems I’ve decided that the best way to move forward is to install Linux.  After evaluating a number of distros (CentOS, Debian, Ubuntu, Mandriva, Gentoo, OpenSuse, Mint) I decided to install Linux Mint 18 to dual boot with Vista and installed it on the x86 iron.

            The installation went easily and Mint 18 was extremely well behaved in the way its installer recognized existing partitions and offered to resize them as necessary to make space for itself.  Copying existing profiles for Firefox/Thunderbird into Linux was simple and computer usage continued without a hitch.

            After getting my backups done I will soon install Mint 18 on the x64 box.

            Windows 10?  Bah, humbug!

             

            1 user thanked author for this post.
            • #114364

              There’s a very good site on optimizing Linux Mint 18.1 once it’s installed that you might find useful here:

              https://sites.google.com/site/easylinuxtipsproject/mint-cinnamon-first

              The page is for the Cinnamon desktop, but there are also links on it to XFCE and Mate desktops as well (my preference is XFCE, as it is very stable).

              Some very good information on configuring for SSD’s that may be hard to find on the regular Mint forums is also here. I would suggest making sure your Windows partition is well backed up (just in case), and that you create a bootable USB drive in case you run into dual boot problems.

               

    • #113913

      I did a bit more testing with the current patches for Windows 7/2008R2 and 8.1/2012R2. Each of them, but in particular the Windows 8.1/2012R2 versions supersede a very large number of older patches. Add to this the recent maintenance done by Microsoft on the update servers when they expired about 300 old updates from each operating system discussed here…

      Yes, I noticed that Microsoft FINALLY stopped offering me some old Windows Update clients – plural.

      I didn’t install a new Windows Update client until the slowdown bug made it necessary.  I ended up first installing the June 2016 update rollup for Windows 7 SP1 (KB3161608), and followed that up with the July 2016 update rollup for Windows 7 SP1 (KB3172605).

      But for a long time my list of hidden Windows Updates included ALL of the old clients I passed on.

      Only now, have the following updates stopped being offered to me:
      Windows Update Client for Windows 7: June 2015 (KB3050265)
      Windows Update Client for Windows 7 and Windows Server 2008 R2: July 2015 (KB3065987)
      Windows Update Client for Windows 7 and Windows Server 2008 R2: August 2015 (KB3075851)
      Windows Update Client for Windows 7 and Windows Server 2008 R2: September 2015 (KB3083324)
      Windows Update Client for Windows 7 and Windows Server 2008 R2: October 2015 (KB3083710)

      However, all the following old Windows Update Clients are STILL being offered to me:
      Windows Update Client for Windows 7 and Windows Server 2008 R2: December 2015 (KB3112343)
      Windows Update Client for Windows 7 and Windows Server 2008 R2: February 2016 (KB3135445)
      Windows Update Client for Windows 7 and Windows Server 2008 R2: March 2016 (KB3138612)

      So now I’m only being offered three obsolete clients instead of eight.  I guess that’s progress.

    • #113965

      hi guys, new here.  Love the great info..  I’ve got a question about the .net updates this month.

      In my WSUS I received :

      May, 2017 Security and Quality Rollup for .net Framework 3.5-4.62 for both win7/2008r2 and win8.1/2012R2 KB 4019112/KB4019114

      Also Get Security only versions of these KB4019108/KB4019111.

      The normal OS Monthly rollups versus Security only updates state that you should choose one or the other.

      The .net Monthly rollups/security do not mention this in KB articles.

      My gut is to decline the security only and approve monthly rollups for .net like I do for OS patching.

      Also one last think, I might be mistaken, but I remember April monthly rollups OS patches specifically saying that Internet explorer fixes were included and that I should either approve security only updates and internet explorer patches or just monthly quality rollups.

      May patches now state that IE fixes are not included in Monthly Quality rollups.  Did this switch or am I nuts?

       

      Thanks

       

      • #113981

        The Rollups for the .NET versions are good unless you are restricted to security-only patches.

        The Security Monthly Quality ROLLUPS contain three parts: non-security, security and cumulative IE11 patches.
        The Security Only Quality UPDATE contained the cumulative IE11 update from Oct 2016 through Feb 2017. As of March 2017, MS split the IE11 patch out. So if you go the Security-only route, you need to install the IE11 patch as well (both manually). Downloads can be obtained each month from the MS Update Catalog or from AKB2000003 on this site.

        1 user thanked author for this post.
    • #113979

      I’m getting error 8024402F when searching for updates today… Anyone having this issue?

      • #114022

        Yup!! On all machines I’ve tried to manually run updates.
        Not sure if there is a problem on my end or the other.

      • #114074

        I also am seeing the error 8024402F when checking for updates. Another thing I noticed is that Microsoft Security Essentials has apparently performed some updates to its definitions, but they are not being reported in Windows Update’s View Update History the way they normally would.

        • #114088

          Update: I just did a search for updates again, and this time it succeeded (no 8024402F error). It said there was an MSE definition update available, and I applied it via Windows Update successfully, and it is visible in View Update History. So, I am not sure what was happening before; a temporary situation at Microsoft?

    • #113989

      thanks PKCano.  I just reread the May Monthly Quality rollups More information (Its a bit confusing, but you are correct, thanks again):

      The security fixes that are listed in this Security Monthly Quality Rollup KB4019215 are also included in the May 2017 Security-Only Quality Update, KB4019213, except for the security fixes for Internet Explorer. Those are instead included in the Cumulative Security Update for Internet Explorer KB4018271. Installing either this May 2017 Security Monthly Quality Rollup or both the May 2017 Security-Only Quality Update and the Cumulative Security Update for Internet Explorer will install the security fixes that are listed here. This Security Monthly Quality Rollup also includes improvements and fixes from previous monthly rollups.

      • If you use update management processes other than Windows Update, and you automatically approve all security update classifications for deployment, May 2017 Security Monthly Quality Rollup KB4019215, May 2017 Security-Only Quality Update KB4019213, and the Cumulative Security Update for Internet Explorer KB4018271 are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed. <b></b><i></i><u></u>
    • #114001

      I just received today a stand alone up date KB3003057.  When you put it in your search all the articles through the years show nothing but trouble with it.  Win 7 ,64X.  old computer.

    • #114008

      Yes, just echoing Geo above–wassup w/kb3003057, which I’m being offered today on my test machine (Win7/32bit/Ent/SP1/fully patched)? I installed all patches offered yesterday (no problems so far after a pretty good workout). This morning  there’s a taskbar bang telling me “New updates are available,” and KB3003057 (Cumulative Update IE11 blah blah blah) is the offering. It installs without requiring a reboot, leading me to wonder whether it’s just another cataloging mistake. Any insight?

      GaryK

    • #114005

      Are the flash security updates technically cumulative? Like say I do a clean install of 8.1 or 10. Will I just get one Flash update with everything from the previous ones?

      • #114021

        If you use Windows Update after the clean install you should get the latest version of IE Flash.

    • #114028

      I’m mystified as to why the quality rollup KB4019264 for WIN7, has this prerequisite:
      ‘To apply this update, you must have Windows 8.1 and Windows Server 2012 R2 update April 2014 KB2919355 installed.’

      1 user thanked author for this post.
      • #114033

        Microsoft’s information is here

      • #114038

        I reported this error to Microsoft.

        1 user thanked author for this post.
        • #114134

          I completely missed the version difference here. Doh!

          • #114183

            Thanks MrBrian. A glaring mistake like that doesn’t exactly inspire confidence in the quality of their er… ‘quality’ updates!

            1 user thanked author for this post.
    • #114037
    • #114050

      Yes, just echoing Geo above–wassup w/kb3003057, which I’m being offered today on my test machine (Win7/32bit/Ent/SP1/fully patched)? I installed all patches offered yesterday (no problems so far after a pretty good workout). This morning there’s a taskbar bang telling me “New updates are available,” and KB3003057 (Cumulative Update IE11 blah blah blah) is the offering. It installs without requiring a reboot, leading me to wonder whether it’s just another cataloging mistake. Any insight?

      Followup: Although I ran WinUp immediately after installing KB3003057, and it showed clean, half-an-hour later KB2987107 has shown up. Also installed without needing a restart. Anyone else old enough to remember Mickey Rooney and Judy Garland? “Hey, kids, let’s start a software company! We can call it ‘Microsoft’!”

      GaryK

      2 users thanked author for this post.
      • #114054

        In my WSUS controlled Environment. I also just got KB3003057 after getting the KB3308923 the other day..I installed 3008923 and it did not want reboot. seems like MS is doing some shady things behind the scenes…

    • #114046

      Ascaris wrote: Backups… always backups!

      I too depend on backups of my system drive to recover from system disasters. I use the windows ‘Create A System Image’ function to make the backups and have successfully used it to recover on several occasions. But I’ve noticed that one else here seems to use it. Am I missing something?

      Gene

      • #114163

        I use the windows ‘Create A System Image’ function to make the backups and have successfully used it to recover on several occasions. But I’ve noticed that one else here seems to use it. Am I missing something? Gene

        I tried that initially on Windows 7, but it didn’t work on my data drive, which is a GPT-formatted volume of a little over 2TB, which is apparently beyond the capabilities of Windows backup.

        I am not sure what features it has, but Acronis has a few that may not be in there, like incremental image creation and encryption of the backup image.  I’d gone off Acronis as it has had some issues with bugs (though once the image was written, it always worked), but its replacement (Macrium Reflect Free) does not do encryption, and the paid version is much more expensive than Acronis (which I had already paid for), so back I went.

         

        Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
        XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
        Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)

      • #114167

        I use the windows ‘Create A System Image’ function to make the backups and have successfully used it to recover on several occasions. But I’ve noticed that one else here seems to use it.


        @gene

        I think you’ll find many around these parts do use system images regularly 🙂

        1 user thanked author for this post.
    • #114058

      Guinea pig reporting in again. Win 7 32-bit, installed 4018271 (IE update) and 4019263 (security-only bundle) several hours ago, so far so good. Just the .NET one left since that was available in Windows Update while I obviously had to download the others and run them manually and then if opened Windows Update would demand a reboot before doing anything else, so leaving it for some later time.

    • #114064

      In my WSUS controlled Environment. I also just got KB3003057 after getting the KB3308923 the other day..I installed 3008923 and it did not want reboot. seems like MS is doing some shady things behind the scenes…

      Sadly it’s recently become easy to believe MS is doing shady things behind the scenes, but more than likely it’s simply incompetence. Neither is good, but a lot of these problems are consistent with a department getting its budget slashed and people being frantically overworked.

      GaryK

      1 user thanked author for this post.
      • #114066

        agreed, neither is good.. but inconsistency of Updates that affect millions of PC’s especially in and enterprise environment is very scary…

        1 user thanked author for this post.
    • #114073

      agreed, neither is good.. but inconsistency of Updates that affect millions of PC’s especially in and enterprise environment is very scary…

      Agreed. Terrifying.

      GaryK

    • #114082

      I refreshed my Windows 8.1 machine, installed all updates, ran a disk clean up and now I have 9 old updates available. What should I do?

      https://i.imgur.com/4wy7QZF.png

      https://i.imgur.com/l7EnfdU.png

      • #114086

        Update 4 minutes later. I tried installing those 9 updates and then they just disappeared. I swear I’ve never seen anything as random as Windows Update.

    • #114104

      1607 and Windows 2016 Server update KB4019472 released with delay of few hours.
      More expired updates, among them KB3008923 and KB3003057.
      Instead of them, now you will see KB2987107 as required.
      Same treatment like for the other two: either ignore, or pretend to install to get rid of it from the picture.

    • #114117

      Are the monthly quality roll ups for Win7/8.1 now including patches NOT installed prior to Oct 2016?  If not, any word about MS’s future intentions for doing this?

      The prospects for this is the primary reason I’m in Group B.   I have hidden patches which, if installed, will create USB issues with my Dell Win 7 machines.

      Thanks!

      • #114120

        Microsoft is gradually rolling old patches into the Monthly Rollups and retiring the ones that have been superseded. But is seems they are making a mess in the process.
        Read this and this

        1 user thanked author for this post.
        • #114186

          I wouldn’t say it is a mess. There is no harm done in “installing” the incorrectly non-expired old updates, as they just flag the supersedence chain and do not install anything. There is no reboot required.
          The benefit in doing this current cleanup is far greater than any annoyance caused by those temporarily missed updates from expiring.
          It is only that people here are more aware of those updates. 99.99999% of users would not see this as an issue and both of us know that this is the case.
          2 out of the 3 mistakenly non-expired updates have already been expired in the last few hours, only one left.

      • #114130

        Not yet

        but next week’s preview rollup is a strong candidate to start the process

        2 users thanked author for this post.
    • #114118

      I too had KB3003057 show up in WU today. A quick lookup reveals that KB3003057 is:

      Cumulative security update for Internet Explorer: November 11, 2014
      https://support.microsoft.com/en-us/help/3003057/

      In the above KB, it states:

      “The update that this article describes has been replaced by a newer update. We recommend that you install the most current cumulative security update for Internet Explorer.”

      In other words, it should be ignored. Looking at the IE files it replaces clearly indicates that this should not be installed, but if it is, then all should be fixed by installing the latest cumulative update.

      I was going to sacrifice one of my other Win 7 machines by ignoring this patch and installing the latest IE11 cumulative patch to determine if WU would resolve things. Much to my surprise, KB3003057 wasn’t offered by WU.

      This 2nd machine (aka machine #2) has the same version of Windows 7 Ult and is also fully patched, so how could this be?

      Going back to machine #1, I searched installed updates and discovered that KB3003057 had never been installed. However, it had been installed on machine #2. Keep in mind that both machines have always been fully patched.

      So why has this happened?

      Well, machine build dates gives a clue:

      1) Machine #1 – built 2010
      2) Machine #2 – built late 2014

      Machine #2 likely had a more recent IE cumulative update installed upon initial setup. KB3003057 was never offered because it had been superseded at that time.

      So it appears that the error is on Microsoft’s part.

      Now I have to figure out why WU is offering:

      1) Machine #1 – 3 Office 2010 patches
      2) Machine #2 – 5 Office 2010 patches

      More than likely, it too relates to when Office 2010 was initially installed.

      CA

    • #114146

      A few caveats about .NET Framework 4.7 MrBrian – you can only find this download at the Microsoft Download Center (just like with the full .NET 4.6.2 package): (web installer) https://www.microsoft.com/en-us/download/details.aspx?id=55170 (full offline installer) https://www.microsoft.com/en-us/download/details.aspx?id=55167

      .NET Framework 4.7 WPF features take a dependency on D3DCompiler_47.dll . This D3DCompiler_47.dll is not present by default in Windows 7 SP1, Windows 2008 R2 SP1 and Windows 2012 OS platforms. Hence these OS platforms require D3DCompiler_47.dll to be installed for .NET Framework 4.7 WPF features to work as expected. Please see known issues article for D3DCompiler_47.dll install information details.

      You will need the KB4019990 D3DCompiler_47.dll update for Win7 SP1 if you want to install .NET Framework 4.7 under Windows 7.

      I deliberately have not installed any versions of .NET Framework higher than the 4.5 branch on my Windows 7 computers since .NET Framework 4.6 and higher include telemetry and are only needed if you want to run Windows 10 applications on Windows 7 and Windows 8x computers. Just a “heads up” for everyone on Group B.

      2 users thanked author for this post.
      • #114168

        I deliberately have not installed any versions of .NET Framework higher than the 4.5 branch on my Windows 7 computers since .NET Framework 4.6 and higher include telemetry and are only needed if you want to run Windows 10 applications on Windows 7 and Windows 8x computers. Just a “heads up” for everyone on Group B.

        Really? That is news to me. Thanks for the heads up.

        The highest version of .NET Framework on my computers running Windows 7 and Windows 8.1 is 4.5.2 as well, but only because 4.5.2 works well and is supported to the end of support (of Windows 7) so that I consider 4.6.x (and now 4.7) unnecessary.

        Hope for the best. Prepare for the worst.

      • #114233

        Is there evidence supporting the claim that “.NET Framework 4.6 and higher include telemetry”?

        3 users thanked author for this post.
    • #114156

      I’m noticing on my WSUS server that all of the Win server 2016 patches are missing for May. Meaning that any patch for any product targeted for Win 2016 was not synchronized. Such as the OS patch, .NET, etc. I’ve rechecked all of the long-standing settings and they are as they should be. Is anyone else seeing this? Thanks, A non-moose cow-herd

      My WSUS server is just not synching at all.

      Last month, syncs would fail until I disabled the Updates category. But this month, the last successful sync was the day before Patch day and nothing since. Not even showing failed attempts this time.

      When I hit Synchronize Now, it just sits there “Running…” for hours.

       

      No matter where you go, there you are.

    • #114157

      Yes, and this has happened several times in the past for us for Server 2016 and Server 2012 R2. I’m expecting them to hit WSUS later this week.

      Check your synch log. Mine is showing no synch (not failed, nothing) after Monday (last day before patch day). For some reason, it’s not even attempting any more. I have kicked off a manual synch, but it’s been running for over three hours with no apparent activity.

      (Yes, I know it says “9/05” was successful, but I’m in Western Australia, so that was still before Patch Tuesday, we don’t see them until Wednesdays with the timezone difference.)

      No matter where you go, there you are.

      • #114388

        Not sure what to make of that.   I manage several WSUS servers that sync nightly, including one older SBS server running WSUS 3.2 . . . and they are all syncing on schedule successfully.  However, those do NOT have the Upgrade option enabled.

        I have one site that won’t sync until tomorrow night (it’s a client with multiple Windows 10 workstations, we defer syncs to end of week in order to control update reboots during the work week.)  It will be interesting to see if that one fails the same way your log indicates.

        And my test bed WSUS – which does have Upgrades enabled, has been working fine all week too.

        Wondering if there is a problem due to time zones?  (Nothing would surprise me these days.)

        You might try canceling the sync, restarting the “Update Service” and try another manual sync.  You may also need to run a full WSUS cleanup.

        Restart Update Services - WSUS

        Another forum I rely on (spiceworks) does not seem to be full of complaints of this nature this week about WSUS, which to me means the problem is likely not widespread.

        ~ Group "Weekend" ~

        • #114484

          I think the same problem was reported on patchmangement.org for the latest synchronisation by those with Upgrades enabled.
          I stopped synchronising Upgrades long time ago so this may be an issue, but I just don’t know.
          Upgrades category is enabled automatically any time when Windows 10 is enabled under Products, so it has to be manually disabled if desired (and I would recommend it, at least until it becomes more reliable).
          Like Service Packs, I think upgrades are better performed offline manually if possible.
          Normally, with WSUS, all categories should be enabled, less Drivers and anything related and Upgrades.

    • #114172

      Updated my Win 10 v1703 “Creator’s” test system to 15063.296 – seems pretty stable so far.

      ScreenGrab_NoelC4_2017_05_11_001818

      -Noel

    • #114182

      The highest version of .NET Framework on my computers running Windows 7 and Windows 8.1 is 4.5.2 as well, but only because 4.5.2 works well and is supported to the end of support (of Windows 7) so that I consider 4.6.x (and now 4.7) unnecessary.

      In fact the minimum version of .NET Framework which you need is dictated by the version which the software developer restricted in the software.
      If a certain software is designed to require .NET Framework 4.6.1 for example, you would be able to use it only if you have 4.6.1, 4.6.2 or 4.7 or later installed on your machine.
      This has nothing to do with the end of support for the Windows edition on which .NET Framework is installed.

      2 users thanked author for this post.
      • #114196

        In fact the minimum version of .NET Framework which you need is dictated by the version which the software developer restricted in the software.
        If a certain software is designed to require .NET Framework 4.6.1 for example, you would be able to use it only if you have 4.6.1, 4.6.2 or 4.7 or later installed on your machine.
        This has nothing to do with the end of support for the Windows edition on which .NET Framework is installed.

        Well, no doubt you are right. But as all of the programs I use works fine (e.g. Handbrake), it shows clearly to me that I don’t require 4.6.x or above of the .NET Framework. So I will just keep 4.5.2 all the way.

        Actually I would prefer not having to install the .NET Framework 4.x at all in Windows 7 as it requires a whole batch of security updates to itself. Unfortunately there are many common programs that require it now (e.g. Display Driver software) so it is not possible. I would just keep the lowest supported version that works for me. In my case that will be 4.5.2.

        Hope for the best. Prepare for the worst.

        • #114208

          @James Bond 007
          My post was not an invite to upgrade the version of .NET Framework to the latest one if you don’t need it or you don’t feel like being proactive for future software which you may use.
          I was only trying to explain as posts like @GoneToPlaid’s (almost all if not all of them on this forum) are actually trolling and trying to mislead unsuspecting users only for fun (of their author).

          2 users thanked author for this post.
    • #114195

      I’ve read somewhere that there are still 1.8% of W10 users that have RTM (1507) version installed – since they’re now out of support (and must be on RTM for valid reasons), are they coming back to W7 or W8.1 that are still supported?

      Fractal Design Pop Air * Thermaltake Toughpower GF3 750W * ASUS TUF GAMING B560M-PLUS * Intel Core i9-11900K * 4 x 8 GB G.Skill Aegis DDR4 3600 MHz CL16 * ASRock RX 6800 XT Phantom Gaming 16GB OC * XPG GAMMIX S70 BLADE 1TB * SanDisk Ultra 3D 1TB * Samsung EVO 840 250GB * DVD RW Lite-ON iHAS 124 * Windows 10 Pro 22H2 64-bit Insider * Windows 11 Pro Beta Insider
      • #114298

        Does that include Enterprise LTSB 2015 users?

        nonetheless, even Windows 8 still have usage

        • #118105

          According to the methodology:

          http://blog.adduplex.com/2017/04/adduplex-windows-device-statistics-report-april-2017.html

          it is based on Store apps usage, so we can rather rule LTSB 2015 out.

          Fractal Design Pop Air * Thermaltake Toughpower GF3 750W * ASUS TUF GAMING B560M-PLUS * Intel Core i9-11900K * 4 x 8 GB G.Skill Aegis DDR4 3600 MHz CL16 * ASRock RX 6800 XT Phantom Gaming 16GB OC * XPG GAMMIX S70 BLADE 1TB * SanDisk Ultra 3D 1TB * Samsung EVO 840 250GB * DVD RW Lite-ON iHAS 124 * Windows 10 Pro 22H2 64-bit Insider * Windows 11 Pro Beta Insider
          1 user thanked author for this post.
    • #114260

      Well, I checked WU this morning on one of my Win 7 machines and IE cumulative update KB3003057 was gone only to be replaced by KB2987107. Both refer to patches for Internet Explorer: October 14, 2014:

      https://support.microsoft.com/en-us/help/3003057/
      https://support.microsoft.com/en-us/help/2987107/

      Note that I haven’t applied any of the May patches on this machine. Looks like MS is working on things.


      @PKCano
      – Not the same thing. By my count, MS retired/superseded 81 Win 7 security related patches in April alone. Different issue.

      I’m in Group B at my home office and have installed this month’s patches on a few Win 7 test machines. Cold booted multiple times, minimally tested some core apps (e.g. 2010 Office, Apache, MySQL, dev tools) and haven’t found any show stoppers yet. I also haven’t heard any problems from clients in the field (Group A).

      As far as .NET goes, I let WU handle that. Why make life difficult.

      CA

      • #114275

        You are seeing the old patches because. in the process of retiring a massive bunch for all versions of Windows (not just Win7) the supersedence chain has been broken. They are working on it, and that is why one of the patches disappeared (it was retired) and the one it superseded showed up.

    • #114338

      @PKCano

      You’re missing the point of my posts. I’m fully aware of supersedence and that it’s broken.

      In this case, I was trying to determine why two identically patched Win 7 machines had different offerings in WU. The patch number is irrelevant.

      These two machines in question are mirrors of one another (except for build dates). If a security related patch shows up on one, then logically the same patch should show up on the other. It struck me as odd, so I did a little digging to determine why this happened. That’s all. 🙂

      As a side note, I’ve now taken a “B” machine that has KB2987107 being offered (not hidden) and applied KB4018271. I’m going to leave it in that state to see how MS addresses the issue. On my other test benches, I had already hid the patch(s) in question.

      As for the massive amount of patches now being retired, MS had made clear their intent to do so many months ago (much to my dismay). It is part of the plan to move Win 7 to the Win 10 cumulative/delta model – so no news there. I don’t, however, see how this will sit well in specific enterprise or controlled environments (e.g. health industry).

      CA

      1 user thanked author for this post.
      • #114408

        I’ve often had a suspicion that the whole process is pretty “hit and miss” under the covers.

        What have I seen over time to warrant that feeling? I don’t know, things like…

        Ancient updates that suddenly show up as applicable.
        Different systems with entirely different WMI QFE LIST output.
        Updates showing up as available right after installing updates.
        Different lists of available updates from machine to machine.

        And of course reading comments like yours over the years.

        It’s all served to make me feel that the whole update process has never been nearly as scientific or well defined as we might hope. I don’t find it surprising that Microsoft wants to create “cumulative” update packages to try to get systems in line with one another.

        And so far I’ve found I can still control everything that’s running… The only downside seems to be that the disk usage is somewhat higher with everything in “Group A” updated state. That being said, I have a critical Win 7 system functioning as a server that simply ISN’T in group A, on purpose. If it works, don’t fix it.

        -Noel

    • #114348

      Reminder of past topic: Installing Win updates on Win 7 or 8.1 computers with Kaby Lake or Ryzen CPUs.

      Just installed the Windows 7-x64 Security Only Quality Update KB4019263.  Note the update DID NOT re-install the Kaby / Ryzen unfiendly Windows Update blocking DLL’s.  All 8 WU related DLL’s are still the Kaby / Ryzen good version 7.6.7601.23453 after installing KB4019263.

      I am surprised!!!

      Viper

      2 users thanked author for this post.
      • #114374

        File Wuaueng.dll indeed is not present in either the Windows 7 or 8.1 May 2017 security-only update.

      • #114425

        Looks like this is more complex than I thought.

        Lemme put together a blog post on it.

      • #114515

        Important note: version 7.6.7601.23453 of the wuaueng.dll & other related Windows Update Agent files for Win7 SP1 are included in the KB3161608 & KB3172605 updates.

        Also KB4019213 for Win8.1 also excludes the updated WUA files from the April 2017 updates that have blocked AMD Ryzen/Carrizo & Intel Kaby Lake CPUs under Win8.1. the version of wuaueng.dll for Win8.1 that doesn’t block those recent AMD & Intel processors is version 7.9.9600.18340 – included in KB3161606 & KB3172614 updates.

    • #114355

      That is interesting, Viper. I know more than a few people who will like that news.

      CA

    • #114415

      I’ve updated my Windows 7 test system with the latest “Group A” patches…

      The update check took just a couple of minutes. I DID notice something called C:c421c1e218fc7873979d267c10setup.exe tried to contact http://www.microsoft.com twice during the update. Blocking that didn’t lead to any failures.

      The installation completed successfully, and the requisite reboot went without a hitch.

      In comparing my current WMI QFE LIST output to one generated prior to the updates, I see the following:

      • KB4015552 “Update” no longer appears.
      • KB4014504 “Update” is added.
      • KB4019264 “Security Update” is added.

      I don’t know what’s supposed to be “retired” or “superseded”, but the list of updates shown installed on this Win 7 x64 Ultimate test system via WMI QFE LIST is still some 226 entries long.

      It seems to be working okay. I will follow up if I discover problems.

      ScreenGrab_W7VM_2017_05_11_152200

      -Noel

      1 user thanked author for this post.
      • #114457

        Monthly Rollups share the same internal name per CBS rules, thus only the latest one would be show by WMI or CP Installed Updates

        .NET rollups however, are separate, but supersede the previous ones

        1 user thanked author for this post.
    • #114436

      My Windows 8.1 test system is now on the latest updates. The update check went quickly, the updates went in smoothly, and the reboot went smoothly.

      A comparison of my WMI QFE LIST output before and after the update shows:

      • KB4015553 “Update” removed.
      • KB4014505 “Update” added.
      • KB4014510 “Update” added.
      • KB4020821 “Security Update” added.
      • KB4019215 “Security Update” added.

      ScreenGrab_NoelC4_2017_05_11_155201

      -Noel

    • #114549

      Patched on Monday.

      Win7 Pro x64, all current with April, except for optional patches.  No problems.

      Win10 Pro 1607 x64.  All current with April patches now.  No problems.

      Windows 10 Pro 22H2

    • #114652

      There is simply no parallel universe in which having a 5-10 email conversation with everyone on my network about when it’s safe to let Windows Update patch and hand holding step by steps on what needs to be dug into and disabled is going to be EASIER for me than to upload patches as I install them for myself and ask everyone once to check their network folder once a day for anything new to install on their end.

      Just a partial solution, but with important updates I sometimes use a login script to install patches downloaded to a network share–sometimes three or four. It makes the login take a bit longer, but this way I’m sure they get installed without having to worry about a user forgetting or just deciding he/she is too busy to bother.

      GaryK

      • #114656

        Why not using tools designed for the purpose like WSUS instead of the old fashioned login scripts?

    • #114668

      Why not using tools designed for the purpose like WSUS instead of the old fashioned login scripts?

      WSUS is a great alternative. I suggested logon scripts as an alternative to trusting users to check a network share every day to see if there were updates to install, which in my experience (and with my users) is not viable. As far as WSUS, I just never got into it. When I first looked at it lo those many yeas ago I was supporting multiple, space-constricted, SBS 2003 boxes connected to slow DSL lines. The boxes didn’t have the space and the DSL lines didn’t have the bandwidth for the WSUS downloads. At the time, WSUS just seemed like overkill., and I found other ways to cope. I have come to prefer touching user boxes (remotely) on a regular basis. Connecting to them and running Windows Update gives us a feel for how the boxes are running and lets us spot anomalies and catch and release them early and quickly before they do too much damage. Ultimately you have to make choices that work best with how your mind works (or in my case doesn’t).

      GaryK

      • #114683

        Gary, WSUS downloads only those updates which are approved by the WSUS administrator. Many admins tend to approve everything or use the default rule to approve all Important (Critical & Security) updates, but in most cases this is overkill and uses too much bandwidth and storage. The only updates which have to be approved are those which are needed. Those superseded can be declined and the storage released following the cleanup task. I agree with you that there is some work going into learning how to use WSUS effectively, but if you have many users under management, it is a lot more effective than running login scripts.
        However, the best solution for the task at hand is the one which works best for you 🙂

        1 user thanked author for this post.
        • #115069

          Given how complex the act of patching hundreds of machines has become, I honestly don’t think I could do my job and remain (mostly) sane without WSUS.

          Of course, it’s got its own special needs for care and feeding . . .

          ~ Group "Weekend" ~

    • #114685

      Gary, WSUS downloads only those update which are approved. Many admins tend to approve everything or use the default rule to approve all Important (Critical & Security) updates, but in most cases this is overkill and uses too much bandwidth. The only updates which have to be approved are those which are needed. I agree with you that there is some work going into learning how to use WSUS effectively, but if you have many users under management, it is a lot more effective than running login scripts. However, the best solution for the task at hand is the one which works best for you 🙂

      Absolutely. For larger organizations, WSUS is a godsend.

      GaryK

      • #114870

        As a single-user consumer (in contrast to some corporate/sysadmin-context), I’ve never really gave an try at MS’s WSUS. It’s only recently, that I moved from using the basic idiot-proof (now “trouble-sure”) WU, to some mixed use of the Catalog (MUC) & their Bulletins .

        But the more I hear about WSUS (along with other similar “more Corporate-Targeted Windows update management solutions), the more I feel like I should step-in, or at the very least give those a try.

        But having not much experience with servers (yet open to), I’d be tempted to try the unofficial offline version WSUS Offline first.
        I’d love to know your insight on this ? Sounds more like a fair “GO” or “NO-GO” to you guys ?

        Everyone’s opinion are much appreciated, just try to back your claim with some source when possible.

        • #114886

          WSUS Offline and the Windows Update Mini Tool (WUMT) were discussed in some depth on this site in the past. I don’t have time right now to search for the links – try maybe under “Tools” or the “Admin IT Lounge”

    • #114837

      In carefully reading the info on KB4019264, at the top under the heading of “Improvements and fixes”, the bulletin clearly states “This security update includes improvements and fixes that were a part of update KB4015552 (released April 18, 2017) and also resolves the following: …Security updates to Internet Explorer, Microsoft Graphics Component, Windows COM, Microsoft ActiveX, Windows Server, Windows kernel, and Microsoft Windows DNS.”

      BUT, if one reads the info listed under the “More Information” section of the bulletin, it clearly states “This Monthly Rollup update does not include security fixes for Internet Explorer. In order to obtain the security fixes for Internet Explorer, the Cumulative Security Update for Internet Explorer KB4018271 should also be installed. Note that the Security Monthly Quality Rollup does contain security updates for Internet Explorer.

      The added emphasis (making the type appear bold) is mine and not included in the original bulletin.

      Also note that, at the top of the page, MS clearly calls the update just a monthly rollup, not a Security Monthly Quality Rollup. However, in the listings for Windows Update, it (KB4019264) is labeled as a Security Monthly Quality Rollup.

      Could this all just be a case of MS not editing their bulletin’s content well enough (a typo), or does this update indeed NOT contain the security fixes/patches for IE11? If the patch isn’t included, then many folks are going to have to go get it separately from the MS Update Catalog who may not be used to dealing with said catalog and may get very frustrated.

      • #114844

        There were patches KB4018271 (Win7) and KB4018271 (Win8.1) labeled Cumulative Update for IE11 that were not issued through Windows Update dated 5/9/2017, listed in MS Description of Software Services.

        Correction: initial info was incorrect.

        • #114852

          I ran WU just before posting my question, and I was not offered the separate IE patch for May, only the superseded patch for IE from 2014, along with 4 Office 2010 patches, a .NET patch, the May rollup (KB4019264) and the usual KB890830 monthly anti malware scan.

          • #114857

            You are correct. The initial info was incorrect – the patches were listed on the MS Description of Services page.

            • #115441

              Does that mean that there’s no need to install cumulative IE update after installing KB4019264 May 2017 rollup for Win7?

            • #115449

              That is correct. The Cumulative Rollup KB4019264 contains the update for IE11

      • #114850

        This appears to be another “copy and paste” error from Microsoft. The May 2017 monthly rollup includes the Internet Explorer fixes.

    • #114912

      From May 2017 monthly rollup for Windows 8.1:

      “If a Server 2012 R2 system uses an Intel Xeon (E3 v6) family of processors, installing this update will block downloading and installing future Windows updates.”

      1 user thanked author for this post.
      • #114934

        Oh boy. They don’t know when to quit….

      • #115648

        @MrBrian
        Please provide the full meaning of the description in the article.
        The Windows 2012 R2 Server issue is a BUG (known issue). 🙂

        1 user thanked author for this post.
    • #115270

      Group A guinea pig.  Win 7 X 64  Home premium.  Installed everything the May  updates offered.  No slow down, no issues.

    • #115630

      Few more patches for this month, released few hours ago:

      2017-05 Update for Windows 10 Version 1607 for x64 based Systems (KB3150513)
      2017-05 Update for Windows 10 Version 1607 for x86 based Systems (KB3150513)
      2017-05 Update for Windows Server 2016 for x64 based Systems (KB3150513)

      Windows Server 2016 is the same version 1607, only that it is LTSB (not CB or CBB).
      Windows Server 2016 shares much of the code with Windows 10 1607.

       

      Edit to change 2106 to 2016 in last line

      Edit: Thank you @PKCano 🙂

      Now the previous versions of the same updates from May, 5 have been expired after few hours from the release of the newer versions.

      • #118925

        Gunter Born is reporting that KB3150513 has been re-released, dated 31 May 2017, for AU/1607 & Server 2016.

        • #118931

          They are being diligent about shipping out these KB3150513 packages, it has been promptly thrown on the waste pile.
          This is off topic but interesting:  The Microsoft Machine wastes little time if a user plugs in a (new) device, they may be offered a Microsoft driver package for it when checking for updates.

    • #115744
    • #119219

      The Windows 8.1 May 2017 monthly rollup and security-only update have this issue documented:

      “This security update introduced an issue in which, if an iSCSI target becomes unavailable, attempts to reconnect will cause a leak. Initiating a new connection to an available target will work as expected.”

    Viewing 61 reply threads
    Reply To: Patch Tuesday is rolling out

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: