An interesting observation from Noel Carboni: UPDATE Noel notes: It turns out ctldl.windowsupdate.com is a legitimate security check: https://technet.
[See the full post at: Unidentified Windows Update process]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Unidentified Windows Update process
Home » Forums » Newsletter and Homepage topics » Unidentified Windows Update process
- This topic has 7 replies, 4 voices, and was last updated 9 years, 1 month ago.
AuthorTopicViewing 6 reply threadsAuthorReplies-
Noel Carboni
GuestApril 21, 2016 at 10:32 am #44031I’ve learned more…
It turns out ctldl.windowsupdate.com is a legitimate security check:
https://technet.microsoft.com/en-us/library/dn265983.aspx
Why Explorer did it is still a bit of a mystery, and it’s not from Classic Shell as it turns out I had the Classic Shell auto-update check already disabled on the Win 7 system.
Perhaps the expiration of a certificate invoked this behavior on all systems.
-Noel
-
ch100
AskWoody_MVPApril 21, 2016 at 3:36 pm #44032A lot of processes in Windows do what in Internet Explorer Advanced options is designated as “Check for publisher’s certificate revocation”. That setting is common to other components of Windows, maybe Windows Explorer, so by disabling it, frequent checks are avoided, although I do not recommend disabling that check box, enabled by default.
.NET Framework does the same and this is presented here https://support.microsoft.com/en-us/kb/936707
This applies to .NET Framework 4.x as well, by using the relevant configuration files.
Same thing related to a particular situation in Citrix XenApp and .NET Framework https://support.microsoft.com/en-us/kb/936707Disabling the certificate checks is more common in Enterprises where various servers and pcs are not directly connected on the Internet, but via proxy servers. Although it is possible to set the proxy per-system with netsh, this is not commonly configured and this is what the article linked by Noel on Technet explains and provides workarounds.
It is a good thing that this was posted by Noel via Woody to clarify some of the accesses which otherwise may look to less aware users as not legitimate.
For those interested in monitoring the certificate related activity, there is a CAPI2 log under Event Viewer which is disabled by default and needs to be enabled. After a while, maybe 1 month or so, the log is again disabled by the internal routines in Windows.
-
Brady
GuestApril 22, 2016 at 12:09 pm #44033Thanks for the thorough and intelligible knowledge bomb.
I have no idea if/when I would need to know this, but I’m very glad we have experts like yourself spreading the erudition around, CH.
And thanks to Noel also. I get anxiety whenever my WFN (simple utility) pops up some new outgoing ip connection with Block/Allow?
I haven’t booted up my home PC in a few days, and now I know if I see this not to worry. -
John
GuestApril 22, 2016 at 2:12 pm #44034Major clarification.
ctldl.microsoft is not about revocation checks at all. It is about updating the list of trusted root certificate authorities from the preinstalled tiny set of outdated ones to the (ever changing) list of CAs appproved by Microsoft. Updates from ctldl are controlled by a different setting than Windows Updates or Revocation checks, and it usually happens in whatever process that happens to check the validity of a certificate not yet on the ctldl and/or on regular intervals to check if any certificates were distrusted by Microsoft.
You can see the list of CAs already installed in the certificates MMC add-on (have to create your own MMC layout for that) or in a subdialog of the “Contents” tab of Internet Options. From there you can also modify the list according to your own trusts. But there is no direct user interface to review or change the trusts and distrusts that your PC has not yet downloaded from Microsoft.
As one additional twist, the check against downloads signed with the outdated SHA-1 algorithm after Jan 1, 2016 only happens if the corresponding root certificate was installed by the ctldl download process (or was on the Windows CD), not if the very same certificate was installed manually or via group policy. This is almost documented by Microsoft saying it only applies to the root certificates they trust (though they have not publicly admitted that it is somehow linked to how the root certificate was installed on the end user PC).
As for relevant Windows Updates, I know about 3: KB2813430(Oct23, 2014 maybe older) enhances the certreq command line tool to allow downloading the ctldl list to a directory of files that you can pick and choose from. KB3004394(Mar 2015) increased the timed checks from weekly to daily. KB3135996(Mar 2016) requires that one of the download-only certificates is installed first.
KB3149737 (not an update as such) explains how to manually download and distribute the list instead of letting Windows check ctldl.microsoft, the text in KB3149737 begins with some chat about the need to do this if you turned off automatic checks on Windows 7/2008R2 due to a specific root not being installed by default, but then goes on to provide a useful overview of ways to manage the trusted root list manually.
-
ch100
AskWoody_MVPApril 22, 2016 at 4:02 pm #44035I think John is right in relation to the ctldl site which is ctldl.windowsupdate.com. You cannot browse directly to that site as it is meant to be used by an internal process and not by Internet Explorer or any other browser.
The other considerations in my post are valid too, maybe not in relation to that particular site though. -
Morty
AskWoody Lounger -
woody
Manager
Viewing 6 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Edge Seems To Be Gaining Weight
by
bbearren
1 hour, 11 minutes ago -
Rufus is available from the MSFT Store
by
PL1
9 hours, 50 minutes ago -
Microsoft : Ending USB-C® Port Confusion
by
Alex5723
11 hours, 59 minutes ago -
KB5061768 update for Intel vPro processor
by
drmark
8 hours, 13 minutes ago -
Outlook 365 classic has exhausted all shared resources
by
drmark
10 hours, 10 minutes ago -
My Simple Word 2010 Macro Is Not Working
by
mbennett555
7 hours, 45 minutes ago -
Office gets current release
by
Susan Bradley
10 hours, 22 minutes ago -
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
2 days ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
1 day, 8 hours ago -
Stop the OneDrive defaults
by
CWBillow
2 days, 1 hour ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
2 days, 11 hours ago -
X Suspends Encrypted DMs
by
Alex5723
2 days, 13 hours ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
2 days, 13 hours ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
2 days, 14 hours ago -
OpenAI model sabotages shutdown code
by
Cybertooth
2 days, 14 hours ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
2 days, 3 hours ago -
Enabling Secureboot
by
ITguy
2 days, 10 hours ago -
Windows hosting exposes additional bugs
by
Susan Bradley
2 days, 22 hours ago -
No more rounded corners??
by
CWBillow
2 days, 18 hours ago -
Android 15 and IPV6
by
Win7and10
2 days, 8 hours ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
3 days, 11 hours ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
3 days, 13 hours ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
3 days, 8 hours ago -
Windows Update orchestration platform to update all software
by
Alex5723
3 days, 21 hours ago -
May preview updates
by
Susan Bradley
3 days, 8 hours ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
3 days ago -
Just got this pop-up page while browsing
by
Alex5723
3 days, 13 hours ago -
KB5058379 / KB 5061768 Failures
by
crown
3 days, 10 hours ago -
Windows 10 23H2 Good to Update to ?
by
jkitc
2 days, 12 hours ago -
At last – installation of 24H2
by
Botswana12
4 days, 12 hours ago
Recent blog posts
Key Links
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 |
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.