ISSUE 17.3.0 • 2020-01-20

Logo
The AskWoody PLUS Newsletter

In this issue

WINDOWS 7: Closing the book on Windows 7

BEST OF THE LOUNGE: Tools of the trade — PC edition

LANGALIST: Win10’s default lock screen is a wasted opportunity

PATCH WATCH: 2020 patching starts with a bang!

WOODY’S WINDOWS WATCH: Say hello to the latest and greatest Microsoft Edge


Windows 7

Closing the book on Windows 7

Susan BradleyBy Susan Bradley

We’ve finished the last chapter for the storied Windows 7 operating system — at least for almost all home users.

With all the various notifications, can there be a Win7 user who doesn’t know that the last general patches were sent out this past Tuesday (January 14)? If so, it’s time to come out from under your rock.

On the other hand, Microsoft has given businesses a bit more time for upgrading to a current version of Windows — or some other fully supported OS of their choice. As we’ve reported in several articles, such as “Hunting for an elusive Win7 ESU license” (2019-12-23 AskWoody Plus newsletter), businesses of any size can purchase Win7 Extended Security Updates licenses — for up to three years. Each ESU is good for one year, and each succeeding year’s license has a higher fee.

Unfortunately, Microsoft did not make acquiring just one or two ESU licenses especially easy for small businesses. So as a service to all AskWoody small-business readers, we’ve posted an application form. Simply enter your contact information, and you should hear from Amy Babinchak’s Harbor Computer Services. (Note: The cost will be slightly higher than the first year’s base U.S. $61 ESU license fee. Harbor Computer Services doesn’t make any revenue from this offer, so it must pass along an additional charge-card fee.)

Again, the licenses need to be renewed once a year, and the cost escalates — Microsoft really wants you off Win7 as soon as possible. That three-year deadline will sneak up on you sooner than you think. So start planning immediately for a new platform. (And keep in mind that we have only three more years of support for Win8.1 and Server 2012 R2.)

Keeping Win7 users in the EoL loop

As you can imagine, the end of support for Windows 7 is a hot topic on the AskWoody forums. I’ve started an online FAQ. Here are some of the more-frequently asked questions — and my short answers:

  • Q: Are Win7 Home-edition machines allowed to participate in the extended support service?

    A: No. The offer is available only for Professional, Ultimate, and Enterprise editions.

  • Q: Does any type of business qualify for this offer?

    A: Yes, ESU licenses are open to all businesses — even if you want to purchase just a single key (as I did).

  • Q: Do I have to buy them now? Do I have to install them today?

    A: No to both . But to stay secure, you should purchase your ESU licenses before February’s Patch Tuesday.

Here’s a series of questions from an AskWoody Plus member — along with my answers. They cover a lot of Win7 EoL territory. (Our reader graciously let me re-post the Q&As here. They are edited for clarity.)

  • “Susan, I feel lucky to have had Woody’s, the other MVPs’, and your wisdom and guidance. I’ve been following your advice for the past several years as it applies to my two Win7 Pro x64 systems. (One PC has Office 2010 and the other has Office 2013.) I purchased these systems for our small business — and for various reasons, I need to keep them running on Win7 Pro.”

[Susan’s reply] I understand perfectly. I have one Windows 7 machine that I’m keeping in the platform mix at my office.

  • “I’ve been a Group B member for the past several years, and I’m presently patched up through November’s Windows and IE updates. I’ve been working through PKCano’s “Group B” page on askwoody.com to manually download patches from the Microsoft Update Catalog each month.

    “Here’s where I’m hoping (fingers crossed!) that you will walk me through December’s security updates and the purchasing/installing of the Win7 ESU, which I understand will keep my systems up to date for the next three years — at an initial annual fee of U.S. $61 (?) per PC.

    “Along with November’s Windows and IE updates, I’ve installed the servicing-stack and SHA-2 patches through September. But I did not add November’s servicing-stack update KB 4523206. As I recall, it was the same as the September version.

    “Should I now jump to Group A [rollups] and install December’s monthly rollup KB 4530734 — particularly if I’ll be purchasing Win7 ESUs via your colleague Amy? Or can I stay with Group B [security-only] patches KB 4530692 and KB 4530677?

    “Also, I’m a little confused by your ESU ‘arming process’ directions. They mention that you must have October’s rollup (KB 4519976) installed. If that update is hidden or doesn’t show up in Windows Update, will the December rollup (KB 4530734) take care of the ‘arming process?'”

At a minimum, you must install the October Win7 monthly rollup (not just the security patch). But you can also opt for either the November or December rollups.

Microsoft released a new servicing-stack update for January, but — following our usual practice — I’d defer all of this month’s patches. For now, concentrate on last year’s fixes. (If you want to live a bit dangerously, you can, of course, install the January updates — you’ll then be able to install extended-security patches just fine.

Given that you historically installed security-only updates — including November’s — you won’t see rollups offered. So when running your next manual update using files from the Microsoft Update Catalog, be sure to pick the rollup and not the security-only patch. Again, you can install any monthly rollup from October (KB 4519976) on.

  • “Should I install December’s servicing-stack update (KB 4531786) first, as your latest Master Patch List suggests? And would clicking “Check for updates” in Windows Update download and list it? Or will it show up only after the other December Group A or Group B patches are installed?”

I would install the November servicing-stack update (KB 4523206) first and then install whatever rollup is offered. Again, Microsoft has released January’s servicing-stack update (KB 4536952), but I recommend deferring it for a while. Bottom line: You can install any servicing-stack update released after September.

  • “I recall reading that December’s Windows patches have upgrade nagware, and one of your colleagues had a way to disable it. Back in August, I disabled that “feature” by using the task manager settings recommended by AskWoody members. (Of course, as a Group B updater, I haven’t installed, or I’ve hidden, any other Win7 telemetry patches.)”

To be rid of the nag, you can use the registry-key trick (more info) — or merely click a button to hide the nag when it first appears. That said, if your computers are in a domain, you won’t see this most recent upgrade warning.

  • “The link Woody provided for purchasing ESUs doesn’t indicate whether you need Office 365. Is it okay to purchase an ESU and then select ‘no’ to having an associated Office 365 tenant? It’s my understanding that this form was created by Amy and her licensing expert Ted.”

Yes, the form was produced by Amy and Ted. And no, you don’t need any sort of Office 365 account. But acquiring an ESU from another source might involve adding Office 365.

I see no reason why an Office 365 account should be needed for an ESU. It’s just Microsoft red tape. I’m assuming that because the Office 365 team is small/medium business–focused, they shouldered the burden of sponsoring extended support.

This is the first time that small businesses have been able to participate in ESUs — previously, the service was limited to Enterprises. So regardless of any hurdles you might have to cross, this is a big win for all small firms.

  • “To clarify, are you recommending Harbor Computer Services as the go-to place for buying ESUs? (I was confused by the link sso.techdata.com.) I’m assuming the purchase form will let you acquire two ESUs together?

    “Also, in your article “Hunting the elusive Win7 ESU license,” I was a bit confused by the directions for the activation key (just after Figure 1). You state that users should enter simgr / along with the activation key. And if you purchased ESUs via the HCS form, all ESUs will have the same activation ID, ending in 93e0. So it’s one MS Update file (MSU) for two Win7 — at approximately $132 for year one of three?”

Yes, that Harbor Computer services form is where we recommend small-business AskWoody readers go to purchase the ESU product keys. Note that the activation key is the same for all of us — only the product key is different for each customer. Furthermore, that product key will be the same for your two computers.

  • “Should I purchase and install ESUs before installing any of the December patches?”

You can buy licenses at any time. However, to stay secure, it would be best to have them in place before February’s Patch Tuesday. But you don’t have to purchase an ESU before adding the preparation updates discussed above.

Putting it all together

We went on to summarize the process:

  • Download and install either the November (KB 4523206) or the December (KB 4531786) servicing-stack update from the MS Update Catalog site (Win7 Pro x64 for 64-bit machines or X86 for 32-bit systems).
  • If you’ve already installed November’s security-only and IE updates, download and install the December Win 7 roll-up KB 4530734.
  • As to the Win7-upgrade nag pop-up, you can make it disappear by simply clicking Don’t ask me again in the lower-left corner of the pop-up.

When you are fully updated through December, and you have the product keys Amy or Ted emailed to you, do the following steps:

  • Open an elevated command prompt (i.e., enter “cmd” into the Windows search box and then select the “Run as administrator” option).
  • Type slmgr /ipk at the prompt plus the product key you received, as shown in Figure 1. Hit Enter. Eventually a screen will pop up indicating that the key was properly entered.

    (Note that the slmgr string is S L M G R — an L, not an I — and there’s a space between slmgr and the next part of each command.)

    Key entry confirmation
    Figure 1. ESU product key successfully entered

  • Back at the prompt, enter slmgr /dlv and click Enter; this will go out and acquire the given activation key.
  • Again at the command prompt, enter slmgr /ato 77db037b-95c3-48d7-a3ab-a9c6d41093e0 (the “0”s are zeros, not the letter “O”).
  • Finally, check the activation status by typing in slmgr /dlv at the prompt. It should show that you’re now activated for ESU patching.

If you have any issues with the process, please visit us on the AskWoody forum. We’ll be there to help.

Questions or comments? Feedback on this article is always welcome in the AskWoody Lounge!

In real life, Susan Bradley is a Microsoft Security MVP and IT wrangler at a California accounting firm, where she manages a fleet of servers, virtual machines, workstations, iPhones, and other digital devices. She also does forensic investigations of computer systems for the firm.


Best of the Lounge

Tools of the trade — PC edition

Are you handy with small tools? Do you have some knowledge of PC guts and a propensity to DIY when it comes to repairing your machine?

In a PC hardware post, MVP MrJimPhelps tells us what’s in his DIY pro-level tool box, complete with mirrors, magnifying glasses, and other essentials. And find out what other tools forum members suggest that will help with any computer-repair task — even if you’re not a technician.


Windows 10

Plus member richw42’s computer is behaving restlessly. The Win10 1903 machine now refuses to go to sleep — it won’t even shut down gracefully. Puzzled, richw42 turned to other AskWoody Loungers for an explanation and a cure. The answer is still in the wind.


Windows 7

After years of use, Plus member cellsee6’s HP 470 G3 laptop started blue-screening for no apparent reason. The WhoCrashed report points to a hardware malfunction, and cellsee6 heads to the forum for help with deciphering the memory dump. Fellow members suggest instead that checking disk-drive health is a good place to start.


Linux

New year, new problem for Plus member Slowpoke47. For some reason, Linux-based Firefox started rendering text like a really bad print job. Loungers walk Slowpoke47 through various possible causes and different solutions.


Windows 1909

MVP MrJimPhelps remotely upgraded two computers to Windows 1909. One upgrade was flawless, the other not so much — the video was severely distorted. Read along as MrJimPhelps takes us through a guided troubleshooting tour.


Windows 10

Plus member CorKam revisits an often-asked question: How to transfer software and data from an old Win7 portable to a new Win10 machine. Using transfer software is tempting, but simply reinstalling applications might be the better path.


Windows10

Plus member berniec had a problem diagnosing a driver issue that prevented Wi-Fi from restarting after the laptop emerged from hibernation. Tired of running Windows’ built-in troubleshooter, berniec turned to forum members for a better solution. PowerShell, anyone?


If you’re not already a Lounge member, use the quick registration form to sign up for free.


LANGALIST

Win10’s default lock screen is a wasted opportunity

Fred Langa

By Fred Langa

The default Win10 lock screen is awful — a cluttered mess of ads, random impersonal images, and vanilla system information.

But all three of those elements are easily customized; you can make the lock screen truly your own, with the information you need, the images you want — and with no ads!

Easy ways to make the Win10 lock screen more useful

Reader Brandon Na asked:

  • “What do you think of the images Windows 10 uses these days on the lock screens of our PCs?”

I like the concept of a pleasant-looking lock screen, but the default Win10 implementation is simply too generic.

The lock screen is, of course, the combination of image and information displayed by Windows after startup but before you sign in. It also shows up anytime the PC has been “software-locked” (automatically or when you press Winkey + L).

In many older Win10 setups, the default lock screen is basically just a glorified clock with a never-changing image of a seaside cave (Figure 1).

classic win10 lock screen
Figure 1. The classic, default, and never-changing Win10 “seaside cave” lock screen

In truth, the default generic layout of the Win10 lock screen is intended to be a placeholder: a fairly attractive screen that would eventually be “personalized” (in Microsoft-speak) by users.

Unfortunately, few users know of or utilize the many available lock-screen customizations. The result is that millions of PCs — maybe yours! — show the same boring and almost-useless lock screen forever.

To me, it seems counterproductive to have potentially useful system information displayed on a screen that’s so static and dull, no one really pays attention to it anymore.

I suspect that’s one of the reasons why newer versions of Win10 usually default to a series of randomized images generated by the “Windows Spotlight” service. These images are overlaid with some basic system information and icons — which I find perfectly fine. But you also get several floating text links for what Microsoft calls “fun facts, tips, and more.” I call them ads.

Figure 2 shows a typical default lock screen on newer versions of Win10. I’ve superimposed yellow numbers and arrows to highlight the three separate elements of this type of screen: (1) a random, Microsoft-selected background image; (2) several ad links; and (3) system icons and information.

Windows Spotlight lock screen
Figure 2. A default Windows Spotlight lock screen, marked up to highlight the MS-supplied image, several disguised ads, and some system information

The Windows Spotlight stock images vary widely in quality. Some are acceptable (the one shown above isn’t bad), but many are, to my eyes, just awful — with garish, oversaturated colors and far-from-realistic dynamic ranges. (My guess is that many of these images were originally meant to be printed — thus the over-processed colors — rather than to be displayed on a bright screen.) My reaction is more often “ugh” than “wow.” But even if the images were fabulous, shouldn’t your lock screen show something you’d prefer to see, day in and day out?

As for the ads (masquerading as “interesting tidbits”), does anyone besides Microsoft like them? To me, they add visual clutter and distraction while failing to provide an offsetting benefit. I can’t think of a single time when I found the links useful — not once, ever!

The lock screen’s standard system-information text and icons are generic, minimal, and generally inoffensive. But did you know that the screen can display much more information? That includes detailed status data for one app (from a list Windows provides) plus quick-view (iconized) info for seven more (from among 11 choices).

And all those lock-screen elements — background image, ad links, and system information/icons — are completely user-controllable.

On my personal-use PC, I’ve turned off the ads and substituted the stock images with my own family photos. I’ve also explored the alternative system-information options to see whether the defaults are best for me — which, in fact, they are. Figure 3 shows the result. Compare that lock screen to those in Figure 1 or 2. I know which one I’d rather look at every day!

A customized lock screen
Figure 3: In this lock-screen screenshot, I’ve easily killed the ads and changed the image. The default system info/icons were fine for my needs.

Changing lock-screen elements is easy. Here’s how:

The exact mix of lock-screen customizations available to you depends on your PC’s software setup. But every system should support at least the major elements. You’ll find everything you need on a single settings page. To get there, click Settings/Personalization/Lock screen — or type lock screen into the Windows search box and select “Lock screen settings” when it’s offered. The settings page will look similar to Figure 4.

lock screen settings
Figure 4. A standard Lock screen settings page

To change lock-screen background image: Click the box below Background (just below the thumbnail of the current image) to open a drop-down list of options.

Select Picture if you want to show your choice of a single, static image (see Figure 5). Select Slideshow to display a series of images. Or choose Windows spotlight if you want to let Microsoft stay in control.

pull-down menu
Figure 5: Use the Background pull-down menu to select the image(s) you want displayed on the lock screen.

If you choose Picture or Slideshow, you next select the image or images of your choice. For Picture, click Browse and navigate to the image’s location; for Slideshow, click one of the listed folders — or choose Add a folder and click though to a folder of photos. Also click the “Advanced slideshow settings” link to enable/disable other options.

Locations on the C: drive work best because it’s always available to Windows, even before you’re signed in. (Lock-screen photos on networks and some other locations might not become available until after you sign in.)

Kill the lock screen’s ad links: If you have the background set to “Windows spotlight,” you get the ad links whether you like them or not. On the other hand, if you picked “Picture” or “Slideshow,” you’ll see a switch labeled Get fun facts, tips, and more from Windows and Cortana on your lock screen (see Figure 6). Click the toggle to turn this “feature” off.

toggle Off
Figure 6: Just move the toggle to Off to kill those annoying lock-screen ads.

Control lock-screen system information/icons: Your PC’s customization options live just below the Background settings. For the “detailed information” option, click the icon below Choose one app to show detailed status on the lock screen. (See Figure 7.) Pick the app of your choice from the displayed list. The Calendar/clock is the default, but you can change to whatever alternate choices your setup offers. (Typically, this includes apps such as 3D Viewer, Messaging, Mail, Xbox Console Companion, Weather, and some third-party apps such as Dell’s SupportAssist.) You can also select None.

Next, under Choose which apps show quick status on the lock screen, select up to seven additional “quick status” icons from the available choices. These typically include 3D Viewer, Messaging, Mail, Xbox Companion, Weather, Clock/Alarms, Skype, the Microsoft Store, Microsoft Content, and possibly others — plus, again, None.

system information and icons
Figure 7: Easily change, add, or remove system information and icons from the lock screen.

Don’t waste your lock screen!

With lock-screen personalization changes this easy to make, why stick with the boring, cluttered, and (sometimes) ugly default options?

Make your lock screen uniquely your own — with attractive images and just the system info that’s most useful to you. And no ads!

Send your questions and topic suggestions to Fred at fred@askwoody.com. Feedback on this article is always welcome in the AskWoody Lounge!

Fred Langa has been writing about tech — and, specifically, about personal computing — for as long as there have been PCs. And he is one of the founding members of the original Windows Secrets newsletter. Check out Langa.com for all Fred’s current projects.


PATCH WATCH

2020 patching starts with a bang!

Susan BradleyBy Susan Bradley

Patch Tuesday arrived on January 14, and it was not an auspicious start to the new year.

An NSA warning about a newly revealed Windows vulnerability isn’t the only newsworthy event for January. Let’s recap:

As we’ve discussed thoroughly on askwoody.com, millions of Windows users are saying goodbye (sort of) to the beloved Windows 7. For consumers, January’s updates are the last they’ll receive — barring some extraordinary event. Businesses still relying on Win7 machines (and there are possibly millions) get a three-year reprieve — if they take advantage of Microsoft’s Win7 Extended Security Updates (ESU) offering.

(Remember, you can buy an ESU, a year at a time, by filling out our application form, as noted in the 2019-12-23 article “Hunting for an elusive Win7 ESU license.”)

Those future Win7 security updates are crucial for businesses. To underscore that point, the National Cyber Security Centre (part of the U.K. Government Communications Headquarters intelligence agency) put out a warning to not use Windows 7 for online banking — unless you continue to receive security fixes after January 14.

I know of too many people who say they’re comfortable with running this obsolete OS without updates. I’m not one of them. So consider exactly where and how you plan to use your no-longer-secure copy of Win7. Don’t use it for online banking, for filing your taxes, for managing medical accounts, or on any other site that involves sensitive personal information. The phishers and scammers are extremely adept, and an unpatched Win7 system is, as they say, low-hanging fruit.

On the browser front, Chromium-based Edge is now out (more info). I rarely install beta products on production machines, but I made an exception this time. It’s running just fine, and it’s probably more secure than the original Edge. Better yet, it works on Windows 7 and macOS.

According to a Microsoft Windows Blogs post, the company will slowly roll out the new version over several months — in other words, it’ll eventually show up in Windows Update. Not surprisingly, the initial release is not without hiccups: there are reports that the update is set to a language different from the local system’s default.

Rules for patching

For this Patch Watch, I’ve broken down patching guidance into two sections: one for Windows consumers (effectively anyone not connected to a domain) and the other for small-business PC admins.

Personal Windows users: Managing January patching works just as in any other month. Defer all updates for at least a couple of weeks, unless we say otherwise. I’ve not heard of nor seen any major issues with January’s fixes, but we’re still freshly past Patch Tuesday. Bad things could still pop up. And as I’ve mentioned numerous times, Win10 Pro gives you more control over when updates are installed than will the Home edition.

Also, Woody now recommends that Win10 1809 users move up to Version 1903. (If you’re still on Version 1803, you’re pushing your luck.)

Administrators: January is somewhat complicated. If you manage Windows Server platforms — or you’re more paranoid than most — I’m going to bend the standard patching rules and strongly suggest that some of you install January updates relatively soon.

Why? It starts with the recently disclosed Windows vulnerability you’ve no doubt read about. Ironically, on January’s Patch Tuesday, the U.S. National Security Agency (aka the NSA) posted an advisory about a “critical” flaw in Windows: crypt32.dll (or, officially, CVE-2020-0601).

I don’t see this vulnerability as a serious threat to individuals, small businesses, and other smaller organizations. By my reading and interpretation of the NSA advisory, the organization found it while either trying to get into someone else’s computer or investigating how the bad guys got into government systems. The vulnerability must not have been all that useful to the NSA, because it passed on information about the flaw to Microsoft. Moreover, any related exploits would most likely target infrastructure, governmental institutions, and all sorts of other large and scary entry points.

The good news? Even without patching, Microsoft and other antivirus vendors are putting protections in place to thwart bad actors.

The vulnerability is connected to certificate validation in Win10, Server 2016, and Windows Server 2019. Attackers exploit the vulnerability by crafting certificates that appear to have been legitimately signed. Here’s how the bad guys might use the vulnerability. It’s a bit scary to read.

  • Apply man-in-the-middle attacks targeting secure connections made through a Web browser (Edge, Internet Explorer, Chrome, etc.)
  • Apply man-in-the-middle attacks against secure connections over ports and protocols for such services as Web servers, RDP connections, Active Directory connections, and so forth
  • Forge certificates that will make phishing sites harder to detect
  • Forge signing certificates will be used to hide malicious software
  • Install malicious applications that could enable code injection

Fortunately, the following Windows components are not impacted because they rely on a different certificate process:

  • Windows kernel-mode code integrity validation
  • Windows Update
  • Xbox and Xbox Live
  • Azure real-time operating system (RTOS)
  • Windows Hello
  • Windows Defender antivirus

Moreover, Windows Defender will sense when a maliciously signed certificate is being used, which is good news for Win10 users who use the default anti-malware system. However, the fact that the threat seems limited to Windows 10, Server 2016, and Server 2019 proves once again that newer isn’t always better.

So … if you just happen to be in charge of, say, a nuclear power plant, and you’re running the aforementioned Windows versions, you might want to add January’s updates sooner rather than later. As for the rest of us? We can kick back and wait to hear that the updates are sound.

A more worrisome threat? In truth, I’m more concerned about two other recently revealed vulnerabilities — CVE-2020-0609 and CVE-2020-0610 — that center on Remote Desktop (used on the client side) and Remote Desktop Gateway, which many large and small businesses use to allow remote staff access to company systems. Of the two, the latter is the more troubling.

On Remote Desktop Gateways, the vulnerabilities show up as a pre-authorization flaw — meaning the attacker doesn’t have to authenticate to servers that have RDgateway installed. (This feature isn’t installed by default.) However, if you happen to be running Small Business Server Essentials 2012 or 2016, you’re vulnerable to this potentially wormable bug.

I was so concerned about this potential threat to my Windows Server installations, I applied the January updates the same day they were released. The good news is that Microsoft has since updated its security advisory with more specifics: an attacker would have to come in through a typically unexposed port (UDP 3391). So the threat is probably not as bad as I thought.

For those of you still running Small Business Server 2011, 2008, or even 2003, be comforted that none of those platforms is vulnerable to this bug. That said, all three of those platforms are no longer supported, so you’ll need to migrate to the formerly vulnerable systems soon. Bottom line: If you have RDgateway installed, you’ll probably want to fast-track the January patches.

Another bug that gave me pause, but not sleepless nights, impacts Remote Desktop. CVE-2020-0611 is not a great threat unless you have a habit of connecting to the office from often-unsecure locations such as coffee-house hotspots and hotel Wi-Fi.

This threat has almost no impact on home systems. A successful attack would require tricking a user into connecting to a malicious site via social engineering, DNS poisoning, or man-in-the-middle techniques. But those who travel and use Remote Desktop are vulnerable. So you might immediately approve January’s patches for them.

Patching summary

Again, we are less than a week past January’s Patch Tuesday. Things are looking good so far, but we want to remain cautious. The exception is, as discussed above, Windows Server updates.

- What to do: Windows consumers should stick to the usual plan and defer this month’s updates until further notice. Admins might want to test the patches and then apply them as soon as they’re ready to.

Windows 10

Reminder: We recommend that most Win10 users now have Version 1903 installed. If you’d prefer to bump up to Win10 1809, see PKCano’s post.

Servicing-stack updates

  • 4528759 for Versions 1903 and 1909

Cumulative updates

  • 4528760 for Versions 1903 and 1909
  • 4534273 for Version 1809 and Server 2019
  • 4534293 for Version 1803 (Enterprise and Education editions only)
  • 4534276 for Version 1709 (Enterprise and Education editions only)
  • 4534296 for Version 1703 (Long-Term Servicing Channels; LTSC)
  • 4534271 for Version 1607 (LTSC) and Server 2016

.NET Framework

This month’s .NET updates include security patches for several vulnerabilities — so they’re important. Note that Win10 1809 has three updates listed. But you should see only one to be installed. (Typical .NET confusion!)

  • 4532938 for Versions 1903 and 1909 (.NET 3.5 and 4.8)
  • 4532937 for Version 1809 and Server 2019 (.NET 3.5 and 4.8)
  • 4532947 for Version 1809 and Server 2019 (.NET 3.5 and 4.7.2)
  • 4535101 for Version 1809 and Server 2019 (.NET 3.5, 4.7.2, and 4.8)
  • 4532936 for Version 1803 (.Net 4.8; Enterprise and Education editions only)
  • 4532935 for Version 1709 (.NET 4.8; Enterprise and Education editions only)
  • 4532934 for Version 1703 (.NET 4.8; LTSC only)
  • 4532933 for Version 1607 (.NET 4.8; LTSC only) and Server 2016
Windows 8.1/Server 2012 R2

If you’re running Win7 and not interested in Win10, consider upgrading to Windows 8.1. It still has the monthly rollup or security-only cadence that Windows 7 had. (Future Win7 ESUs will be security-only.)

  • 4534297 – Monthly rollup
  • 4534309 – Security-only
  • 4534251 – Internet Explorer 11 (install with the security-only update)
  • 4535104 – .NET security and quality rollup
  • 4534978 – .NET security-only update
Windows 7/Server 2008 R2 SP1

Remember: These updates include a time-to-update nag message. Block it with registry-key changes or check the “Don’t remind me …” box.

  • 4536952 – Servicing-stack update
  • 4534310 – Monthly rollup
  • 4534314 – Security-only
  • 4534251 – Internet Explorer 11 (install with the security-only patch)
  • 4535102 – .NET security and quality rollup
  • 4534976 – .NET security-only update
Windows Server 2012

These updates still have the Cluster Shared Volume flaw.

  • 4534283 – Monthly rollup
  • 4534288 – Security-only
  • 4534251 – Internet Explorer 11 (install with the security-only patch)
  • 4535103 – .NET security and quality rollup
  • 4534977 – .NET security-only
Windows Server 2008 SP2
  • 4536953 – Servicing-stack update
  • 4534303 – Monthly rollup
  • 4534312 – Security-only
  • 4534251 – Internet Explorer 11 (install with the security-only patch)
  • 4535105 – .NET security and quality rollup
  • 4534979 – .NET security-only
Office security and non-security updates

January’s security updates fix a remote-code-execution vulnerability.

Office 2016

Office 2013 SP1

Office 2010 SP2

The following Office non-security enhancements and fixes were released January 7, 2020.

Office 2016

  • 2920709 – Visio Viewer; duplicate windows class names
  • 4464575 – Visio; crashes with .vsdx files
  • 4464586 – Office; ability to bypass credential prompts
  • 4484140 – Project; cost-value errors
  • 4484168 – Office; new PowerPoint commenting feature (subscription versions only)
  • 4484212 – Outlook; fixes various Outlook issues
  • 4484213 – Skype for Business; toll-free numbers display
  • 4484216 – PowerPoint; new commenting feature (subscription versions only)
  • 4484218 – Office; ODBC Data Sources application stops
  • 4484219 – Word; language and UNC fixes

Office 2013 and 2010

There are no new non-security updates for Office 2013 and Office 2010.

Refresher: Patch Watch rules for updating

It’s a new month of patching. Once again, here are our current recommendations for patching Windows and Office. They may change as Microsoft evolves its updating process.

  • Monthly security patches ship on the second Tuesday of each month (Patch Tuesday). For all versions of Windows, defer this month’s updates for at least 15 days. (Windows 10 will still wait for 15 days if you click “Check for updates.”)
  • Microsoft sends out preview updates, typically on the third Tuesday of each month. They are completely optional and should be skipped on any system not used exclusively for testing. I list the previews in our Master Patch List spreadsheets, so you can look up their KB numbers and see whether they’re available. Again, we strongly recommend you don’t install them on production systems.

    Keep this in mind: On older platforms, it’s clearly stated that the optional updates are previews. But Windows 10 doesn’t make that distinction. You know they’re previews only because they show up a week or two after Patch Tuesday — and they’re not necessarily released on a Tuesday. (Yes, it’s annoying and confusing for WSUS admins.)

  • Remember: Updates can be deferred on Windows 10 Pro and above. If you’re running Win10 Home Version 1903, you can pause patching in seven-day increments; for earlier versions, we recommend upgrading to Win10 Pro.
  • Ensure that Windows 7 is set to download or check for updates, but don’t automatically install them. It’s your best defense against problematic patches.

Stay safe out there.

Questions or comments? Feedback on this article is always welcome in the AskWoody Lounge!

In real life, Susan Bradley is a Microsoft Security MVP and IT wrangler at a California accounting firm, where she manages a fleet of servers, virtual machines, workstations, iPhones, and other digital devices. She also does forensic investigations of computer systems for the firm.


WOODY’S WINDOWS WATCH

Say hello to the latest and greatest Microsoft Edge

Woody Leonhard

By Woody Leonhard

Will Microsoft’s last-ditch effort to reinstate its Internet-browser hegemony succeed?

There’s plenty to like about the new Chromium-based Edge — but plenty of shortcomings, too.

Almost as soon as Microsoft won the Internet-browser race in the 2000s, its hold on that hard-fought market began to erode. By May 2007, Firefox was running on roughly a quarter of all Windows PCs. In 2009, Google’s Chrome burst onto the scene in a big way — and for Microsoft, it’s been all downhill ever since.

So in 2015, Microsoft tried to replace the old and vulnerability-ridden Internet Explorer with the shiny new Edge. Over the past four years, the new browser has gone exactly … nowhere. Edge shipped as the default browser with every version of Windows 10 — an advantage once considered antitrust-worthy. For many new Win10 users, it was known mostly as the best way to download Firefox or Chrome, a bit of notoriety it holds to this day.

I’ve never used Edge consistently; I do play with it from time to time to see what’s new (typically, not much). I’m just not willing to run another snooping Microsoft product. If you use a browser other than Edge (and there’s over a 95 percent chance you do), you probably feel the same way.

Many factors contributed to the demise of Edge as we currently know it: incompatibility, sluggishness, a paucity of add-ons, and the ABM (anything but …) movement. With that situation unlikely to improve, Microsoft decided to take a different tack. Starting around a year ago, it gave Edge a radical rendectomy — which is to say, MS tore out the old, proprietary rendering engine that powered the beast and replaced it with Chromium, the open-source code that’s the foundation for Google Chrome.

Last week, Microsoft formally released the new Chromium-based version of Edge, making it available for Windows 7, 8.1, 10, and related versions of Windows Server. There are even editions of the new Edge for Android, Apple iOS, and macOS. You can download and install it manually — if you’re feeling lucky — or you can just wait; it’ll show up on your PC sooner or later.

Normally, the new Edge will simply install itself on top of the old Edge and display its fabulous and unmistakable icon, shown in Figure 1. (The classic “e” icons of Internet Explorer and old Edge are annoyingly similar.)

The new Edge/Chromium icon
Figure 1. The opening screen for Chromium + Edge, with its distinctive icon

To run both old and new Edge simultaneously, you must make some changes to the Windows registry or Group Policy (MS info).

What shall we call this rebuilt beast? Microsoft fluctuates between calling it the “new Microsoft Edge,” “Chromium-based Edge,” “Edge Chromium,” and “that browser with the cool blue swirl icon.” ZDNet’s Mary Jo Foley started calling it Chredge — which suits me just fine! And what label do we slap onto the original Edge? Microsoft has started calling it “Legacy Edge” or “Edge Legacy.” I think I’ll call it “Better Off Forgotten.”

Putting aside the “Collections” feature (see Martin Brinkmann’s explainer) — which I figure I’ll use exactly … never — the item that struck me as worthwhile is something called “Tracking prevention” (see Figure 2).

The Tracking prevention window
Figure 2. Edge/Chromium’s new Tracking prevention tool allows different levels of Web activity–tracking management.

The intent of this feature seems pretty clear: you can tell Chredge that you want to allow all, some, or no tracking cookies. The documentation has more explicit details, but you can reasonably expect that “Strict” will work as well as some third-party ad blockers. You can also expect that Google’s Chrome, in particular, will try to match the appearance of the feature — if not the intent.

If you decide to give Chredge a whirl, try Tracking prevention on some of your favorite webpages. One well-known computer site that shall remain nameless runs almost a hundred trackers — on just the first page. AskWoody.com, I’m happy to report, has just two trackers: one for “Automattic” (the WordPress site that dishes up avatar pictures on users’ posts) and one for Google (necessary for CAPTCHAs, unfortunately).

You’ll be hearing a lot more about Chredge. If nothing else, Microsoft fanbois will finally have a browser to talk about without being ridiculed. Give it a shot if you feel so inclined, and let us know how it goes on askWoody.com.

Questions? Comments? Thinly veiled prognostications of impending doom? Join the discussion about this article on the AskWoody Lounge. Bring your sense of humor.

Eponymous factotum Woody Leonhard writes lots of books about Windows and Office, creates the Woody on Windows columns for Computerworld, and raises copious red flags in sporadic AskWoody Plus Alerts.


Publisher: AskWoody LLC (woody@askwoody.com); editor: Tracey Capen (editor@askwoody.com).

Trademarks: Microsoft and Windows are registered trademarks of Microsoft Corporation. AskWoody, Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Perimeter Scan, Wacky Web Week, the Windows Secrets Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of AskWoody LLC. All other marks are the trademarks or service marks of their respective owners.

Your email subscription:


Copyright © 2020 AskWoody LLC, All rights reserved.