Newsletter Archives
-
MS-DEFCON 4: Consumers get a break
ISSUE 21.26.1 • 2024-06-25 By Susan Bradley
We’re halfway through the patching year!
It’s time to install the June updates, which is why I’m lowering the MS-DEFCON level to 4. I’m not seeing any widespread issues or major impacts. Most side effects seem to be with Win11 Insider versions and 24H2.
It appears that new technology allowing you to sync your phone with your computer is causing a bit of a CPU hit in the 24H2 release. Microsoft is trying to fix this issue before it gets released to the rest of us. That’s good news.
In the very good news category is the delay in releasing Microsoft Recall, the much-hyped “reminder” software. The company pulled back at the last minute, due to concerns from security researchers and businesses.
Anyone can read the full MS-DEFCON Alert (21.26.1, 2024-06-25).
-
MS-DEFCON 4: Major April issue, but not from updates
ISSUE 20.17.1 • 2023-04-25 By Susan Bradley
I’m ready to approve the April updates.
Accordingly, I’ve lowered the MS-DEFCON level to 4. This is not to say there are not a few oddities out there, but they will not affect many users.
Most of the unusual behavior in updates this month is due to slow changes that will lead to future enforcement changes.
Microsoft has also pushed off the implementation of the mandatory, number-based, multifactor authentication for Microsoft 365 applications.
Anyone can read the full MS-DEFCON Alert (20.17.1, 2023-04-25).
-
Apple and Microsoft fix April zero days
PATCH WATCH
By Susan Bradley
Tomorrow is the tax-filing deadline in the US. It’s not the time to be installing updates, especially since we’re still at MS-DEFCON 2.
In other words, we’re still in deferral mode despite several newsworthy patching headlines and despite my not having noticed any significant side effects. As usual, I suggest patience until we know more.
The majority of the items of concern relate to businesses, not consumers. Here are some highlights.
Read the full story in our Plus Newsletter (20.16.0, 2023-04-17).
-
May updates fix risks to networks
PATCH WATCH
By Susan Bradley
It’s looking like consumers may have an issue-free month — if they don’t run Windows 11 machines — and businesses will have to decide whether they want to patch sooner versus later.
Once again, we have a vulnerability that has already been used and abused, but the good news for home and consumer users is that the vulnerability under fire is seen only in Active Directory domains.
Read the full story in our Plus Newsletter (19.20.0, 2022-05-16).
-
December Security-Only patch breaks Active Directory Admin Center console when editing object’s properties
This from commenter Paul:
Did the security only update (KB3205394) break anyone else’s applications? In an enterprise environment, it broke AD Admin Center console when trying to edit any object’s properties, and it also broke SCCM consoles. Removing just this patch resolved both situations
I haven’t seen anything, but it’s been a wild month for obscure problems.
Anybody out there notice anything?
UPDATE from Paul, over on the other thread:
We do test them… Which is why we found this out when it only affected 4 PCs, instead of 4,000… And our users don’t utilize ADAC so they wouldn’t have been any help in this situation.
It actually affects both Win7 and 10, as well as server 2012r2 from what I’ve seen.