Newsletter Archives
-
MS-DEFCON 4: Side effects for dual booters
ISSUE 21.35.1 • 2024-08-27 By Susan Bradley
Secure Boot is causing — once again — side effects for Windows patchers.
The August updates are triggering issues for those who dual-boot into Linux. Because this is unlikely to affect very many users, and because the IPv6 bug I alerted you to ten days ago is now well understood, I feel that lowering the MS-DEFCON level to 4 is safe.
That assumes you do not ignore the IPv6 matter.
Anyone can read the full MS-DEFCON Alert (21.35.1, 2024-08-27).
-
Threats to businesses
ISSUE 21.34 • 2024-08-19 PATCH WATCH
By Susan Bradley
This month’s updates include fewer vulnerabilities than normal. What is not normal is that some of the bugs have already been exploited.
I’m not changing my stance about it being wise to wait to see whether there are side effects, but I will review that decision should the need arise. For now, review the special alert.
There are six bugs under active attack.
Read the full story in our Plus Newsletter (21.34.0, 2024-08-19).
This story also appears in our public Newsletter. -
MS-DEFCON 3: Secure Boot triggers recovery keys
ISSUE 21.31.1 • 2024-07-31 By Susan Bradley
It’s time to check whether your boot drive is encrypted.
As I predicted, Microsoft’s July 2024 security update may trigger a request for recovery keys among those who enabled BitLocker or drive encryption. That’s because the update included a change to Secure Boot.
This is problematic enough that I’m lowering the MS-DEFCON level to just 3, rather than the more common level 4 I usually suggest at the end of the month. I think you should install updates, but don’t install and then review. Instead, understand this problem ahead of time, prepare as needed, and then update.
Anyone can read the full MS-DEFCON Alert (21.31.1, 2024-07-31.
-
MS-DEFCON 4: Safe — for now
ISSUE 21.17.1 • 2024-04-23 By Susan Bradley
The April updates have been relatively quiet, with some exceptions.
That’s why I’m lowering the MS-DEFCON level to 4. Most of my concerns lie not with this month’s patches but rather with the timing of future mandates.
In addition, Microsoft finally acknowledged an “oopsie” with Edge.
Anyone can read the full MS-DEFCON Alert (21.17.1, 2024-04-23).
-
A deluge of vulnerabilities for April
PATCH WATCH
By Susan Bradley
It’s raining CVEs.
There are definitely going to be two groups of patchers this month. One will say, “Issues? What issues? My computer updated without issues.”
The other group will complain about needing a BitLocker recovery key, or that their updates took a long time, or that they were offered a confusing SQL update for a database they didn’t realize they had on their home PC. I’m certainly part of this group — my Windows 10 PC at home took a long time to come back up.
Let me remind you of some of my standard recommendations, even if you decide to sit on the sidelines and just watch the fun.
Read the full story in our Plus Newsletter (21.16.0, 2024-04-15).
-
A new patching year
PATCH WATCH
By Susan Bradley
Tomorrow, as usual, Microsoft will release the January patches.
Today, as usual, I’m recommending that you not install the patches right away. If you’ve been dealing with and following patching as long as I have, you’ll know that it takes about a week or so for problems to bubble up.
Side effects are somewhat sporadic — some see them, some don’t. Those who see none sometimes move along to the next vulnerability. Lately, however, Microsoft has been taking a long-term look at vulnerabilities thus and taking several months to implement changes. 2024 looks to be no different, with many long-term issues needing resolution.
This week’s edition of Patch Watch focuses specifically on business patching and what we may see in the coming months. For consumers, you probably will not have the same side effects or concerns as business patchers.
Read the full story in our Plus Newsletter (21.02.0, 2024-01-08).
-
The patching year in review — for consumers
PATCH WATCH
By Susan Bradley
We’re closing another patching year for consumers and home users (aka the “unmanaged crowd”).
Will and I have an ongoing, two-year struggle with a phrase I commonly use, “consumer and home users.” Will thinks it cumbersome and that there is no meaningful difference.
I define consumers as anyone running Windows Home or Professional editions but not configured in a domain or not using patching tools favored by businesses. Consumers don’t have an IT department (assuming you don’t call the teenager next door an IT department) and don’t use a managed service provider. Consumers usually have a peer-to-peer network (because who doesn’t have multiple devices connected to their Internet service these days?) and may use it to connect to shared devices such as printers. Consumers tend to blur the lines of technology and will use Apple iPads or Android phones right alongside Windows machines.
Read the full story in our Plus Newsletter (20.52.0, 2023-12-26).
-
MS-DEFCON 4: Skip those Secure Boot scripts
ISSUE 20.21.1 • 2023-05-23 By Susan Bradley
Deploy May updates — and nothing but the updates.
I’m lowering the MS-DEFCON level to 4 to encourage you to install the May updates now.
However, I do not recommend taking the optional steps recommended by Microsoft to revoke the vulnerable bootloader files, as I discussed in yesterday’s On Security column. I do not think these manual steps provide full protection for this vulnerability — or potential future ones.
Anyone can read the full MS-DEFCON Alert (20.21.1, 2023-05-23).