Woody Leonhard's no-bull news, tips and help for Windows, Office and more… Please disable your ad blocker – our (polite!) ads help keep AskWoody going!
Home icon Home icon Home icon Email icon RSS icon
  • Patch Lady – 1803 issues with peer to peer

    Posted on June 23rd, 2018 at 09:40 Susan Bradley Comment on the AskWoody Lounge

    A new “known issue” note was posted in the answers forum:


    File Explorer may not detect other devices or perform file sharing on the local network when running Windows 10 version 1803

    Justin posts:

    Microsoft is aware of reports that devices running Windows 10 version 1803 cannot connect to other devices on their home network and is investigating the issue.

    You can resolve this problem by setting some services to Automatic (Delayed Start) and restarting Windows:

    1. Press the Windows Key and R at the same time to bring up the Run dialog.
    2. Type services.msc in the Run dialog and press Enter.
    3. For each of the following services, locate the service in list, right-click the service and select Properties.  Then set the Startup type to Automatic (Delayed Start) and select Apply.
      • Computer Browser (Browser)
      • Function Discovery Provider Host (FDPHost)
      • Function Discovery Resource Publication (FDResPub)
      • Network Connections (NetMan)
      • UPnP Device Host (UPnPHost)
      • Peer Name Resolution Protocol (PNRPSvc)
      • Peer Networking Grouping (P2PSvc)
      • Peer Networking Identity Manager (P2PIMSvc)
    4. Restart Windows.


  • Patch Lady – Quickbooks and emails

    Posted on June 16th, 2018 at 00:46 Susan Bradley Comment on the AskWoody Lounge

    I was posting up the master patch listing tonight and I spotted this KB and I know this impacted people recently:



    After updating Outlook to Monthly Channel Version 1805 (Build 9330.2087), external applications may crash when interacting with or sending email.

    For example, you may get an “Outlook is not responding” error with Intuit QuickBooks. Possible solutions for that specific error can be tried via this Intuit QuickBooks Help article: Crash: Com Error in QuickBooks Desktop


    This issue is fixed in Monthly Channel Version 1805 (Build 9330.2118) and higher. To get the latest update immediately, open Outlook and choose File > Office Account > Update Options > Update Now.

    Microsoft made a service change for Outlook on June 11 2018 (3:45 PST) to mitigate instances of a crash that happens if you’re using a POP or IMAP account. Because of the way the service changes are implemented and also because the issue involves 3rd party interaction with Outlook, you may have to restart Outlook up to three times to ensure that the service change is applied. These restarts ensure that the service change is recognized, then downloaded, then applied successfully to your install of Outlook.

    If anyone is seeing this on NON Click to run, let me know.  But again this points out you need to move to the semi-annual non monthly version of Office 2016 as there are less issues.

  • Patch Lady – KB 4103718 no longer lists “investigation” note

    Posted on May 25th, 2018 at 01:30 Susan Bradley Comment on the AskWoody Lounge

    Remember that KB that was updated to showcase that Microsoft was investigating the networking issues?


    This has been removed from this KB and appears to have been updated today to remove this note:


    Microsoft is aware that some customers have reported that network drivers are intentionally uninstalled, then fail to reinstall after applying the May 8, 2018 update. This can result in the loss of network connectivity.

    Microsoft is presently investigating and will provide a status update when the investigation is complete.

    I haven’t seen as many reports in the last few days of networking issues, but I’m not sure if that’s due to folks holding off on updating.  I can tell you on my several Windows 7 machines I have not seen an issue with networking.

    As always, when you go to install, be prepared to roll back.

    Updated note:  My apologies if I didn’t make this clear:  The patch had no change.  All that happened was a documentation change where they removed the investigation note.  However we have no final word on what happened.  All I know is that in my personal testing/patching on my Windows 7 under my control none had issues with networking.

  • Patch Lady – KB4103718 /KB4103712 known issues

    Posted on May 14th, 2018 at 13:41 Susan Bradley Comment on the AskWoody Lounge

    As noted in https://support.microsoft.com/en-us/help/4103718/windows-7-update-kb4103718 and in https://support.microsoft.com/en-us/help/4103712



    Microsoft is aware that some customers have reported that network drivers are intentionally uninstalled, then fail to reinstall after applying the May 8, 2018 update. This can result in the loss of network connectivity. Microsoft is presently investigating and will provide a status update when the investigation is complete.
  • Surface Pro 4 gets a firmware/driver patch

    Posted on April 12th, 2018 at 15:05 woody Comment on the AskWoody Lounge

    Just saw an addition to the Surface pro 4 update history page.

    Windows Update History Name Device Manager Name
    Surface – Human Interface Device – 2.0.313.0 Surface Digitizer Integration – Human Interface Device

    • 2.0.313.0 enables on-screen support for Surface Dial.
    Surface – Firmware – Surface Touch – Firmware

    • enables on-screen support for Surface Dial and improves touch accuracy.
    Surface – System – Surface Dial Detection – System

    • enables on-screen support for Surface Dial.
    Surface – System – 1.0.821.0 Surface Touch Servicing ML – System

    • 1.0.821.0 enables on-screen support for Surface Dial and improves touch accuracy.

    Care to bet that they didn’t solve the screen shake problem?

  • Patch Lady – Networking issues and KB 4088875

    Posted on March 15th, 2018 at 00:11 Susan Bradley Comment on the AskWoody Lounge

    As Woody pointed out earlier today there are some reports of networking issues after the install of this month’s Server 2008 r2 and Windows 7 patch.  The issues are not widespread and they appear to be limited to two scenerios:

    Scenerio 1 – VMware.  As noted on a reddit post a new virtual Ethernet network card is installed/enabled after the update.  The side effect has occurred before with other convenience rollups and a workaround was previously posted to this KB and a script is provided to fix the issue.  It is not impacting all servers, it appears to be impacting virtual machines on VMware.

    You can see more threads here.

    Scenerio 2 – workstations.  This one is a bit more fuzzy and not clear cut.  I’ve seen reports where workstations with static IPs may be impacted with this update.  There are definitely enough credible reports of chipsets being reset and losing their networking IP addresses.

    Note that I’m seeing this more in businesses than in consumer/peer to peer settings.

    On my Windows 7 (my old machine that we keep around for older programs), I’m seeing this update unchecked:

    Which normally means that Microsoft is throttling the patch while they monitor issues.

    What is honestly a bit more concerning is this documented side effect:

    After installing this update, SMB servers may leak memory. Microsoft is working on a resolution and will provide an update in an upcoming release.

    If you run a file server, you may want to run tests and determine if you do see THIS side effect as that one may impact.

    More on this as I see issues.

  • Revisited: How to update an old copy of Win7

    Posted on February 20th, 2018 at 06:32 woody Comment on the AskWoody Lounge

    Credit: David Stanley, Nanaimo, Canada

    Kevin Beaumont just tweeted:

    Barry Dorrans replied with a reference to this advice from @SwiftOnSecurity in April 2016:

    [REVISED] If updating fresh Win7, first download these, install, and reboot to make update install faster:


    What struck me is how @SwiftOnSecurity’s advice (from April 2016) differs from our AskWoody advice (Feb. 2017, as amended) from @CanadianTech at AKB 3172605, basically:

    3… download and install either one or two updates manually. In most cases only the first (KB3172605) of these is needed. If that produces a result that says the “update is not appropriate for your computer”, you need to first install the 2nd of these (KB3020369), then install the first (KB3172605).

    Can anybody out there reconcile the differences? Which method is best?

    I have a sneaky suspicion we’re going to see lots of Win7 (re-)installs this year.

  • Adobe Flash patch KB 4074595 pushed out the Windows Update chute

    Posted on February 8th, 2018 at 00:58 woody Comment on the AskWoody Lounge

    Doncha just love Flash?

    A few hours ago, Microsoft pushed the first round of February 2018 patches. The KB 4074595 patch fixes two security holes in Adobe Flash Player, CVE-2018-4877 and CVE-2018-4878.

    Microsoft has a few details in Security Advisory ADV180004.

    Adobe’s Security Bulletin APSB18-03 says:

    Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild, and is being used in limited, targeted attacks against Windows users.  These attacks leverage Office documents with embedded malicious Flash content distributed via email.

    Adobe goes on to say it’s a remote code execution hole. Critical Priority 1. Impacts and earlier versions (February 6, 2018). New version is

    Adobe’s version checker is here.

    Microsoft’s patches are for Windows 8.1 and Win10, all versions. All of those versions need to have Internet Explorer (and, in the case of Win10, Edge) fixed to plug the holes in the embedded versions of Flash.

    Adobe’s patches cover everything other than IE 11 and Edge. Chrome is fixed automatically, by default, when you re-start Chrome.

    Liam Tung at ZDNet reports:

    Researchers at Cisco Talos said hackers known as Group 123 were using the zero-day Flash flaw and Excel sheets to deliver the ROKRAT remote-administration tool.

    Cisco researchers found Group 123’s Excel sheets contained an ActiveX object that was a malicious Flash file that downloaded ROKRAT from a compromised web server. Notably, it was the first time this group has been seen using a zero-day exploit, suggesting the targets were carefully selected and high value.

    FireEye, which calls Group 123 TEMP.Reaper, said it had observed the group interacting with their command-and-control infrastructure from North Korean IP addresses. Most of the group’s targets were South Korean government, military and defense industry organizations, it said.

    If you haven’t yet disabled Flash, now would be a very good time to do so. Chris Hoffman at How-to-Geek has detailed instructions. If you absolutely have to have Flash, restrict it to one browser — I use Chrome to do the dirty deed — and only use it manually, under duress.

    If you can’t or won’t throttle Flash, get the update applied. Yet another Patch Wednesday.

    Thx CAR, Günter Born.