• MS-DEFCON 2: Batten down the hatches again

    Home » Forums » Newsletter and Homepage topics » MS-DEFCON 2: Batten down the hatches again


    ISSUE 19.05.1 • 2022-02-03 By Susan Bradley It’s time to wrap up updating or feature-release installations and pause as we wait for February’s Patch T
    [See the full post at: MS-DEFCON 2: Batten down the hatches again]

    Susan Bradley Patch Lady

    5 users thanked author for this post.
    Viewing 5 reply threads
    • #2423014

      A quick question, since I see the mention to the hack to prevent moving to windows 11.

      I was thinking that the upgrade would be offered as optional, but would not start unless clicking / accepting it.

      Is my assumption wrong and does it mean they will just push it without a “written confirmation” from the user ?

      • #2423057

        We have seen reports of the upgrade to 10 and 11 being pushed, although the reports seem to be anecdotal rather than proven. Using the registry value should work, but you always need to be careful.

        cheers, Paul

    • #2423008

      CVE-2022-21882 – Win32k Elevation of Privilege Vulnerability
      This vulnerability was initially found in May 2020 then mitigated in December 2020 CVE-2021-1732, and can now bypass the fix!

      Have there been any reports of compromised systems without January 2020 patches?

    • #2423257

      With no issues from January’s .NET security and the monthly CU, I’m going to take this brief window to jump from 21H1 to 21H2.

    • #2423252

      I know Windows doesn’t give much control over updates these days.  I just came across Windows Update Blocker (https://www.sordum.org/9470/windows-update-blocker-v1-7/) which brings back some control over updates.  Sordum has many useful tools which I use; so I was happy when I noticed this.  It’s easy to Enable or Disable updates.  While there are other ways to accomplish this; this seems very simple and easy for most users.

      1 user thanked author for this post.
      • #2423425

        Sordum programs are excellent. I have been using the update blocker off and on for over a year, it is solid and extremely easy to enable and disable when needed.

        The method used to disable windows update is very thorough. Completely disables the update, yet allows windows defender to update in the background.

        You can also use it to disable other services by adding them to a list, but you need to understand what you are doing but to just literally turn off the update function in windows, when necessary, there is no better software in my opinion. No installation, just copy files in a folder and run. No background processes from the program, it utilizes services and task scheduler to fully disable, then you can close the program…if you need to update, run the program to enable.

        It really is that simple.

    • #2423632

      Decided to do a last minute update and moved my Windows 10 Home computer from 20H2 to 21H2 using the ISO method: no issues to report as far as I can tell and the following installation of the (regular, i.e. no previews or out-of-band) January CU and .NET patch was successful.

    • #2423760
    Viewing 5 reply threads
    Reply To: MS-DEFCON 2: Batten down the hatches again

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: