An interesting observation from Noel Carboni: UPDATE Noel notes: It turns out ctldl.windowsupdate.com is a legitimate security check: https://technet.
[See the full post at: Unidentified Windows Update process]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Unidentified Windows Update process
Home » Forums » Newsletter and Homepage topics » Unidentified Windows Update process
- This topic has 7 replies, 4 voices, and was last updated 9 years, 1 month ago.
AuthorTopicViewing 6 reply threadsAuthorReplies-
Noel Carboni
GuestApril 21, 2016 at 10:32 am #44031I’ve learned more…
It turns out ctldl.windowsupdate.com is a legitimate security check:
https://technet.microsoft.com/en-us/library/dn265983.aspx
Why Explorer did it is still a bit of a mystery, and it’s not from Classic Shell as it turns out I had the Classic Shell auto-update check already disabled on the Win 7 system.
Perhaps the expiration of a certificate invoked this behavior on all systems.
-Noel
-
ch100
AskWoody_MVPApril 21, 2016 at 3:36 pm #44032A lot of processes in Windows do what in Internet Explorer Advanced options is designated as “Check for publisher’s certificate revocation”. That setting is common to other components of Windows, maybe Windows Explorer, so by disabling it, frequent checks are avoided, although I do not recommend disabling that check box, enabled by default.
.NET Framework does the same and this is presented here https://support.microsoft.com/en-us/kb/936707
This applies to .NET Framework 4.x as well, by using the relevant configuration files.
Same thing related to a particular situation in Citrix XenApp and .NET Framework https://support.microsoft.com/en-us/kb/936707Disabling the certificate checks is more common in Enterprises where various servers and pcs are not directly connected on the Internet, but via proxy servers. Although it is possible to set the proxy per-system with netsh, this is not commonly configured and this is what the article linked by Noel on Technet explains and provides workarounds.
It is a good thing that this was posted by Noel via Woody to clarify some of the accesses which otherwise may look to less aware users as not legitimate.
For those interested in monitoring the certificate related activity, there is a CAPI2 log under Event Viewer which is disabled by default and needs to be enabled. After a while, maybe 1 month or so, the log is again disabled by the internal routines in Windows.
-
Brady
GuestApril 22, 2016 at 12:09 pm #44033Thanks for the thorough and intelligible knowledge bomb.
I have no idea if/when I would need to know this, but I’m very glad we have experts like yourself spreading the erudition around, CH.
And thanks to Noel also. I get anxiety whenever my WFN (simple utility) pops up some new outgoing ip connection with Block/Allow?
I haven’t booted up my home PC in a few days, and now I know if I see this not to worry. -
John
GuestApril 22, 2016 at 2:12 pm #44034Major clarification.
ctldl.microsoft is not about revocation checks at all. It is about updating the list of trusted root certificate authorities from the preinstalled tiny set of outdated ones to the (ever changing) list of CAs appproved by Microsoft. Updates from ctldl are controlled by a different setting than Windows Updates or Revocation checks, and it usually happens in whatever process that happens to check the validity of a certificate not yet on the ctldl and/or on regular intervals to check if any certificates were distrusted by Microsoft.
You can see the list of CAs already installed in the certificates MMC add-on (have to create your own MMC layout for that) or in a subdialog of the “Contents” tab of Internet Options. From there you can also modify the list according to your own trusts. But there is no direct user interface to review or change the trusts and distrusts that your PC has not yet downloaded from Microsoft.
As one additional twist, the check against downloads signed with the outdated SHA-1 algorithm after Jan 1, 2016 only happens if the corresponding root certificate was installed by the ctldl download process (or was on the Windows CD), not if the very same certificate was installed manually or via group policy. This is almost documented by Microsoft saying it only applies to the root certificates they trust (though they have not publicly admitted that it is somehow linked to how the root certificate was installed on the end user PC).
As for relevant Windows Updates, I know about 3: KB2813430(Oct23, 2014 maybe older) enhances the certreq command line tool to allow downloading the ctldl list to a directory of files that you can pick and choose from. KB3004394(Mar 2015) increased the timed checks from weekly to daily. KB3135996(Mar 2016) requires that one of the download-only certificates is installed first.
KB3149737 (not an update as such) explains how to manually download and distribute the list instead of letting Windows check ctldl.microsoft, the text in KB3149737 begins with some chat about the need to do this if you turned off automatic checks on Windows 7/2008R2 due to a specific root not being installed by default, but then goes on to provide a useful overview of ways to manage the trusted root list manually.
-
ch100
AskWoody_MVPApril 22, 2016 at 4:02 pm #44035I think John is right in relation to the ctldl site which is ctldl.windowsupdate.com. You cannot browse directly to that site as it is meant to be used by an internal process and not by Internet Explorer or any other browser.
The other considerations in my post are valid too, maybe not in relation to that particular site though. -
Morty
AskWoody Lounger -
woody
Manager
Viewing 6 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Are Macs immune?
by
Susan Bradley
1 hour, 23 minutes ago -
HP Envy and the Function keys
by
CWBillow
1 hour, 52 minutes ago -
Microsoft : Removal of unwanted drivers from Windows Update
by
Alex5723
3 hours, 16 minutes ago -
MacOS 26 beta 1 dropped support for Firewire 400/800
by
Alex5723
3 hours, 33 minutes ago -
Unable to update to version 22h2
by
04om
3 hours, 53 minutes ago -
Windows 11 Insider Preview Build 26100.4482 (24H2) released to Release Preview
by
joep517
11 hours, 1 minute ago -
Windows 11 Insider Preview build 27881 released to Canary
by
joep517
11 hours, 4 minutes ago -
Very Quarrelsome Taskbar!
by
CWBillow
2 hours, 10 minutes ago -
Move OneNote Notebook OFF OneDrive and make it local
by
CWBillow
1 day ago -
Microsoft 365 to block file access via legacy auth protocols by default
by
Alex5723
12 hours, 46 minutes ago -
Is your battery draining?
by
Susan Bradley
5 hours, 53 minutes ago -
The 16-billion-record data breach that no one’s ever heard of
by
Alex5723
2 hours, 52 minutes ago -
Weasel Words Rule Too Many Data Breach Notifications
by
Nibbled To Death By Ducks
1 day, 3 hours ago -
Windows Command Prompt and Powershell will not open as Administrator
by
Gordski
11 hours, 57 minutes ago -
Intel Management Engine (Intel ME) Security Issue
by
PL1
12 hours, 9 minutes ago -
Old Geek Forced to Update. Buy a Win 11 PC? Yikes! How do I cope?
by
RonE22
4 hours, 49 minutes ago -
National scam day
by
Susan Bradley
11 hours, 42 minutes ago -
macOS Tahoe 26 the end of the road for Intel Macs, OCLP, Hackintosh
by
Alex5723
7 hours, 51 minutes ago -
Cyberattack on some Washington Post journalists’ email accounts
by
Bob99
2 days, 4 hours ago -
Tools to support internet discussions
by
Kathy Stevens
17 hours, 37 minutes ago -
How get Group Policy to allow specific Driver to download?
by
Tex265
1 day, 20 hours ago -
AI is good sometimes
by
Susan Bradley
2 days, 12 hours ago -
Mozilla quietly tests Perplexity AI as a New Firefox Search Option
by
Alex5723
2 days, 2 hours ago -
Perplexity Pro free for 12 mos for Samsung Galaxy phones
by
Patricia Grace
3 days, 12 hours ago -
June KB5060842 update broke DHCP server service
by
Alex5723
3 days, 10 hours ago -
AMD Ryzen™ Chipset Driver Release Notes 7.06.02.123
by
Alex5723
3 days, 14 hours ago -
Excessive security alerts
by
WSSebastian42
2 days, 5 hours ago -
* CrystalDiskMark may shorten SSD/USB Memory life
by
Alex5723
4 days ago -
Ben’s excellent adventure with Linux
by
Ben Myers
14 hours, 40 minutes ago -
Seconds are back in Windows 10!
by
Susan Bradley
3 days, 11 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.