-
dportenlanger
AskWoody LoungerFebruary 27, 2020 at 6:34 pm in reply to: Admins, heads up! Another Patch Tuesday security hole has a public exploit #2172276Final notes: Updating through Windows Update works better than downloading the patch manually. If you have WSUS, just approve the patch and apply it. It can be installed while the server is running. Then, pick a reboot time and you will be golden.
If you do decide to use the manual patch, follow the directions explicitly.
-
dportenlanger
AskWoody LoungerFebruary 27, 2020 at 2:04 pm in reply to: Admins, heads up! Another Patch Tuesday security hole has a public exploit #2172171To answer my own question …… I guess I thought I was admin……I had better double check on the next attempt. According to the article:
When you try to manually install this security update by double-clicking the update file (.msp) to run it in Normal mode (that is, not as an administrator), some files are not correctly updated.
When this issue occurs, you don’t receive an error message or any indication that the security update was not correctly installed. However, Outlook Web Access (OWA) and the Exchange Control Panel (ECP) may stop working.This issue occurs on servers that are using user account control (UAC). The issue occurs because the security update doesn’t correctly stop certain Exchange-related services.
-
dportenlanger
AskWoody LoungerFebruary 26, 2020 at 11:07 am in reply to: Admins, heads up! Another Patch Tuesday security hole has a public exploit #2171560****Caution Exchange 2016 Installs *****
Exchange 2016 CU15 applied fine. The patch KB4536987 broke OWA and killed search across the boards in the web client and desktop client. Uninstalling the KB brought OWA back. Stopping the search services and deleting the indexes brought the search back.
Exchange 2016 users should test before installing on production servers.
Please let me know how your update went.
-
dportenlanger
AskWoody LoungerI am confused. I added a couple of 1903 machines to my domain last month for testing. In WSUS, I only have Windows 10 checked in Products and Classifications, not every specific version. When the sync would run, it would get the updates required for every version of Windows through 1809
Last month, none of the 1903 updates were listed. I thought that was odd, so I checked Windows 1903 in WSUS and Windows 10 in Products and Classifications. No other versions were checked. WSUS listed all the updates for every version including 1903. Then I went and unchecked the specific 1903 option.
This morning I checked what updates were synchronized. Again, every version of Windows except 1903 is listed in updates.
Do we now have to explicitly check 1903 in Products and Classifications to get the 1903 updates? Is this a requirement I missed?
Thank you in advance.
-
This reply was modified 3 years, 6 months ago by
dportenlanger.
-
This reply was modified 3 years, 6 months ago by
dportenlanger.
-
This reply was modified 3 years, 6 months ago by
-
dportenlanger
AskWoody LoungerRegardless of in or out of band, maybe it is just me, but I am failing to understand the Windows 10 1903 update settings. I have one Pause Update setting that I enabled after updating a test machine. Then I disabled the Pause and it is installing the same updates it already installed. Does it not know what it already installed?
-
dportenlanger
AskWoody LoungerNovember 7, 2018 at 11:11 am in reply to: Win7 Monthly Rollup, KB 4462923, updated and rolled out again #230932I have three freshly installed Windows 7 machines. I cannot get any of the monthly rollups on any of the three systems to install. They get to 15% and then roll back.
They have KB3177467 v2 installed. If I try to get it from the Microsoft Update catalog and install it, it says it already exists.
Existing machines have the rollups applied with no issues.
What am I doing wrong on the three fresh machines? I appreciate any help.
-
dportenlanger
AskWoody LoungerSusan,
Now list for me all the security exceptions, disabled security features etc. required to make customer’s applications run.
1 user thanked author for this post.
-
dportenlanger
AskWoody LoungerSeptember 12, 2018 at 12:20 pm in reply to: Massive (and frustrating!) sync failures with WSUS #217067Our corporate WSUS servers were exhibiting the same behavior. I tried the Office check/uncheck manual sync process and it didn’t solve the problem, so I turned Office back on and left it alone.
Waiting a couple of days fixed the issue. Literally, I did nothing but watch it for a couple of days and it started working.
Go figure!
-
dportenlanger
AskWoody LoungerI don’t know that we should panic about the exploit, but the poster to github appears to be unstable.
-
dportenlanger
AskWoody LoungerI recommend trying Linux and keep your money in your pocket. You can install Chrome on Linux. You can install Chrome’s apps basically making a Chromebook.
Give it a try.
-
dportenlanger
AskWoody LoungerJune 28, 2018 at 1:01 pm in reply to: With Sets now jettisoned, the worthwhile feature list for the next version of Windows is vanishing #200277Stardock’s Groupy as discussed is the sets equivalent, or vice versa. I purchased Groupy and I have to admit, using it is addicting and makes many tasks more efficient. Stardock’s applications are especially great for Win 8.1 users. There are merits to running Windows 8.1 and Stardock. As mentioned on this site, Win 8.1 is a way to skip the Windows 10 Feature Update plan (or should I say pain) until 2023.
Highly recommended.
-
dportenlanger
AskWoody LoungerSo, to clarify, if there is a deferral policy, Windows bypasses the WSUS policy in favor of WU. I did find a deferral policy for CBB and 365 and disabled it. Now behavior appears to be normal again. I will discuss the policy with the customer. Thank you for the information.
-
dportenlanger
AskWoody LoungerJune 14, 2018 at 4:08 pm in reply to: White paper: How to use Trend Micro Vulnerability Protection to patch virtually #197895Woody had commented on the topic of a virtual patch in a previous post. I am a contractor and have many customers with different security suites. One customer had a license for Vulnerability Protection that was included with their Enterprise Security Suite. I used the experience to write a simple document for our peers to understand the technology.
The document uses the flash player exploit as an example. If you recall, there was a flash player update that broke VMware. There was also a Windows patch that broke virtual network cards. It is my opinion that those patch issues caused business critical failures.
1 user thanked author for this post.
-
dportenlanger
AskWoody LoungerApril 26, 2018 at 7:11 am in reply to: Are Windows customers getting Meltdown/Spectre bullied into buying new computers? #187553With upgrades we didn’t ask for, apps we didn’t want, administrative capability that was removed and telemetry we can’t see, here is an extreme example.
Feel free to comment.
-
dportenlanger
AskWoody LoungerApril 25, 2018 at 9:48 pm in reply to: Are Windows customers getting Meltdown/Spectre bullied into buying new computers? #187488All of you are correct. Intel will not be patching older CPUs per the list linked by BillC. I expected CVE-2017-5715 to always be vulnerable as it is on the many Windows machines my team is flashing. If I run Inspectre from Gibson research on Windows, it always shows CVE-2017-5715 is vulnerable. Then, I flash the BIOS and rerun Inspectre again at it says the PC is mitigated.
Because I was able to run the Linux checker linked in various portions of this thread on machines that will not be patched, imagine my dismay when it reported a machine that is surely vulnerable to CVE-2017-5715 is flagged as Not Vulnerable. How is this possible? I started looking for potential reasons.
Further research on Intel’s documents indicated that legacy processors (that BillC listed) were included as part of the Linux microcode fixes when, in fact, they are not at all.
It appears CVE-2017-5715 is vulnerable to elderly computers or computers that manufacturers won’t patch.
However, it appears on the surface that Linux developers are doing all they can to protect users of legacy machines or machines manufacturers have decided not to patch. I can find no evidence that Microsoft is employing similar techniques, though maybe another expert here has more information.
The man hours lost updating firmware can never be recovered. Despite the lack of malware so far, I would be negligent if I didn’t flash every computer I am responsible for. I also feel Intel and Microsoft are being negligent by refusing to mitigate every vulnerable computer.
Therefore, I am inclined to advise users to run Linux if your PC cannot be mitigated or replaced.
Microsoft/Intel: Please feel free to chime in with facts as everything that started this thread was speculative, but for good reason.
1 user thanked author for this post.
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
PXE Boot and Hyper-V virtual machines and other strange things
by
Simon_Weel
1 hour, 31 minutes ago -
Testing for adding table to post
by
alejr
2 hours, 37 minutes ago -
I honestly can’t tell if this is a scam or not
by
Susan Bradley
1 hour, 9 minutes ago -
New Life For Ten Year Old DIY NAS Hardware
by
bbearren
2 hours, 52 minutes ago -
June 2023 Office non-Security updates have been released
by
PKCano
21 hours, 6 minutes ago -
Web Apps from Brave Browser
by
Gale
18 hours, 7 minutes ago -
Firefox 114 offering Secure DNS Options – does AT&T ISP Support?
by
Tex265
3 hours ago -
macOS 14 Sonoma
by
Alex5723
1 hour, 30 minutes ago -
Just a fyi – I think I’ll skip on an Apple Vision Pro hardware section
by
Susan Bradley
23 hours, 50 minutes ago -
What’s wrong with Windows 11?
by
Ascaris
6 hours, 35 minutes ago -
Streaming an iPad to a standard TV
by
MrJimPhelps
16 hours, 18 minutes ago -
clone to make backup laptop
by
greenbergman
2 days ago -
Problems with sound and USB ports
by
StavRoss
1 day, 6 hours ago -
Can you use WUShowHide on Windows 11 version 21H2?
by
southieguy
1 day, 13 hours ago -
Can we control the changes to our operating systems?
by
Susan Bradley
19 minutes ago -
Watch out for fake ‘Windows Defender’ scare
by
B. Livingston
3 hours, 23 minutes ago -
Diagnostics and testing? Get it all done in a flash.
by
Ben Myers
16 hours, 20 minutes ago -
Dip your toe into Visio Online
by
Peter Deegan
1 day, 23 hours ago -
Updating Win 10 Pro 21H2 to 22H2
by
bsqrd
1 day, 21 hours ago -
Changing mouse pointer options.
by
Artie
2 days ago -
Desktop or Laptop? What’s your choice?
by
Susan Bradley
12 hours, 55 minutes ago -
Anyone use Auslogics Bitreplica
by
WSjcgc50
3 days, 10 hours ago -
Unleashing the Gaming Revolution: CrossOver Mac’s DirectX 12 Support Update!
by
Alex5723
3 days, 23 hours ago -
Defender’s Offline Scan Fails to Run
by
E Pericoloso Sporgersi
3 days, 6 hours ago -
Mouse problem : cannot grab a window without maximizing it
by
Andy M
1 day, 11 hours ago -
End of support for Cortana in Windows
by
Alex5723
2 days, 22 hours ago -
Microsoft is really missing an advertising trick
by
Sky
3 days, 22 hours ago -
New MOVEit Transfer zero-day mass-exploited in data theft attacks
by
Alex5723
4 days, 22 hours ago -
Windows 11 Insider Preview build 25381 released to Canary
by
joep517
1 hour, 25 minutes ago -
Authenticating Email Address
by
IreneLinda
49 minutes ago
Recent blog posts
- June 2023 Office non-Security updates have been released
- Can we control the changes to our operating systems?
- Watch out for fake ‘Windows Defender’ scare
- Diagnostics and testing? Get it all done in a flash.
- Dip your toe into Visio Online
- Desktop or Laptop? What’s your choice?
- Beware of Google’s .ZIP domain and password-embedded URLs
- Longstanding feature requests, and their status
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2023 by AskWoody Tech LLC. All Rights Reserved.