{"id":16183,"date":"2019-08-28T06:30:08","date_gmt":"2019-08-28T14:30:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/28\/news-9925\/"},"modified":"2019-08-28T06:30:08","modified_gmt":"2019-08-28T14:30:08","slug":"news-9925","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/28\/news-9925\/","title":{"rendered":"Microsoft removes August patch block on Win7\/2008R2 systems running Norton, Symantec AV"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 28 Aug 2019 06:07:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re using Symantec Endpoint Protection or any Norton Antivirus product on a Windows 7 or Server 2008 R2 machine, you <\/span><a href=\"https:\/\/www.askwoody.com\/2019\/august-2019-security-patches-its-a-biiiiiiiiig-month\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">didn\u2019t get the August patches<\/span><\/a><span style=\"font-weight: 400;\">. Shortly after the August Monthly Rollup and Security-only patches were released, Microsoft put a freeze on systems running Symantec or Norton antivirus products.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The conflict stemmed from a long-anticipated change in the way Microsoft signed the August patches: Starting in August, all patches are signed using the SHA-2 encryption method. Somehow, Symantec <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3322518\/heads-up-a-critical-win7-server-2008-patch-coming-in-february-march-that-s-really-critical.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">didn\u2019t get the message<\/span><\/a><span style=\"font-weight: 400;\"> back in November that the shift was underway, and missed the deadline.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Per <\/span><a href=\"https:\/\/support.symantec.com\/us\/en\/article.tech255857.html\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Symantec <\/span><\/a><span style=\"font-weight: 400;\">(which owns the Norton brand):<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This issue is specific to Windows 7 SP1 and Windows Server 2008 R2 SP1. All currently available versions of Symantec Endpoint Protection are affected. \u2026 Out of an abundance of caution, Symantec and Microsoft worked together to only allow the update to be visible to versions of Symantec Endpoint Protection that fully support SHA-2 signed Windows executables replaced by this and future updates to Windows 7 SP1 and Windows 2008 R2 SP1.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yesterday, in a coordinated reveal, both Symantec and Microsoft say that all is now well. Symantec <\/span><a href=\"https:\/\/support.symantec.com\/us\/en\/article.tech255857.html\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">now says<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Symantec has completed its evaluation of the impact of this update and future updates to Windows 7\/Windows 2008 R2 and has determined that there is no increased risk of a false positive detection for all in-field versions of Symantec Endpoint Protection. Microsoft KB4512506\/KB4512486 and future updates can be safely installed and the soft block was removed on August 27th, 2019.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has updated its <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-information\/status-windows-7-and-windows-server-2008-r2-sp1#663msgdesc\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Release Information Status page <\/span><\/a><span style=\"font-weight: 400;\">to say:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The safeguard hold has been removed. Symantec has completed its evaluation of the impact of this update and future updates to Windows 7\/Windows 2008 R2 and has determined that there is no increased risk of a false positive detection for all in-field versions of Symantec Endpoint Protection and Norton antivirus programs. See the<\/span><a href=\"https:\/\/support.symantec.com\/us\/en\/article.tech255857.html\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Symantec support article<\/span><\/a><span style=\"font-weight: 400;\"> for additional detail and please reach out to Symantec or Norton support if you encounter any issues.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The change applies to<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As best I can tell, there were no changes made to either the Symantec or the Microsoft products.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Only took \u2018em two weeks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AskWoody poster <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/symantec-fixes-the-sha-2-patch-problem-for-win7\/#post-1922694\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">RDRGuy nails it<\/span><\/a><span style=\"font-weight: 400;\"> by asking:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now the real question is, was there ever any problem with Symantec Endpoint Protection not being able to properly handle the Windows 7 SHA-2 updated files?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Patch problems? We feel your pain on <\/span><a href=\"https:\/\/www.askwoody.com\/2019\/microsoft-removes-the-update-block-for-august-win7-patches-on-symantec-norton-systems\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">AskWoody<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3434563\/microsoft-removes-august-patch-block-on-win72008r2-systems-running-norton-symantec-av.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 28 Aug 2019 06:07:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">If you\u2019re using Symantec Endpoint Protection or any Norton Antivirus product on a Windows 7 or Server 2008 R2 machine, you <\/span><a href=\"https:\/\/www.askwoody.com\/2019\/august-2019-security-patches-its-a-biiiiiiiiig-month\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">didn\u2019t get the August patches<\/span><\/a><span style=\"font-weight: 400;\">. Shortly after the August Monthly Rollup and Security-only patches were released, Microsoft put a freeze on systems running Symantec or Norton antivirus products.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The conflict stemmed from a long-anticipated change in the way Microsoft signed the August patches: Starting in August, all patches are signed using the SHA-2 encryption method. Somehow, Symantec <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3322518\/heads-up-a-critical-win7-server-2008-patch-coming-in-february-march-that-s-really-critical.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">didn\u2019t get the message<\/span><\/a><span style=\"font-weight: 400;\"> back in November that the shift was underway, and missed the deadline.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3434563\/microsoft-removes-august-patch-block-on-win72008r2-systems-running-norton-symantec-av.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,10525],"class_list":["post-16183","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16183"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16183\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16183"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}