{"id":16483,"date":"2019-10-02T10:30:05","date_gmt":"2019-10-02T18:30:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/10\/02\/news-10223\/"},"modified":"2019-10-02T10:30:05","modified_gmt":"2019-10-02T18:30:05","slug":"news-10223","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/02\/news-10223\/","title":{"rendered":"Time to install Microsoft&#039;s mainstream September patches \u2013 and avoid the dregs"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 02 Oct 2019 11:00:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s a smelter-weight slapdown.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In one corner you have the Chicken Little contingent, which insists that September\u2019s IE zero-day patch <\/span><strong><i>must <\/i><\/strong><span style=\"font-weight: 400;\">be important because Microsoft marked it as \u201cExploited: Yes\u201d and memorialized it with <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3440523\/what-do-we-know-about-the-big-scary-exploited-emergency-patched-ie-security-hole-cve-2019-1367.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">an extremely odd patch on a Monday<\/span><\/a><span style=\"font-weight: 400;\">, followed in Keystone Kops fashion with a <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-patch-alert-botched-ie-zero-day-patch-leaves-cognoscenti-fuming.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">stumbling trail of follow-ons<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the other corner you have Dummies like me who say Microsoft <\/span><a href=\"https:\/\/www.askwoody.com\/2019\/heres-why-were-not-patching-internet-explorer\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">obviously didn\u2019t care <\/span><\/a><span style=\"font-weight: 400;\">that much about the security hole because it didn\u2019t really push out a fix. If Microsoft were serious about the zero-day, the Dummies insist, it would\u2019ve gotten its act together by now. Demonstrably, the act is still in progress.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And in the middle you have a billion or two Windows customers who really don\u2019t care. They just want their computers to work and not suddenly get whopped by a WannaCry wannabe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Welcome to Windows as a service.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With Internet Explorer usage share rapidly swirling down the drain, you might wonder why anybody would <\/span><strong><i>care <\/i><\/strong><span style=\"font-weight: 400;\">about a patch for a zero-day bug in IE. The problem is that some security holes in IE can be exploited even if you aren\u2019t using IE because Microsoft spreads IE plumbing throughout Windows. Fair enough. But Microsoft hasn\u2019t said if the CVE-2019-1367 exploit can be harnessed even if you aren\u2019t using IE. So the long and short answer is we don\u2019t know if you really need to install the IE patch(es).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s true in spite of what you heard on your local evening news right after the weather report\u00a0\u2014 or read in one of a gazillion Chicken Little articles rumbling in the Windows echo chamber.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In what follows, I\u2019ll show you how to install the official, approved patches for all versions of Windows. That\u2019ll leave you unprotected from the CVE-2019-1367 ghoul. If the Chicken Little approach appeals to you, when you\u2019re done with these steps, you have one of two choices for Windows 10:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re using Windows 7 or 8.1 (or Server variants) and you follow the instructions here, you\u2019ll get all the recommended September patches, but you won\u2019t be protected from the CVE-2019-1367 mess. If you\u2019re in the Chicken Little party, the easiest way to get protected is to manually install a single standalone patch, KB<\/span><a href=\"https:\/\/support.microsoft.com\/help\/4522007\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">4522007<\/span><\/a><span style=\"font-weight: 400;\">, that applies to IE in Win7, 8.1, Server 2012 and Server 2012 R2. It\u2019s a plain-vanilla IE patch (which means it\u2019s a rollup), arriving at a weird time. It\u2019s NOT a Windows patch.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month brought three cumulative updates for each version of Win10. The last cumulative update, marked \u201coptional, non-security\u201d is in fact a security patch. But you Win10 users shouldn\u2019t feel special. Win7 and 8.1 this month have precisely the opposite problem\u00a0\u2014 their \u201cSecurity only\u201d patches include the full suite of Microsoft snooping\/telemetry updates, and installing them sets up scheduled tasks to use them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s the same shenanigans we saw in July.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately, there are ways to circumvent the telemetry\u00a0\u2014 or at least minimize it. Details follow.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s how to get your system updated the (relatively) safe way.<\/span><\/p>\n<p><strong>Step 1. Make a full system image backup before you install the latest patches<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s a non-zero chance that the patches \u2014 even the latest, greatest patches of patches of patches \u2014 will hose your machine. Best to have a backup that you can reinstall even if your machine refuses to boot. This, in addition to the usual need for System Restore points.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are plenty of full-image backup products, including at least two good free ones:<\/span><a href=\"https:\/\/www.macrium.com\/reflectfree\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\"> Macrium Reflect Free<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/www.computerworld.com\/article\/3199125\/microsoft-windows\/top-35-free-apps-for-windows-10.html#slide8\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\"> EaseUS Todo Backup<\/span><\/a><span style=\"font-weight: 400;\">. For Win 7 users, If you aren\u2019t making backups regularly, take a look at this<\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/patch-alert-heres-where-we-stand-with-the-june-patches\/#post-200264\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">thread started by Cybertooth<\/span><\/a><span style=\"font-weight: 400;\"> for details. You have good options, both free and not-so-free.<\/span><\/p>\n<p><strong>Step 2. For Win7 and 8.1<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft is blocking updates to Windows 7 and 8.1 on recent computers. If you are running Windows 7 or 8.1 on a PC that\u2019s 24 months old or newer, follow the instructions in<\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/2000006-see-if-microsoft-is-blocking-windows-update-on-your-new-computer\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\"> AKB 2000006<\/span><\/a><span style=\"font-weight: 400;\"> or<\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/installing-win-updates-on-win-7-or-8-1-computers-with-kaby-lake-or-ryzen-cpus\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\"> @MrBrian\u2019s summary of @radosuaf\u2019s method<\/span><\/a><span style=\"font-weight: 400;\"> to make sure you can use Windows Update to get updates applied.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019ve been relying on the Security-only \u201cGroup B\u201d patching approach to keep Microsoft\u2019s snooping software off your PC, you\u2019re stuck again this month. You can install the August Security-only patch without bringing in the snooping routines. But unless you install the telemetry-laden July and September Security-only patches, you\u2019re missing a couple of months of (not really all that important) patches. Think of it as a preview of your January Win7 end-of-support conundrum.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For most Windows 7 and 8.1 users, I recommend following<\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/2000004-how-to-apply-the-win7-and-8-1-monthly-rollups\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\"> AKB 2000004: How to apply the Win7 and 8.1 Monthly Rollups<\/span><\/a><span style=\"font-weight: 400;\">. You should have one Windows patch, dated Sept. 10 (the Patch Tuesday patch). If you\u2019re very paranoid about the CVE-2019-1367 IE zero-day exposure, use the separately downloaded and manually installed IE update, KB<\/span><a href=\"https:\/\/support.microsoft.com\/help\/4522007\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">4522007<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Realize that some or all of the expected patches for September may not show up or, if they do show up, may not be checked. DON&#8217;T CHECK any unchecked patches. Unless you&#8217;re very sure of yourself, DON&#8217;T GO LOOKING for additional patches. In particular, if you install the September Monthly Rollup, you won\u2019t need (and probably won\u2019t see) the concomitant patches for August. Don&#8217;t mess with Mother Microsoft.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you see<\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-patch-alert-most-march-patches-look-good.html\" rel=\"noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">KB 4493132<\/span><\/a><span style=\"font-weight: 400;\">, the \u201cGet Windows 10\u201d nag patch, make sure it\u2019s unchecked.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Watch out for driver updates \u2014 you\u2019re far better off getting them from a manufacturer\u2019s website.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After you\u2019ve installed the latest Monthly Rollup, if you\u2019re intent on minimizing Microsoft\u2019s snooping, run through the steps in<\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/2000007-turning-off-the-worst-windows-7-and-8-1-snooping\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\"> AKB 2000007: Turning off the worst Win7 and 8.1 snooping<\/span><\/a><span style=\"font-weight: 400;\">. If you want to thoroughly cut out the telemetry, see @abbodi86\u2019s detailed instructions in<\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/2000012-neutralize-telemetry-sustain-win-7-8-1-monthly-rollup-model\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">AKB 2000012: How To Neutralize Telemetry and Sustain Windows 7 and 8.1 Monthly Rollup Model<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Realize that <\/span><strong><i>we don\u2019t know <\/i><\/strong><span style=\"font-weight: 400;\">what information Microsoft collects on Window 7 and 8.1 machines. But I\u2019d be willing to bet that fully-updated Win7 and 8.1 machines are leaking almost as much personal info as that pushed in Win10.<\/span><\/p>\n<p><strong>Step 3. For Windows 10 prior to version 1903<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">If you want to stick with your current version of Win10 Pro \u2014 a reasonable alternative \u2014 you can follow my<\/span><a href=\"https:\/\/www.computerworld.com\/article\/3339563\/its-time-to-block-windows-automatic-updating.html\" rel=\"noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">advice from February<\/span><\/a><span style=\"font-weight: 400;\"> and set \u201cquality update\u201d (cumulative update) deferrals to 15 days, per the screenshot. If you have quality updates set to 15 days, your machine already updated itself on Sept. 25, and will update again on Oct. 16. Don\u2019t touch a thing and in particular don\u2019t click <\/span><i><span style=\"font-weight: 400;\">Check for updates<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the rest of you, including those of you stuck with Win10 Home, go through the steps in &#8220;<\/span><a href=\"https:\/\/www.computerworld.com\/article\/3215668\/windows-pcs\/8-steps-to-install-windows-10-patches-like-a-pro.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">8 steps to install Windows 10 patches like a pro<\/span><\/a><span style=\"font-weight: 400;\">.&#8221; Make sure that you run Step 3, to hide any updates you don\u2019t want (such as the Win10 1903 upgrade or any driver updates for non-Microsoft hardware) before proceeding.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you see a notice that &#8220;You&#8217;re currently running a version of windows that&#8217;s nearing the end of support. We recommend you update to the most recent version of Windows 10 now to get the latest features and security improvements&#8221; you can safely chill. Win10 1803 is good through November. If you see a link to \u201cDownload and install now,\u201d ignore it\u00a0\u2014 for the same reason.<\/span><\/p>\n<p><strong>Step 4. For Windows 10 version 1903<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Windows Update in Win10 version 1903 went through a <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3436499\/patching-behavior-in-win10-1903-changes-dramatically-for-the-better.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">major makeover<\/span><\/a><span style=\"font-weight: 400;\"> last month. The result, if it works the way it\u2019s been described, will be a major step forward in Windows 10 patching.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s a legacy fly in the ointment, though. If you\u2019ve moved to Win10 Pro version 1903, and you set 15 day deferral on quality updates (as shown in the preceding screenshot), you\u2019ll no doubt discover that the settings shown in the screenshot are no longer available on your machine. Microsoft hasn\u2019t yet deigned to tell us what\u2019s going on, but you can rest assured that your 15-day deferral was obeyed\u00a0\u2014 and you got the September patches on Sept. 25. Don\u2019t worry about changing the deferral settings. You\u2019re protected until Oct. 16.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Long story short, the setting shown in the screenshot <\/span><a href=\"https:\/\/www.askwoody.com\/2019\/things-i-didnt-know-check-for-updates-in-win10-1903-now-warns-about-optional-and-feature-updates\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">may not be visible on your machine<\/span><\/a><span style=\"font-weight: 400;\">. Not to worry. You have a belt-and-suspenders kind of second choice. If you\u2019re on Win10 version 1903 (either Home or Pro), click the link on the Windows Update page that says \u201cPause updates for 7 days,\u201d then click on the newly revealed link, which says \u201cPause updates for 7 more days,\u201d then click it again.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By clicking that link three times, you\u2019ll defer cumulative updates for 21 days from the day you started clicking\u00a0\u2014 if you do it today, you\u2019ll be protected until Oct. 23\u00a0\u2014 which is typically long enough for Microsoft to work out the worst bugs in their patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are several group policies and a handful of registry settings working in the background when you make those changes. But if you\u2019re using Pro and set the quality update deferral to 15 days, <\/span><strong><i>and <\/i><\/strong><span style=\"font-weight: 400;\">punch the \u201cPause updates for 7 days\u201d button three times (on either Home or Pro), you should be in good shape.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you see an offer of an Optional update (screenshot), don\u2019t click Download and install now. Even more bugs await.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And, no, I don&#8217;t know how to reliably keep Win10 1909 off your 1903 machine. For now, the Pause updates button should keep you protected. At some point Microsoft will have to explain exactly how the feature-upgrade-in-cumulative-update-clothing gets installed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I think.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Stay tuned.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Thanks to the dozens of volunteers on AskWoody who contribute mightily, especially @sb, @PKCano, @abbodi86 and many others.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">We\u2019ve moved to MS-DEFCON 3 on the<\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2019\/ms-defcon-3-get-your-september-patches-installed-but-stick-to-the-mainstream-patches\/\" rel=\"nofollow noopener\" target=\"_blank\"> <i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3442751\/time-to-install-microsofts-mainstream-september-patches-and-avoid-the-dregs.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 02 Oct 2019 11:00:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">It\u2019s a smelter-weight slapdown.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In one corner you have the Chicken Little contingent, which insists that September\u2019s IE zero-day patch <\/span><strong><i>must <\/i><\/strong><span style=\"font-weight: 400;\">be important because Microsoft marked it as \u201cExploited: Yes\u201d and memorialized it with <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3440523\/what-do-we-know-about-the-big-scary-exploited-emergency-patched-ie-security-hole-cve-2019-1367.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">an extremely odd patch on a Monday<\/span><\/a><span style=\"font-weight: 400;\">, followed in Keystone Kops fashion with a <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-patch-alert-botched-ie-zero-day-patch-leaves-cognoscenti-fuming.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">stumbling trail of follow-ons<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3442751\/time-to-install-microsofts-mainstream-september-patches-and-avoid-the-dregs.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,10525],"class_list":["post-16483","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16483"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16483\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16483"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}