Thought you already paid for Win7 Extended Security Updates? Think again.

Credit to Author: Woody Leonhard| Date: Wed, 12 Feb 2020 05:43:00 -0800

I’m hearing lots of complaints from people who spent good money to get Win7 Extended Security Updates, but don’t see this month’s patches. There’s a reason why. Microsoft didn’t bother to tell us that you need a new patch, released yesterday, in order to start receiving Win7 ESU updates. You have to download the new patch, KB 4538483, from the Microsoft Catalog, and install it manually before the updates even appear.

Folks who spent money to get the February and later patches are livid. 

Yesterday, after releasing the February updates, Microsoft modified its ESU Procedure page to add this step:

The upshot: If you (or your company) paid for extended updates, unless you know by osmosis that you have to install this additional package, and then you download and install KB 4538483 manually, you won’t see any February patches. 

Adding insult to pinheaded injury, if your machine is all prepped to receive Extended Security Updates — using the instructions that were in effect before yesterday — and you don’t install KB 4538483 (or KB 4538484) manually, you won’t even see the Office patches for that machine.

This new KB 4538483 patch has to be manually installed, even if your machine has passed Microsoft’s KB 4528069 tests to verify that ESU is properly set up.

Patch Lady Susan Bradley kicks it, “While I’m glad that Microsoft offered Win7 Extended Security Updates to small businesses, I’m also concerned that I have now put small businesses at the mercy of what feels like a less-than-planned implementation.  In order to get patched by Windows Update, one has to stumble on a brand new blog post out today and download a patch only on the Catalog site. The idea behind paid-for security patches is to make it easier to be patched while you are still running Windows 7, not make it harder to get updates.”

Need help? We’re ready on AskWoody.com.

http://www.computerworld.com/category/security/index.rss