Windows 2019 09 security update for windows

Item Preview

There Is No Preview Available For This Item

This item does not appear to have any files that can be experienced on Archive.org.


Please download files in this item to interact with them on your computer.

Show all files

1,046

Views

DOWNLOAD OPTIONS

Uploaded by

videogamesm12

on

SIMILAR ITEMS (based on metadata)

To obtain updates from this website, scripting must be enabled.

To use this site to find and download updates, you need to change your security settings to allow ActiveX controls and active scripting. To get updates but allow your security settings to continue blocking potentially harmful ActiveX controls and scripting from other sites, make this site a trusted website:


In Internet Explorer, click Tools, and then click Internet Options.

On the Security tab, click the Trusted Sites icon.

Click Sites and then add these website addresses one at a time to the list:
You can only add one address at a time and you must click Add after each one:


http://*.update.microsoft.com

https://*.update.microsoft.com

http://download.windowsupdate.com

Note:
You might have to uncheck the Require server verification (https:) for all sites in the zone option to enter all the addresses.

Содержание

  1. Выпущены обновления безопасности Microsoft за сентябрь 2019
  2. Общий взгляд
  3. Обратите внимание
  4. Рекомендации по безопасности
  5. Возможные проблемы
  6. Дополнительная информация
  7. Как продлить жизнь Windows 7?
  8. Как отключить всплывающее уведомление о окончании поддержки Windows 7?
  9. Microsoft Windows Security Updates September 2019 overview
  10. Microsoft Windows Security Updates September 2019
  11. Executive Summary
  12. Operating System Distribution
  13. Windows Security Updates
  14. Known Issues
  15. Security advisories and updates
  16. Non-security related updates
  17. Microsoft Office Updates
  18. How to download and install the September 2019 security updates
  19. Direct update downloads
  20. question
  21. Server 2019 update KB5005568 (Sept 2022) forcing new DCOM authentication prematurely
  22. 2019 SHA-2 Code Signing Support requirement for Windows and WSUS
  23. Summary
  24. Background details
  25. Product update schedule
  26. Current status
  27. Windows 7 SP1 and Windows Server 2008 R2 SP1
  28. Windows Server 2008 SP2
  29. Frequently Ask Questions
  30. General information, planning and issue prevention
  31. Issue recovery

Выпущены обновления безопасности Microsoft за сентябрь 2019

11 September 2019 | Пресс-Центр

Компания Microsoft выпустила обновления безопасности за сентябрь. В этой статье я расскажу о самых главных моментах этого выпуска.

Общий взгляд

Сводная информация по количеству и типу уязвимостей в соответствующих продуктах приведена на графике ниже:

sep

Обратите внимание

На следующие уязвимости и обновления безопасности следует обратить особое внимание:

Windows

CVE-2019-1235 – Windows Text Service Framework (Publicly disclosed)

CVE-2019-1253 – Windows AppX Deployment Server (Publicly disclosed)

CVE-2019-1294 – Secure Boot (Publicly disclosed)

CVE-2019-1273 – Active Directory Federation Services (Base CVSS Score 8.2)

CVE-2019-1214 – Common Log File System Driver (Exploitation detected)

CVE-2019-1215 – Windows Winsock driver (Exploitation detected)

Microsoft Browsers

CVE-2019-1208 – VBScript Remote Code Execution Vulnerability

Microsoft Office

CVE-2019-1297 – Microsoft Excel (Preview Pane is not an attack vector)

Microsoft SharePoint

CVE-2019-1296 – Microsoft SharePoint Remote Code Execution Vulnerability

Microsoft Exchange

CVE-2019-1233 – Microsoft Exchange Denial of Service Vulnerability

CVE-2019-1266 – Microsoft Exchange Spoofing Vulnerability

Microsoft Skype for Business/Lync

CVE-2019-1209 – Microsoft Lync 2013 Information Disclosure Vulnerability

.NET Framework

CVE-2019-1142 – ASP.NET Core Elevation of Privilege Vulnerability

Visual Studio

CVE-2019-1232 – Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability

CVE-2019-1305 – Team Foundation Server Cross-site Scripting Vulnerability

CVE-2019-1306 – Azure DevOps and Team Foundation Server Remote Code Execution Vulnerability

Рекомендации по безопасности

Были выпущены следующие рекомендательные документы (security advisory):

ADV190022 – September 2019 Adobe Flash Security Update

Были дополнены и обновлены следующие рекомендательные документы:

ADV990001 – Latest Servicing Stack Updates

New Servicing Stack Update (KB4512937) for all versions of Windows OS.

ADV190013 – Microsoft Guidance to mitigate Microarchitectural Data Sampling vulnerabilities

New updates provide protections for the 32-bit (x86) versions of: Server 2008, Windows 7, Windows 8.1, Windows 10 v1607, 1703, 1709, 1803, 1809, 1903.

ADV190023 – Microsoft Guidance for Enabling LDAP Channel Binding and LDAP Signing.

В одном из будущих выпусков обновлений в начале 2020 г. компания Microsoft предоставит обновление Windows, которое изменит настройки по умолчанию для параметров подписывания протокола LDAP (LDAP signing) и проверки привязки канала протокола LDAP (LDAP channel binding) для обеспечения более защищенной конфигурации. Когда обновление станет доступно, заказчики будут уведомлены посредством данной рекомендательной статьи.

В настоящее время мы настоятельно рекомендуем при первой возможности предпринять следующее:

Возможные проблемы

Ниже представлен список статей базы знаний для соответствующих пакетов обновлений, с которыми связаны потенциальные проблемы после установки:

KB Article Applies To
4512578 Windows 10, version 1809, Windows Server 2019
4515384 Windows 10, version 1903, Windows Server version 1903
4515832 Microsoft Exchange Server 2019 and Exchange Server 2016
4516044 Windows 10, version 1607, Windows Server 2016
4516046 Internet Explorer
4516055 Windows Server 2012 (Monthly Rollup)
4516058 Windows 10, version 1803, Windows Server version 1803
4516062 Windows Server 2012 (Security-only update)
4516064 Windows 8.1, Windows Server 2012 R2 (Security-only update)
4516065 Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Monthly Rollup)
4516066 Windows 10, version 1709
4516067 Windows 8.1, Windows Server 2012 R2 (Monthly Rollup)
4516068 Windows 10, version 1703
4516070 Windows 10

Дополнительная информация

Вы также можете посмотреть запись нашего ежемесячного вебинара «Брифинг по безопасности», посвященного подробному разбору текущего выпуска обновлений и бюллетеней безопасности компании Microsoft.

Самую полную и актуальную информацию об уязвимостях и обновлениях безопасности вы можете найти на нашем портале Security Update Guide.

А для того чтобы быть в курсе самых актуальных новостей информационной безопасности Microsoft, подписывайтесь на канал https://aka.ms/artsin.

Помните, для 86% всех уязвимостей были доступны патчи на момент их обнародования*, и своевременно обновляйте ваши системы.

руководитель программ информационной безопасности

*Vulnerability Review Report 2018 by Flexera

Источник

Приступим, что бы продлить поддержку нам необходимо установить несколько важных обновлений, программу продленной поддержки и тестовое обновление. За счет чего можно получить продление поддержки? Поддержка корпоративным клиентам будет оказывается еще 2 года, но платно. Мы же под шумок получим туже поддержку но бесплатно.

prodli zhizn windows 7

Смотрите в моем видео как продлить поддержку Windows 7:

Для начала скачайте архив со всеми необходимыми обновлениями. В нем есть обновления как для x86 так и х64 систем, используйте обновления вашей разрядности. Использовать эти обновления можно на любых версиях Windows 7. Устанавливайте обновления в таком порядке:

Теперь ваш компьютер будет получать обновления безопасности и устранение критических уязвимостей еще 2 года!

Как отключить всплывающее уведомление о окончании поддержки Windows 7?

Если вы знаете еще варианты получения расширенной поддержки Windows 7, напишите о этом в комментариях!

i3

FTPJ1baI7a8

7242 286581

e c535993a

e c535993a

avatar

photo

photo

photo

photo

7242 286581

photo

photo

photo

photo

photo

photo

Мои действия по переустановке «Bypass_ESU-v4» на версию 5:
1 Проверил установку на компьютере рекомендованных обновлений.
Следующие обновления должны быть установлены и готовы перед использованием BypassESU-v5:
— KB4490628: Servicing stack update, March 2019;
— KB4474419: SHA-2 code signing support update, August 2019;
— KB4536952: Latest Extended Servicing stack update, currently KB4536952 (January 2020)
or later;
— KB4538483: ESU Licensing Preparation Package, 13.02.2020 г.
(требуется только для получения обновлений через WU)
— KB3138612: Updated Windows Update Client.
Примечание: Если вы установили какой-либо накопительный пакет обновлений за июль 2016 года
KB3172605, или обновление безопасности KB4534314 за 13.01.2020 г., или исправление KB4539602
за 10.02.2020, они все уже обновили WUC (Windows Update Client).

2 Все они были установлены и их установку не выполнял.

3 Создал точку восстановления.

5 Перезагрузил компьютер.

6 Центр Обновления Windows 7 должен начать функционировать.

## Важные замечания:
1 После использования WU patcher, если вы все еще не получаете обновления ESU, попробуйте:
— перезагрузитесь, потом проверьте WU;
— остановите службу wuauserv, удалите (переименуйте) папку «C:WindowsSoftwareDistribution»,
затем проверьте WU (Центр обновления Windows).

Источник

Microsoft Windows Security Updates September 2019 overview

It is September 10, 2019 and Microsoft has just released security and non-security updates for its Microsoft Windows operating system and other company products.

Our overview of the September 2019 Patch Day provides system administrators and home users with information on the released updates. It features some stats at the beginning, provides links to all support articles and direct download options, lists known issues and security advisories, and provides other relevant information.

Microsoft Windows Security Updates September 2019

Here is a handy Excel spreadsheet that lists all released security updates for Microsoft products in September 2019. Please download it with a click on the following link: Microsoft Windows Security Updates September 2019

Executive Summary

Operating System Distribution

Windows Server products

Other Microsoft Products

Windows Security Updates

Windows 7 SP1 and Windows Server 2008 R2 SP1

Windows 8.1 and Windows Server 2012 R2

Windows 10 version 1803

Windows 10 version 1809 and Windows Server 1809

Windows 10 version 1903 and Windows Server version 1903

Windows 10 version 1903 and Windows Server 1903

Other security updates

Known Issues

Windows 7 SP1 and Windows Server 2008 R2 (monthly rollup only)

Windows 8.1 and Windows Server 2008 R2

Windows 10 version 1803

Windows 10 version 1809

Security advisories and updates

ADV990001 | Latest Servicing Stack Updates

ADV190022 | September 2019 Adobe Flash Security Update

Microsoft Office Updates

You find Office update information here.

How to download and install the September 2019 security updates

windows updates september 2019 microsoft

Most home systems receive updates automatically especially when they run Windows 10. Updates are not pushed in real-time to devices running Windows. Some administrators prefer to install security updates the moment they are released, others to wait to make sure that the updates don’t introduce any issues on the system.

Note: it is recommended that you back up the system partition before you install updates. Use programs like Paragon Backup & Recovery Free or Macrium Reflect for that.

Admins may check for updates manually to retrieve the released updates right away. Here is how that is done:

Updates may also be downloaded from the Microsoft Update Catalog website.

Direct update downloads

Windows 7 SP1 and Windows Server 2008 R2 SP

Windows 8.1 and Windows Server 2012 R2

Windows 10 (version 1803)

Windows 10 (version 1809)

Windows 10 (version 1903)

Источник

question

Server 2019 update KB5005568 (Sept 2022) forcing new DCOM authentication prematurely

Hi,
We recent applied KB5005568 (Sept 21 update) to one of our Server 2019 DCs. After applying, we started receiving many DCOM error events 10036 (Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application) for a user id function on our Palo Alto FW (It uses a service account to resolve user identification from AD). Having read up on Microsoft’s transition to a minimum of Packet Integrity for DCOM authentication (see June’s KB5004442 and the DCOM issue described in CVE-2022-26414), it would appear that, at least in Server 2019, this feature has been enabled prematurely (Supposed to be Q1 2022 based on the timeline in the KB5004442) and the described reg entry to temporarily bypass the DCOM update does not work (it is supposed to be valid all of 2022 after the feature is enabled).

Our only solution has been to roll back the patch on our DC. I found one reference to someone else encountering the same. They have mixed OS’s for DCs and are only seeing the issue on 2019 (https://www.reddit.com/r/paloaltonetworks/comments/pl5dm7/new_2019_dc_event_log_messages_from_panos_userid/).

Is anyone else seeing this behavior with the pending DCOM update?

First time posting here and really just trying to see if this is on MS’s radar at all.

The fix related to this didn’t work?

Registry key HKEY_LOCAL_MACHINESOFTWAREMicrosoftOleAppCompatRequireIntegrityActivationAuthenticationLevel set to 0x00000000 and Reboot server.

Also go to COM Security, Edit Limits on both options, make sure user is manually added to local and remote access, local launch, remote launch etc.

Give those a go and see if any stick?

Hi the solution for me was to update the client server with the same patches and also using your tip:
Registry key HKEY_LOCAL_MACHINESOFTWAREMicrosoftOleAppCompatRequireIntegrityActivationAuthenticationLevel set to 0x00000000 and Reboot server.

can you explain some more how you resolved it finally?
We are having same issues with 2019.

Do i get it right that you uninstalled the CU of September, then set the Regkey, then installed the small update kb5004442 and then again the CU and then it worked without errors?

Having the same issue on 2019DC’s when we are querying WMI for events (errors/warnings) nightly. We get the error but the Powershell script that runs from a remote server is still able to pull the events. And so far no other clients appear to be creating this error when talking to the DC’s

This update KB5005568 also broke WMI Polling method in our monitoring. (SolarWinds)
WMI Polling fails all the time and we are getting»RPC server is unavailable» when testing WMI connectivity using wbemtest. Uninstalling the update resolved the issue, but we’d like to have the update installed without getting any WMI polling issues at all. Does anyone have this resolved from their end, can you share us what steps were taken to fix it? It would be greatly appreciated.

Keep safe everyone!

Anyone had any luck with this so far? Getting the same as OP (Palo alto service account).

You may need to try a beta firmware. Our vendor happened to release a beta that patches this issue the same day we started seeing the problem.

Источник

2019 SHA-2 Code Signing Support requirement for Windows and WSUS

Summary

To help protect the security of the Windows operating system, updates were previously signed (using both the SHA-1 and SHA-2 hash algorithms). The signatures are used to authenticate that the updates come directly from Microsoft and were not tampered with during delivery. Because of weaknesses in the SHA-1 algorithm and to align to industry standards, we have changed the signing of Windows updates to use the more secure SHA-2 algorithm exclusively. This change was done in phases starting in April 2019 through September 2019 to allow for smooth migration (see the «Product update schedule» section for more details on the changes).

Customers who run legacy OS versions (Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Server 2008 SP2) are required to have SHA-2 code signing support installed on their devices to install updates released on or after July 2019. Any devices without SHA-2 support will not be able to install Windows updates on or after July 2019. To help prepare you for this change, we released support for SHA-2 signing in starting March 2019 and have made incremental improvements. Windows Server Update Services (WSUS) 3.0 SP2 will receive SHA-2 support to securely deliver SHA-2 signed updates. Please see the «Product update schedule» section for the SHA-2 only migration timeline.

Background details

The Secure Hash Algorithm 1 (SHA-1) was developed as an irreversible hashing function and is widely used as a part of code-signing. Unfortunately, the security of the SHA-1 hash algorithm has become less secure over time because of the weaknesses found in the algorithm, increased processor performance, and the advent of cloud computing. Stronger alternatives such as the Secure Hash Algorithm 2 (SHA-2) are now strongly preferred as they do not experience the same issues. For more information about of the deprecation of SHA-1, see Hash and Signature Algorithms.

Product update schedule

Starting in early 2019, the migration process to SHA-2 support began in stages, and support will be delivered in standalone updates. Microsoft is targeting the following schedule to offer SHA-2 support. Please note that the following timeline is subject to change. We will continue to update this page as needed.

Stand Alone security updates KB4474419 and KB4490628 released to introduce SHA-2 code sign support.

Windows 7 SP1
Windows Server 2008 R2 SP1

Stand Alone update, KB4484071 is available on Windows Update Catalog for WSUS 3.0 SP2 that supports delivering SHA-2 signed updates. For those customers using WSUS 3.0 SP2, this update should be manually installed no later than June 18, 2019.

Stand Alone update, KB4493730 that introduce SHA-2 code sign support for the servicing stack (SSU) was released as a security update.

Windows Server 2008 SP2

Stand Alone security update KB4474419 released to introduce SHA-2 code sign support.

Windows Server 2008 SP2

Stand Alone security update KB4474419re-released to add missing MSI SHA-2 code sign support.

Windows Server 2008 SP2

Windows 10 updates signatures changed from dual signed (SHA-1/SHA-2) to SHA-2 only. No customer action required.

Windows 10, version 1709
Windows 10, version 1803
Windows 10, version 1809
Windows Server 2019

Required: For those customers using WSUS 3.0 SP2, KB4484071 must be manually installed by this date to support SHA-2 updates.

Required: Updates for legacy Windows versions will require that SHA-2 code signing support be installed. The support released in April and May (KB4493730 and KB4474419) will be required in order to continue to receive updates on these versions of Windows.

All legacy Windows updates signatures changed from SHA1 and dual signed (SHA-1/SHA-2) to SHA-2 only at this time.

Windows Server 2008 SP2

Windows 10 updates signatures changed from dual signed (SHA-1/SHA-2) to SHA-2 only. No customer action required.

Windows 10, version 1507
Windows 10, version 1607
Windows Server 2016
Windows 10, version 1703

Required: Updates for legacy Windows versions will require that SHA-2 code signing support be installed. The support released in March (KB4474419 and KB4490628) will be required in order to continue to receive updates on these versions of Windows. If you have a device or VM using EFI boot, please see the FAQ section for additional steps to prevent an issue in which your device may not start.

All legacy Windows updates signatures changed from SHA-1 and dual signed (SHA-1/SHA-2) to SHA-2 only at this time.

Windows 7 SP1
Windows Server 2008 R2 SP1

Legacy Windows update signatures changed from dual-signed (SHA-1/SHA-2) to SHA-2 only. No customer action required.

Windows Server 2012
Windows 8.1
Windows Server 2012 R2

Stand Alone security update KB4474419 was re-released to add missing EFI boot mangers. Please make sure that this version is installed.

Windows 7 SP1
Windows Server 2008 R2 SP1
Windows Server 2008 SP2

Signatures on the Certificate Trust Lists (CTLs) for the Microsoft Trusted Root Program changed from dual-signed (SHA-1/SHA-2) to SHA-2 only. No customer action required.

All supported Windows platforms

Windows Update SHA-1 based service endpoints are discontinued. This only impacts older Windows devices which have not updated with appropriate security updates. For more information, see KB4569557.

Windows 7
Windows 7 SP1
Windows Server 2008
Windows Server 2008 SP2
Windows Server 2008 R2
Windows Server 2008 R2 SP1

Microsoft retired content that is Windows-signed for Secure Hash Algorithm 1 (SHA-1) from the Microsoft Download Center. For more information, see the Windows IT pro blog SHA-1 Windows content to be retired August 3, 2020.

Windows Server 2000
Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8
Windows Server 2012
Windows 8.1
Windows Server 2012 R2
Windows 10
Windows 10 Server

Current status

Windows 7 SP1 and Windows Server 2008 R2 SP1

The following required updates must be installed and then the device restarted before installing any update released August 13, 2019 or later. The required updates can be installed in any order and do not need to be reinstalled, unless there is a new version of the required update.

Servicing stack update (SSU) (KB4490628). If you use Windows Update, the required SSU will be offered to you automatically.

SHA-2 update (KB4474419) released September 10, 2019. If you use Windows Update, the required SHA-2 update will be offered to you automatically.

Important You must restart your device after installing all the required updates, before installing any Monthly Rollup, Security-only update, Preview of Monthly Rollup, or standalone update.

Windows Server 2008 SP2

The following updates must be installed and then the device restarted before installing any Rollup released September 10, 2019 or later. The required updates can be installed in any order and do not need to be reinstalled, unless there is a new version of the required update.

Servicing stack update (SSU) (KB4493730). If you use Windows Update, the required SSU update will be offered to you automatically.

The latest SHA-2 update (KB4474419) released September 10, 2019. If you use Windows Update, the required SHA-2 update will be offered to you automatically.

Important You must restart your device after installing all the required updates, before installing any Monthly Rollup, Security-only update, Preview of Monthly Rollup, or standalone update.

Frequently Ask Questions

General information, planning and issue prevention

The SHA-2 code-signing support was shipped early to ensure that most customers would have the support well in advance of Microsoft’s change to SHA-2 signing for updates to these systems. The stand-alone updates include some additional fixes and are being made available to ensure that all of the SHA-2 updates are in a small number of easily identifiable updates. Microsoft recommends that customers that maintain system images for these OSes to apply these updates to the images.

Starting with WSUS 4.0 on Windows Server 2012, WSUS already supports SHA-2-signed updates, and no customer action is needed for these versions.

Only WSUS 3.0 SP2 needs KB4484071installed to support SHA2 only signed updates.

Assume you run Windows Server 2008 SP2. If you dual-boot with Windows Server 2008 R2 SP1/Windows 7 SP1, the boot manager for this type of system is from the Windows Server 2008 R2/Windows 7 system. In order to successfully update both of these systems to use SHA-2 support, you must first update the Windows Server 2008 R2/Windows 7 system so that the boot manager is updated to the version that supports SHA-2. Then, update the Windows Server 2008 SP2 system with SHA-2 support.

Similar to the dual-boot scenario, the Windows 7 PE environment must be updated to SHA-2 support. Then, the Windows Server 2008 SP2 system must be updated to SHA-2 support.

Run Windows setup to completion and boot into Windows prior to installing August 13, 2019 or later updates

Open an administrator command prompt window, run bcdboot.exe. This copies the boot files from the Windows directory and sets up the boot environment. See BCDBoot Command-Line Options for more details.

Before installing any additional updates, install the August 13, 2019 re-release of KB4474419 and KB4490628 for Windows 7 SP1 and Windows Server 2008 R2 SP1.

Restart the operating system. This restart is required

Install any remaining updates.

Install the image on the disk and boot into Windows.

At the command prompt, run bcdboot.exe. This copies the boot files from the Windows directory and sets up the boot environment. See BCDBoot Command-Line Options for more details.

Before installing any additional updates, install the September 23, 2019 re-release of KB4474419 and KB4490628 for Windows 7 SP1 and Windows Server 2008 R2 SP1.

Restart the operating system. This restart is required

Install any remaining updates.

Yes, you will need to install the required updates before proceeding: SSU (KB4490628) and SHA-2 update (KB4474419). Also, you are required to restart your device after installing the required updates before installing any further updates.

Windows 10, version 1903 supports SHA-2 since it’s release and all updates are already SHA-2 only signed. There is no action needed for this version of Windows.

Windows 7 SP1 and Windows Server 2008 R2 SP1

Boot into Windows prior to installing any August 13, 2019 or later updates.

Before installing any additional updates, install the September 23, 2019 re-release of KB4474419 and KB4490628for Windows 7 SP1 and Windows Server 2008 R2 SP1.

Restart the operating system. This restart is required

Install any remaining updates.

Windows Server 2008 SP2

Boot into Windows prior to installing any July 9, 2019 or later updates.

Before installing any additional updates, install the September 23, 2019 re-release of KB4474419 and KB4493730 for Windows Server 2008 SP2.

Restart the operating system. This restart is required

Install any remaining updates.

Issue recovery

If you are seeing error 0xc0000428 with the message “Windows cannot verify the digital signature for this file. A recent hardware or software change might have installed a file that is signed incorrectly or damaged, or that might be malicious software from an unknown source.” please follow these steps to recover.

Start the operating system using recovery media.

Before installing any additional updates, install update KB4474419 that is dated September 23, 2019 or a later date using Deployment Image Servicing and Management (DISM) for Windows 7 SP1 and Windows Server 2008 R2 SP1.

At the command prompt, run bcdboot.exe. This copies the boot files from the Windows directory and sets up the boot environment. See BCDBoot Command-Line Options for more details.

Restart the operating system.

Halt deployment to other devices and do not restart any devices or VMs that have not already restarted.

Identify devices and VMs in restart pending state with updates released August 13, 2019 or later and open an elevated command prompt

Find the package identity for the update you want to remove by using the following command using the KB number for that update (replace 4512506 with the KB number you are targeting, if it is not the Monthly rollup released August 13, 2019): dism /online /get-packages | findstr 4512506

Use the following command to remove the update, replacing

with what was found in the previous command: Dism.exe /online /remove-package /packagename:

You will now need to install the required updates listed in the How to get this update section of the update you are trying to install, or the required updates listed above in the Current status section of this article.

Note Any device or VM you are currently receiving an error 0xc0000428 or that is starting into the recovery environment, you will need to follow the steps in the FAQ question for error 0xc0000428.

If you encounter these errors, you need to install the required updates listed in the How to get this update section of the update you are trying to install, or the required updates listed above in the Current status section of this article.

If you are seeing error 0xc0000428 with the message “Windows cannot verify the digital signature for this file. A recent hardware or software change might have installed a file that is signed incorrectly or damaged, or that might be malicious software from an unknown source.” please follow these steps to recover.

Start the operating system using recovery media.

Install the latest SHA-2 update (KB4474419) released on or after August 13, 2019, using Deployment Image Servicing and Management (DISM) for Windows 7 SP1 and Windows Server 2008 R2 SP1.

Reboot into the recovery media. This restart is required

At the command prompt, run bcdboot.exe. This copies the boot files from the Windows directory and sets up the boot environment. See BCDBoot Command-Line Options for more details.

Restart the operating system.

If you encounter this issue, you can mitigate this issue by opening a command prompt window and run the following command to install the update (replace the placeholder with the actual location and file name of the update):

This issue is resolved in KB4474419 released October 8, 2019. This update will install automatically from Windows Update and Windows Server Update Services (WSUS). If you need to install this update manually, you will need to use the workaround above.

Note If you previously installed KB4474419 released September 23, 2019, then you already have the latest version of this update and do not need to reinstall.

Источник

September is upon us and with it brings the latest security patches from Microsoft and Adobe. Take a break from your regularly scheduled activities and join us as we review the details for security patches for this month.  

Adobe Patches for September 2019

Adobe had a small release for September with only two patches covering a total of three CVEs in Adobe Flash and Application Manager. The update for Flash addresses two CVEs, both of which were reported through the ZDI program. The patch corrects a Use-After-Free (UAF) bug and a Same Origin Method Execution bug, both of which are rated Critical in severity. The Application Manager patch fixes an Important-severity DLL hijacking bug.

Neither of these bugs are listed as being publicly known or under active attack at the time of release.

Microsoft Patches for September 2019

This month, Microsoft released security patches for 80 CVEs plus two advisories. The updates cover Microsoft Windows, Internet Explorer, Microsoft Edge, ChakraCore, Office and Microsoft Office Services and Web Apps, Skype for Business and Microsoft Lync, Visual Studio, .NET Framework, Exchange Server, Microsoft Yammer, and Team Foundation Server. Of these 80 CVEs, 17 are listed as Critical, 62 are listed as Important, and one is listed as Moderate in severity. A total of 18 of these CVEs came through the ZDI program. Two of the bugs this month are listed as publicly known at the time of release, and two other bugs are listed as under active attack.

Let’s take a closer look at some of the more interesting patches for this month, starting with the bugs under active attack:

Note: Post-release, Microsoft revised their advisories to indicate these two CVEs are not under active attack.

—       CVE-2019-1215 – Windows Elevation of Privilege Vulnerability
This patch corrects a local privilege escalation (LPE) in the Winsock2 Integrated File System Layer (ws2ifsl.sys). An attacker who exploits this vulnerability could go from User level to Administrator level access. Microsoft reports this is being actively used against both newer and older supported OSes, but they don’t indicate where. Interestingly, this file has been targeted by malware in the past, with some references going back as far as 2007. Not surprising, since malware often targets low-level Windows services. Regardless, since this is being actively used, put this one on the top of your patch list.

—       CVE-2019-1214 – Windows Common Log File System Driver Elevation of Privilege Vulnerability
The other bug under active attack this month is also a Windows LPE, this time in the Common Log File System (CLFS) Driver. Again, an attacker could use this to elevate from a regular user to one with Administrative privileges. According to Microsoft, this CVE is only being seen targeting older operating systems. This is a fine time to remind you that Windows 7 is less than six months from end of support, which means you won’t be getting updates for bugs like this one next February. Patch your systems, then work on your upgrade strategy.

—       CVE-2019-1289 – Windows Update Delivery Optimization Elevation of Privilege Vulnerability
This patch corrects a rather intriguing bug in the Windows Update Delivery Optimization (WUDO) feature found in Windows 10. This component is designed to reduce network bandwidth by having PCs grab updates from other peers on a network that already have downloaded the update. A local attacker could use this vulnerability to overwrite files they would normally not have permissions to. While this clearly could lead to an LPE on the local system, it’s not clear if it could be used to impact other systems through WUDO. If you’re using this feature, definitely roll this patch out quickly or disable the feature entirely.

—        CVE-2019-1257 – Microsoft SharePoint Remote Code Execution Vulnerability
This patch addresses one of three Critical-rated deserialization bugs in the Business Data Connectivity Service of SharePoint. All three were reported by Markus Wulftange through the ZDI program. For this particular case, an attacker could execute their code under the context of the SharePoint application pool identity by uploading a specially crafted SharePoint application package to an affected server. Normally, you would need to authenticate to upload such a package – unless you have enabled anonymous access. But you wouldn’t do that. Would you? We’ll also have more details about these bugs on our blog in the near future. Stay tuned…

Here’s the full list of CVEs released by Microsoft for September 2019.

Of the public patches, one was highly publicized through a blog just after last patch Tuesday. The update closes a hole that could possibly allow attackers to hijack just about any application. Although we haven’t seen this being used in the wild yet, there’s a strong possibility that will happen. The other publicly known issue involves a bypass in the secure boot functionality. It sounds worse than it actually is, as this bug could only allow attackers with physical access to get debugging functionality.

You’ll notice there are Remote Desktop bugs being patched in this release as well, but unlike BlueKeep and DejaBlue, these members of the Blue Bug Group are all client-side. An attacker would need to convince someone to connect to their malicious RDP server or otherwise intercept (MITM) the traffic. It’s good to see these issues patched, but they don’t carry the urgency of the recent wormable bugs.

Of the remaining Critical-rated patches, nine correct browse-and-own scenarios in either a browser or a browser component. In reading these, Microsoft now seems to be referring to older Edge versions as “Microsoft Edge (EdgeHTML-based)” or “Microsoft Edge based on EdgeHTML” in order to distinguish it from Edge based on the Chromium source code.

More interestingly, this is the second month in a row with patch for an LNK vulnerability. Considering the history of exploits using LNK vulnerabilities, including recent malware campaigns using fileless execution and (of course) Stuxnet, these bugs always get attention from attackers.

The final Critical patch for September fixes a bug in the Azure DevOps (ADO) and Team Foundation Server (TFS) that could allow an attacker to execute code on the server in the context of the TFS or ADO service account. An attacker would need permissions to upload a file on a target repo, but if they do, they can achieve code execution once the affected server indexes their file. We’ll have additional details (with video!) about this bug in the near future as well.

Moving on to the Important-rated patches, the first that pops out is a Denial-of-Service (DoS) bug impacting Microsoft Exchange. An attacker could shut down an affected server just by sending it a specially crafted email. No user interaction is required. Neat. There’s also a patch that addresses an Exchange spoofing vulnerability, but that one requires a user to click a link.

Info disclosure bugs get their fair share of attention this month with 16 patches impacting Windows and Office components. There are also three cross-site scripting (XSS) and three spoofing bugs fixed this month to go with the many EoP and RCEs. Rounding out this month’s release, there are a few updates for the JET Database, Office, SharePoint, .NET and ASP.NET, and other various Windows components. 

Looking at the advisories for September, the first is Microsoft’s version of the aforementioned patch for Flash in Internet Explorer. The other is the update to the Windows Servicing Stack, which adds updates for Windows 10 version 1607, Windows Server 2016, Windows 10 version 1809, and Windows Server 2019.

Looking Ahead

The next patch Tuesday falls on October 8, and we’ll return with details and patch analysis then. Until then, happy patching and may all your reboots be smooth and clean!

To obtain updates from this website, scripting must be enabled.

To use this site to find and download updates, you need to change your security settings to allow ActiveX controls and active scripting. To get updates but allow your security settings to continue blocking potentially harmful ActiveX controls and scripting from other sites, make this site a trusted website:


In Internet Explorer, click Tools, and then click Internet Options.

On the Security tab, click the Trusted Sites icon.

Click Sites and then add these website addresses one at a time to the list:
You can only add one address at a time and you must click Add after each one:


http://*.update.microsoft.com

https://*.update.microsoft.com

http://download.windowsupdate.com

Note:
You might have to uncheck the Require server verification (https:) for all sites in the zone option to enter all the addresses.

KB4474419

Update Windows 7 KB4474419

Update Windows 7 KB4474419. 2019-09 Security Update for Windows 7 for x86 and x64 based Systems (KB4474419).

A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update KB4474419 for windows 7. After you install this update, you may have to restart your system.

Install resources KB4474419

Architecture: X86 & X64

Classification: Security Updates

Supported products: Windows 7

Supported languages: all

Restart behavior: Can request restart

May request user input: No

Must be installed exclusively: No

Requires network connectivity: No

Uninstall Notes: This software update can be removed by selecting View installed updates in the Programs and Features Control Panel.

Uninstall Steps: n/a

Rate this program

  • 1
  • 2
  • 3
  • 4
  • 5

4.5 out of 5 stars (20 Ratings)

KB4474419

Update Windows 7 KB4474419 32-bit

Language

All languagesAll languages

MD5 Checksum

6335cd216727be17720c8d67394e309e

KB4474419

Update Windows 7 KB4474419 64-bit

Language

All languagesAll languages

MD5 Checksum

d5ff57b4145dfd534f7e5d1d3b50a5c2

Secure and Fast Download — Software Verified

These updates are important to continue getting security patches

by Milan Stanojevic

Milan has been enthusiastic about technology ever since his childhood days, and this led him to take interest in all PC-related technologies. He’s a PC enthusiast and he… read more


Updated on November 5, 2022

Reviewed by
Vlad Turiceanu

Vlad Turiceanu

Passionate about technology, Windows, and everything that has a power button, he spent most of his time developing new skills and learning more about the tech world. Coming… read more

  • Need to continue using Windows 7? You have to install KB4474419, KB4490628, and KB448407.
  • These updates were first released during the March 2019 Patch Tuesday updates. 
  • All 3 cumulative updates will provide your Windows 7 system with SHA-2 code sign support.

XINSTALL BY CLICKING THE DOWNLOAD FILE

To fix various PC problems, we recommend Restoro PC Repair Tool:
This software will repair common computer errors, protect you from file loss, malware, hardware failure and optimize your PC for maximum performance. Fix PC issues and remove viruses now in 3 easy steps:

  1. Download Restoro PC Repair Tool that comes with Patented Technologies (patent available here).
  2. Click Start Scan to find Windows issues that could be causing PC problems.
  3. Click Repair All to fix issues affecting your computer’s security and performance
  • Restoro has been downloaded by 0 readers this month.

If you want to continue receiving security patches on your Windows 7 machines, you need to install KB4474419, KB4490628, and KB4484071 before you hit the Update button.

All of these updates support SHA-2 and they have been around since the March 2019 Patch Tuesday updates. In this guide, we’ll give you a quick overview of these updates and show you how to properly install them.

What are KB4474419 prerequisites?

This update doesn’t have any prerequisites, and it can be installed independently of other updates.

As a result, you can install this update right away by following the instructions from this guide.

What can I do if I missed the deadline to download KB4474419?

I missed the deadline to download KB4474419 for my windows 7 service pack 1 is there a solution for this?

The question of missed deadlines for the download of the KB4474419 for Windows 7 is rampant among users. If you have not downloaded the update before the stipulated time, you can go to the Windows Update Catalog to download it manually.

Note that you might need to install the earlier versions of the updates before installing the latest one. If you face some KB4474419 download issues for some reason, you might need to perform an in-place upgrade.

We have shown how to download the update manually from the Windows Update Catalog in this guide.

What should I know about KB4474419, KB4490628, and KB4484071?

The rollout is targeting the users of Windows Server 2008 R2 Service Pack 1 and Windows 7 Service Pack 1 and encourages them to install the three updates.

  • Download  KB4474419 
  • Download KB4490628
  • Download  KB4484071

What does each of these updates do?

KB4474419

Those users who currently have Windows 7 Service Pack 1 (SP1) need to install the KB4474419 Windows security update to receive the SHA-2 code sign support. This pack is also useful for users who encounter OpenVPN TAP driver errors.

KB4490628

Secondly, you can resolve the hash algorithm issue by installing the KB4490628 servicing stack update. You will get SHA-2 signed Windows Updates on your system.

KB4484071

Some PC issues are hard to tackle, especially when it comes to corrupted repositories or missing Windows files. If you are having troubles fixing an error, your system may be partially broken.
We recommend installing Restoro, a tool that will scan your machine and identify what the fault is.
Click here to download and start repairing.

Finally, addresses the issues that are faced by the users with Windows Server Update Services 3.0 Service Pack 2 (WSUS).

Microsoft has made it clear that WSUS update tasks cant be performed by the WSUS 3.0 SP2 generally known as WSUS 3.2 without installing the SHA-2 update. 

The updates are scheduled to be released in July 2019. If you are still using WSUS 3.0 SP2, this update is critical for you.

Microsoft recommends its users update to the latest version 10.0 of WSUS. 

How to download Windows 7 KB4474419, KB4490628, and KB4484071?

  1. Open Control Panel.
  2. Select Windows Update.
  3. Now click the Check for updates button.
  4. Windows will look for available updates and download them automatically.

The easiest way to download KB4474419 is with Windows Update, so we encourage you to try it.

Read more about this topic

  • How to disable the Windows 7 out of support message
  • 4 best software to fix Windows 7 errors for good
  • Windows XP Antivirus: 8 Top Picks That Still Support This OS
  • Best Open Source Antivirus in 2023 [Out of 25 Tested]

How do I manually install KB4474419?

  1. Visit Windows Update Catalog.
  2. Enter the KB number in the search field and click on Search.
  3. Locate the update that matches your system, in our case, it was Windows 7 and click on Download. If you’re using the 32-bit operating system, select the KB4474419 32-bit version instead.
  4. A new window will appear. Click the link to download the update.
  5. Once the file is downloaded, run it and follow the instructions on the screen to install the update.

As you can see, this is an easy way to download and install KB4474419 for 64-bit and 32-bit PCs without having to use Windows Update.

How to uninstall KB4474419?

  1. Open Control Panel.
  2. Navigate to Uninstall a program.
  3. Now select View installed updates.
  4. Double-click the KB4474419 and follow the instructions on the screen to remove it.

If you have any issues with KB4474419, then you can remove it easily by following the instructions above.

All of the Windows Server 2008 and Windows 7 machines have received all of these updates via Windows Update as a part of Patch Tuesday.

Don’t forget that Microsoft has retired Windows 7 back in January 2020, and those that still wanted to continue receiving updates needed to purchase an EOS package.

For more information on how to get this, check out our detailed article on how to get Windows 7 Extended Support.

Feel free to let us know if you encountered any issues downloading these updates in the comments below.

newsletter icon

Newsletter

These updates are important to continue getting security patches

by Milan Stanojevic

Milan has been enthusiastic about technology ever since his childhood days, and this led him to take interest in all PC-related technologies. He’s a PC enthusiast and he… read more


Updated on November 5, 2022

Reviewed by
Vlad Turiceanu

Vlad Turiceanu

Passionate about technology, Windows, and everything that has a power button, he spent most of his time developing new skills and learning more about the tech world. Coming… read more

  • Need to continue using Windows 7? You have to install KB4474419, KB4490628, and KB448407.
  • These updates were first released during the March 2019 Patch Tuesday updates. 
  • All 3 cumulative updates will provide your Windows 7 system with SHA-2 code sign support.

XINSTALL BY CLICKING THE DOWNLOAD FILE

To fix various PC problems, we recommend Restoro PC Repair Tool:
This software will repair common computer errors, protect you from file loss, malware, hardware failure and optimize your PC for maximum performance. Fix PC issues and remove viruses now in 3 easy steps:

  1. Download Restoro PC Repair Tool that comes with Patented Technologies (patent available here).
  2. Click Start Scan to find Windows issues that could be causing PC problems.
  3. Click Repair All to fix issues affecting your computer’s security and performance
  • Restoro has been downloaded by 0 readers this month.

If you want to continue receiving security patches on your Windows 7 machines, you need to install KB4474419, KB4490628, and KB4484071 before you hit the Update button.

All of these updates support SHA-2 and they have been around since the March 2019 Patch Tuesday updates. In this guide, we’ll give you a quick overview of these updates and show you how to properly install them.

What are KB4474419 prerequisites?

This update doesn’t have any prerequisites, and it can be installed independently of other updates.

As a result, you can install this update right away by following the instructions from this guide.

What can I do if I missed the deadline to download KB4474419?

I missed the deadline to download KB4474419 for my windows 7 service pack 1 is there a solution for this?

The question of missed deadlines for the download of the KB4474419 for Windows 7 is rampant among users. If you have not downloaded the update before the stipulated time, you can go to the Windows Update Catalog to download it manually.

Note that you might need to install the earlier versions of the updates before installing the latest one. If you face some KB4474419 download issues for some reason, you might need to perform an in-place upgrade.

We have shown how to download the update manually from the Windows Update Catalog in this guide.

What should I know about KB4474419, KB4490628, and KB4484071?

The rollout is targeting the users of Windows Server 2008 R2 Service Pack 1 and Windows 7 Service Pack 1 and encourages them to install the three updates.

  • Download  KB4474419 
  • Download KB4490628
  • Download  KB4484071

What does each of these updates do?

KB4474419

Those users who currently have Windows 7 Service Pack 1 (SP1) need to install the KB4474419 Windows security update to receive the SHA-2 code sign support. This pack is also useful for users who encounter OpenVPN TAP driver errors.

KB4490628

Secondly, you can resolve the hash algorithm issue by installing the KB4490628 servicing stack update. You will get SHA-2 signed Windows Updates on your system.

KB4484071

Some PC issues are hard to tackle, especially when it comes to corrupted repositories or missing Windows files. If you are having troubles fixing an error, your system may be partially broken.
We recommend installing Restoro, a tool that will scan your machine and identify what the fault is.
Click here to download and start repairing.

Finally, addresses the issues that are faced by the users with Windows Server Update Services 3.0 Service Pack 2 (WSUS).

Microsoft has made it clear that WSUS update tasks cant be performed by the WSUS 3.0 SP2 generally known as WSUS 3.2 without installing the SHA-2 update. 

The updates are scheduled to be released in July 2019. If you are still using WSUS 3.0 SP2, this update is critical for you.

Microsoft recommends its users update to the latest version 10.0 of WSUS. 

How to download Windows 7 KB4474419, KB4490628, and KB4484071?

  1. Open Control Panel.
  2. Select Windows Update.
  3. Now click the Check for updates button.
  4. Windows will look for available updates and download them automatically.

The easiest way to download KB4474419 is with Windows Update, so we encourage you to try it.

Read more about this topic

  • How to disable the Windows 7 out of support message
  • 4 best software to fix Windows 7 errors for good
  • Windows XP Antivirus: 8 Top Picks That Still Support This OS
  • Best Open Source Antivirus in 2023 [Out of 25 Tested]

How do I manually install KB4474419?

  1. Visit Windows Update Catalog.
  2. Enter the KB number in the search field and click on Search.
  3. Locate the update that matches your system, in our case, it was Windows 7 and click on Download. If you’re using the 32-bit operating system, select the KB4474419 32-bit version instead.
  4. A new window will appear. Click the link to download the update.
  5. Once the file is downloaded, run it and follow the instructions on the screen to install the update.

As you can see, this is an easy way to download and install KB4474419 for 64-bit and 32-bit PCs without having to use Windows Update.

How to uninstall KB4474419?

  1. Open Control Panel.
  2. Navigate to Uninstall a program.
  3. Now select View installed updates.
  4. Double-click the KB4474419 and follow the instructions on the screen to remove it.

If you have any issues with KB4474419, then you can remove it easily by following the instructions above.

All of the Windows Server 2008 and Windows 7 machines have received all of these updates via Windows Update as a part of Patch Tuesday.

Don’t forget that Microsoft has retired Windows 7 back in January 2020, and those that still wanted to continue receiving updates needed to purchase an EOS package.

For more information on how to get this, check out our detailed article on how to get Windows 7 Extended Support.

Feel free to let us know if you encountered any issues downloading these updates in the comments below.

newsletter icon

Newsletter

Доступны обновления безопасности для продуктов компании Microsoft, исправляющие более 60 уязвимостей.

13 марта стали доступны обновления для следующих продуктов: Internet Explorer, Edge, Exchange Server, ChakraCore, Microsoft Windows, Office and Microsoft Office Services and Web Apps, .NET Framework, Windows Server, Hyper-V, Storage and Filesystems, Windows Cryptography, Windows Fundamentals, Windows Kernel, Windows MSXML, Microsoft JET Database Engine, DHCP-клиент Windows.

Устранена критическая уязвимость Win32k Elevation of Privilege Vulnerability (CVE-2019-0797, CVE-2019-0808), данная уязвимость повышения привилегий в драйвере ядра Windows win32k.sys, позволяющую выйти за пределы окружения песочницы, была озвучена группой анализа угроз Google.

Обновления:

Windows Server 2008 SP2 — KB4489880.

Windows 7 с пакетом обновления 1 (SP1) и Windows Server 2008 R2 с пакетом обновления 1 (SP1) —  KB4489878.

KB4474419 — это обновление, добавляет поддержку шифрования SHA-2 в Windows 7/Windows Server 2008 R2 and WSUS.

KB4490628 — это обновление устраняет ошибку в стеке сопровождения при установке обновления, который подписан с помощью хэш-алгоритма шифрования SHA-2 в Windows 7/Windows Server 2008 R2 and WSUS.

Windows 8.1 и Windows Server 2012 R2  — KB4489881

Adobe Flash Player для Windows 8.1 и Windows 10 —  KB4489907.

Так же доступны обновления для: Windows 10/Windows 2016/Windows 2019, MS Officce 2010 и выше.

Дополнено.

Как правильно установить обновление KB4474419 .

1) Скачайте и установите обновление KB4489878 (если данное обновление установлено, данный шаг можно пропустить).

2) Скачайте и установите обновление KB4490628.

3) Скачайте и установите обновление KB4474419.

  • ВКонтакте

Если вы хотите получать будущие исправления безопасности на компьютерах с Windows 7, вам действительно нужно установить KB4474419, KB4490628 и KB4484071, прежде чем нажать кнопку обновления.

Все эти обновления поддерживают SHA-2, и они были выпущены пользователям в обновлениях, выпущенных в марте 2019 года во вторник.

Кто должен устанавливать KB4474419, KB4490628 и KB4484071?

Развертывание ориентировано на пользователей Windows Server 2008 R2 с пакетом обновления 1 и Windows 7 с пакетом обновления 1 и предлагает им установить три обновления.

  • Загрузить KB4474419  

  • Загрузить KB4490628

  • Загрузить KB4484071

Редмондский гигант рекомендует пользователям устанавливать вышеупомянутые обновления до истечения крайнего срока 16 июля 2019 года.

Давайте посмотрим на каждый из них в деталях.

1. KB4474419

Те пользователи, которые в настоящее время имеют Windows 7 с пакетом обновления 1 (SP1) и Windows Server 2008 R2 с пакетом обновления 1 (SP1), получат поддержку знака кода SHA-2 при установке KB4474419.

2. KB4490628

Во-вторых, вы можете решить проблему с алгоритмом хеширования, установив обновление стека обслуживания KB4490628. В вашей системе вы получите подписанные обновления SHA-2 для Windows.

3. KB4484071

Наконец, решаются проблемы, с которыми сталкиваются пользователи Windows Server Update Services 3.0 с пакетом обновления 2 (WSUS).

Microsoft ясно дала понять, что задачи обновления WSUS не могут быть выполнены с помощью WSUS 3.0 с пакетом обновления 2 (SP2), обычно известного как WSUS 3.2, без установки обновления SHA-2.

Выпуск обновлений запланирован на июль 2019 года. Если вы все еще используете WSUS 3.0 с пакетом обновления 2 (SP2), это обновление является критически важным для вас.

Microsoft рекомендует своим пользователям обновиться до последней версии 10.0 WSUS.

Как скачать обновления?

Все компьютеры под управлением Windows Server 2008 и Windows 7 получили все эти обновления через Центр обновления Windows в рамках цикла « Вторник исправлений» в этом месяце.

Помните, что вы не сможете получать другие исправления безопасности, которые будут выпущены в июле, если вы заблокируете эти автоматические обновления .

Как мы уже сообщали, Microsoft уже объявила о выходе из строя Windows 7 в январе 2020 года. Microsoft планирует предложить расширенные обновления безопасности пользователям, которые планируют использовать Windows 7 для каждого устройства.

Если вы один из тех пользователей, которые еще не решили перейти на Windows 10, скачайте эти обновления как можно скорее, чтобы обезопасить свою ОС.

СВЯЗАННЫЕ СТАТЬИ, КОТОРЫЕ ВЫ ДОЛЖНЫ ПРОВЕРИТЬ:

  • Какие ошибки приносит Windows 7 KB4489885, KB4489878?
  • Скачать Windows 7 KB4489885, KB4489878 в патче вторник


  • Malwarebytes / Malwarebytes Business / Malwarebytes for Windows / Malwarebytes for Windows / Malwarebytes Home

Windows 2019-09 Security Update for Windows devices running Malwarebytes home products

For devices running Windows 7, to install, upgrade, or update your Malwarebytes product, you must have the Microsoft™ 2019-09 Security Update installed. To learn more, see Microsoft’s support article 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.

To apply the Microsoft 2019-09 Security Update, see the Windows 7 section of How to download a Windows update manually. If you have problems applying this security update, please contact Microsoft Support.

For Windows devices not running the 2019-09 Security Update

For existing Malwarebytes users: If you cannot apply this Microsoft update or choose not to update, you can continue to use your installed Malwarebytes version which automatically remains compliant.

For new installs: You can download a compliant version of Malwarebytes for Windows below. This legacy version does not include all of the latest version features or functionality. The following installer applies for both Malwarebytes Home and Malwarebytes for Teams users:

  • Malwarebytes for Windows legacy build

Source : Official Malwarebytes Brand
Editor by : BEST Antivirus KBS Team

(Visited 65 times, 1 visits today)

Related Articles

  • All about Malwarebytes

  • Technical Add-on for Malwarebytes for Splunk

  • Malwarebytes Agentless Remediation app for Splunk

  • Relatórios de atividade de terminais na plataforma Nebula da Malwarebytes

  • Malwarebytes Endpoint Protection Product Lifecycle

  • Verify subscription renewal email is legitimate (Malwarebytes)

  • Windows 7 32 bit без активации скачать
  • Windows 7 32 bit обновления не устанавливаются
  • Windows 7 32 bit update pack
  • Windows 2016 настройка после установки
  • Windows 2012 r2 remoteapp без домена