Рекомендации по обновлению ПО


Полная история обновлений безопасности

Обновления за последний месяц

16.03.20 March 2020 NCR FSE Microsoft Security Updates

Хотим проинформировать, что компания Microsoft, в патчах безопасности для Windows от Декабря 2019 и Января 2020 года:

Windows 7 December 2019 Monthly Rollup (KB4530734)
Windows 7 December 2019 Security-only update (KB4530692)
Windows 7 January 2020 Monthly Rollup (KB4534310
Windows 7 January 2020 Security-only update (KB4534314)

добавила изменение, после которого, начиная с 15 Января 2020 года, на экране начинает появляться сообщение информирующее об окончании поддержки Windows 7.

Сообщение остается на экране до тех пор пока пользователь не закроет его.

Сообщение возникает после следующих действий:

- Разблокирование системы

- Вход (Log On) в систему

- Каждый день с 12:00 до тех пор пока Remind Me Later не будет активировано пользователем.

Решение проблемы:

Для удаления информационного сообщения Windows необходимо задать следующий ключ реестра:




The patches released in January 2020 for Windows 7 are the last official Microsoft patches released for Windows 7 that will be made generally available.

In subsequent months, Microsoft will only release “Extended Security Updates” (ESU) for Windows 7. These will only be able to be installed by those customers who have an agreement to receive them. These will only cover “important” and “critical” updates to security vulnerabilities as categorized by Microsoft.

For more information on ESU, please contact your NCR Sales Representative.

Since April 9, 2019, Microsoft Corporation has discontinued the release of “Delta” patches for Windows 10.  From this date onwards, the only regular patches made available for download and testing for Windows 10 (1607 x64) will be the “Full” cumulative update patch. The patch can neither be broken down nor made any smaller. There are no other options available. Due to this change, NCR can only recommend that customers pick up this cumulative patch to test and deploy, in place of the “Delta” patches supplied by Microsoft Corporation previously.  

NCR will continue to provide our regularly scheduled Microsoft Patch recommendations that contain the release information for these patches.

If the infrastructure is already in place to provide “Express” updates from Microsoft, then customers can also use this. However, the effective final patched state is the same as when applying the “full” cumulative patches. Due to the complexity of testing the express patches NCR can only provide guidance based upon the “Full” cumulative patch releases.

Note: There is no impact on Windows 7 – this change only affects windows 10 patch releases

Microsoft has replaced security bulletins with the Security Updates Guide . Please see the blog post, Furthering our commitment to security updates, for more details. Security issues are no longer listed as bulletins but are listed by CVE number. CVEs are grouped by Monthly Security Rollup for all applicable software.

Anyone creating new software builds for Windows 7 can use the convenience roll up that was issued in April 2016 and then just install all the security patches since April 2016. The convenience roll up can be found here and includes all security patches up to April 2016.

March 2020 Security Updates

Pre-Requisite - Latest Servicing Stack Updates

Always ensure that you have the latest Servicing Stack Updates: ADV990001


IMPORTANT – Windows 7 updates are now only able to be applied by ESU customers.

For more information on ESU, please contact your NCR Sales Representative

Windows 7

Security Rollup ID: 4541500
Affected Software: Windows 7 for 32-bit Systems Service Pack 1
Critical CVEs: CVE-2020-0684, CVE-2020-0881, CVE-2020-0883
Important CVEs: CVE-2020-0778, CVE-2020-0779, CVE-2020-0781, CVE-2020-0783, CVE-2020-0785, CVE-2020-0787, CVE-2020-0788, CVE-2020-0802, CVE-2020-0803, CVE-2020-0804, CVE-2020-0806, CVE-2020-0814, CVE-2020-0842, CVE-2020-0843, CVE-2020-0844, CVE-2020-0845, CVE-2020-0849, CVE-2020-0853, CVE-2020-0645, CVE-2020-0769, CVE-2020-0770, CVE-2020-0771, CVE-2020-0772, CVE-2020-0773, CVE-2020-0774, CVE-2020-0791, CVE-2020-0822, CVE-2020-0860, CVE-2020-0871, CVE-2020-0874, CVE-2020-0877, CVE-2020-0879, CVE-2020-0880, CVE-2020-0882, CVE-2020-0885, CVE-2020-0887

Security Rollup ID: 4540671
Affected Software: Internet Explorer 11
Critical CVEs: CVE-2020-0768, CVE-2020-0824, CVE-2020-0830, CVE-2020-0832, CVE-2020-0833, CVE-2020-0847

 No Updates for .NET Framework for Windows 7 Released in March 2020

Windows 10

Security Rollup ID: 4540670Affected Software: Windows 10 Version 1607 for x64-based Systems

Critical CVEs:  CVE-2020-0684, CVE-2020-0768, CVE-2020-0801, CVE-2020-0809, CVE-2020-0816, CVE-2020-0823, CVE-2020-0824, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0847, CVE-2020-0848, CVE-2020-0869, CVE-2020-0881, CVE-2020-0883
Important CVEs: CVE-2020-0645, CVE-2020-0690, CVE-2020-0769, CVE-2020-0770, CVE-2020-0771, CVE-2020-0772, CVE-2020-0773, CVE-2020-0774, CVE-2020-0775, CVE-2020-0776, CVE-2020-0777, CVE-2020-0778, CVE-2020-0779, CVE-2020-0780, CVE-2020-0781, CVE-2020-0783, CVE-2020-0785, CVE-2020-0786, CVE-2020-0787, CVE-2020-0788, CVE-2020-0791, CVE-2020-0793, CVE-2020-0797, CVE-2020-0798, CVE-2020-0799, CVE-2020-0800, CVE-2020-0802, CVE-2020-0803, CVE-2020-0804, CVE-2020-0806, CVE-2020-0810, CVE-2020-0814, CVE-2020-0819, CVE-2020-0820, CVE-2020-0822, CVE-2020-0834, CVE-2020-0840, CVE-2020-0841, CVE-2020-0842, CVE-2020-0843, CVE-2020-0844, CVE-2020-0845, CVE-2020-0849, CVE-2020-0853, CVE-2020-0857, CVE-2020-0858, CVE-2020-0859, CVE-2020-0860, CVE-2020-0861, CVE-2020-0864, CVE-2020-0865, CVE-2020-0866, CVE-2020-0867, CVE-2020-0868, CVE-2020-0871, CVE-2020-0874, CVE-2020-0877, CVE-2020-0879, CVE-2020-0880, CVE-2020-0882, CVE-2020-0885, CVE-2020-0887, CVE-2020-0896, CVE-2020-0897, CVE-2020-0898

Security Advisories

ADV190023 – Microsoft Guidance for Enabling LDAP Channel Binding and LDAP Signing

Microsoft Release Notes for March 2020 Security Updates are available – Click Here.
Historical patching information from December 2017 and earlier is available on Confluence at the following location: https://confluence.ncr.com/display/FSE/Microsoft+Security+Patch+Historical+Archives

If you are unable to access these archives, please contact your Account Manager, who shall retrieve them for you.

Please note only NCR customers and partners who are on software maintenance (SWM) can be subscribed to this list, and only if they have NCR account team approval.

129075 г. Москва,
Мурманский проезд, 14, к. 1

+7 (495) 967 6674
+7 (495) 721 9155

Copyright 2020 «ЛАН АТМсервис»

Создано Webway