Рекомендации по обновлению ПО

Документы

Полная история обновлений безопасности


Обновления за последний месяц


15.06.20 June 2020 NCR FSE Microsoft Security Updates

Хотим проинформировать, что компания Microsoft, в патчах безопасности для Windows от Декабря 2019 и Января 2020 года:

Windows 7 December 2019 Monthly Rollup (KB4530734)
Windows 7 December 2019 Security-only update (KB4530692)
Windows 7 January 2020 Monthly Rollup (KB4534310
Windows 7 January 2020 Security-only update (KB4534314)

добавила изменение, после которого, начиная с 15 Января 2020 года, на экране начинает появляться сообщение информирующее об окончании поддержки Windows 7.

Сообщение остается на экране до тех пор пока пользователь не закроет его.

Сообщение возникает после следующих действий:

- Разблокирование системы

- Вход (Log On) в систему

- Каждый день с 12:00 до тех пор пока Remind Me Later не будет активировано пользователем.

Решение проблемы:

Для удаления информационного сообщения Windows необходимо задать следующий ключ реестра:

[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionEOSNotify]

"DiscontinueEOS"=dword:00000001

IMPORTANT NOTE – END OF WINDOWS 7 EXTENDED SUPPORT JANUARY 2020

The patches released in January 2020 for Windows 7 are the last official Microsoft patches released for Windows 7 that will be made generally available.

In subsequent months, Microsoft will only release “Extended Security Updates” (ESU) for Windows 7. These will only be able to be installed by those customers who have an agreement to receive them. These will only cover “important” and “critical” updates to security vulnerabilities as categorized by Microsoft.

For more information on ESU, please contact your NCR Sales Representative.

Since April 9, 2019, Microsoft Corporation has discontinued the release of “Delta” patches for Windows 10.  From this date onwards, the only regular patches made available for download and testing for Windows 10 (1607 x64) will be the “Full” cumulative update patch. The patch can neither be broken down nor made any smaller. There are no other options available. Due to this change, NCR can only recommend that customers pick up this cumulative patch to test and deploy, in place of the “Delta” patches supplied by Microsoft Corporation previously.  

NCR will continue to provide our regularly scheduled Microsoft Patch recommendations that contain the release information for these patches.

If the infrastructure is already in place to provide “Express” updates from Microsoft, then customers can also use this. However, the effective final patched state is the same as when applying the “full” cumulative patches. Due to the complexity of testing the express patches NCR can only provide guidance based upon the “Full” cumulative patch releases.

Note: There is no impact on Windows 7 – this change only affects windows 10 patch releases

Microsoft has replaced security bulletins with the Security Updates Guide . Please see the blog post, Furthering our commitment to security updates, for more details. Security issues are no longer listed as bulletins but are listed by CVE number. CVEs are grouped by Monthly Security Rollup for all applicable software.

Anyone creating new software builds for Windows 7 can use the convenience roll up that was issued in April 2016 and then just install all the security patches since April 2016. The convenience roll up can be found here and includes all security patches up to April 2016.

June 2020 Security Updates

Microsoft Release Notes for June 2020 Security Updates are availableClick Here.

Pre-Requisite - Latest Servicing Stack Updates

Always ensure that you have the latest Servicing Stack Updates: ADV990001


IMPORTANT – Windows 7 updates are now only able to be applied by ESU customers.

For more information on ESU, please contact your NCR Sales Representative

Windows 7

Security Rollup ID: 4561669
NCR Severity Rating: IMPORTANT
Affected Software: Windows 7 for 32-bit Systems Service Pack 1
Microsoft Critical Rated CVEs: CVE-2020-1299, CVE-2020-1281, CVE-2020-1300
Microsoft Important Rated CVEs: CVE-2020-1208, CVE-2020-1236, CVE-2020-1247, CVE-2020-1207, CVE-2020-1160, CVE-2020-1212, CVE-2020-1194, CVE-2020-1301, CVE-2020-1246, CVE-2020-1251, CVE-2020-1302, CVE-2020-1263, CVE-2020-1291, CVE-2020-1262, CVE-2020-1253, CVE-2020-1348, CVE-2020-1271, CVE-2020-1270, CVE-2020-1272, CVE-2020-1314, CVE-2020-1311, CVE-2020-1239, CVE-2020-1287, CVE-2020-1196, CVE-2020-1255, CVE-2020-1317, CVE-2020-1254

Security Rollup ID: 4561603
NCR Severity Rating: IMPORTANT
Affected Software: Internet Explorer 11
Microsoft Critical Rated CVEs: CVE-2020-1260, CVE-2020-1219, CVE-2020-1213, CVE-2020-1216
Microsoft Important Rated CVEs: CVE-2020-1214, CVE-2020-1230, CVE-2020-1215, CVE-2020-1315

No new .NET Framework patches were released June 2020

 Windows 10

Security Rollup ID: 4561616
NCR Severity Rating: IMPORTANT
Affected Software: Windows 10 Version 1607 for x64-based Systems
Microsoft Critical Rated CVEs:   CVE-2020-1216, CVE-2020-1213, CVE-2020-1219, CVE-2020-1260, CVE-2020-1300, CVE-2020-1299, CVE-2020-1281Microsoft Important Rated CVEs:   CVE-2020-1230, CVE-2020-1215, CVE-2020-1315, CVE-2020-1214, CVE-2020-1241, CVE-2020-1235, CVE-2020-1202, CVE-2020-1247, CVE-2020-0916, CVE-2020-0986, CVE-2020-1207, CVE-2020-1208, CVE-2020-1160, CVE-2020-1234, CVE-2020-1263, CVE-2020-1203, CVE-2020-1211, CVE-2020-1272, CVE-2020-1293, CVE-2020-1232, CVE-2020-1279, CVE-2020-1334, CVE-2020-1305, CVE-2020-1266, CVE-2020-1316, CVE-2020-1283, CVE-2020-1261, CVE-2020-1301, CVE-2020-1251, CVE-2020-1278, CVE-2020-1246, CVE-2020-1311, CVE-2020-1257, CVE-2020-1197, CVE-2020-1264, CVE-2020-1304, CVE-2020-1269, CVE-2020-1239, CVE-2020-1253, CVE-2020-1317, CVE-2020-1270, CVE-2020-1314, CVE-2020-1212, CVE-2020-1262, CVE-2020-1291, CVE-2020-1231, CVE-2020-1302, CVE-2020-1194, CVE-2020-1287, CVE-2020-0915, CVE-2020-1282, CVE-2020-1196, CVE-2020-1271, CVE-2020-1236, CVE-2020-1294, CVE-2020-1254, CVE-2020-1309, CVE-2020-1259, CVE-2020-1255, CVE-2020-1348, CVE-2020-1310

Security Rollup ID: 4561600
NCR Severity Rating: IMPORTANT
Affected Software: Adobe Flash Player on Windows 10 Version 1607 for x64-based Systems
Microsoft Critical Rated CVEs: ADV200010 (CVE-2020-9633)

 

Адрес:
129075 г. Москва,
Мурманский проезд, 14, к. 1

http://www.lanatmservice.ru
Тел:
+7 (495) 967 6674
Факс:
+7 (495) 721 9155
E-mail:

Copyright 2020 «ЛАН АТМсервис»

Создано Webway