Security updates will be next. Same as they did for IE.

On Wed, Aug 17, 2016 at 6:52 AM, Steve Whitcher <[email protected]> wrote:

> To be fair, the new model is still offering security updates separate from
> the update rollups, with non-cumulative security updates each month.  If
> you only want security patches, you can install the security updates each
> month.  If you absolutely have to skip a specific security update for some
> reason, you could skip a single month's security update and still install
> the next month's.  It brings back the partially patched issue displayed so
> well by the graphics earlier in this thread, but it is an option. It
> potentially leaves other vulnerabilities unpatched, which were addressed in
> the skipped bundle.  Still, it's not as bad as some here seem to think.
>
> Steve
>
> On Wed, Aug 17, 2016 at 6:15 AM, Stuart Watret <[email protected]>
> wrote:
>
>> i think you are right, more unprotected systems will be the reality.
>>
>> It’s a terrible idea given the appalling qa testing done on patches; it
>> seems every month we have an issue.
>>
>> On 16 Aug 2016, at 18:22, Erno, Cynthia M (ITS) <[email protected]>
>> wrote:
>>
>> Oh I get it.  So, when we fail to apply a patch until we can manage our
>> domains so it doesn’t screw up our group policies or print servers or etc…,
>> and we only truly find those facts out because of the people on this list
>> that belong to businesses that need to maintain certain certifications for
>> their
>> business so they actually are the testers that Microsoft obviously does
>> not employ.. somehow Microsoft sets back and tries to judge us on that
>> behavior
>> by putting together a little graphic?
>> Want a graphic for what the new reality will be?  Put together the
>> graphic that shows how much more unprotected our systems will be when we
>> have
>> to roll back the cumulative security patches for that month because, yet
>> again, Microsoft pushed something out without thinking of the impact it
>> would have on business servers.
>> Out of touch and arrogant does not even begin to cover where Microsoft is
>> with businesses that have to be up and running 24/7.
>>
>> *Cynthia Erno*
>>
>> *From:* [email protected] [mailto:listsadmin@
>> lists.myitforum.com <[email protected]>]*On Behalf Of *Michael
>> Niehaus
>> *Sent:* Tuesday, August 16, 2016 12:41 PM
>> *To:* [email protected]
>> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
>> disasterous way
>>
>>
>> *ATTENTION: This email came from an external source. Do not open
>> attachments or click on links from unknown senders or unexpected emails.*
>> Each update (MSU/CAB) has to be installed in its entirety.
>>
>> If you encounter any issues with an update, contact Microsoft Support
>> right away.  They are serious about resolving issues as quickly as possible.
>>
>> Certainly the reasoning for making this change is simple:
>>
>> <image002.jpg>
>>
>> Thanks,
>> -Michael
>>
>> *From:* [email protected] [mailto:listsadmin@
>> lists.myitforum.com <[email protected]>]*On Behalf Of *Andreas
>> Hammarskjöld
>> *Sent:* Tuesday, August 16, 2016 5:38 AM
>> *To:* [email protected]
>> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
>> disasterous way
>>
>> I thought this was possible? Like WUSA /u /kb:blabla?
>>
>> *From:* [email protected] [mailto:listsadmin@
>> lists.myitforum.com <[email protected]>]*On Behalf Of *Mawdsley
>> R.
>> *Sent:* den 16 augusti 2016 14:16
>> *To:* [email protected]
>> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
>> disasterous way
>>
>> Agree.  It can only be a good thing if it enables us to have a more
>> consistent environment out there.
>>
>> However, It would be excellent if they could implement some way we could
>> install the Rollup, whilst excluding one of its subsidiaries, even
>> temporarily.
>>
>> Rich Mawdsley
>>
>> *From:* [email protected] [mailto:listsadmin@
>> lists.myitforum.com <[email protected]>]*On Behalf Of *John
>> Aubrey
>> *Sent:* 16 August 2016 12:55
>> *To:* [email protected]
>> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
>> disasterous way
>>
>> I was little uneasy about Windows 10 CU/UR whatever they call it. It’s
>> been going well so far.  I think this is a good thing.  From my
>> perspective, it will save me a tone of time, and make our PC’s way more
>> secure.  Bring it on.
>> *From:* [email protected] [mailto:listsadmin@
>> lists.myitforum.com <[email protected]>]*On Behalf Of *Marable,
>> Mike
>> *Sent:* Tuesday, August 16, 2016 7:31 AM
>> *To:* [email protected]
>> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
>> disasterous way
>>
>> I totally agree.  In fact yesterday we had to pull off a security update
>> because it “broke” an app.  So instead of the vendor fixing their app,
>> we’re going to allow a potential security threat?
>>
>> In my opinion I think this is a good thing.  Give me just a single patch
>> each month so I don’t have to worry about 5 this month, 2 the month before,
>> 7 the prior month…
>>
>> Aaron Czechowski talked about this at MMS this last Spring.
>> <image004.jpg>
>>
>> Like Andreas said, “Just my 2 cents.”
>>
>> Mike
>>
>>
>>
>> *From:* [email protected] [mailto:listsadmin@
>> lists.myitforum.com <[email protected]>]*On Behalf Of *Andreas
>> Hammarskjöld
>> *Sent:* Tuesday, August 16, 2016 2:54 AM
>> *To:* [email protected]
>> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
>> disasterous way
>>
>> This is very understandable and typicaly the way of “as-a-service”
>> solutions work, regardless of vendor. Doing it any other way would be too
>> costly & time consuming. I think we should be happy that MS is even
>> considering non security fixes for these operating systems!
>>
>> I think part of it is also to create an even bigger haystack to hide the
>> needles in for the security updates to delay the re-engineers finding the
>> actual issues from the patches that MS releases.
>>
>> One thing is sure, as ConfigMgr does support delta downloads of these
>> patches yet it will be a large file per month to download to each location.
>> So people that haven’t started looking at ways to peer-to-peer this should
>> do that… fast. With Win10 this is a 1GB DL per month per PC and counting.
>>
>> As per the not secure vs functionality, it’s the same as the idiots not
>> vaccinating their kids as they think they might get whatever from it. Go to
>> your vendor and tell them to fix the app. If they don’t, switch app.
>>
>> Unless you want to go Linux/Mac side, but thinking you have more control
>> there makes me laugh.
>>
>> Just my 2 cents.
>>
>> //A
>>
>> *From:* [email protected] [mailto:listsadmin@
>> lists.myitforum.com <[email protected]>]*On Behalf Of *Murray,
>> Mike
>> *Sent:* den 16 augusti 2016 01:29
>> *To:* [email protected]
>> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
>> disasterous way
>>
>> I’ve been told “get used to it” on the patch management list. Not good
>> enough. I think this is ridiculous.
>>
>> *From:* [email protected] [mailto:listsadmin@
>> lists.myitforum.com <[email protected]>]*On Behalf Of *Roland
>> Janus
>> *Sent:* Monday, August 15, 2016 4:08 PM
>> *To:* [email protected]
>> *Subject:* AW: [mssms] Microsoft set to change Windows patching in a
>> disasterous way
>>
>> 1+
>>
>> If they include such updates, like 3170455 which we also excluded, that’s
>> certainly going the mess up things..
>>
>> *Von:* [email protected] [mailto:listsadmin@
>> lists.myitforum.com <[email protected]>]*Im Auftrag von *Miller,
>> Todd
>> *Gesendet:* Montag, 15. August 2016 22:42
>> *An:* [email protected]
>> *Betreff:* [mssms] Microsoft set to change Windows patching in a
>> disasterous way
>>
>> https://blogs.technet.microsoft.com/windowsitpro/2016/08/15/
>> further-simplifying-servicing-model-for-windows-7-and-windows-8-1/
>>
>> Wow, this could be a disaster.
>>
>> We have had 4 or 5 cases in the last 12 months where we have had to delay
>> the installation of a security update so that applications could be
>> modified to work with updates.  In a couple of cases, one ongoing,
>> Microsoft has released a security update, then acknowledged a bug in that
>> update and released a fix several months later.  We currently have
>> KB3170455 denied in our environment because it breaks point – and –print
>> driver installation.  In the new world, I will need to decide which is
>> worse – no security updates for 3 months, or break printing for all
>> non-admin users.  Currently I can decide to pull or hold an individual
>> patch, but it looks like that option is being removed from Windows 7 and
>> 8.     This comes at a time where it seems like patch quality has hit a
>> rough patch, making this decision more troubling.
>>
>>
>> ------------------------------
>> Notice: This UI Health Care e-mail (including attachments) is covered by
>> the Electronic Communications Privacy Act, 18 U.S.C. 2510-2521 and is
>> intended only for the use of the individual or entity to which it is
>> addressed, and may contain information that is privileged, confidential,
>> and exempt from disclosure under applicable law. If you are not the
>> intended recipient, any dissemination, distribution or copying of this
>> communication is strictly prohibited. If you have received this
>> communication in error, please notify the sender immediately and delete or
>> destroy all copies of the original message and attachments thereto. Email
>> sent to or from UI Health Care may be retained as required by law or
>> regulation. Thank you.
>> ------------------------------
>>
>>
>>
>>
>>
>> **********************************************************
>> Electronic Mail is not secure, may not be read every day, and should not
>> be used for urgent or sensitive issues
>>
>>
>>
>>
>
>



Reply via email to