Yes, that shifts the burden to the customers. Saves a ton of money for Microsoft. If they get enough people to sign up, they will not have to hire any testers.
On Wed, Aug 17, 2016 at 8:05 AM, Ed Aldrich <[email protected]> wrote: > Don’t let Michael’s earlier comment about the availability of the NDA > Early Testing program get lost in tall of this… it appears to me that this > program may provide the best of both worlds, especially for those who are > having, or have had, issues with updates impacting parts of their > environment. You get directly involved with the resolution of the problem > (helping your organization) while Microsoft is able to sort a problem > update before release, helping everyone else in a similar scenario. > > > > *From:* [email protected] [mailto:listsadmin@lists. > myitforum.com] *On Behalf Of *Stuart Watret > *Sent:* Wednesday, August 17, 2016 8:06 AM > *To:* [email protected] > *Subject:* Re: [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > Fair point > > > > On 17 Aug 2016, at 12:52, Steve Whitcher <[email protected]> wrote: > > > > To be fair, the new model is still offering security updates separate from > the update rollups, with non-cumulative security updates each month. If > you only want security patches, you can install the security updates each > month. If you absolutely have to skip a specific security update for some > reason, you could skip a single month's security update and still install > the next month's. It brings back the partially patched issue displayed so > well by the graphics earlier in this thread, but it is an option. It > potentially leaves other vulnerabilities unpatched, which were addressed in > the skipped bundle. Still, it's not as bad as some here seem to think. > > > > Steve > > > > On Wed, Aug 17, 2016 at 6:15 AM, Stuart Watret <[email protected]> > wrote: > > i think you are right, more unprotected systems will be the reality. > > > > It’s a terrible idea given the appalling qa testing done on patches; it > seems every month we have an issue. > > > > On 16 Aug 2016, at 18:22, Erno, Cynthia M (ITS) <[email protected]> > wrote: > > > > Oh I get it. So, when we fail to apply a patch until we can manage our > domains so it doesn’t screw up our group policies or print servers or etc…, > > and we only truly find those facts out because of the people on this list > that belong to businesses that need to maintain certain certifications for > their > > business so they actually are the testers that Microsoft obviously does > not employ.. somehow Microsoft sets back and tries to judge us on that > behavior > > by putting together a little graphic? > > Want a graphic for what the new reality will be? Put together the graphic > that shows how much more unprotected our systems will be when we have > > to roll back the cumulative security patches for that month because, yet > again, Microsoft pushed something out without thinking of the impact it > > would have on business servers. > > Out of touch and arrogant does not even begin to cover where Microsoft is > with businesses that have to be up and running 24/7. > > > > *Cynthia Erno* > > > > *From:* [email protected] [mailto: > [email protected] <[email protected]>]*On > Behalf Of *Michael Niehaus > *Sent:* Tuesday, August 16, 2016 12:41 PM > *To:* [email protected] > *Subject:* RE: [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > *ATTENTION: This email came from an external source. Do not open > attachments or click on links from unknown senders or unexpected emails.* > > Each update (MSU/CAB) has to be installed in its entirety. > > > > If you encounter any issues with an update, contact Microsoft Support > right away. They are serious about resolving issues as quickly as possible. > > > > Certainly the reasoning for making this change is simple: > > > > <image002.jpg> > > > > Thanks, > > -Michael > > > > *From:* [email protected] [mailto: > [email protected] <[email protected]>]*On > Behalf Of *Andreas Hammarskjöld > *Sent:* Tuesday, August 16, 2016 5:38 AM > *To:* [email protected] > *Subject:* RE: [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > I thought this was possible? Like WUSA /u /kb:blabla? > > > > *From:* [email protected] [mailto: > [email protected] <[email protected]>]*On > Behalf Of *Mawdsley R. > *Sent:* den 16 augusti 2016 14:16 > *To:* [email protected] > *Subject:* RE: [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > Agree. It can only be a good thing if it enables us to have a more > consistent environment out there. > > > > However, It would be excellent if they could implement some way we could > install the Rollup, whilst excluding one of its subsidiaries, even > temporarily. > > > > Rich Mawdsley > > > > *From:* [email protected] [mailto: > [email protected] <[email protected]>]*On > Behalf Of *John Aubrey > *Sent:* 16 August 2016 12:55 > *To:* [email protected] > *Subject:* RE: [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > I was little uneasy about Windows 10 CU/UR whatever they call it. It’s > been going well so far. I think this is a good thing. From my > perspective, it will save me a tone of time, and make our PC’s way more > secure. Bring it on. > > *From:* [email protected] [mailto: > [email protected] <[email protected]>]*On > Behalf Of *Marable, Mike > *Sent:* Tuesday, August 16, 2016 7:31 AM > *To:* [email protected] > *Subject:* RE: [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > I totally agree. In fact yesterday we had to pull off a security update > because it “broke” an app. So instead of the vendor fixing their app, > we’re going to allow a potential security threat? > > > > In my opinion I think this is a good thing. Give me just a single patch > each month so I don’t have to worry about 5 this month, 2 the month before, > 7 the prior month… > > > > Aaron Czechowski talked about this at MMS this last Spring. > > <image004.jpg> > > > > Like Andreas said, “Just my 2 cents.” > > > > Mike > > > > > > > > *From:* [email protected] [mailto: > [email protected] <[email protected]>]*On > Behalf Of *Andreas Hammarskjöld > *Sent:* Tuesday, August 16, 2016 2:54 AM > *To:* [email protected] > *Subject:* RE: [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > This is very understandable and typicaly the way of “as-a-service” > solutions work, regardless of vendor. Doing it any other way would be too > costly & time consuming. I think we should be happy that MS is even > considering non security fixes for these operating systems! > > > > I think part of it is also to create an even bigger haystack to hide the > needles in for the security updates to delay the re-engineers finding the > actual issues from the patches that MS releases. > > > > One thing is sure, as ConfigMgr does support delta downloads of these > patches yet it will be a large file per month to download to each location. > So people that haven’t started looking at ways to peer-to-peer this should > do that… fast. With Win10 this is a 1GB DL per month per PC and counting. > > > > As per the not secure vs functionality, it’s the same as the idiots not > vaccinating their kids as they think they might get whatever from it. Go to > your vendor and tell them to fix the app. If they don’t, switch app. > > > > Unless you want to go Linux/Mac side, but thinking you have more control > there makes me laugh. > > > > Just my 2 cents. > > > > //A > > > > *From:* [email protected] [mailto: > [email protected] <[email protected]>]*On > Behalf Of *Murray, Mike > *Sent:* den 16 augusti 2016 01:29 > *To:* [email protected] > *Subject:* RE: [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > I’ve been told “get used to it” on the patch management list. Not good > enough. I think this is ridiculous. > > > > *From:* [email protected] [mailto: > [email protected] <[email protected]>]*On > Behalf Of *Roland Janus > *Sent:* Monday, August 15, 2016 4:08 PM > *To:* [email protected] > *Subject:* AW: [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > 1+ > > > > If they include such updates, like 3170455 which we also excluded, that’s > certainly going the mess up things.. > > > > *Von:* [email protected] [mailto: > [email protected] <[email protected]>]*Im > Auftrag von *Miller, Todd > *Gesendet:* Montag, 15. August 2016 22:42 > *An:* [email protected] > *Betreff:* [mssms] Microsoft set to change Windows patching in a > disasterous way > > > > https://blogs.technet.microsoft.com/windowsitpro/2016/08/15/further- > simplifying-servicing-model-for-windows-7-and-windows-8-1/ > > > > Wow, this could be a disaster. > > > > We have had 4 or 5 cases in the last 12 months where we have had to delay > the installation of a security update so that applications could be > modified to work with updates. In a couple of cases, one ongoing, > Microsoft has released a security update, then acknowledged a bug in that > update and released a fix several months later. We currently have > KB3170455 denied in our environment because it breaks point – and –print > driver installation. In the new world, I will need to decide which is > worse – no security updates for 3 months, or break printing for all > non-admin users. Currently I can decide to pull or hold an individual > patch, but it looks like that option is being removed from Windows 7 and > 8. This comes at a time where it seems like patch quality has hit a > rough patch, making this decision more troubling. > > > ------------------------------ > > Notice: This UI Health Care e-mail (including attachments) is covered by > the Electronic Communications Privacy Act, 18 U.S.C. 2510-2521 and is > intended only for the use of the individual or entity to which it is > addressed, and may contain information that is privileged, confidential, > and exempt from disclosure under applicable law. If you are not the > intended recipient, any dissemination, distribution or copying of this > communication is strictly prohibited. If you have received this > communication in error, please notify the sender immediately and delete or > destroy all copies of the original message and attachments thereto. Email > sent to or from UI Health Care may be retained as required by law or > regulation. Thank you. > ------------------------------ > > > > > > > > > > ********************************************************** > Electronic Mail is not secure, may not be read every day, and should not > be used for urgent or sensitive issues > > > > > > > > > > > > > > ------------------------------ > > > Legal Notice: This email is intended only for the person(s) to whom it is > addressed. If you are not an intended recipient and have received this > message in error, please notify the sender immediately by replying to this > email or calling +44(0) 2083269015 (UK) or +1 866 592 4214 (USA). This > email and any attachments may be privileged and/or confidential. The > unauthorized use, disclosure, copying or printing of any information it > contains is strictly prohibited. The opinions expressed in this email are > those of the author and do not necessarily represent the views of 1E Ltd. > Nothing in this email will operate to bind 1E to any order or other > contract. > >

