Yes, that shifts the burden to the customers. Saves a ton of money for
Microsoft. If they get enough people to sign up, they will not have to hire
any testers.

On Wed, Aug 17, 2016 at 8:05 AM, Ed Aldrich <[email protected]> wrote:

> Don’t let Michael’s earlier comment about the availability of the NDA
> Early Testing program get lost in tall of this… it appears to me that this
> program may provide the best of both worlds, especially for those who are
> having, or have had, issues with updates impacting parts of their
> environment. You get directly involved with the resolution of the problem
> (helping your organization) while Microsoft is able to sort a problem
> update before release, helping everyone else in a similar scenario.
>
>
>
> *From:* [email protected] [mailto:listsadmin@lists.
> myitforum.com] *On Behalf Of *Stuart Watret
> *Sent:* Wednesday, August 17, 2016 8:06 AM
> *To:* [email protected]
> *Subject:* Re: [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> Fair point
>
>
>
> On 17 Aug 2016, at 12:52, Steve Whitcher <[email protected]> wrote:
>
>
>
> To be fair, the new model is still offering security updates separate from
> the update rollups, with non-cumulative security updates each month.  If
> you only want security patches, you can install the security updates each
> month.  If you absolutely have to skip a specific security update for some
> reason, you could skip a single month's security update and still install
> the next month's.  It brings back the partially patched issue displayed so
> well by the graphics earlier in this thread, but it is an option. It
> potentially leaves other vulnerabilities unpatched, which were addressed in
> the skipped bundle.  Still, it's not as bad as some here seem to think.
>
>
>
> Steve
>
>
>
> On Wed, Aug 17, 2016 at 6:15 AM, Stuart Watret <[email protected]>
> wrote:
>
> i think you are right, more unprotected systems will be the reality.
>
>
>
> It’s a terrible idea given the appalling qa testing done on patches; it
> seems every month we have an issue.
>
>
>
> On 16 Aug 2016, at 18:22, Erno, Cynthia M (ITS) <[email protected]>
> wrote:
>
>
>
> Oh I get it.  So, when we fail to apply a patch until we can manage our
> domains so it doesn’t screw up our group policies or print servers or etc…,
>
> and we only truly find those facts out because of the people on this list
> that belong to businesses that need to maintain certain certifications for
> their
>
> business so they actually are the testers that Microsoft obviously does
> not employ.. somehow Microsoft sets back and tries to judge us on that
> behavior
>
> by putting together a little graphic?
>
> Want a graphic for what the new reality will be?  Put together the graphic
> that shows how much more unprotected our systems will be when we have
>
> to roll back the cumulative security patches for that month because, yet
> again, Microsoft pushed something out without thinking of the impact it
>
> would have on business servers.
>
> Out of touch and arrogant does not even begin to cover where Microsoft is
> with businesses that have to be up and running 24/7.
>
>
>
> *Cynthia Erno*
>
>
>
> *From:* [email protected] [mailto:
> [email protected] <[email protected]>]*On
> Behalf Of *Michael Niehaus
> *Sent:* Tuesday, August 16, 2016 12:41 PM
> *To:* [email protected]
> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> *ATTENTION: This email came from an external source. Do not open
> attachments or click on links from unknown senders or unexpected emails.*
>
> Each update (MSU/CAB) has to be installed in its entirety.
>
>
>
> If you encounter any issues with an update, contact Microsoft Support
> right away.  They are serious about resolving issues as quickly as possible.
>
>
>
> Certainly the reasoning for making this change is simple:
>
>
>
> <image002.jpg>
>
>
>
> Thanks,
>
> -Michael
>
>
>
> *From:* [email protected] [mailto:
> [email protected] <[email protected]>]*On
> Behalf Of *Andreas Hammarskjöld
> *Sent:* Tuesday, August 16, 2016 5:38 AM
> *To:* [email protected]
> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> I thought this was possible? Like WUSA /u /kb:blabla?
>
>
>
> *From:* [email protected] [mailto:
> [email protected] <[email protected]>]*On
> Behalf Of *Mawdsley R.
> *Sent:* den 16 augusti 2016 14:16
> *To:* [email protected]
> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> Agree.  It can only be a good thing if it enables us to have a more
> consistent environment out there.
>
>
>
> However, It would be excellent if they could implement some way we could
> install the Rollup, whilst excluding one of its subsidiaries, even
> temporarily.
>
>
>
> Rich Mawdsley
>
>
>
> *From:* [email protected] [mailto:
> [email protected] <[email protected]>]*On
> Behalf Of *John Aubrey
> *Sent:* 16 August 2016 12:55
> *To:* [email protected]
> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> I was little uneasy about Windows 10 CU/UR whatever they call it. It’s
> been going well so far.  I think this is a good thing.  From my
> perspective, it will save me a tone of time, and make our PC’s way more
> secure.  Bring it on.
>
> *From:* [email protected] [mailto:
> [email protected] <[email protected]>]*On
> Behalf Of *Marable, Mike
> *Sent:* Tuesday, August 16, 2016 7:31 AM
> *To:* [email protected]
> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> I totally agree.  In fact yesterday we had to pull off a security update
> because it “broke” an app.  So instead of the vendor fixing their app,
> we’re going to allow a potential security threat?
>
>
>
> In my opinion I think this is a good thing.  Give me just a single patch
> each month so I don’t have to worry about 5 this month, 2 the month before,
> 7 the prior month…
>
>
>
> Aaron Czechowski talked about this at MMS this last Spring.
>
> <image004.jpg>
>
>
>
> Like Andreas said, “Just my 2 cents.”
>
>
>
> Mike
>
>
>
>
>
>
>
> *From:* [email protected] [mailto:
> [email protected] <[email protected]>]*On
> Behalf Of *Andreas Hammarskjöld
> *Sent:* Tuesday, August 16, 2016 2:54 AM
> *To:* [email protected]
> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> This is very understandable and typicaly the way of “as-a-service”
> solutions work, regardless of vendor. Doing it any other way would be too
> costly & time consuming. I think we should be happy that MS is even
> considering non security fixes for these operating systems!
>
>
>
> I think part of it is also to create an even bigger haystack to hide the
> needles in for the security updates to delay the re-engineers finding the
> actual issues from the patches that MS releases.
>
>
>
> One thing is sure, as ConfigMgr does support delta downloads of these
> patches yet it will be a large file per month to download to each location.
> So people that haven’t started looking at ways to peer-to-peer this should
> do that… fast. With Win10 this is a 1GB DL per month per PC and counting.
>
>
>
> As per the not secure vs functionality, it’s the same as the idiots not
> vaccinating their kids as they think they might get whatever from it. Go to
> your vendor and tell them to fix the app. If they don’t, switch app.
>
>
>
> Unless you want to go Linux/Mac side, but thinking you have more control
> there makes me laugh.
>
>
>
> Just my 2 cents.
>
>
>
> //A
>
>
>
> *From:* [email protected] [mailto:
> [email protected] <[email protected]>]*On
> Behalf Of *Murray, Mike
> *Sent:* den 16 augusti 2016 01:29
> *To:* [email protected]
> *Subject:* RE: [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> I’ve been told “get used to it” on the patch management list. Not good
> enough. I think this is ridiculous.
>
>
>
> *From:* [email protected] [mailto:
> [email protected] <[email protected]>]*On
> Behalf Of *Roland Janus
> *Sent:* Monday, August 15, 2016 4:08 PM
> *To:* [email protected]
> *Subject:* AW: [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> 1+
>
>
>
> If they include such updates, like 3170455 which we also excluded, that’s
> certainly going the mess up things..
>
>
>
> *Von:* [email protected] [mailto:
> [email protected] <[email protected]>]*Im
> Auftrag von *Miller, Todd
> *Gesendet:* Montag, 15. August 2016 22:42
> *An:* [email protected]
> *Betreff:* [mssms] Microsoft set to change Windows patching in a
> disasterous way
>
>
>
> https://blogs.technet.microsoft.com/windowsitpro/2016/08/15/further-
> simplifying-servicing-model-for-windows-7-and-windows-8-1/
>
>
>
> Wow, this could be a disaster.
>
>
>
> We have had 4 or 5 cases in the last 12 months where we have had to delay
> the installation of a security update so that applications could be
> modified to work with updates.  In a couple of cases, one ongoing,
> Microsoft has released a security update, then acknowledged a bug in that
> update and released a fix several months later.  We currently have
> KB3170455 denied in our environment because it breaks point – and –print
> driver installation.  In the new world, I will need to decide which is
> worse – no security updates for 3 months, or break printing for all
> non-admin users.  Currently I can decide to pull or hold an individual
> patch, but it looks like that option is being removed from Windows 7 and
> 8.     This comes at a time where it seems like patch quality has hit a
> rough patch, making this decision more troubling.
>
>
> ------------------------------
>
> Notice: This UI Health Care e-mail (including attachments) is covered by
> the Electronic Communications Privacy Act, 18 U.S.C. 2510-2521 and is
> intended only for the use of the individual or entity to which it is
> addressed, and may contain information that is privileged, confidential,
> and exempt from disclosure under applicable law. If you are not the
> intended recipient, any dissemination, distribution or copying of this
> communication is strictly prohibited. If you have received this
> communication in error, please notify the sender immediately and delete or
> destroy all copies of the original message and attachments thereto. Email
> sent to or from UI Health Care may be retained as required by law or
> regulation. Thank you.
> ------------------------------
>
>
>
>
>
>
>
>
>
> **********************************************************
> Electronic Mail is not secure, may not be read every day, and should not
> be used for urgent or sensitive issues
>
>
>
>
>
>
>
>
>
>
>
>
>
> ------------------------------
>
>
> Legal Notice: This email is intended only for the person(s) to whom it is
> addressed. If you are not an intended recipient and have received this
> message in error, please notify the sender immediately by replying to this
> email or calling +44(0) 2083269015 (UK) or +1 866 592 4214 (USA). This
> email and any attachments may be privileged and/or confidential. The
> unauthorized use, disclosure, copying or printing of any information it
> contains is strictly prohibited. The opinions expressed in this email are
> those of the author and do not necessarily represent the views of 1E Ltd.
> Nothing in this email will operate to bind 1E to any order or other
> contract.
>
>



Reply via email to