1. Win some Team Group goodies in OCAU's latest contest!
    Dismiss Notice

[WIN7] Windows 7 Updates, Descriptions & Telemetry

Discussion in 'Windows Operating Systems' started by Grinder9, Jan 1, 2016.

  1. Grinder9

    Grinder9 Member

    Joined:
    Jun 4, 2014
    Messages:
    16
    PLEASE NOTE: I will not be providing ongoing support for this thread. Support ended December 2016. As a once off I listed July 2017 updates.

    Updates shown within this list appear in Windows Update for Windows 7 Pro x64 ONLY.
    This is the configuration that was tested. Other configurations may have more or less updates.

    PLEASE NOTE: Set Windows to check for updates but let me choose whether to download and install them but it may try to revert to install updates automatically.
    Make sure it doesn't do that. We have broken down the list with 3 colors described here:

    GOOD
    INSTALL IF NEEDED
    WINDOWS TELEMETRY OR NOT NEEDED

    REFERENCES

    Search For Windows 7 Updates Takes Forever
    Notebook Review
    Manage Engine

    WINDOWS 7 TELEMETRY

    KB2952664 - Compatibility update for keeping Windows up-to-date in Windows 7. Adds telemetry
    KB3021917 - Update to Windows 7 SP1 for performance improvements. Adds telemetry
    KB3068708 - Update for customer experience and diagnostic telemetry
    KB3080149 - Update for customer experience and diagnostic telemetry
    KB3184143 - Remove software related to the Windows 10 free upgrade offer

    .NET FRAMEWORK 3.5.1

    KB2604115 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2656356 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2729452 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2742599 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2789645 - VulnerabilitIES in .NET Framework Could Allow Elevation of Privilege
    KB2894844 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2911501 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2931356 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB2937610 - Vulnerabilities in .NET Framework Could Allow Security Feature Bypass
    KB2968294 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2972100 - Vulnerabilities in .NET Framework Could Allow Remote Code Execution
    KB2972211 - Vulnerabilities in .NET Framework Could Allow Denial of Service
    KB2978120 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB3023215 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB3037574 - Vulnerabilities in .NET Framework Could Allow Information Disclosure
    KB3074543 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege
    KB3097989 - Security Update for .NET Framework to Address Elevation of Privilege
    KB3122648 - .NET Framework Stack Overflow Denial of Service Vulnerability
    KB3127220 - Windows Forms Information Disclosure Vulnerability
    KB4014504 - May 2017 Security & Quality Rollup

    .NET FRAMEWORK 4.5.2

    KB2901907 - Microsoft .NET Framework 4.5.2
    KB4014514 - May 2017 Security & Quality Rollup

    SECURITY UPDATES

    KB2479943 - Vulnerabilities in Windows Media Could Allow Remote Code Execution
    KB2506212 - Vulnerability in Windows Fax Cover Page Editor Could Allow Remote Code Execution
    KB2509553 - Vulnerability in DNS Resolution Could Allow Remote Code Execution
    KB2532531 - Vulnerability in Bluetooth Stack Could Allow Remote Code Execution
    KB2560656 - Vulnerability in Data Access Components Could Allow Remote Code Execution
    KB2564958 - Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution
    KB2579686 - Vulnerability in Windows Media Center Could Allow Remote Code Execution
    KB2585542 - Vulnerability in SSL/TLS Could Allow Information Disclosure
    KB2620704 - Vulnerability in Windows Mail and Windows Meeting Space Could Allow Remote Code Execution
    KB2621440 - Vulnerabilities in Remote Desktop Could Allow Remote Code Execution
    KB2653956 - Vulnerability in Windows Could Allow Remote Code Execution
    KB2654428 - Vulnerability in C Run-Time Library Could Allow Remote Code Execution
    KB2667402 - Vulnerabilities in Remote Desktop Could Allow Remote Code Execution
    KB2685939 - Vulnerability in Remote Desktop Could Allow Remote Code Execution
    KB2690533 - Vulnerability in Windows Partition Manager Could Allow Elevation of Privilege
    KB2698365 - Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution
    KB2705219 - Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution
    KB2706045 - Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution
    KB2727528 - Vulnerabilities in Windows Shell Could Allow Remote Code Execution
    KB2758857 - Vulnerability in Windows file handling component could allow remote code execution
    KB2770660 - Vulnerability in DirectPlay Could Allow Remote Code Execution
    KB2807986 - Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation Of Privilege
    KB2813430 - Updates to Improve Cryptography and Digital Certificate Handling in Windows
    KB2847927 - Vulnerability in Windows Defender Could Allow Elevation of Privilege
    KB2862152 - Vulnerability in DirectAccess and IPsec could allow security feature bypass.
    KB2862330 - Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution
    KB2862335 - Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution
    KB2864202 - Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution
    KB2868038 - Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution
    KB2871997 - Update to Improve Credentials Protection and Management
    KB2884256 - Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution
    KB2892074 - Vulnerability in Microsoft Scripting Runtime Object Library Could Allow Remote Code Execution
    KB2893294 - Vulnerability in Windows Could Allow Remote Code Execution
    KB2900986 - Cumulative Security Update of ActiveX Kill Bits
    KB2973201 - Vulnerability in On-Screen Keyboard Could Allow Elevation of Privilege
    KB2973351 - Restricted Admin mode turned off to improve the credentials protection and management
    KB2977292 - Microsoft EAP implementation that enables the use of TLS
    KB2984972 - Enables the Remote Desktop Connection client to perform restricted administration logons
    KB2991963 - Vulnerability in IME (Japanese) Could Allow Elevation of Privilege
    KB2992611 - Vulnerability in Schannel Could Allow Remote Code Execution
    KB3003743 - Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass
    KB3004361 - Vulnerability in Group Policy Could Allow Security Feature Bypass
    KB3004375 - Update for Windows Command Line Auditing
    KB3010788 - Vulnerabilities in Windows OLE Could Allow Remote Code Execution
    KB3011780 - Vulnerability in Kerberos Could Allow Elevation of Privilege
    KB3019978 - Vulnerability in Windows Components Could Allow Elevation of Privilege
    KB3021674 - Vulnerability in Windows User Profile Service Could Allow Elevation of Privilege
    KB3022777 - Vulnerability in Network Location Awareness Service Could Allow Security Feature Bypass
    KB3030377 - Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass
    KB3031432 - Vulnerability in Microsoft Windows could allow elevation of privilege
    KB3035126 - Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure
    KB3035132 - Vulnerability in PNG Processing Could Allow Information Disclosure
    KB3042058 - Update to Default Cipher Suite Priority Order
    KB3045685 - Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege
    KB3046017 - Unsafe Command Line Parameter Passing Could Allow Information Disclosure
    KB3046269 - Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege
    KB3055642 - Vulnerability in Service Control Manager Could Allow Elevation of Privilege
    KB3059317 - Vulnerability in Microsoft Common Controls Could Allow Remote Code Execution
    KB3060716 - Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege
    KB3067903 - Vulnerabilities in Windows Could Allow Remote Code Execution
    KB3071756 - Vulnerability in Mount Manager Could Allow Elevation of Privilege
    KB3075220 - Vulnerabilities in RDP Could Allow Remote Code Execution
    KB3076895 - Vulnerabilities in XML Core Services Could Allow Information Disclosure
    KB3078601 - Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution
    KB3084135 - Vulnerabilities in Windows Task Management Could Allow Elevation of Privilege
    KB3086255 - Disables SafeDisc games in Windows Vista, 7, and 8/8.1
    KB3101722 - Security Update for NDIS to Address Elevation of Privilege
    KB3108371 - Security Update for Microsoft Windows to Address Remote Code Execution
    KB3108381 - Security Update for Microsoft Windows to Address Remote Code Execution
    KB3108664 - MAPI DLL Loading Elevation of Privilege Vulnerability
    KB3109103 - Security Update for Windows PGM to Address Elevation of Privilege
    KB3109560 - DirectShow Heap Corruption Remote Code Execution Vulnerability
    KB3110329 - DLL Loading Remote Code Execution Vulnerability
    KB3115858 - Security Update for Windows Journal to Address Remote Code Execution
    KB3126587 - DLL Loading Elevation of Privilege Vulnerability
    KB3138910 - Windows Media Parsing Remote Code Execution Vulnerability
    KB3139398 - USB Mass Storage Elevation of Privilege Vulnerability
    KB3139914 - Secondary Logon Elevation of Privilege Vulnerability
    KB3156016 - Direct3D Use After Free Vulnerability
    KB3156019 - Windows Imaging Component Memory Corruption Vulnerability
    KB3159398 - Group Policy Elevation of Privilege Vulnerability
    KB3161949 - Windows WPAD Elevation of Privilege Vulnerability
    KB3161958 - Windows Search Component Denial of Service Vulnerability
    KB3170455 - Security Update for Windows Print Spooler Components
    KB4025341 - July 2017 Security & Quality Rollup

    STANDARD UPDATES

    KB890030 - Windows Malicious Software Update
    KB976932 - Windows 7 SP1 Update. An update that prevents a "0xC0000034" error message when you try to install Windows 7 SP1
    KB2506014 - An issue has been identified that could allow a user with administrative permissions to load an unsigned driver
    KB2552343 - Time-out error occurs when you install a Windows Update package that contains drivers on a computer
    KB2798162 - Update to improve messaging in dialog boxes when you run executable files
    KB2868116 - Updates that improves the content in warning messages that you receive when you run local executable files
    KB2929733 - The first stage of the WER protocol is not SSL encrypted
    KB3177467 - September 2016 Servicing stack update

    PLEASE NOTE: Windows 7 SP1 in the KB976932 Windows Update adds KB2533552

    STANDARD UPDATES

    KB971033 - Windows Activation Technologies
    KB2786081 - Internet Explorer 10 does not save credentials for a website after you log off or restart a computer
    KB3112343 - Windows Update Client for December 2015
    KB3138612 - Windows Update Client for March 2016

    OPTIONAL UPDATES

    KB982018 - An update that improves the compatibility with Advanced Format Disks
    KB2484033 - Update that improves the print performance of XPS documents
    KB2488113 - An application that uses Direct2D or Direct3D may crash
    KB2505438 - Slow performance in applications that use the DirectWrite API
    KB2563227 - An SVG graphic that has attributes that use large values may not be parsed correctly
    KB2603229 - The values of the 32-bit versions of two registry entries are incorrect in 64-bit versions
    KB2640148 - Windows Explorer stops responding if you try to expand a mapped drive
    KB2685811 - Update For Kernel-Mode Driver Framework v1.11 / Needed for Intel Management Engine
    KB2685813 - Update For User-Mode Driver Framework v1.11 / Needed for Intel Management Engine
    KB2729094 - An update for the Segoe UI symbol font
    KB2750841 - An IPv6 readiness update
    KB2763523 - No network connectivity when a DHCPv6 message is sent that has a duplicated DUID
    KB2799926 - USB storage device cannot be recognized or mounted on a computer
    KB2808679 - Update that protects from internal URL port scanning
    KB2852386 - Disk Cleanup Wizard addon lets users delete outdated Windows updates
    KB2891804 - Files or folders are removed unexpectedly when you perform a cut-and-paste operation on a Windows FTP client that is connected to an FTP site
    KB2893519 - "Remember my credentials" option cannot be hidden when the SspiPromptForCredentials function is called in Windows
    KB3020370 - Update the copy of the Cmitrust.dll file in Windows
    KB3054476 - May 2015 update for stream.sys driver-based applications
    KB3078667 - System malfunction because memory leak occurs in dwm.exe
    KB3092627 - September 2015 update to fix Windows or application freezes after you install security update 3076895
    KB3138378 - Update for Journal.dll binary
    KB3140245 - A new registry key enables TLS 1.1 and TLS 1.2 to default secure protocols in WinHTTP
    KB3181988 - SFC integrity scan reports and fixes an error in the usbhub.sys.mui file

    OPTIONAL UPDATES

    KB2506928 - Fixes an issue in which a link in an .html file that you open in Outlook does not work that has Internet Explorer 9 installed
    KB2511250 - You cannot print a Scalable Vector Graphics (SVG) or level 3 Cascading Style Sheet (CSS3) file in Internet Explorer 9
    KB2522422 - Cannot print from Internet Explorer 9 using some Canon printers
    KB2545698 - Text in some core fonts appears blurred in Internet Explorer 9
    KB2547666 - You cannot delete long URLs from the browsing history in Internet Explorer
    KB2574819 - An update is available that adds support for DTLS
    KB2592687 - Remote Desktop Protocol (RDP) 8.0 update
    KB2660075 - You cannot change the time and date if the time zone is set to Samoa (UTC+13:00) and KB2657025 is installed
    KB2670838 - The EVIL Update, breaks AERO on Windows 7 and makes some fonts on websites fuzzy
    KB2719857 - You cannot use an USB RNDIS device to connect to a 3G or 4G network
    KB2726535 - An update is available that adds South Sudan to the list of countries
    KB2732059 - You cannot open an .oxps file
    KB2732487 - "0x0000000a" Stop error code when you resume a Windows 7-based computer from sleep or from hibernation
    KB2761217 - Update to add the Calibri Light and Calibri Light Italic fonts
    KB2773072 - Update changes the game rating systems
    KB2791765 - Application compatibility update
    KB2800095 - Wudfhost.exe crashes when you plug in a USB-ICCD-compliant smart card device
    KB2830477 - Remote Desktop Connection (RDC) 8.1 client update that lets you use the new Remote Desktop Services features
    KB2834140 - "0x00000050" Stop error after you install update KB2670838
    KB2843630 - Update helps unmanaged Office 2010 users work with Microsoft RMS
    KB2853952 - Loss of consistency with IDE-attached virtual hard disks when a Hyper-V host server experiences an unplanned restart
    KB2908783 - Data corruption occurs on iSCSI LUNs in Windows
    KB2918077 - VAN UI freezes after KB2813956 is applied
    KB2919469 - Canada country code is incorrect
    KB2966583 - Improvements for the System Update Readiness Tool
    KB2970228 - Update to support the new currency symbol for the Russian ruble
    KB2985461 - Error 0x800401f0 when you update RemoteApp and Desktop Connections feeds
    KB3006121 - Private EUDCs are not displayed in Character Map after you apply update 2982791
    KB3006137 - Update changes the currency symbol of Lithuania from the Lithuanian litas (Lt) to the euro (€)
    KB3013531 - Update to support copying .mkv files to Windows Phone from a computer that is running Windows
    KB3080079 - Update to add RDS support for TLS 1.1 and TLS 1.2
    KB3102429 - Update that supports Azerbaijani Manat and Georgian Lari currency symbols
    KB3107998 - Remove Lenovo USB Blocker version 1.0.0.37 to avoid a system crash
    KB3133977 - Bitlocker can't encrypt drives because of service crashes in svchost.exe process
    KB3135445 - Windows Update Client for February 2016
    KB3137061 - Windows Azure VMs don't recover from a network outage and data corruption issues occur
    KB3147071 - Connection to Oracle database fails when you use Microsoft ODBC or OLE DB Driver for Oracle or Microsoft DTC
    KB3172605 - July 2016 Rollup
    KB3179573 - August 2016 Rollup
     
    Last edited: Aug 2, 2017
    Groff likes this.
  2. beastkiller009

    beastkiller009 Member

    Joined:
    Mar 14, 2016
    Messages:
    8
    Thank God for Grinder9

    WARNING TO ASUS MOTHERBOARD USERS! Just read this online!... very interesting 'Optional' Update Grinder9 identified as "Unnecessary" and advised to not load & hide! Thank God I was paying attention since I happen to have an ASUS Motherboard!

    "While some PC users updated to Windows 10 the moment it became available, others will stick with earlier versions for as long as possible. For the horde still clinging on to Windows 7, there’s a new glitch to keep an eye out for — but it only seems to affect certain Asus motherboards.

    An update titled KB3133977 can potentially trigger a “secure boot violation” during startup, according to a report from The Register. This prevents the computer from loading its OS, rendering it rather useless.

    According to Asus, the problem stems from the fact that the affected motherboards have a feature called Secure Boot enabled by default. This is not supported by Windows 7, but the KB3133977 update tricks the boards into thinking that it is, which causes a conflict once the system tries to initialize its OS.

    KB3133977 has been available for some time, but was previously listed as an optional update by Microsoft. Its status was changed to recommended last week, which means it was installed automatically for many users via Windows Update, in some cases disabling their systems until a fix can be found.While some PC users updated to Windows 10 the moment it became available, others will stick with earlier versions for as long as possible. For the horde still clinging on to Windows 7, there’s a new glitch to keep an eye out for — but it only seems to affect certain Asus motherboards.

    An update titled KB3133977 can potentially trigger a “secure boot violation” during startup, according to a report from The Register. This prevents the computer from loading its OS, rendering it rather useless.

    According to Asus, the problem stems from the fact that the affected motherboards have a feature called Secure Boot enabled by default. This is not supported by Windows 7, but the KB3133977 update tricks the boards into thinking that it is, which causes a conflict once the system tries to initialize its OS.

    KB3133977 has been available for some time, but was previously listed as an optional update by Microsoft. Its status was changed to recommended last week, which means it was installed automatically for many users via Windows Update, in some cases disabling their systems until a fix can be found."

    HOPE NONE OF YOU OUT THEE ARE NOW DEALING WITH THIS!!!!!...beastkiller009
     
  3. beastkiller009

    beastkiller009 Member

    Joined:
    Mar 14, 2016
    Messages:
    8
    Dec 2016 Important Updates

    Any feedback on the following? Thanks, beastkiller009

    December 2016 Important Updates

    KB3205402 - December 2016 Security & Quality Rollup for .NET Framework 3.5.3, 4.5.2,, 4.6, 4.6.1, 4.6.2 on Windows 7 for x64

    KB3207752 - December 2016 Security Monthly Quality Rollup for W7 x64-based Systems
     
  4. demiurge3141

    demiurge3141 Member

    Joined:
    Aug 19, 2005
    Messages:
    1,591
    Location:
    Melbourne 3073
    I wouldn't install the second one. Download from WSUS kb3205394, December Security ONLY update.
     
    Last edited: Dec 17, 2016
  5. beastkiller009

    beastkiller009 Member

    Joined:
    Mar 14, 2016
    Messages:
    8
    Demiurge3141... Need some help... actually a lot of help!

    Sorry for being such a pain... will only download what you recommended which was "Download from WSUS kb3205394, December Security ONLY update."

    However, I am a total 'newbe' when it comes to downloading or installing an individual KB from somewhere other than my regular Windows Update... I am not even sure where to put it on my system if I did download it, or how to install it once it is downloaded (pretty sad, huh!)...

    I did find the KB3205294 you speak of on the MS Update Catalog page, but not sure where to download it to (a directory I assume if that will work) or what to do with it once I download it... and there are 6 parts to it... so not sure what to download or where to put what...

    I don't know how to get to the WSUS (Windows Services Update Server?) you speak of or how to locate KB3205294 if I did get there ...basically lost...can you help?? (This is truly embarrassing!)

    Best regards and any help greatly appreciated!
    beastkiller009
     
  6. MUTMAN

    MUTMAN Member

    Joined:
    Jun 27, 2001
    Messages:
    6,659
    Location:
    4109
    Search for wsus cmd line
    Its a fairly simple process to install or remove a single KB
     
  7. OP
    OP
    Grinder9

    Grinder9 Member

    Joined:
    Jun 4, 2014
    Messages:
    16
    They are both not safe as they contain added telemetry points. The 2 replacement files can be found here:

    KB3205394 - http://www.catalog.update.microsoft.com/Search.aspx?q=KB3205394 x64

    KB3205406 - http://www.catalog.update.microsoft.com/Search.aspx?q=KB3205406 x64

    There is no security only update for .NET Framework 3.5.1 this month so KB3205406 will only update .NET Framework 4.6.2 if you have it. Essentially Microsoft should have named KB3205402 a Quality Only Rollup for .NET Framework 3.5.1 but still it can't be trusted.
     
    Last edited: Dec 19, 2016
  8. beastkiller009

    beastkiller009 Member

    Joined:
    Mar 14, 2016
    Messages:
    8
    Grinder9 - direct links very helpful!

    Thanks for the direct links to the Security Only Updates for W7 for Dec 2016... also greatly appreciate suggestions regarding WSUS from other users but as an extreme newby, I got lost in the tech requirements of the other processes for downloading the correct updates. (again, very embarrassing on my part!)

    I found the direct links much more helpful...thanks again Grinder9! As usual. you saved my rear end! Greatly appreciated!...beastkiller009
     
  9. beastkiller009

    beastkiller009 Member

    Joined:
    Mar 14, 2016
    Messages:
    8
    Grinder9 - one little problem...

    :confused:
    Link for download of KB3205394 - http://www.catalog.update.microsoft....B3205394 x64 worked great on my desktop 64x W7 Pro system, but not on my laptop 64x W7 Home system... started downloading, all was going well and then went to "Windows Standalone Update Installer" popup window which displays message "Searching for updates on this computer"... has continued with this popup & message for almost 3 hours and appears it has no plans of ever stopping... any ideas??
     
  10. OP
    OP
    Grinder9

    Grinder9 Member

    Joined:
    Jun 4, 2014
    Messages:
    16
    Disable Windows Update.
    Reboot.
    Download and install update.
    Reboot.
    Re-enable Windows Update.
     
  11. MUTMAN

    MUTMAN Member

    Joined:
    Jun 27, 2001
    Messages:
    6,659
    Location:
    4109
    hey beasty, have a look at this as an example
    https://support.microsoft.com/en-us/kb/934307

    so if you wanted to install those two KB's that grinder listed you open up a command prompt by hitting windows key and type "CMD", you should see an option to launch the command prompt.
    then type in "wusa/?" to see a help file associated with this
    then punch in "wusa /quiet /norestart /KB320539"
    then the next one "wusa /quiet /norestart /KB3205406

    a restart after that's probably not a bad idea

    at least try the wusa /? and have a look around :thumbup:
     
  12. beastkiller009

    beastkiller009 Member

    Joined:
    Mar 14, 2016
    Messages:
    8
    Thanks for the recomendation!

    Hey mutman...thanks much will give it a try on the x64 laptop...already got the desktop security updated with Grinder9's link...best regards, beastkiller009
     
  13. MUTMAN

    MUTMAN Member

    Joined:
    Jun 27, 2001
    Messages:
    6,659
    Location:
    4109
    no worries :)
    you can uninstall that way too :thumbup:
     
  14. snelle

    snelle Member

    Joined:
    Sep 1, 2016
    Messages:
    2
    what difference does it make: downloading via link or via windows update ?
     
  15. MUTMAN

    MUTMAN Member

    Joined:
    Jun 27, 2001
    Messages:
    6,659
    Location:
    4109
    to the download itself, none i'm aware of. the KB# is the KB#
     
  16. snelle

    snelle Member

    Joined:
    Sep 1, 2016
    Messages:
    2
  17. MUTMAN

    MUTMAN Member

    Joined:
    Jun 27, 2001
    Messages:
    6,659
    Location:
    4109
    You're asking why the different KB's in place of the automatically selected ones ?
    Grinder might confirm/clarify, but basically the "quality" roll-ups have a heap of telemetry and other not so privacy friendly tracking in them. Win 10 has so much of it so highly dug in it's almost impossible to have a functioning system once the crap is removed.
    Win 7 has such a massive commercial/enterprise client base that they are allowing sys admins to not include that stuff (for now) and have a replacement KB thats just the security/functionality upgraded.

    Sadly for us here, grinder is moving on, and wont be doing any more updates in the future :( :( :(

    Thanks grinder, your work has been appreciated
    I guess we just have to move on, long live windows 7 mothertruckers :thumbup:
     
  18. beastkiller009

    beastkiller009 Member

    Joined:
    Mar 14, 2016
    Messages:
    8
    Hey MUTMAN - thanks! I appreciate your efforts!

    As it turns out, I finally got Grinder9's link for the security update (all I needed 'cuz I'm not using .NET 4.6.2) to work on my wife's x64 laptop...not sure what the issue was originally... but I appreciate the tour and explanation of WSUS...nice to know, even though I ended up not using it... looks like I could use it in the future as long as I know where the *.MUS files are sitting... I greatly appreciate all the time and effort you guys put into this stuff to help us keep our W7 systems running W7... just wish I was more knowledgeable with it! Thanks again!!... I also just hid all the optional updates (if they are optional, I really don't need them, like the Realtek & Intel updates... I rely on Realtek & Intel for that kind of stuff...less issues)... All the best guys, beastkiller009
     
  19. beastkiller009

    beastkiller009 Member

    Joined:
    Mar 14, 2016
    Messages:
    8
    Dear Grinder9 - we will miss you!

    Especially the neophytes like me that have only scratched he surface with this stuff... hope I can stay with W7 a bit longer until I can save my pennies and move to an Apple system,...I am tired of dealing with all the MS crap!!

    Merry Christmas & Happy New year to you and your team...you have brought wisdom and relief to this forum for as long as I have been here, and I am sure you will continue wherever you go!

    Thanks again, beastkiller009
     
  20. MUTMAN

    MUTMAN Member

    Joined:
    Jun 27, 2001
    Messages:
    6,659
    Location:
    4109
    No thanks to me at all, Grinder9 is the hero in this one :thumbup:
     

Share This Page

Advertisement: