Noted by Neowin, Microsoft yesterday pushed out new cumulative updates for both the Windows 10 Creators Update (version 1703) and the Windows 10 Anniversary Update (version 1607.) These patches push the Creators Update up to build 15063.936 and the Anniversary Update to build 14393.2097. As usual, the updates address multiple issues across both versions the operating system, while also coming with a set of known issues.
Those running the Creators Update should see KB4077528 in Windows Update, pushing them up to build 15063.936. A manual download can also be found here, though keep in mind there is the ongoing known issue where you might not be able to download this update if your AV software hasn’t been updated with a specific registry key.
- Addresses issue where an application cannot read or write attributes of windows that belong to another process using Get/SetWindowWord, Get/SetWindowLong, or Get/SetWindowLongPtr.
- Addresses issue where Internet Explorer stops responding, which delays the desktop appearing, makes the Start menu unresponsive, and causes some system tray icons to disappear.
- Addresses issue where members of the Performance Log Users group receive the error “Access is denied. (Exception from HRESULT: 0x80070005 (E_ACCESSDENIED))”. The error appears while trying to schedule logging of performance counters, enable trace providers, or collect trace information.
- Addresses issue where authentication to Microsoft Outlook fails when using conditional access.
- Addresses reliability issue where certain Device Guard rules may cause the system to stop working.
- Addresses issue where a 0x06d9 failure occurs when a user attempts an OS upgrade or an LCU update. The system automatically reverts to a previous version of the upgrade or update.
- Addresses issue where a server error occurs occasionally during file transfer. The error is “Stop D1 in tcpip!TcpSegmentTcbSend”.
- Addresses issue where a print server name containing a wildcard character (*, ?) prevents the Point and Print Restrictions Group Policy from taking effect.
- Addresses issue where the Remote Authentication Dial-In User Service (RADIUS) server name isn’t authenticated while connecting to a wireless network.
- Addresses issue where iSCSI target redirection during login might lead to stop error 9f.
- Addresses issue that causes server-side performance regression and poor transfer rates for high-latency scenarios.
- Addresses issue where the Internet connection service (ICS) connections don’t persist across OS restarts or ICS service restarts. You can also activate this solution using an optional EnableRebootPersistConnection registry key described in KB4055559.
- Addresses issue with the Auto-register Inbox templates feature for UEV where the Scheduled Task didn’t have the proper trigger.
- Addresses issue where the App-V client didn’t read the policy for SyncOnBatteriesEnabled when the policy was set using a Group Policy Object (GPO).
- Addresses issue where the Supported On field for the Enable App-V Client policy is blank in the Group Policy editor.
- Addresses issue where the user’s hive data in the registry is not maintained correctly when some App-V packages belong to the connection group.
Provides additional logging for administrators to take action, such as picking a proper configuration for their App-V package, when there are multiple configuration files for a single package.- Addresses issue with App-V packages that aren’t compatible with registry virtualization using kernel containers. To address the issue, we changed the registry virtualization to use the earlier (non-container) method by default.
Secondly, those still running the Anniversary Update should see KB4077525 in Windows Update, pushing them up to build 14393.2097. A manual download is here, and there is the same known AV issue, plus an additional issue where Credential Guard may restart unexpectedly. Microsoft is working on a solution to this and recommends to disable the feature until a resolution is reached.
- Addresses issue where users of Citrix XenApp are unable to change passwords by pressing Ctrl+F1.
- Addresses issue where members of the Performance Log Users group receive the error “Access is denied. (Exception from HRESULT: 0x80070005 (E_ACCESSDENIED))”.
- Addresses issue where the WinRM event query returns the error “0x6c6 (RPC_S_INVALID_BOUND)” from the target server
- Addresses issue where authentication to Microsoft Outlook fails when using conditional access.
- Addresses issue where smart card logons fail with the error “Signing in with a smart card isn’t supported for your account….” after the authenticating DC has been restarted
- Addresses issue where the certutil.exe -MergePfx command could not produce a merged EPF file for multiple V1 certificates.
- Addresses issue where the SM3 cryptographic hash algorithm was not supported on TPM devices
- Addresses issue where a 0x06d9 failure occurs when a user attempts an OS upgrade or an LCU update
- Addresses issue where a server error occurs occasionally during file transfer.
- Addresses issue where the Remote Authentication Dial-In User Service (RADIUS) server name is not authenticated while connecting to a wireless network.
- Addresses issue where iSCSI target redirection during login may lead to stop error 9f.
- Addresses issue in MPIO where pass-through SCSI requests may lead to a stop error if the disk is pending removal.
- Updates MPIO path selection algorithm to match the documentation when all paths are Active or Unoptimized.
- Addresses issue where a delay function in StorNVMe may cause a small CPU usage increase when launching applications.
Improves ReFS performance by more thoroughly unmapping multiple views of a file. See KB4090104 for additional tunable registry parameters to address large ReFS metadata streams.
Improves ReFS performance by removing idle containers from its hash table.- Addresses issue where booting with Unified Write Filter and a connected USB hub may lead to stop error E1.
- Addresses issue where the Internet connection service (ICS) connections don’t persist across OS restarts or ICS service restarts.
- Cleans the public IP with the correct information for the SDN Network Manager.
- Adds ADCS support for Certificate Transparency (CT) that’s compatible with the updated Google Chrome requirements.
- Adds ADCS support for Certificate Transparency for publicly trusted SSL/TLS certificates.
- Addresses issue where there is missing information in the Value field of audit event 5136 for Directory Service Changes.
- Addresses issue where an HTTP 500 error occurs when an ADFS farm has at least two servers using Windows Internal Database (WID).
- Addresses issue in which AD FS can no longer ignore prompt=login during authentication.
- Addresses issue in AD FS where Authorized Customers (and relying parties) who select Certificate as an authentication option will fail to connect.
- Addresses issue where AD FS incorrectly displays the Home Realm Discovery (HRD) page when an identity provider (IDP) is associated with a relying party (RP) in an OAuth Group.
- Addresses issue where some Remote Desktop Protocol (RDP) clients that used an absolute URI (instead of a relative URI) were blocked by the Web Application Proxy (WAP) server from connecting to the Remote Desktop Gateway.
- Addresses issue where a file that is optimized and is less than 2.2 TB may be corrupted by the Dedup process when the file is updated to exceed 2.2 TB.
- Addresses issue where, after installing .NET 4.7, creating a new DFS-Replication group or adding a member to an existing replication group
- Addresses issue where, after installing .NET 4.7, the Create Cluster wizard in the Failover Cluster Management UI may unexpectedly close upon selecting Browse on the Select Servers page.
- Addresses issue where the Japanese keyboard layout didn’t work properly during a Remote Assistance session.
- Addresses issue where logons to a Remote Desktop VDI collection start to fail after a period of server uptime.
Those on the Fall Creators Update already saw cumulative updates last week. As you can tell, there is definitely a lot of fixes with these updates. Head to Windows Update now to download, and once things have completed, let us know your thoughts on how the update experience went by dropping us a comment below.