Microsoft releases Windows 10 builds 17134.677, 16299.1059 - here's what's new

Last Tuesday was Patch Tuesday, the second Tuesday of the month when Microsoft releases updates for all supported versions of Windows. But in recent months, the changelog for Patch Tuesday updates is rather small, with the larger list of fixes coming in a secondary, yet optional, update later on in the month. Naturally, if you don"t take it, it"s included in next month"s Patch Tuesday update.

Today"s updates apply to Windows 10 versions 1803, 1709, 1703, and 1607, so there"s nothing new for the latest version, 1809.

If you"re on Windows 10 version 1803, you"ll get KB4489894, which brings the build number to 17134.677. You can manually download it here, and it includes the following fixes:

  • Addresses an issue with a Microsoft Access 97 database that stops a requested operation when a table or column has custom properties.

  • Addresses an issue that prevents Microsoft Office updates from downloading from the Microsoft Store.

  • Updates time zone information for Buenos Aires, Argentina.

  • Addresses an issue with Microsoft Office Visual Basic for Applications that fails to use the Japanese Era registry settings for dates in the Japanese format. For more information, see KB4469068.

  • Updates time zone information for Kazakhstan.

  • Updates time zone information for São Tomé and Príncipe.

  • Addresses an issue that prevents users from enabling gan-nen support for the Japanese Era. For more information, see KB4469068.

  • Addresses an issue that causes a device to periodically stop responding when using an East Asian locale.

  • Addresses a reliability issue that may cause a laptop screen to remain black after resuming from Sleep if you close the lid when disconnecting from a docking station.

  • Addresses an issue with the Group Policy, "Turn off app notifications on the lock screen".

  • Addresses an issue that may prevent users from signing in and cause account lockouts when using the App-V client to start applications. The issue occurs because Kerberos authentication fails when trying to get user information from the domain name server (DNS). Modify the following registry key:

    • Setting: UseDcForGetUserInfo

    • Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppV\Shared\

    • Type: REG_DWORD

    • Value: Setting the following DWORD to nonzero will enable the solution.

  • Addresses an issue with the Windows lock screen that prevents users from unlocking a device after multiple smart card users have used the same device. This issue occurs when you attempt to use a workstation that another user has locked.

  • Addresses an issue that prevents the authentication credentials dialog from appearing when an enterprise web server attempts to connect to the Internet.

  • Addresses an issue that causes a client or server to restart when using a smart card to log in with User Name Hints to an Azure Active Directory (AAD) joined machine using Remote Desktop ServicesAddresses an issue in which multiple device entries exist for a single, hybrid domain joined device.

  • Addresses an issue that removes the ALLOWCLSIDS policy from the policy XML file when you run the Add-SignerRule for Windows Defender Application Control.

  • Addresses an issue that prevents a virtual smart card from starting when running in conjunction with Citrix 7.15.2000 Workstation VDA software.

  • Addresses an issue that prevents a user from authenticating and causes Windows Account Manager (WAM) to fail when using a Trusted Platform Module (TPM).

  • Addresses an issue that causes certificate renewal to fail when using CERT_RENEWAL_PROP_ID with the ICertPropertyRenewal interface.

  • Adds a new Group Policy setting called “Enable Windows to soft-disconnect a computer from a network”. This determines how Windows will disconnect a computer from a network when it determines that the computer should no longer be connected to the network.

    • If enabled, Windows will soft-disconnect (disconnection is not immediate or abrupt) a computer from a network.

    • If disabled, Windows disconnects a computer from a network immediately.

    • If not configured, the default behavior is soft-disconnect. For more information about soft-disconnect, see Understanding and configuring Windows Connection Manager.

  • Path: Computer Configuration\Policies\Administrative Templates\Network\Windows Connection Manager

  • Addresses an issue that may cause the error, “Stop 0x133” in NTFS.sys.

  • Addresses an issue that causes Windows to reuse an expired Dynamic Host Configuration Protocol (DHCP) lease if the lease expired while the OS was shutdown.

  • Addresses an issue that may cause the Virtual Machine Management Service (VMMS) to stop working. This issue occurs when executing a Live Migration using a Measure-VM cmdlet or any metric Windows Management Instrumentation (WMI) query.

  • Addresses an issue in which the graphics device interface (GDI) DeleteObject() may cause the calling process to stop working when both of the following conditions are true:

  • The calling process is a WOW64 process that handles memory addresses larger than 2 GB.

  • The DeleteObject() is called with a device context that is compatible with a printer device context.

  • Provides seamless integration with Microsoft Cloud App Security (MCAS) to discover cloud app usage inside and outside the corporate network for Windows Defender Advanced Threat Protection (ATP) customers.

  • Enhances automated investigation and remediation, including memory forensics, for Windows Defender ATP customers.

  • Addresses an issue that prevents the “Turn off app notifications on the lock screen" policy from working. The path is "Computer Configuration\Administrative Templates\System\Logo".

  • Addresses minor issues with unknown options (unknown OPT) in the Extension Mechanisms for DNS (EDNS) for the Windows DNS Server role.

There are also four known issues to be aware of:

Symptom

Workaround

After installing this update, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Microsoft is working on a resolution and will provide an update in an upcoming release.
After installing this security update, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Right-click the URL link to open it in a new window or tab.

Or

Enable Protected Mode in Internet Explorer for local intranet and trusted sites.

  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, selectLocal intranet and then selectEnable Protected Mode.
  3. Select Trusted sites and then selectEnable Protected Mode.
  4. Select OK.

You must restart the browser after making these changes.

Microsoft is working on a resolution and will provide an update in an upcoming release.

After applying this update, a stop error occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.

Disable forwarding of the authentication agent connection using a command line switch (ssh –a) or a configuration setting.

Microsoft is working on a resolution and will provide an update in an upcoming release.

After installing this update, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI.

  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

“HKLM\System\CurrentControlSet\Services\WDSServer\ Providers\WDSTFTP\EnableVariableWindowExtension”.

Restart the WDSServer service after disabling the Variable Window Extension.

Microsoft is working on a resolution and will provide an update in an upcoming release.


If you"re still on the Windows 10 Fall Creators Update, or version 1709, you"ll get KB4489890, which brings the build number to 16299.1059. You can manually download it here, and it contains the following fixes:

  • Addresses an issue with a Microsoft Access 97 database that stops a requested operation when a table or column has custom properties.

  • Updates time zone information for Buenos Aires, Argentina.

  • Addresses an issue with Microsoft Office Visual Basic for Applications that fails to use the Japanese Era registry settings for dates in the Japanese format. For more information, see KB4469068.

  • Updates time zone information for Kazakhstan.

  • Updates time zone information for São Tomé and Príncipe.

  • Addresses an issue that prevents users from enabling gan-nen support for the Japanese Era. For more information, see KB4469068.

  • Addresses an issue with the Group Policy, "Turn off app notifications on the lock screen".

  • Addresses an issue that may prevent users from signing in and cause account lockouts when using the App-V client to start applications. The issue occurs because Kerberos authentication fails when trying to get user information from the domain name server (DNS). Modify the following registry key:

    • Setting: UseDcForGetUserInfo

    • Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppV\Shared\

    • Type: REG_DWORD

    • Value: Setting the following DWORD to nonzero will enable the solution.

  • Addresses an issue that prevents App-V applications from starting and generates error “0xc0000225”. Setting the following DWORD to a non-zero number will enable the solution: "HKLM\Software\Microsoft\AppV\\MAV\Configuration\MaxAttachWaitTimeInMilliseconds". The default is zero, the maximum is 10,000, and it limits the maximum wait time for a driver when the error occurs. For more information, see KB4494206.

  • Addresses an issue that prevents the authentication credentials dialog from appearing when an enterprise web server attempts to connect to the Internet.

  • Addresses an issue that causes a client or server to restart when using a smart card to log in with User Name Hints to an Azure Active Directory (AAD) joined machine using Remote Desktop Services.

  • Addresses an issue with Microsoft Outlook profiles on devices that are domain joined and workplace joined. Creation of new Microsoft Outlook profile may fail, or created Microsoft Outlook profiles may fail to work later.

  • Addresses an issue that removes the ALLOWCLSIDS policy from the policy XML file when you run the Add-SignerRule for Windows Defender Application Control.

  • Addresses an issue that prevents a user from authenticating and causes Windows Account Manager (WAM) to fail when using a Trusted Platform Module (TPM).

  • Addresses an issue that causes certificate renewal to fail when using CERT_RENEWAL_PROP_ID with the ICertPropertyRenewal interface.

  • Adds a new Group Policy setting called “Enable Windows to soft-disconnect a computer from a network”. This determines how Windows will disconnect a computer from a network when it determines that the computer should no longer be connected to the network.

    • If enabled, Windows will soft-disconnect (disconnection is not immediate or abrupt) a computer from a network.

    • If disabled, Windows disconnects a computer from a network immediately.

    • If not configured, the default behavior is soft-disconnect. For more information about soft-disconnect, see Understanding and configuring Windows Connection Manager.
      Path: Computer Configuration\Policies\Administrative Templates\Network\Windows Connection Manager.

  • Addresses an issue that may cause the error, “Stop 0x133” in NTFS.sys.

  • Addresses an issue that causes Windows to reuse an expired Dynamic Host Configuration Protocol (DHCP) lease if the lease expired while the OS was shutdown.

  • Addresses an issue that causes the “Windows created a temporary warning.” message to appear if you create a page file on a drive with FILE_PORTABLE_DEVICE characteristics.

  • Addresses an issue that causes the user interface (UI) to stop responding for several seconds when you scroll a window while many child windows are open.

  • Addresses an issue in which the graphics device interface (GDI) DeleteObject() may cause the calling process to stop working when both of the following conditions are true:

  • The calling process is a WOW64 process that handles memory addresses larger than 2 GB.

  • The DeleteObject() is called with a device context that is compatible with a printer device context.

  • Provides seamless integration with Microsoft Cloud App Security (MCAS) to discover cloud app usage inside and outside the corporate network for Windows Defender Advanced Threat Protection (ATP) customers.

  • Enables automated investigation and remediation for Windows Defender ATP customers.

  • Addresses an issue that prevents the “Turn off app notifications on the lock screen" policy from working. The path is "Computer Configuration\Administrative Templates\System\Logo".

  • Addresses minor issues with unknown options (unknown OPT) in the Extension Mechanisms for DNS (EDNS) for the Windows DNS Server role.

It contains the first three known issues from the ones listed above, as does the update for version 1703. It"s worth noting that version 1709 will no longer be supported for Home and Pro versions beginning after next month"s Patch Tuesday.

The Windows 10 Creators Update, or version 1703, is already unsupported for Home and Pro. To get today"s update, which is KB4489888 and brings the build number to 15063.1716, you"ll need to be on Windows 10 Enterprise or Education. You can manually download it here, and it contains the following fixes:

  • Addresses an issue with a Microsoft Access 97 database that stops a requested operation when a table or column has custom properties.

  • Updates time zone information for Buenos Aires, Argentina.

  • Addresses an issue with Microsoft Office Visual Basic for Applications that fails to use the Japanese Era registry settings for dates in the Japanese format. For more information, see KB4469068.

  • Updates time zone information for Kazakhstan.

  • Updates time zone information for São Tomé and Príncipe.

  • Addresses an issue that prevents users from enabling gan-nen support for the Japanese Era. For more information, see KB4469068.

  • Addresses an issue that may prevent users from signing in and cause account lockouts when using the App-V client to start applications. The issue occurs because Kerberos authentication fails when trying to get user information from the domain name server (DNS). Modify the following registry key:

    • Setting: UseDcForGetUserInfo​​​​​​​

    • Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppV\Shared\

    • Type: REG_DWORD

    • Value: Setting the following DWORD to nonzero will enable the solution.

  • Addresses an issue that prevents App-V applications from starting and generates error “0xc0000225”. Setting the following DWORD to a non-zero number will enable the solution: "HKLM\Software\Microsoft\AppV\\MAV\Configuration\MaxAttachWaitTimeInMilliseconds". The default is zero, the maximum is 10,000, and it limits the maximum wait time for a driver when the error occurs. For more information, see KB4494206.

  • Addresses an issue that prevents the authentication credentials dialog from appearing when an enterprise web server attempts to connect to the Internet.

  • Addresses an issue that causes a client or server to restart when using a smart card to log in with User Name Hints to an Azure Active Directory (AAD) joined machine using Remote Desktop Services.

  • Addresses an issue that removes the ALLOWCLSIDS policy from the policy XML file when you run the Add-SignerRule for Windows Defender Application Control.

  • Addresses an issue that prevents a user from authenticating and causes Windows Account Manager (WAM) to fail when using a Trusted Platform Module (TPM).

  • Addresses an issue that causes certificate renewal to fail when using CERT_RENEWAL_PROP_ID with the ICertPropertyRenewal interface.

  • Addresses an issue that may cause the error, “Stop 0x133” in NTFS.sys.

  • Addresses an issue that prevents users from receiving all the available Windows updates using the Unified Write Filter (UWF) servicing mode while UWF is enabled.

  • Addresses an issue in which the graphics device interface (GDI) DeleteObject() may cause the calling process to stop working when both of the following conditions are true:

    • The calling process is a WOW64 process that handles memory addresses larger than 2 GB.

    • The DeleteObject() is called with a device context that is compatible with a printer device context.

  • If you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.

Finally, if you"re on the Windows 10 Anniversary Update, or version 1607, you"ll get KB4489889, which brings the build number to 14393.2879. It"s also supported for Education and Enterprise customers, although that ends after next month. It"s also supported for LTSC customers and Windows Server 2016 users. You can manually download it here, and it contains the following fixes:

  • Addresses an issue with a Microsoft Access 97 database that stops a requested operation when a table or column has custom properties.

  • Updates time zone information for Buenos Aires, Argentina.

  • Addresses an issue with Microsoft Office Visual Basic for Applications that fails to use the Japanese Era registry settings for dates in the Japanese format. For more information, see KB4469068.

  • Updates time zone information for Kazakhstan.

  • Updates time zone information for São Tomé and Príncipe.

  • Addresses an issue that prevents users from enabling gan-nen support for the Japanese Era. For more information, see KB4469068.

  • Addresses a reliability issue in dxgkrnl.sys.

  • Addresses an issue that causes a yellow exclamation mark to appear in Windows Device Manager on human interface devices (HID). This issue occurs after switching users and removing or adding HID-compliant devices. The HID-compliant device stops responding, and the system stops responding on shutdown and restart.

  • Addresses an issue that may cause the touch screen to stop working after a restart.

  • Addresses an issue that may prevent users from signing in and cause account lockouts when using the App-V client to start applications. The issue occurs because Kerberos authentication fails when trying to get user information from the domain name server (DNS). Modify the following registry key:

    • Setting: UseDcForGetUserInfo​​​​​​​

    • Path: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppV\Shared\

    • Type: REG_DWORD

    • Value: Setting the following DWORD to nonzero will enable the solution.

  • Addresses an issue that prevents App-V applications from starting and generates error “0xc0000225”. Setting the following DWORD to a non-zero number will enable the solution: HKLM\Software\Microsoft\AppV\\MAV\Configuration\MaxAttachWaitTimeInMilliseconds. The default is zero, the maximum is 10,000, and it limits the maximum wait time for a driver when the error occurs. For more information, see KB4494206.

  • Addresses an issue that removes the ALLOWCLSIDS policy from the policy XML file when you run the Add-SignerRule for Windows Defender Application Control.

  • Addresses an issue that prevents the authentication credentials dialog from appearing when an enterprise web server attempts to connect to the Internet.

  • Addresses an issue that causes a client or server to restart when using a smart card to log in with User Name Hints to an Azure Active Directory (AAD) joined machine using Remote Desktop Services.

  • Addresses an issue that causes certificate renewal to fail when using CERT_RENEWAL_PROP_ID with the ICertPropertyRenewal interface.

  • Addresses an issue that prevents users from receiving all the available Windows updates using the Unified Write Filter (UWF) servicing mode while UWF is enabled.

  • Addresses an issue that may cause the error, “Stop 0x133” in NTFS.sys.

  • Addresses an issue in the Microsoft Service Control Manager (SCM) component that causes a system to stop responding at startup.

  • Addresses an issue in Active Directory Federation Services (AD FS) that causes a duplicate relying party trust to appear in the AD FS management console. This occurs when you create or view relying party trusts using the AD FS management console.

  • Addresses an issue that prevents the display of previous file versions after a disk that hosts file shares goes offline and then comes back online.

  • Addresses an issue that causes a long delay when resuming from hybrid sleep.

  • Addresses an issue in a Storage Spaces Direct environment that may lead to an error at shutdown during a "restart in a loop" scenario.

  • Addresses an issue that may cause a cluster to stop working when a file share witness becomes read-only.

  • Addresses an issue that occurs when updating cluster nodes one by one. If you restart a node at a lower patched level, the node at a higher patched level may become unexpectedly quarantined.

  • Addresses a high Active Directory Federation Services (ADFS) Web Application Proxy (WAP) latency issue (over 10,000ms) that occurs while Extranet Smart Lockout (ESL) is enabled on ADFS.

  • Enables activation of insider builds of Windows 10 Enterprise for Virtual Desktops in Microsoft Azure. Microsoft Azure is the only tested and supported platform to host Windows 10 Enterprise for Virtual Desktops, which is a key part of Windows Virtual Desktop.

  • Addresses an issue in which the Policy Replication Status report in the Group Policy Management Console (GPMC) consistently displays one less domain controller than is present in the entire domain or a specific Group Policy.

  • Addresses an issue in which the graphics device interface (GDI) DeleteObject() may cause the calling process to stop working when both of the following conditions are true:

    • The calling process is a WOW64 process that handles memory addresses larger than 2 GB.

    • The DeleteObject() is called with a device context that is compatible with a printer device context.

  • Addresses a character limit issue in the “Settings Page Visibility” Group Policy in the following policy path: "User Configuration\Administrative Templates\Control Panel".

  • Addresses minor issues with unknown options (unknown OPT) in the Extension Mechanisms for DNS (EDNS) for the Windows DNS Server role.

This update has a rather long list of known issues:

Symptom Workaround

For hosts managed by System Center Virtual Machine Manager (SCVMM), SCVMM cannot enumerate and manage logical switches deployed on the host after installing the update.

Additionally, if you do not follow the best practices, a stop error may occur in vfpext.sys on the hosts.
  1. Run mofcomp on the following mof files on the affected host:
    1. Scvmmswitchportsettings.mof
    2. VMMDHCPSvr.mof
  2. Follow the best practices while patching to avoid a stop error in vfpext.sys in an SDN v2 environment (NC managed hosts).
After installing KB4467684, the cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with greater than 14 characters.

Set the domain default "Minimum Password Length" policy to less than or equal to 14 characters.

Microsoft is working on a resolution and will provide an update in an upcoming release.

After installing this update, Internet Explorer 11 may have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include, but may not be limited to:

  • Cache size and location show zero or empty.
  • Keyboard shortcuts may not work properly.
  • Webpages may intermittently fail to load or render correctly.
  • Issues with credential prompts.
  • Issues when downloading files.

Create unique user accounts so that two people don’t share the same user account when logging on to a Windows Server machine. Additionally, disable multiple RDP sessions for a single user account for a specific Windows Server.

Microsoft is working on a resolution and will provide an update in an upcoming release.

After installing this update, MSXML6 causes applications to stop responding if an exception was thrown during node operations, such as appendChild(), insertBefore(), and moveNode().

The Group Policy editor may stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 settings.
Microsoft is working on a resolution and will provide an update in an upcoming release.
After installing this security update, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.

Right-click the URL link to open it in a new window or tab.

Or

Enable Protected Mode in Internet Explorer for local intranet and trusted sites.

  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, selectLocal intranet and then selectEnable Protected Mode.
  3. Select Trusted sites and then selectEnable Protected Mode.
  4. Select OK.

You must restart the browser after making these changes.

Microsoft is working on a resolution and will provide an update in an upcoming release.
After installing this update, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension.

To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI.

  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

“HKLM\System\CurrentControlSet\Services\WDSServer\

Providers\WDSTFTP\EnableVariableWindowExtension”.

Restart the WDSServer service after disabling the Variable Window Extension.

Microsoft is working on a resolution and will provide an update in an upcoming release.

If you enable per font end-user-defined characters (EUDC), the system will stop working and a blue screen will appear at startup. This is not a common setting in non-Asia regions.

To avoid this issue, don’t enable per font EUDC.

Microsoft is working on a resolution and will provide an update in an upcoming release.


As mentioned earlier, these are all optional updates. You can either install them manually, or go to Windows Update and check for updates, but they won"t be installed manually.

Report a problem with article
Next Article

Getting '20/20' Vision on Security, from z/OS to Open Systems - free White Paper

Previous Article

Microsoft releases Windows 10 build 18356.16 to the Slow ring with nothing new