Connect with us

Security

Microsoft: If you’re on Windows 10 version 1803, you’ll be automatically upgraded

Published

on

Windows 10 version 1909: Why this feature update should be a pleasant surprise
Microsoft is getting the November 2019 Update ready for release to the general public. Ed Bott explains what makes this update different from the feature updates you’ve come to dread. Read more: https://zd.net/2P1kysX

With support for Windows 10 1803 now ended for Home and Pro, Microsoft says it will automatically update anyone on those editions to a new version. But users will have the ability to choose when that move will occur. 

Microsoft delivered its final Patch Tuesday update for Windows 10 version 1803, the April 2018 Update, on November 12, the end date for version 1803 support.

Microsoft says Windows Update will automatically initiate a feature update, “Keeping those devices supported and receiving the monthly updates that are critical to device security and ecosystem health”.  

The company doesn’t say which version of Windows 10 it will bump users up to but for the past few months it has been pushing users to install the Windows 10 May 2019 Update, or version 1903. 

Microsoft on Tuesday released Windows 10 version 1909, the November 2019 Update, but for the moment it is being offered to users only if they check for updates from Windows Update. Gradually, it will dial up distribution to devices that it assesses can handle the update successfully. 

According to Windows 10-focused advertising network AdDuplex, at the end of October, Windows 10 version 1803 represented 13.6% of 90,000 Windows 10 PCs it surveyed. The May 2019 Update, version 1903, rose 11% to 56.6%, making it the most widely adopted version of Windows 10. The Windows 10 October 2018 Update, version 1809, accounted for a quarter of all devices.

Windows 10 version 1803 was Microsoft’s fastest rollout of Windows 10 since it was first released in 2015. The company declared it ready for business just two months after rolling releasing it on April 30, 2018. 

Following the troubles caused by Windows 10 version 1809 in the days after its initial release, Microsoft is now taking a more cautious approach to new feature releases and is trying to capture more reports about low-volume but high-impact bug reports through the Feedback Hub.    

Microsoft introduced the ability to control when to install feature updates via an update it released in May 2019, which displayed feature updates in a separate module on the Windows Update page. These controls allow users to install security updates without necessarily installing the feature update immediately. 

Version 1803 users should see a ‘Download and Install now’ option in Windows Update. After the feature update is downloaded, users are notified and then can choose when to finish the install process and reboot a machine.

More on Microsoft and Windows 10 updates

  • Microsoft begins the official rollout of Windows 10 1909
  • With Windows 10 1909 coming, Windows 10 20H1 hits major milestone  
  • Windows 10 updates: Microsoft kills off Skip Ahead ring for Insiders  
  • Windows 10 version 1903 should just work out of the box, right? Wrong  
  • Why is Windows 10 a mess? Ex-Microsoft engineer blames the culture of ‘made-men’  
  • Windows 10 version 1903: This new update brings Start menu fixes
  • Farewell Windows 10 1703: With its final patch, Creators Update hits end of life
  • Windows patch causes more pain: Start Menu, boot and printer problems surface
  • Windows out-of-band update: Microsoft’s mandatory security patch is for all versions
  • Windows 10 users fume: Microsoft, where’s our ‘local account’ option gone?
  • Windows 10 1909: Microsoft pushes on with testing as 19H2 update rollout looms  
  • Windows 10 1909: Microsoft ends 19H2 confusion, puts all testers on same builds 
  • Windows 10: We’re now gearing up for 1909 with new throttled release, says Microsoft
  • No more buggy Windows 10 updates? Microsoft makes it easier to flag early flaws
  • Windows 10 recovery: Microsoft borrows Apple’s Mac cloud reinstall feature
  • Windows 10 19H2: If you’re on 1903, expect ‘far faster’ update, says Microsoft
  • Windows 10 yields more secrets: Microsoft plan to split OS from shell takes shape
  • How to delete the Windows 10 paging file on every shut-down TechRepublic
  • Test Microsoft’s Chrome-like Edge browser for Windows 10 CNET


  • Source link

    Continue Reading

    Security

    The Five Pillars of (Azure) Cloud-based Application Security

    Published

    on

    This 1-hour webinar from GigaOm brings together experts in Azure cloud application migration and security, featuring GigaOm analyst Jon Collins and special guests from Fortinet, Director of Product Marketing for Public Cloud, Daniel Schrader, and Global Director of Public Cloud Architecture and Engineering, Aidan Walden.

    These interesting times have accelerated the drive towards digital transformation, application rationalization, and migration to cloud-based architectures. Enterprise organizations are looking to increase efficiency, but without impacting performance or increasing risk, either from infrastructure resilience or end-user behaviors.

    Success requires a combination of best practice and appropriate use of technology, depending on where the organization is on its cloud journey. Elements such as zero-trust access and security-driven networking need to be deployed in parallel with security-first operations, breach prevention and response.

    If you are looking to migrate applications to the cloud and want to be sure your approach maximizes delivery whilst minimizing risk, this webinar is for you.

    Continue Reading

    Security

    Data Management and Secure Data Storage for the Enterprise

    Published

    on

    This free 1-hour webinar from GigaOm Research brings together experts in data management and security, featuring GigaOm Analyst Enrico Signoretti and special guest from RackTop Systems, Jonathan Halstuch. The discussion will focus on data storage and how to protect data against cyberattacks.

    Most of the recent news coverage and analysis of cyberattacks focus on hackers getting access and control of critical systems. Yet rarely is it mentioned that the most valuable asset for the organizations under attack is the data contained in these systems.

    In this webinar, you will learn about the risks and costs of a poor data security management approach, and how to improve your data storage to prevent and mitigate the consequences of a compromised infrastructure.

    Continue Reading

    Security

    CISO Podcast: Talking Anti-Phishing Solutions

    Published

    on

    Simon Gibson earlier this year published the report, “GigaOm Radar for Phishing Prevention and Detection,” which assessed more than a dozen security solutions focused on detecting and mitigating email-borne threats and vulnerabilities. As Gibson noted in his report, email remains a prime vector for attack, reflecting the strategic role it plays in corporate communications.

    Earlier this week, Gibson’s report was a featured topic of discussions on David Spark’s popular CISO Security Vendor Relationship Podcast. In it, Spark interviewed a pair of chief information security officers—Mike Johnson, CISO for SalesForce, and James Dolph, CISO for Guidewire Software—to get their take on the role of anti-phishing solutions.

    “I want to first give GigaOm some credit here for really pointing out the need to decide what to do with detections,” Johnson said when asked for his thoughts about selecting an anti-phishing tool. “I think a lot of companies charge into a solution for anti-phishing without thinking about what they are going to do when the thing triggers.”

    As Johnson noted, the needs and vulnerabilities of a large organization aligned on Microsoft 365 are very different from those of a smaller outfit working with GSuite. A malicious Excel macro-laden file, for example, poses a credible threat to a Microsoft shop and therefore argues for a detonation solution to detect and neutralize malicious payloads before they can spread and morph. On the other hand, a smaller company is more exposed to business email compromise (BEC) attacks, since spending authority is often spread among many employees in these businesses.

    Gibson’s radar report describes both in-line and out-of-band solutions, but Johnson said cloud-aligned infrastructures argue against traditional in-line schemes.

    “If you put an in-line solution in front of [Microsoft] 365 or in front of GSuite, you are likely decreasing your reliability, because you’ve now introduced this single point of failure. Google and Microsoft have this massive amount of reliability that is built in,” Johnson said.

    So how should IT decision makers go about selecting an anti-phishing solution? Dolph answered that question with a series of questions of his own:

    “Does it nail the basics? Does it fit with the technologies we have in place? And then secondarily, is it reliable, is it tunable, is it manageable?” he asked. “Because it can add a lot overhead, especially if you have a small team if these tools are really disruptive to the email flow.”

    Dolph concluded by noting that it’s important for solutions to provide insight that can help organizations target their protections, as well as support both training and awareness around threats. Finally, he urged organizations to consider how they can measure the effectiveness of solutions.

    “I may look at other solutions in the future and how do I compare those solutions to the benchmark of what we have in place?”

    Listen to the Podcast: CISO Podcast

    Continue Reading

    Trending