Patch Deployment
Prompts for deferment type and time and updates registry keys based on this article: https://pureinfotech.com/defer-windows-10-upgrades-updates/ This script makes use of Microsoft’s new “Windows Update for Business” (WUB) which is a new set of protocols built into Windows 10 (above Home edition) that allow you to have more control over when and how Windows installs updates.…
Read MoreAttempts to silently install kb patch for Win10 cumulative update to 1709 (Apr 2018). Script makes a few checks first. Script first will check that the patch is not already installed, that the system has the meltdown reg key and that the build number is less than 16299.371. Once these checks are verified the patch…
Read MoreYou can use this script to clean up Patch scan issues. The script stops the bits and wuauserv services, deletes the Network Downloader cache as well as renames the Software Distribution folder, then restarts the 2 services. This is a free script, we are not sure of its original origins, but thank you to whomever…
Read MoreAttempts to silently install kb patch for Win10 cumulative update to 1709. Script makes a few checks first. Script first will check that the patch is not already installed, that the system has the meltdown reg key and that the build number is less than 16299.248. Once these checks are verified the patch (about 680MB)…
Read MoreScripts downloads and runs Microsoft’s KB4078130 patch. This script disables Intel Microcode meant to mitigate against Spectre variant 2. Machines running this KB will be vulnerable to Spectre attack vectors from malicious third parties. This KB will do nothing on machines that have not yet installed the new Microcode firmware update for their Intel CPU.
Read MoreScript checks for the existence of 2 registry keys. Then sets them to enable Spectre Mitigation. If the machine is a server, there will be a 3rd registry key that will be checked as well. Script will report the result of these checks. More details here. Report using $Spectre2$. Use the following video to setup…
Read MoreScripts checks for 2 registry keys to be set to enable patching. If the machine is a server, there will be a 3rd registry key that will be checked as well. Script will report the result of these checks. Can Report using $MeltSpecPatch$. Use the following video to setup reports based on script tags.
Read MoreScript checks for the existence of 2 registry keys. Then sets them to disable Spectre Mitigation. Script will report the result of these checks. More information here. Can Report using $Spectre2$. Use the following video to setup reports based on script tags.
Read MoreScripts checks for 2 registry keys to be set to disable patching. If the machine is a server, there will be a 3rd registry key that will be checked (removed). Script will report the result of these checks. Can Build a Report using $MeltSpecPatch$. Use the following video to setup reports based on script tags.
Read MoreInstalls PS module and runs powershell command Get-SpeculationControlSettings. Outputs the results to a file and reports to the procedure log. Procedure log will indicate if patching may be required. Should work on Powershell 3.0 or later. Results are saved to custom variable (“updateSystemInfo” lines will need to be edited to link to your variable). It…
Read More- « Previous
- 1
- 2
- 3
- 4
- Next »