Update KB4493464 (Build 17134.706) for Windows 10, version 1803

1 Star2 Star3 Star4 Star5 Star (No ratings yet)
Loading...

DOWNLOAD pass”123″

Microsoft released cumulative update KB4493464 (Build 17134.706) for Windows 10 April 2018 Update (version 1803) and Windows Server 2016 (1803) as part of the April Tuesday patches

Microsoft released KB4493464 update package for Windows 10 version 1803 (April 2018 Update) based on x86, x64 (amd64), ARM64 and Windows Server 2016 (1803) processors for x64-based systems.

Installing via Windows Update

Cumulative update 4493464 for PC is installed automatically through Windows Update. To test, go to the Options > Update and Security menu and click Check for Updates. To complete the installation, you will need to restart the computer. After updating the build number, Windows 10 will change to 17134.706.

Installing and configuring Windows 10 updates

Download update KB4493464

You can also download the update from the Microsoft Update Catalog and install it manually using the link below:

Download KB4493464

To install an MSU file, simply double-click on the file. You can apply additional parameters (for example, /silent for a background installation) —the installation of the MSU update package.

Improvements and fixes KB4493464 (17134.706)

This update includes quality updates. New features of the system are not presented. List key changes:

  • Risk reduction measures for Specter Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754) for a VIA-based PC are presented. Protective measures are enabled by default for Windows client computers, but are disabled for & nbsp; Windows Server servers. Detailed information about these risk mitigation measures is available at & nbsp; KB4073119 & nbsp; for Windows client machines and in & nbsp; KB4072698 & nbsp; for Windows Server.
  • Fixed a stop error that occurred when trying to start an SSH client on the Windows subsystem for Linux (WSL) with agent redirection enabled using the command line key ( ssh –A ) or the configuration parameter.
  • Fixed an issue that caused applications that use & nbsp; MSXML6 to stop working if an exception occurred during operations with nodes.
  • Fixed a problem that caused the Group Policy Editor to hang when editing a Group Policy Object (GPO), which contains an additional set of Group Policy Group Policy Preferences (GPP) functions for Internet Explorer 10 browser settings.
  • Fixed an issue that occurred when enabling end-user-defined characters (EUDC). The system stopped working and a BSOD appeared while attempting to boot.
  • Security updates for & nbsp; Microsoft Scripting Engine, Windows App Platform and Frameworks, Windows storage and file systems, Windows Server, Windows Graphics, Windows Input and Composition, Windows kernel, Windows virtualization, Windows MSXML and Microsoft JET Database Engine. & nbsp;

If you installed previous updates, this time only new changes will be applied to the cumulative package.

Known promlems

After installing the update, & nbsp; custom URI schemes for application protocol handlers may not launch the corresponding application for the local Intranet and trusted sites in Internet Explorer.

Right-click the URL link to open it in a new window or tab.

OR

Enable Protected Mode in & nbsp; Internet Explorer for trusted sites and intranet sites.

  1. Go to Tools > Browser Properties> Security
  2. In the zone selection window, select “Intranet Location” and turn on the “Enable Protected Mode” checkbox.
  3. In the zone selection window, select Trusted Sites and turn on the Enable Protected Mode checkbox.
  4. Click OK.

Restart your browser to apply the changes.
Microsoft is working on a solution and will present it in future releases.

After installing the update, you may have problems using the PXE environment to launch the device from a Windows Deployment Services (WDS) server configured to use the & nbsp; Variable Window Extension. The problem leads to a sudden disconnection from the WDS server when the image is loaded and does not affect devices and client systems that do not use the & nbsp; Variable Window Extension.

To solve the problem, disable & nbsp; Variable Window Extension on the WDS server using the following methods:

1. Run a command prompt with administrator rights and enter: 

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

2. Use the Windows Deployment Services interface:

  • Open  Windows Deployment Services from admin tools.
  • Expand the server list and select the WDS server
  • Open the properties and on the  TFTP tab, disable the  Enable Variable Window Extension

3. Create a registry key and set the value to 0:

HKLM\System\CurrentControlSet\Services\WDSServer\Providers\WDSTFTP\EnableVariableWindowExtension

Restart the & nbsp; WDSServer service after making the changes.

Microsoft is working on a solution and will present it in future releases.

DOWNLOAD pass”123″


You can download the file below:

x64 download update
x86 download update
ARM64 download update
Windows Server 2016 download update