There are several components in Windows 7 SP1 still bearing the 7600.16384 version number. Pretty normal. There are even downlevel files from later OS (mostly from 10). Since the introduction of the SxS (Side by Side) Store, there really aren't that much reasons to check versions manually. DLL hell ended with NT 5.x (XP/2003).
darrianpalmeraeu: It's still relevent. And yes- it checks things at an update level (not individual files), but how else would you update the files?
About MRT update... What purpose of file windows-kb890830-x64-v5.43-delta_99b8ab35c0a3823b8de3faccbe6335c0fa1e2a26.exe?
Delta patch to convert previous installed MRT.exe to current version, instead downloading whole new MRT.exe
I had the same question, i.e. if KUC is still relevant. I am new to KUC, although I think I understand well WU and the underlying technologies. Thank you for clarifying.
I would like to elaborate on the package 567 removal step part because, as expected by abbodi, it's no a trivial task. However it can be done and here are the steps for those interested. The above quote refers to offline updating a x64 image. Assuming abbodi's script has finished and the image is still mounted (otherwise mount it): 1. Open a command prompt with TrustedInstaller privileges. I used NSudo for this. 2. Run the following batch of commands. Be sure to edit "_mount_point" variable to match your image mount path: Spoiler Code: @echo off cls set _mount_point=YOUR_MOUNT_PATH_HERE echo. echo Loading hive: SOFTWARE... reg load HKLM\_WIM_SOFTWARE "%_mount_point%\Windows\System32\config\SOFTWARE" echo. echo Editing hive: SOFTWARE... set _rCBS=HKLM\_WIM_SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing set _UTCp=Package_567_for_KB3207752~31bf3856ad364e35~amd64~~6.1.1.3 reg add "%_rCBS%\Packages\%_UTCp%" /v "Visibility" /t REG_DWORD /d "1" /f reg add "%_rCBS%\Packages\%_UTCp%" /v "DefVis" /t REG_DWORD /d "2" /f reg delete "%_rCBS%\PackagesPending\%_UTCp%\Owners" /f echo. echo Unloading hive: SOFTWARE... reg unload HKLM\_WIM_SOFTWARE 3. You can now close the TI comand prompt and open a standard administrator one, the following command will remove package 567: Spoiler Code: dism /Image:YOUR_MOUNT_PATH_HERE /Remove-Package /PackageName:Package_567_for_KB3207752~31bf3856ad364e35~amd64~~6.1.1.3 The image can be unmounted. I've tested such an image and no traces of UTC, i.e. the following targets in latest version of abbodi's block script simply don't exist: Spoiler Code: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Appraiser HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\ClientTelemetry HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController DiagTrack service HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\AutoLogger-Diagtrack-Listener HKLM\SYSTEM\CurrentControlSet\Control\WMI\AutoLogger\Diagtrack-Listener HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection %ProgramData%\Microsoft\Diagnosis Microsoft Compatibility Appraiser task Note: "Appraiser" stuff come from 2952664 which is not included in image (W10 updates set to OFF in abbodi's update script) Note: For x86 the package is Package_412_for_KB3207752~31bf3856ad364e35~x86~~6.1.1.3.mum Sadly, in addition to UTC component it also deploys "Microsoft-Windows-CAPI2-WeakCrypto" component. I guess that the only side-effect in removing package 412 will be making an older version of the second component (in a previous update) to "win" instead of the (newer?) version in 3207752, but I've not tested this. Hope this helps.
New blog post on Technet, nothing significantly new but nicely put in one place. There is something new though, a promise for a revised KB3125574 later in the year. Few issues with the procedure as you can see in the comments. Some of our friends here got a mention as well. ttps://blogs.technet.microsoft.com/astoica/2017/01/03/windows-7-refreshed-media-creation/ Please put an "h" in front of the URL, still cannot post URLs.
I don't see anywhere recently KB2775511 being discussed. This is the "Enterprise rollup", or the first "SP2" for Windows 7 and 2008 R2. The question is if KB3125574 include KB2775511. There is a mention from Michael Niehaus here ttps://blogs.technet.microsoft.com/windowsitpro/2016/05/17/simplifying-updates-for-windows-7-and-8-1/ He says: "Michael Niehaus May 18, 2016 at 9:34 pm The convenience update does include the fixes from KB 2775511, so this does supersede that update." I don't see it in the supersedence relationship in the Catalog and I am wondering if anybody did a full comparison of the 2 rollups to confirm or contradict Michael's statement on the Technet blog.
I'm not sure if I asked this already because I can't find it. How different are the monthly and security only rollups for .NET? Are the .NET monthly rollups OK to install or should I be using the security only rollups?
So far, nothing same components in both .NET updates are generally safe but for constancy, maybe it's better to match the general update model if you use Security Only for Windows, use Security Only for .NET likewise for Rollups
Alrighty then. Looks like I'm going to have to hit up the MS Update Catalog every month then because for the some reason the the security only .NET rollups don't show up in a WUMT offline scan.
Greetings, while I have been successfully able to get updates automatically on my Windows 7 install for quite some time now, however there are a few recent updates that I have not been able to complete as the download will not start. The updates seem to be left hanging with no data downloaded. The following files are the updates in question: December, 2016 Security and Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 on Windows 7 and Windows Server 2008 R2 for x64 (KB3205402) December, 2016 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB3207752) Definition Update for Windows Defender - KB915597 (Definition 1.233.3603.0) I need to know.. Why are these updates not downloading, and is it safe to manually download these from MS sites and install them?