A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Microsoft Windows 7 » Windows 7 Forum
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)



 
 
Thread Tools Rate Thread Display Modes
  #1  
Old March 2nd 18, 09:39 PM posted to alt.windows7.general
No_Name
external usenet poster
 
Posts: 40
Default 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)

On Mon, 26 Feb 2018 14:34:58 -0500, Paul
wrote:

If you want to study "what is missing from my system",
you'd use MBSA 2.3 for that. It only handles "security"
patches, not "Optional" patches.


The following is from MSBA 3.2. It claims "No security updates are
missing."

Searching for "4074598", this update is not listed in the "Windows
Security Updates", "Current Update Compliance"

I downloaded and tried to install each of the following six packages.
They all failed with message "The update is not applicable to your
computer".


2018-02 Security Monthly Quality Rollup for
Windows 7 for x64-based Systems (KB4074598)

2018-02 Security Monthly Quality Rollup for
Windows 7 for x86-based Systems (KB4074598)

2018-02 Security Monthly Quality Rollup for
Windows Embedded Standard 7 for x64-based Systems (KB4074598)

2018-02 Security Monthly Quality Rollup for
Windows Embedded Standard 7 for x86-based Systems (KB4074598)

2018-02 Security Monthly Quality Rollup for
Windows Server 2008 R2 for Itanium-based Systems (KB4074598)

2018-02 Security Monthly Quality Rollup for
Windows Server 2008 R2 for x64-based Systems (KB4074598)


I don't think I've ever had so much trouble from a Windows Update.


2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)

Installation date: ?23/?02/?2018 12:41

Installation status: Failed

Error details: Code 80242016

Update type: Important



Is there some way of un-installing 4074598 so I can try to install it
again?

When I try Control Panel - Programs - Programs and Features -
Installed Updates, it does not show KB4074598 as having been
installed.

Thank you for your help.


.


Security assessment: Potential Risk
Computer name: WORKGROUP\SONYZ
IP address: 192.168.1.64
Security report name: WORKGROUP - SONYZ (02-03-2018 21-11)
Scan date: 02/03/2018 21:11
Scanned with MBSA version: 2.3.2211.0
Catalog synchronization date:
Security update catalog: Microsoft Update


Security Updates Scan Results

Issue: Developer Tools, Runtimes, and Redistributables
Security Updates
Sco Check passed
Result: No security updates are missing.

Current Update Compliance

| MS11-025 | Installed | Security Update for
Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package
(KB2538242) | Important |
| MS11-025 | Installed | Security Update for
Microsoft Visual C++ 2010 Service Pack 1 Redistributable Package
(KB2565063) | Important |
| MS11-025 | Installed | Security Update for
Microsoft Visual C++ 2008 Service Pack 1 Redistributable Package
(KB2538243) | Important |

Issue: Office Security Updates
Sco Check passed
Result: No security updates are missing.

Current Update Compliance

| MS10-079 | Installed | Security Update for
Microsoft Word 2010 (KB2345000), 32-Bit Edition | Important |
| MS10-087 | Installed | Security Update for
Microsoft Office 2010 (KB2289161), 32-Bit Edition | Critical |

Issue: SDK Components Security Updates
Sco Check passed
Result: No security updates are missing.

Current Update Compliance

| MS07-028 | Installed | Security Update for
CAPICOM (KB931906) | Critical |

Issue: SQL Server Security Updates
Sco Check failed (non-critical)
Result: 1 service packs or update rollups are missing.

Update Rollups and Service Packs

| 2546951 | Missing | Microsoft SQL Server
2008 Service Pack 3 (KB2546951) | |

Current Update Compliance

| MS06-061 | Installed | MSXML 6.0 RTM
Security Update (925673) | Critical |

Issue: Silverlight Security Updates
Sco Check passed
Result: No security updates are missing.

Current Update Compliance

| 4023307 | Installed | Security Update for
Microsoft Silverlight (KB4023307) | Critical |

Issue: Windows Security Updates
Sco Check passed
Result: No security updates are missing.

Current Update Compliance

| MS15-118 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB3097989) | Important |
| MS14-046 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2943357) | Important |
| MS15-029 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3035126) | Important |
| 2862152 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2862152) | |
| MS16-055 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3156019) | Critical |
| MS13-007 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2736422) | Important |
| MS15-015 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3031432) | Important |
| MS12-045 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2698365) | |
| MS15-038 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3045685) | Important |
| MS11-075 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2564958) | |
| 2973351 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2973351) | |
| MS13-099 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2892074) | Critical |
| 2813430 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2813430) | |
| MS15-132 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3108371) | Important |
| 3123479 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3123479) | |
| MS15-014 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3004361) | Important |
| MS12-013 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2654428) | |
| MS11-024 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2491683) | |
| 4055532 | Installed | 2018-01 Security and
Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2,
4.7, 4.7.1 on Windows 7 and Server 2008 R2 for x64 (KB4055532) |
Important |
| 3004375 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3004375) | |
| MS12-054 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2705219) | |
| 2984972 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2984972) | |
| MS14-064 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3010788) | Important |
| MS14-066 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2992611) | Critical |
| MS15-117 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3101722) | Important |
| MS14-053 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2973112) | Important |
| 3148851 | Installed | Update for Windows 7
for x64-based Systems (KB3148851) | |
| MS11-053 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2532531) | |
| MS16-072 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3159398) | Important |
| MS16-014 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3126587) | Important |
| MS16-077 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3161949) | Important |
| 2977292 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2977292) | |
| MS15-041 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB3037574) | Important |
| MS13-082 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2861698) | Important |
| MS12-072 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2727528) | |
| MS16-019 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64 (KB3122648) | Important |
| MS12-020 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2621440) | |
| MS16-032 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3139914) | Important |
| MS16-007 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3110329) | Important |
| MS14-068 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3011780) | |
| MS16-055 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3156016) | Critical |
| MS12-033 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2690533) | |
| MS13-004 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2742599) | Important |
| MS15-004 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3020388) | Important |
| MS16-007 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3109560) | Important |
| MS11-076 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2579686) | |
| MS16-082 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3161958) | Important |
| MS16-059 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3150220) | Important |
| MS16-007 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3121461) | Important |
| MS14-009 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2911501) | Important |
| MS14-078 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2991963) | Moderate |
| MS14-007 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2912390) | Critical |
| MS15-088 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3046017) | Important |
| MS12-035 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2604115) | Critical |
| 976932 | Installed | Windows 7 Service Pack
1 for x64-based Systems (KB976932) | |
| MS15-080 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3078601) | Critical |
| 2871997 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2871997) | |
| MS16-047 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3149090) | Important |
| MS12-082 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2770660) | |
| MS11-030 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2509553) | |
| MS13-081 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2862335) | Important |
| MS16-027 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3138910) | Critical |
| MS13-081 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2868038) | Important |
| MS15-132 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3108381) | Important |
| MS15-048 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB3023215) | Important |
| MS15-101 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB3074543) | Important |
| MS13-081 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2864202) | Important |
| MS15-133 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3109103) | Important |
| MS12-020 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2667402) | |
| MS13-027 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2807986) | |
| MS15-060 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3059317) | Important |
| MS16-033 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3139398) | Important |
| MS15-037 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3046269) | Important |
| MS13-081 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2862330) | Important |
| MS11-024 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2506212) | |
| MS13-058 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2847927) | Important |
| MS08-069 | Installed | Security Update for
Microsoft XML Core Services 4.0 Service Pack 2 for x64-based Systems
(KB954430) | Important |
| MS15-028 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3030377) | Important |
| MS12-034 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2676562) | |
| MS14-039 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2973201) | Important |
| MS13-090 | Installed | Cumulative Security
Update for ActiveX Killbits for Windows 7 for x64-based Systems
(KB2900986) | Critical |
| MS14-057 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2972100) | Critical |
| MS15-005 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3022777) | Important |
| MS16-039 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3145739) | Critical |
| MS15-090 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3060716) | Important |
| MS13-081 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2884256) | Important |
| MS14-074 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3003743) | Important |
| MS13-098 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2893294) | Critical |
| MS14-057 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2968294) | Important |
| MS16-104 | Installed | Cumulative Security
Update for Internet Explorer 11 for Windows 7 for x64-based Systems
(KB3185319) | Critical |
| MS15-003 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3021674) | Important |
| MS14-046 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2937610) | Important |
| MS14-026 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2931356) | Important |
| 3033929 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3033929) | |
| 2894844 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2894844) | |
| MS15-109 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3093513) | Critical |
| MS12-004 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2631813) | |
| MS13-052 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64-based Systems (KB2840631) | Important |
| MS15-085 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3071756) | Important |
| MS11-015 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2479943) | |
| 2841134 | Installed | Internet Explorer 11
for Windows 7 for x64-based Systems | |
| MS16-044 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3146706) | Important |
| MS13-029 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2813347) | |
| MS11-085 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2620704) | |
| MS15-080 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 SP1 and Windows Server
2008 R2 SP1 for x64 (KB3072305) | Critical |
| MS16-040 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3146963) | Critical |
| MS11-059 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2560656) | |
| MS15-102 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3084135) | Important |
| MS15-050 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3055642) | Important |
| MS14-043 | Installed | Security Update for
Windows 7 for x64-based Systems (KB2978742) | Critical |
| MS15-082 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3075226) | Important |
| MS15-097 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3086255) | |
| MS15-069 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3067903) | Important |
| MS16-019 | Installed | Security Update for
Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2
SP1 for x64 (KB3127220) | Important |
| 890830 | Installed | Windows Malicious
Software Removal Tool x64 - February 2018 (KB890830) | |
| MS16-007 | Installed | Security Update for
Windows 7 for x64-based Systems (KB3108664) | Important |
Ads
  #2  
Old March 3rd 18, 09:01 AM posted to alt.windows7.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-basedSystems (KB4074598)

lid wrote:
On Mon, 26 Feb 2018 14:34:58 -0500, Paul
wrote:

If you want to study "what is missing from my system",
you'd use MBSA 2.3 for that. It only handles "security"
patches, not "Optional" patches.


The following is from MSBA 3.2. It claims "No security updates are
missing."

Searching for "4074598", this update is not listed in the "Windows
Security Updates", "Current Update Compliance"

I downloaded and tried to install each of the following six packages.
They all failed with message "The update is not applicable to your
computer".


2018-02 Security Monthly Quality Rollup for
Windows 7 for x64-based Systems (KB4074598)


snip

I have a theory as to what the "independent variable" is in this mess.

I did an install of Win7 SP1 on the laptop, and patched it up,
stopping along the way and checking stuff.

I eventually got '598 installed, from WindowsUpdate (didn't need a
copy from catalog.update.microsoft.com).

https://s10.postimg.org/dmpt6ebbt/Wi...pdate_test.gif

So I'm sailing along, installing stuff, and I get 2017-12 done,
and then Windows Update simply won't offer me anything moer.

I actually had to install 2017-12 twice. Once from Windows Update, where
it looked like it worked, but the update history said it failed. I used
the .msu from catalog.update.microsoft.com (204MB or so), and it installed
and passed. The install took less time, as I think it noticed all the
packages were already there in the package folder. Now, the only weird
thing I did, was try to install the "Security Only" version of '598 first,
and it still insisted that I needed to install the "Security Quality"
(which contains "plums" as well as "security updates").

I was looking for MSE Definition files, on the off chance that
I could toss those in and bring MSE definitions up to date.
And instead, I happened to find this in a search. It's a
new version of MSE code, and it happens to set the
QualityCompat registry setting.

https://support.microsoft.com/en-us/...tials-download

Note that, it's an evil EXE, in that it will switch your Windows
Update settings from "Never check..." to "Full Auto". I caught it
before it could rush my controlled experiment. I was doing the
updates in "Never check..." mode so I could control which ones
were getting done. And the mseinstall thing changed the setting.

Once I could find a QualityCompat in Regedit, after mseinstall,
then I knew I would be seeing 2018-02 offered in Windows Update.
I installed from Windows Update and it worked. It says success
and there were no errors.

So the only potential difference between what you did and
what I did, is I used mseinstall. There are many language
links on that page, and I used the English x64 version.

https://download.microsoft.com/downl...mseinstall.exe

And it has the capability to change the Windows Update setting
so watch it.

*******

And the weirdness of it all, is why is "mseinstall.exe" being
delivered outside of Windows Update ? Windows Update didn't
offer that to me, to break the logjam. I had to stumble on
it myself, purely by accident.

Paul
  #3  
Old March 3rd 18, 02:43 PM posted to alt.windows7.general
No_Name
external usenet poster
 
Posts: 40
Default 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)

On Sat, 03 Mar 2018 04:01:46 -0500, Paul
wrote:

I downloaded and tried to install each of the following six packages.
They all failed with message "The update is not applicable to your
computer".


2018-02 Security Monthly Quality Rollup for
Windows 7 for x64-based Systems (KB4074598)


snip

I have a theory as to what the "independent variable" is in this mess.

I did an install of Win7 SP1 on the laptop, and patched it up,
stopping along the way and checking stuff.

I eventually got '598 installed, from WindowsUpdate (didn't need a
copy from catalog.update.microsoft.com).

https://s10.postimg.org/dmpt6ebbt/Wi...pdate_test.gif

So I'm sailing along, installing stuff, and I get 2017-12 done,
and then Windows Update simply won't offer me anything moer.


How do I remove 4074598 from Windows Update history, so I can install
it again?

Regarding;

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\QualityCompat\cadca5fe-87d3-4b96-b7fb-a231484277cc

I give it a value of 0. Is that the correct value for QualityCompat ?

I installed MS security essentials, no difference.

Is it possible to get help from Microsoft in this issue? I'd consider
paying a fee for competent tech support.
  #4  
Old March 3rd 18, 08:31 PM posted to alt.windows7.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-basedSystems (KB4074598)

lid wrote:
On Sat, 03 Mar 2018 04:01:46 -0500, Paul
wrote:

I downloaded and tried to install each of the following six packages.
They all failed with message "The update is not applicable to your
computer".


2018-02 Security Monthly Quality Rollup for
Windows 7 for x64-based Systems (KB4074598)

snip

I have a theory as to what the "independent variable" is in this mess.

I did an install of Win7 SP1 on the laptop, and patched it up,
stopping along the way and checking stuff.

I eventually got '598 installed, from WindowsUpdate (didn't need a
copy from catalog.update.microsoft.com).

https://s10.postimg.org/dmpt6ebbt/Wi...pdate_test.gif

So I'm sailing along, installing stuff, and I get 2017-12 done,
and then Windows Update simply won't offer me anything moer.


How do I remove 4074598 from Windows Update history, so I can install
it again?

Regarding;

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\QualityCompat\cadca5fe-87d3-4b96-b7fb-a231484277cc

I give it a value of 0. Is that the correct value for QualityCompat ?

I installed MS security essentials, no difference.

Is it possible to get help from Microsoft in this issue? I'd consider
paying a fee for competent tech support.


They are supposed to help with Windows Update problems.

They will ask for a credit card for "non-Windows" related
issues. Only certain topics are covered by support. Back in
the old Service Pack days, they would help you install
SP1 on Windows 7, for a period of one year after its release.

But in this case, you have a Windows Update problem and
they should be able to help with that.

The "dism" program has some capabilities, but they
differ between Windows 7 and Windows 10. The first
of these, for example, can cause Windows 10 to back
out a "half-installed" package. In the first command,
the package doesn't have a name, and it's merely
"revert whatever one is broken at the current time".

DISM /image:c:\ /cleanup-image /revertpendingactions

DISM /image:c:\ /remove-package /packagename: etc.

I don't really know with certainty, what works
on Windows 7. The DISM on Windows 7 has some features
missing.

Even one-way packages (Servicing Stack updates), which
are marked "not removable", actually are removable. You
edit the manifest file, and you can change their status
so they can be backed out.

There are all sorts of tricks out there. But I wouldn't
try any of those, until I could determine what is
wrong first. I've not seen a tool yet, that can tell
you in plain English, what is going on.

If you look in the package folder, you'll see (by naming
convention), that one Cumulative contains hundreds or
thousands of individual packages. Somehow, the successes
of each little package are combined to give a status
for the KB. And the true success isn't known until the
reboot, when the system comes back up. Only then can
the installation process conclude "Success".

If this was my system, I'd be looking for the install log
next. And no, the log format isn't all that nice.

https://support.microsoft.com/en-ca/...pdate-log-file

Paul
  #5  
Old March 3rd 18, 09:04 PM posted to alt.windows7.general
No_Name
external usenet poster
 
Posts: 40
Default 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)

On Sat, 03 Mar 2018 15:31:44 -0500, Paul
wrote:

Is it possible to get help from Microsoft in this issue? I'd consider
paying a fee for competent tech support.


They are supposed to help with Windows Update problems.


I spoke to MS's Indian tech support today. They basically said there
was a fault in the files for that update, and I shouldn't worry about
it, even without installing KB4074598 my computer would continue to
work and "you're good to go".

When I manually download and try to install each of the six install
packages for KB4074598, each time it tells me it's not suitable for my
computer. Hence, when the automatic Windows Update process tries to
install the appropriate package, it fails.

I'm tempted to simply give up trying to install this update KB4074598.
It's just too much effort trying to get it to work.

The "dism" program has some capabilities, but they
differ between Windows 7 and Windows 10. The first
of these, for example, can cause Windows 10 to back
out a "half-installed" package. In the first command,
the package doesn't have a name, and it's merely
"revert whatever one is broken at the current time".

DISM /image:c:\ /cleanup-image /revertpendingactions

DISM /image:c:\ /remove-package /packagename: etc.

I don't really know with certainty, what works
on Windows 7. The DISM on Windows 7 has some features
missing.


When I try; DISM /image:c:\ /cleanup-image /revertpendingactions

it says;

C:\Windows\system32DISM /image:c:\ /cleanup-image /revertpendingactions

Deployment Image Servicing and Management tool
Version: 6.1.7600.16385


Error: 87

The /Image option that is specified points to a running Windows installation.
To service the running operating system, use the /Online option. For more inform
ation, refer to the help by running DISM.exe /Online /?.

The DISM log file can be found at C:\Windows\Logs\DISM\dism.log

C:\Windows\system32


When I try; DISM /online /cleanup-image /revertpendingactions

C:\Windows\system32DISM /online /cleanup-image /revertpendingactions

Deployment Image Servicing and Management tool
Version: 6.1.7600.16385

Image Version: 6.1.7601.18489

Reverting pending actions from the image...

Error: 50

This operation is only supported against an offline image.

The DISM log file can be found at C:\Windows\Logs\DISM\dism.log

C:\Windows\system32


When I try; DISM /image:c:\ /remove-package KB4074598

C:\Windows\system32DISM /image:c:\ /remove-package KB4074598

Error: 87

DISM doesn't recognize the command-line option "KB4074598".
For more information, refer to the help by running DISM.exe /?.

The DISM log file can be found at C:\Windows\Logs\DISM\dism.log

C:\Windows\system32


Advice? ty
  #6  
Old March 3rd 18, 09:19 PM posted to alt.windows7.general
No_Name
external usenet poster
 
Posts: 40
Default 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)

and the following;

C:\Windows\system32DISM /online /remove-package:KB4074598

Deployment Image Servicing and Management tool
Version: 6.1.7600.16385

Image Version: 6.1.7601.18489

An error occurred trying to open - KB4074598 Error: 0x80070003

Error: 3

The system cannot find the path specified.

The DISM log file can be found at C:\Windows\Logs\DISM\dism.log

C:\Windows\system32

  #7  
Old March 3rd 18, 09:37 PM posted to alt.windows7.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-basedSystems (KB4074598)

lid wrote:

When I try; DISM /image:c:\ /cleanup-image /revertpendingactions

it says;

C:\Windows\system32DISM /image:c:\ /cleanup-image /revertpendingactions

Deployment Image Servicing and Management tool
Version: 6.1.7600.16385


Error: 87

The /Image option that is specified points to a running Windows installation.
To service the running operating system, use the /Online option. For more inform
ation, refer to the help by running DISM.exe /Online /?.

The DISM log file can be found at C:\Windows\Logs\DISM\dism.log

C:\Windows\system32


When I try; DISM /online /cleanup-image /revertpendingactions

C:\Windows\system32DISM /online /cleanup-image /revertpendingactions

Deployment Image Servicing and Management tool
Version: 6.1.7600.16385

Image Version: 6.1.7601.18489

Reverting pending actions from the image...

Error: 50

This operation is only supported against an offline image.

The DISM log file can be found at C:\Windows\Logs\DISM\dism.log

C:\Windows\system32


When I try; DISM /image:c:\ /remove-package KB4074598

C:\Windows\system32DISM /image:c:\ /remove-package KB4074598

Error: 87

DISM doesn't recognize the command-line option "KB4074598".
For more information, refer to the help by running DISM.exe /?.

The DISM log file can be found at C:\Windows\Logs\DISM\dism.log

C:\Windows\system32


Advice? ty


To start with, I'm not recommending you try it that way.

I would only do it that way if I backed up C: and was willing
to restore after it failed in some way.

To do it offline, you:

1) Boot the installer DVD or the emergency boot CD that Windows 7 Backup
makes for you. There is a repair option that opens a Command Prompt
for you.

2) Then use the offline format.

DISM /image:c:\ /remove-package KB4074598

Then you boot from optical media, and ask for the Command Prompt option,
the "OS" it boots from is X:\ . The drive letters don't always have to
be in the order you think. You need to use the "dir" command and check
each drive letter, until you've assured yourself the letter is actual
C: that you want and not D: . I have at least one setup here, where
that DISM command uses D: .

Offline operations like that are normally used for "bricked"
systems, where you're trying to repair the OS while it's not in usage.
That's why I'm not placing a lot of weight on that option.
Sure, it's available. If you want to experiment, take precautions
and try it out for fun. I'm not convinced though, that it'll
fix everything up for you. With computers though, you never
know what will happen. That's part of the "fun" I guess.

One of the reasons I keep my C: partition small, is to make it
easy to back up. As an experimenter, I do temp backups *a lot*.

Even while I was running my Windows 7 test on the laptop,
I did two backups so I could revert quickly part way along
the way. I think the backup size (stored on another machine)
was only 9GB compressed each. That's what makes experiments
like this possible. A good safety net. With Macrium, I can
restore from a file share, so the backup doesn't even have
to be stored locally.

Paul
  #8  
Old March 3rd 18, 09:49 PM posted to alt.windows7.general
No_Name
external usenet poster
 
Posts: 40
Default 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)

On Sat, 03 Mar 2018 16:37:50 -0500, Paul
wrote:

To do it offline, you:

1) Boot the installer DVD or the emergency boot CD that Windows 7 Backup
makes for you. There is a repair option that opens a Command Prompt
for you.

2) Then use the offline format.

DISM /image:c:\ /remove-package KB4074598

Then you boot from optical media, and ask for the Command Prompt option,
the "OS" it boots from is X:\ . The drive letters don't always have to
be in the order you think. You need to use the "dir" command and check
each drive letter, until you've assured yourself the letter is actual
C: that you want and not D: . I have at least one setup here, where
that DISM command uses D: .

Offline operations like that are normally used for "bricked"
systems, where you're trying to repair the OS while it's not in usage.
That's why I'm not placing a lot of weight on that option.
Sure, it's available. If you want to experiment, take precautions
and try it out for fun. I'm not convinced though, that it'll
fix everything up for you. With computers though, you never
know what will happen. That's part of the "fun" I guess.


I think I'm going to follow MS's advice and give up trying to install
the package. It's just too much trouble.

Thank you for your advice.
  #10  
Old March 6th 18, 06:54 AM posted to alt.windows7.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default 2018-02 Security Monthly Quality Rollup for Windows 7 for x64-basedSystems (KB4074598)

lid wrote:
On Sat, 03 Mar 2018 16:37:50 -0500, Paul
wrote:

To do it offline, you:

1) Boot the installer DVD or the emergency boot CD that Windows 7 Backup
makes for you. There is a repair option that opens a Command Prompt
for you.

2) Then use the offline format.

DISM /image:c:\ /remove-package KB4074598

Then you boot from optical media, and ask for the Command Prompt option,
the "OS" it boots from is X:\ . The drive letters don't always have to
be in the order you think. You need to use the "dir" command and check
each drive letter, until you've assured yourself the letter is actual
C: that you want and not D: . I have at least one setup here, where
that DISM command uses D: .

Offline operations like that are normally used for "bricked"
systems, where you're trying to repair the OS while it's not in usage.
That's why I'm not placing a lot of weight on that option.
Sure, it's available. If you want to experiment, take precautions
and try it out for fun. I'm not convinced though, that it'll
fix everything up for you. With computers though, you never
know what will happen. That's part of the "fun" I guess.


I think I'm going to follow MS's advice and give up trying to install
the package. It's just too much trouble.

Thank you for your advice.


Just for fun, I was wondering whether it was possible to record
an entire Windows Update. And I discovered that Sysinternals Process
Monitor can do it. ProcMon has a Boot Trace option, which I've used before
while tinkering. And it records what happens when the system boots.

But it turns out, you can also leave Procmon running at shutdown
time too. I changed the recording mode from "RAM backing store"
the default, to ProcMon using a file for backing. Then, when you reach for
the controls and reboot the system, Procmon nicely closes the
current trace file. Then, when the system reboots, Procmon is
recording the Boot Trace. And it won't stop recording the Boot Trace
until you run Process Monitor again, when it will harvest the Boot
Trace it's been running on.

This gave me around 6GB of files, in two sets. The shutdown set. The startup set.

I won't go into the details of carving that mess. I carved a file log
for myself (what files are being touched). And a registry log (boring,
too much data!).

One thing I found, was a rather large...

C:\Windows\Logs\CBS\CBS.log

file. That one rolls over and starts a new file when it
gets big enough. There must be 10MB of new logs in that file
or so, related to 4074598.

I took one of the interesting identifiers from the CBS log, and
Googled it. And found this article, where a security catalog
made all the downloaded files look like they were corrupted.

http://www.tweaking.com/forums/index.php?topic=3310.0

So rather than bore you with more theories, I'd suggest a
look in that file as a start.

*******

Another curious aspect, is some "Fix" is applied, before the main
..cab is unpacked (after the download). I think BITS builds the .cab
from parts, and the download is not monolithic. It's built of a thousand
tiny pieces.

2018-03-04 17:31:41, Info CBS Disabling LKG boot option
2018-03-04 17:31:41, Info CBS Client specifies CbsMovePayload, or client is Windows Update, will move payload to system.
2018-03-04 17:31:41, Info CBS Appl: detect Parent, Package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3,
Parent: Microsoft-Hyper-V-WinPE-Drivers-Package~31bf3856ad364e35~amd64~~6.1.7601.17514,
Disposition = Detect, VersionComp: EQ, ServiceComp: GE, BuildComp: EQ, DistributionComp: GE, RevisionComp: GE, Exist: present
2018-03-04 17:31:41, Info CBS Appl: detectParent: package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3,
no parent found, go absent
2018-03-04 17:31:41, Info CBS Appl: detect Parent, Package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3,
Parent: Microsoft-Windows-Common-Drivers-Package~31bf3856ad364e35~amd64~ar-SA~6.1.7601.17514,
Disposition = Detect, VersionComp: EQ, ServiceComp: GE, BuildComp: EQ, DistributionComp: GE, RevisionComp: GE, Exist: present
2018-03-04 17:31:41, Info CBS Appl: detectParent: package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3,
no parent found, go absent
2018-03-04 17:31:41, Info CBS Appl: detect Parent, Package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3,
Parent: Microsoft-Windows-Common-Drivers-Package~31bf3856ad364e35~amd64~en-US~6.1.7601.17514,
Disposition = Detect, VersionComp: EQ, ServiceComp: GE, BuildComp: EQ, DistributionComp: GE, RevisionComp: GE, Exist: present
2018-03-04 17:31:41, Info CBS Appl: detectParent: package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3,
parent found: Microsoft-Windows-Common-Drivers-Package~31bf3856ad364e35~amd64~en-US~6.1.7601.17514, state: Installed
2018-03-04 17:31:41, Info CBS Appl: detect Parent, Package: Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3,
disposition state from detectParent: Installed
2018-03-04 17:31:41, Info CBS Appl: Evaluating package applicability for package Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3,
applicable state: Installed
2018-03-04 17:31:42, Info DPX Started DPX phase: Resume and Download Job
2018-03-04 17:31:42, Info DPX Started DPX phase: Apply Deltas Provided In File
2018-03-04 17:32:20, Info DPX Ended DPX phase: Apply Deltas Provided In File
2018-03-04 17:32:20, Info DPX Ended DPX phase: Resume and Download Job

2018-03-04 17:32:20, Info CBS Extracting all files from cabinet \\?\C:\Windows\SoftwareDistribution\Download\7e79b c8b7d53185e7a729c71075a872c\Windows6.1-KB4074598-x64-EXPRESS.cab

*******

From this file:

C:\Windows\WindowsUpdate.log

I get a short log. These are the highlights.

Process kicks off (it still has to do the ~200MB download). This is when
I started my Windows Update session to install 4074598.

2018-03-04 17:31:00:978 252 a98 AU AU received approval from Ux for 1 updates

Last entry before reboot. (All files loaded, PendMoves all set up.)

2018-03-04 17:39:44:936 252 918 Report REPORT EVENT: {BBA17C99-97EE-4207-A5E2-49B47CA1AB42}
2018-03-04 17:39:39:929-0500 1 181 101 {73D175EA-2483-46D4-A8E3-1832178EB474}
200 0 AutomaticUpdates Success Content Install
Installation Started: Windows successfully started the following update:
2018-02 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4074598)

After reboot. That gives me a timestamp to look for in my 6GB trace.

2018-03-04 17:43:35:193 492 b28 Handler Requesting post-reboot reporting for package
Package_for_RollupFix~31bf3856ad364e35~amd64~~7601 .24055.1.3.
2018-03-04 17:43:35:193 492 b28 Handler Completed install of CBS update with
type=3, requiresReboot=1, nstallerError=0, hr=0x0

2018-03-04 17:43:35:224 252 8a8 AU ## RESUMED ## AU: Installing update
[UpdateId = {73D175EA-2483-46D4-A8E3-1832178EB474}, succeeded]

Now, that means the C:\Windows\WindowsUpdate.log is written *one minute*
before ProcMon starts logging the BootUp :-/ Which means my damn
trace didn't catch the "good stuff". It's what you'd expect, as
some file moving that happens during the "spinning balls" phase,
you wouldn't want the OS to actually be running at the time.

Anyway, the summary of this post, is to check those two files for interesting stuff.

HTH,
Paul
 




Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off






All times are GMT +1. The time now is 10:08 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.