When I miss at least one cumulative update on one of my Windows 10 or Windows Server 2019 installations I often get the situation that after installing seemingly all pending updates and rebooting first the Windows Update GUI says the system is up to date but as soon as I click the check for updates button it finds a whole bunch of further updates. I can install these right away without issues but that really is annoying and time consuming and also requires a second reboot right after the first one...
(I'm assuming this is already answered somewhere out there but searching for it really seems hard since tons of other Windows Update topics pop up. But I'd also be grateful for any link or reference.)
No you can not force all the updates at one time. Sometimes updates are applied to other updates. It is updating as far as it can in one go, rechecking for any newer updates that can now be applied and then repeating the cycle until you are caught up. The best thing to do is be updating more often so they don't accumulate.
The good part is that this software greatly lessens the pain involved with updating several systems. Simply use one computer to download ALL patches for your OS and drag the whole folder to a big enough USB-stick.
I have seven PCs all running Windows 10 Pro. Windows Update has updated five of them to 22H2 however two PCs are still stuck on 21H2. Oddly enough, those are two of the newer PCs (and they are both Win 11 ready).
Since the computers are Windows 11 ready, as soon as you have finished installing Windows 10 22h2 and rebooted use your preferred method to make sure Windows 11 is not offered. I would use GRC InControl.
I have a similar problem. I am running Windows 10 on a Dell desktop that is not ready for Windows 11. I am running Windows 10 21H1 (verified by WINVER). When I check for updates, Windows tells me that I am up to date. I know that support for 21H1 has a finite life. How can I force an update to 21H2? Can I use the patch solution discussed above?
Hi all, I onboarded a non-technical friend to Enpass Windows and Android. She used Biometric sign-in for a while - until Enpass simply stopped offering to use Windows Hello and biometrics on Windows AND Android for no obvious reason.
(Why does that even happen?)
She always signs in to her device using biometrics, so she is authenticated and trusted. Also, her device is trusted. And Windows Hello is, by definition, MFA. So it should be significantly safer than the master password alone. How can we force Windows Hello unlock instead of Master-Password?
2. I understand the master password is gone, permanently. And no one on the planet can help us recover it. Which is why I didn't ask to recover the master password, I asked to restore biometric sign-in, which is already established on trusted devices and works fine for all other apps.
3. I am quite familiar with Windows Hello. AFAIK, it does not signal failed sign-in attempts to the requesting service, only successful ones. Enpass can't know whether sign-in failed or not. Especially not on devices with Hello Face Recognition, where there is always a fall-back to the device PIN, making Hello sign-in 100% successful every time.
5. Windows Hello is, by definition SAFER than Enpass Master Password. Device-based biometrics (on Android also) are, by definition, Multi-Factor, whereas the Master Password is single-factor. So by turning Biometric MFA off without user consent, you weaken security. Also without user consent.
Claiming that you are improving security by periodically requiring the master-password and defaulting to single-factor-auth. seems counter-intuitive.
a.) Provide an unsupported private build (!) for me/us that has Windows Hello force-enabled. We will use this to re-gain access and set a new master-password. After that, we re-install a supported public build from the Store/Play.
b.) Change Enpass to NEVER disable biometric MFA without user consent. At the very least, provide a user-configurable option, which, by default, is set to NEVER disable biometric MFA, regardless of the circumstances. Make sure that when this update rolls out, it will automatically re-enable biometric sign-in wherever it was turned off.
Alternatively, move the vault-unlock sign-in into the app, so that we can start the app and access the settings without unlocking the vault. Require vault sign-in when the user wants to access their vault, not before the app starts.
Due to the nature of Enpass being an offline password manager, it is important to create a strong but memorable password that you do not store anywhere that it could be discovered. Enpass cannot recover lost or forgotten Master Passwords. All your data is under your exclusive control. If your Master Password is lost, Enpass should be reset so you can start over as a new user.
Although we provide our users with the advantage of accessing the app through various means like PIN/Face ID/biometrics, we strongly recommend remembering your master password and keeping it safe. Having said that, I have duly noted your comments for future consideration.
However, I don't see how turning Windows Hello off will let us re-gain access to the app? We do not remember the master password, since, for a long time, it was not necessary. And users being human tend to forget stuff they don't use for a longer time.
Also, if my data is under my exclusive control, then do not meddle in the authentication mechanisms I choose for my data. Turning off biometrics without warning, user consent or any recourse is highly disruptive to say the least, and ultra-destructive in the worst case.
Do you realize this is like my bank removing access to my money and other valuable property without my consent?
The moment I switch my authentication of choice to the OS' biometric MFA framework (based on your advertised functionality), the master password became obsolete. With Enpass unilaterally reverting that choice, you have blocked access to valuable (potentially vital!) data. Selecting my authentication method to my data should not be Enpass' choice, it should be mine.
No place in your documentation, guides, FAQ or even this forum seem to indicate that Windows Hello simply turns off ever so often. Your claim above "For security purposes, Enpass may occasionally prompt you to enter your master password or in certain situations, like after unsuccessful verification attempts via Face ID/biometrics/Windows Hello." is undocumented. Hence, you took a supported feature away.
Please don't force me to post this circumstance to Google Play and MS Store reviews. But I will, as Enpass currently seems to be a positive danger to use. I will also switch my own keystore to something I can rely on 100% and stop recommending Enpass to clients, friends and family.
But obviously, Enpass does NOT. While all other apps and services happily use Windows Hello on all my devices, Enpass appears to be the only one that arbitrarily decides to stop using it - locking unsuspecting, non-technical users out of their most important assets: their digital access methods.
And judging by Abishek's responses it seems to be "by design". That is, apologies for the ranting and venting, stupid. Every security expert will tell you these days that invalidating access periodically (reasons are irrelevant) and forcing users to re-new or re-configure their access is a security RISK. Because it encourages users to (re-)use simple, easy to remember passwords instead of complex passwords that they can set and forget. Or better yet, not use passwords at all any more.
Does anyone knows how to use Windows 10/11 policy to force all Windows updates and security patches without user interactions. We do not have a Domain but use Workgroup instead. I need to setup a policy on this individual computers to download and install the updates automatically without the needing to go and click to download and install now.
My problem is that about 50% of the time, windows (main application windows and sub windows of applications) will open on the secondary window. These are 32" displays so I have to stretch my head just to look where it opened and bring the window back to my primary monitor.
Does anyone know of a way to force a workstation to use a specific DHCP
server ? I'm just into a situation where a Windows Server 2003 have DHCP
server active and the phone system also have DHCP server active.Several workstations keeps getting their IP information from the phone DHCP
server rather than the Windows 2003 DHCP server. I know the real fix is to kill the DHCP server on the phone system but our
phone provider need to use the DHCP server for the phone configuration.Any ideas are welcome.Thank you !Tanguy Brasseur
You already know the answer. And no, you can't make a machine use a specific
DHCP. You can play around with DHCP vendor and other options, but to please
the phone vendor? Ask the phone vendor what specifically is the phone system
looking for DHCP options-wise.If they can't answer that question, then your only course of action is to
put the phone system on a separate switch with their own subnet. I think I
would have probably done that just to keep them separate, however I've
worked in environments with an Avaya phone system on the same subnet as
other machines, and we simply used Windows DHCP and set specific vendor
options at Avya's direction in regards how to set it up.--
AceThis posting is provided "AS-IS" with no warranties or guarantees and
confers no rights.Please reply back to the newsgroup or forum for collaboration benefit among
responding engineers, and to help others benefit from your resolution.Ace Fekay, MCT, MCITP EA, MCTS Windows 2008 & Exchange 2007, MCSE & MCSA
2003/2000, MCSA Messaging 2003
Microsoft Certified TrainerFor urgent issues, please contact Microsoft PSS directly. Please check
for regional support phone numbers.