Microsoft releases new patches for older versions of Windows 10

Microsoft released new patches for Windows 10 versions 1809, 1803, 1709, and 1703 yesterday. These new optional updates bring the same quality fix for a bug that was introduced in a previous series of patches released for these versions of Windows 10 in late May.

Here’s what Microsoft said about this single fix in the changelog for the build 17763.593 (KB4509479) for Windows 10 version 1809. Again, the exact same fix is also available for Windows 10 versions 1803, 1709, and 1703:

  • Addresses an issue that may prevent devices from connecting to some Storage Area Network (SAN) devices using Internet Small Computer System Interface (iSCSI) after installing KB4497934. You may also receive an error in the System log section of Event Viewer with Event ID 43 from iScsiPrt and a description of “Target failed to respond in time for a login request.”

Be aware that the patches for the versions 1709, 1703 of Windows 10 are only be available for Enterprise and Education users, as Home and Pro users are no longer receiving servicing. In the release notes for Windows 10 version 1809, Microsoft also reiterated that users still running Windows 10 version 1803 or older will soon receive the latest feature update that’s available for their device.

Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 feature update based on device compatibility and Windows Update for Business deferral policy. This doesn’t apply to long-term servicing editions.

As a reminder, Windows 10 version 1803 will reach end of service on November 12, 2019 for Home and Pro editions, and Microsoft announced last week that it will be using a machine learning model for updating PCs running the version 1803 or older to the latest Windows 10 release. By automatically initiating a feature update on PCs reaching end of service, Microsoft is making sure that these devices will keep receiving security updates.

Share This
Further reading: , , , , ,