Fix: Outlook does not support connections to Exchange ActiveSync

While trying to connect your Outlook account with Exchange by using ActiveSync protocol the users may get the Outlook does not support connections to exchange by using ActiveSync error. This error is commonly caused if the Outlook does not support connection to a server that is running Exchange server. A similar discussion can also be read on the Microsoft Community forum.

On the same Windows 8 Pro machine, on the same user account – Windows Mail app is connected successfully to my corporate e-mail account (‘Outlook‘ account type, use SSL connection, domain and user name specified).

In Outlook 2013 the same account can’t be connected (selecting ‘ActiveSync’ account type, specifying server name and user name, however there are no options to specify SSL and domain) – getting error message ‘Log onto Exchange ActiveSync mail server (EAS): The server cannot be found.’

Follow the steps listed in the article below to fix Outlook server issue with ActiveSync and Exchange.

Is the Exchange Activesync supported by Outlook?

1. Connect to Exchange using Standard Exchange Connection

  1. Launch the Outlook desktop app.
  2. Click on File and then click on Add Account button.

    outlook does not support connections to exchange by using activesyncoutlook does not support connections to exchange by using activesync
  3. Enter your email address and click Connect.outlook does not support connections to exchange by using activesyncoutlook does not support connections to exchange by using activesync
  4. Now you will be asked to enter your password again. Enter the password, and click OK.
  5. Click Finish to connect to exchange using standard exchange connection.
  6. Trying to set up your email account manually can create issues like the one mentioned earlier. Try to set up the email account normally and check if the error is resolved.

Deal with spam mails for good with these Exchange anti-spam software for Exchange email server.


2. Configure Outlook 2013 / 2016 Manually

  1. If you want to configure Outlook for Exchange by using ActiveSync do the following.
  2. Launch the Outlook desktop client.
  3. Choose “New Email Account“.
  4. Select “Manual setup or additional server types“.

    outlook does not support connections to exchange by using activesyncoutlook does not support connections to exchange by using activesync
  5. Select “Exchange ActiveSync“.
  6. Now you need to fill in the server setting. The username can be in Domainusername format.
  7. Now press and hold the Enter key on the Keyboard until all the boxes go away.
  8. Once the connection goes through. Launch the Outlook client and check if the error is resolved.

For Outlook 2016 / Office 365

  1. Launch the Outlook client in your Windows system.
  2. Click on File and select Add Account.
  3. Now enter the email address for the account and click the Advanced Options.
  4. Select “Let me set up my account manually” option.

    outlook does not support connections to exchange by using activesyncoutlook does not support connections to exchange by using activesync
  5. Click the Connect button.
  6. Select “Exchange” option.

    outlook does not support connections to exchange by using activesyncoutlook does not support connections to exchange by using activesync
  7. Enter the password for your ID and check if the connection is established without any error.

The EAS protocol provides access to data in exchange mailboxes thus keeping all of your connected devices in sync. Since EAS connection does not provide all the features of an Exchange account, Outlook does not support this method resulting in the error.

RELATED STORIES YOU MAY LIKE:

Related:

  • No Related Posts

Avoid embarrassing mistakes: How to recall an email in Outlook

Outlook Windows 10

How to recall an email in Outlook

Recalling an email in Outlook can save you from many awkward or embarrassing situations. Here’s how you can do that.

  1. Head to the Sent Items part of the Outlook app and double click the message that you want to recall.
  2. Navigate to the Message tab in the open window with the message.
  3. Head to the fourth group of options in the top menu bar under Move, and choose Recall this Message.
  4. Choose to delete the unread copy of the message on the server, or replace it with a new message.
  5. Press OK

Applies to All Windows 10 Versions

One of the most embarrassing things in life is replying to an email, and realizing you’ve replied to all, or sent out something to the recipient that wasn’t meant to see. Luckily, there is a way around this common problem. With the Outlook app as part of Office 365, you can easily recall an email — granted that you’re using a Microsoft Exchange account and the feature has been enabled by your IT department. In this guide, we’ll show you how you avoid mistakes and recall emails in Outlook.

Steps to recall an email in Outlook

The first step in recalling an email in Outlook is to head to the Sent Items part of the Outlook App. After that, you can double click the message that you want to recall. Then, you need to navigate to the Message tab in the open window with the message. You can then head to the fourth group of options in the top menu bar under Move, and choose Recall this Message.

After following the steps above, a new window with the recall a message option should have appeared. From there, you’ll have two options, both of which will require you to press on OK afterward. You can either delete the unread copy of the message on the server, or you can replace it with a new message. The recipient might have already viewed the message, so deleting the unread copy might not always work. You can, however, select the option to receive a report on if the recall was successful.

Speed is of the essence here, and you should always recall right as you realize your mistake. If all else fails, that’s where the second option comes in, allowing you to write an apology message so that the original (error) email does not get opened.

Other ways to avoid having to recall messages

Recalling messages might not always work, but there are some ways you can avoid getting into the situation. First off, you should always slow down and double-check where your emails are heading. You also can even these troubles by setting up an Outlook rule to delay emails. This ensures that your messages sent through Outlook will be delayed by a certain number of minutes, giving you a short period of time to recall messages if something were to go wrong.

Share This

Further reading: Email, Microsoft, Outlook

Related:

  • No Related Posts

Microsoft Windows Security Updates July 2019 overview

Microsoft released security updates and non-security updates for Microsoft Windows (client and server) and other company products on the July 9, 2019 Patch Day.

Our overview provides system administrators, organizations, and home users with detailed information on released patches, known issues, and other relevant information.

The overview starts with an executive summary; it is followed by the operating system distribution, and the list of security updates for all versions of Windows.

The list of known issues, security advisories released by Microsoft, and download information follow.

Here is the link to the June 2019 Patch Day in case you missed it.

Microsoft Windows Security Updates July 2019

Here is an Excel spreadsheet listing security updates that Microsoft released for its products in July 2019. You can download the archive with a click on the following link: Microsoft Windows Security Updates July 2019 Overview

Executive Summary

  • Microsoft released security updates for all client and server versions of the Windows operating system.
  • All versions of Windows are affected by (at least) 1 critical security issue.
  • Security updates were also released for other company products such as Internet Explorer, Microsoft Edge, Microsoft Office, Azure DevOps, .NET Framework, Azure, SQL Server, ASP.NET, Visual Studio, and Microsoft Exchange Server
  • The Microsoft Update Catalog lists 212 entries.

Operating System Distribution

  • Windows 7: 21 vulnerabilities: 1 rated critical and 20 rated important
  • Windows 8.1: 19 vulnerabilities: 1 rated critical and 18 rated important
  • Windows 10 version 1703: 24 vulnerabilities: 1 critical and 23 important
  • Windows 10 version 1709: 36 vulnerabilities: 1 critical and 35 important
  • Windows 10 version 1803: 37 vulnerabilities: 1 critical and 36 important
  • Windows 10 version 1809: 36 vulnerabilities: 1 critical and 35 important
  • Windows 10 version 1903: 36 vulnerabilities: 1 critical and 35 important.

Windows Server products

  • Windows Server 2008 R2: 21 vulnerabilities: 1 critical and 20 important.
  • Windows Server 2012 R2: 22 vulnerabilities: 2 critical and 20 important.
    • CVE-2019-0785 | Windows DHCP Server Remote Code Execution Vulnerability
    • CVE-2019-1102 | GDI+ Remote Code Execution Vulnerability
  • Windows Server 2016: 27 vulnerabilities: 2 critical and 25 important
    • CVE-2019-0785 | Windows DHCP Server Remote Code Execution Vulnerability
    • CVE-2019-1102 | GDI+ Remote Code Execution Vulnerability
  • Windows Server 2019: 40 vulnerabilities: 2 critical and 38 are important.
    • CVE-2019-0785 | Windows DHCP Server Remote Code Execution Vulnerability
    • CVE-2019-1102 | GDI+ Remote Code Execution Vulnerability

Other Microsoft Products

  • Internet Explorer 11: 6 vulnerabilities: 6 critical
    • CVE-2019-1001 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1004 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1056 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1059 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1063 | Internet Explorer Memory Corruption Vulnerability
    • CVE-2019-1104 | Microsoft Browser Memory Corruption Vulnerability
  • Microsoft Edge: 7 vulnerabilities: 7 critical
    • CVE-2019-1001 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1062 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1092 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1103 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1104 | Microsoft Browser Memory Corruption Vulnerability
    • CVE-2019-1106 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1107 | Chakra Scripting Engine Memory Corruption Vulnerability

Windows Security Updates

Windows 7 Service Pack 1 and Windows Server 2008 R2

KB4507449 — Monthly Rollup

  • Same as KB4507456.

KB4507456 — Security-only Update

  • Security updates to Windows Server, Microsoft Graphics Component, Windows Storage and Filesystems, Windows Shell, Windows Input and Composition, and Windows Kernel.

Windows 8.1 and Windows Server 2012 R2

KB4507448 — Monthly Rollup

  • Fixed a Bitlocker issue that caused Bitlocker to go into recovery mode.
  • Same as KB4507457.

KB4507457 — Security-only Update

  • Security updates to Windows Wireless Networking, Windows Server, Windows Storage and Filesystems, Microsoft Graphics Component, Windows Input and Composition, Windows Kernel, and Windows App Platform and Frameworks

Windows 10 version 1803

KB4507435

  • Fixed a Bitlocker issue that caused the encryption software to go into recover mode.
  • Security updates to Windows Wireless Networking, Windows Server, Microsoft Scripting Engine, Windows Storage and Filesystems, Microsoft Graphics Component, Windows Kernel, Internet Explorer, Windows Input and Composition, Windows Virtualization, Windows App Platform and Frameworks, Microsoft Edge, Windows Cryptography, and Windows Fundamentals.

Windows 10 version 1809 and Windows Server 2019

KB4507469

  • Fixed a Bitlocker issue that caused the encryption software to go into recover mode.
  • Fixed an issue that caused the camera to become unresponsive.
  • Security updates to Windows Server, Microsoft Scripting Engine, Microsoft Graphics Component, Internet Explorer, Windows Input and Composition, Windows Virtualization, Windows App Platform and Frameworks, Windows Kernel, Microsoft Edge, Windows Cryptography, and Windows Fundamentals.

Windows 10 version 1903

KB4507453

Other security updates

KB4506954 — 2019-07 Security Only Update for .NET Framework 4.8 for Windows Embedded 8 Standard and Windows Server 2012

KB4506955 — 2019-07 Security Only Update for .NET Framework 4.8 for Windows 8.1 and Windows Server 2012 R2

KB4506956 — 2019-07 Security Only Update for .NET Framework 4.8 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2

KB4506961 — 2019-07 Security Only Update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows Embedded 8 Standard and Windows Server 2012

KB4506962 — 2019-07 Security Only Update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Windows Server 2012 R2

KB4506963 — 2019-07 Security Only Update for .NET Framework 4.6 for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, and Windows Server 2008

KB4506964 — 2019-07 Security Only Update for .NET Framework 4.5.2 for Windows 8.1 and Windows Server 2012 R2

KB4506965 — 2019-07 Security Only Update for .NET Framework 4.5.2 for Windows Embedded 8 Standard and Windows Server 2012

KB4506966 — 2019-07 Security Only Update for .NET Framework 4.5.2 for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, and Windows Server 2008

KB4506974 — 2019-07 Security Only Update for .NET Framework 3.5 for Windows Embedded 8 Standard and Windows Server 2012

KB4506975 — 2019-07 Security Only Update for .NET Framework 2.0, 3.0 for Windows Server 2008

KB4506976 — 2019-07 Security Only Update for .NET Framework 3.5.1 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2

KB4506977 — 2019-07 Security Only Update for .NET Framework 3.5 for Windows 8.1 and Windows Server 2012 R2

KB4506992 — 2019-07 Security and Quality Rollup for .NET Framework 4.8 for Windows Embedded 8 Standard and Windows Server 2012

KB4506993 — 2019-07 Security and Quality Rollup for .NET Framework 4.8 for Windows 8.1 and Windows Server 2012 R2

KB4506994 — 2019-07 Security and Quality Rollup for .NET Framework 4.8 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2

KB4506995 — 2019-07 Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows Embedded 8 Standard and Windows Server 2012

KB4506996 — 2019-07 Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Windows Server 2012 R2

KB4506997 — 2019-07 Security and Quality Rollup for .NET Framework 4.6 for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, and Windows Server 2008

KB4506999 — 2019-07 Security and Quality Rollup for .NET Framework 4.5.2 for Windows 8.1 and Windows Server 2012 R2

KB4507000 — 2019-07 Security and Quality Rollup for .NET Framework 4.5.2 for Windows Embedded 8 Standard and Windows Server 2012

KB4507001 — 2019-07 Security and Quality Rollup for .NET Framework 4.5.2 for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, and Windows Server 2008

KB4507002 — 2019-07 Security and Quality Rollup for .NET Framework 3.5 for Windows Embedded 8 Standard and Windows Server 2012

KB4507003 — 2019-07 Security and Quality Rollup for .NET Framework 2.0 for Windows Server 2008

KB4507004 — 2019-07 Security and Quality Rollup for .NET Framework 3.5.1 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2

KB4507005 — 2019-07 Security and Quality Rollup for .NET Framework 3.5 for Windows 8.1 and Windows Server 2012 R2

KB4507411 — 2019-07 Security Only Update for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2

KB4507412 — 2019-07 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded 8 Standard and Windows Server 2012

KB4507413 — 2019-07 Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1 and Windows Server 2012 R2

KB4507414 — 2019-07 Security Only Update for .NET Framework 2.0, 3.0, 4.5.2, 4.6 for Windows Server 2008

KB4507420 — 2019-07 Security and Quality Rollup for .NET Framework 3.5.1 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2

KB4507421 — 2019-07 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 on Windows Embedded 8 Standard and Windows Server 2012

KB4507422 — 2019-07 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2

KB4507423 — 2019-07 Security and Quality Rollup for .NET Framework 2.0, 3.0, 4.5.2, 4.6 on Windows Server 2008

KB4507434 — 2019-07 Cumulative Security Update for Internet Explorer

KB4507452 — 2019-07 Security Monthly Quality Rollup for Windows Server 2008

KB4507461 — 2019-07 Security Only Quality Update for Windows Server 2008

KB4507462 — 2019-07 Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012

KB4507464 — 2019-07 Security Only Quality Update for Windows Embedded 8 Standard and Windows Server 2012

KB4504418 — 2019-07 Servicing Stack Update for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows Embedded 8 Standard, and Windows Server 2012

KB4506986 — 2019-07 Cumulative Update for .NET Framework 4.8 for Windows Server 2016, Windows 10 Version 1607

KB4506987 — 2019-07 Cumulative Update for .NET Framework 4.8 for Windows 10 Version 1703

KB4506988 — 2019-07 Cumulative Update for .NET Framework 4.8 for Windows 10 Version 1709

KB4506989 — 2019-07 Cumulative Update for .NET Framework 4.8 for Windows 10 Version 1803

KB4506990 — 2019-07 Cumulative Update for .NET Framework 3.5, 4.8 for Windows 10 Version 1809 and Windows Server 2019

KB4506991 — 2019-07 Cumulative Update for .NET Framework 3.5, 4.8 for Winodws 10 version 1903

KB4506998 — 2019-07 Cumulative Update for .NET Framework 3.5, 4.7.2 for Windows 10 Version 1809 and Windows Server 2019

KB4507419 — 2019-07 Cumulative Update for .NET Framework 3.5, 4.7.2, 4.8 for Windows 10 Version 1809 and Windows Server 2019

KB4507435 — 2019-07 Dynamic Cumulative Update for Windows 10 Version 1803

KB4507450 — 2019-07 Cumulative Update for Windows 10 Version 1703

KB4507455 — 2019-07 Cumulative Update for Windows 10 Version 1709

KB4507458 — 2019-07 Dynamic Cumulative Update for Windows 10 Version 1507

KB4507460 — 2019-07 Cumulative Update for Windows 10 Version 1607 and Windows Server 2016

KB4509090 — 2019-07 Servicing Stack Update for Windows 10 Version 1507

KB4509091 — 2019-07 Servicing Stack Update for Windows Server 2016, and Windows 10 Version 1607

KB4509092 — 2019-07 Servicing Stack Update for Windows 10 Version 1703

KB4509093 — 2019-07 Servicing Stack Update for Windows 10 Version 1709

KB4509094 — 2019-07 Servicing Stack Update for Windows 10 Version 1803, and Windows Server 2016

KB4509095 — 2019-07 Servicing Stack Update for Windows 10 Version 1809, and Windows Server 2019

KB4509096 — 2019-07 Servicing Stack Update for Windows 10 Version 1903

Known Issues

Windows 7 Service Pack 1 and Windows Server 2008 R2

  • Issue with McAfee Enterprise software that causes slow startup or the system to become unresponsive.

Windows 8.1 and Windows Server 2012 R2

  • Still the long standing issue with Cluster Shared Volumes that throws the error “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.
  • Issue with McAfee Enterprise software that causes slow startup or the system to become unresponsive.
  • Windows-Eyes screen reader may may throw errors on launch or during use, and some features may not work properly.

Windows 10 version 1803

  • Still the long standing issue with Cluster Shared Volumes that throws the error “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”.
  • Black screen during first logon after installing updates.
  • Issue with Window-Eyes screen reader app that may not work correctly.

Windows 10 version 1809 and Server 2019

  • Long standing issue with Cluster Shared Volumes.
  • Error “0x800f0982 – PSFX_E_MATCHING_COMPONENT_NOT_FOUND” on devices with “some Asian language packs installed”.
  • Black screen during first logon after installing updates.
  • Issue with Window-Eyes screen reader app that may not work correctly.

Windows 10 version 1903

  • Windows Sandbox may fail to start.
  • The Remote Access Connection Manager (RASMAN) service may stop working and you may receive the error “0xc0000005” on devices where the diagnostic data level is manually configured to the non-default setting of 0.

Security advisories and updates

ADV190020 | Linux Kernel TCP SACK Denial of Service Vulnerability

ADV190021 | Outlook on the web Cross-Site Scripting Vulnerability

ADV990001 | Latest Servicing Stack Updates

Non-security related updates

KB890830 — Windows Malicious Software Removal Tool – July 2019

KB4501375 –Windows 10 version 1903 and Windows Server version 1903

KB4509479 — Windows 10 version 1809 and Windows Server 2019

  • Fixed a Storage Area Network (SAN) connection issue.

KB4501371 –Windows 10 version 1809 and Windows Server 2019

KB4509478 — Windows 10 version 1803

  • Same as KB4509479 for Windows 10 version 1809.

KB4503288 — Windows 10 version 1803

KB4509477 — Windows 10 version 1709

  • Same as KB4509479 for Windows 10 version 1809.

KB4503281 — Windows 10 version 1709

Microsoft Office Updates

You find Office update information here.

How to download and install the July 2019 security updates

microsoft windows security updates july 2019

The July 2019 security updates are distributed through Windows Update, WSUS, and other means. Most client-based Windows systems are configured to check for updates automatically.

Windows administrators who don’t want to wait may run manual checks for updates. It is generally not recommended as bugs may be discovered after the general availability. Backups are recommended if the installation of updates can’t be delayed.

Do the following to run a manual check for updates:

  1. Tap on the Windows-key, type Windows Update, and select the result.
  2. A click on “check for updates” runs a manual check. Updates may be installed automatically or on user request depending on system settings.

Direct update downloads

Windows 7 SP1 and Windows Server 2008 R2 SP

  • KB4507449 — 2019-07 Security Monthly Quality Rollup for Windows 7
  • KB4507456 — 2019-07 Security Only Quality Update for Windows 7

Windows 8.1 and Windows Server 2012 R2

  • KB4507448 — 2019-07 Security Monthly Quality Rollup for Windows 8.1
  • KB4507457 — 2019-07 Security Only Quality Update for Windows 8.1

Windows 10 (version 1803)

  • KB4507435 — 2019-07 Cumulative Update for Windows 10 Version 1803

Windows 10 (version 1809)

  • KB4507469 — 2019-07 Cumulative Update for Windows 10 Version 1809

Windows 10 (version 1903)

  • KB4501375 — 2019-07 Cumulative Update for Windows 10 Version 1903

Additional resources

Summary
Microsoft Windows Security Updates June 2019 overview
Article Name
Microsoft Windows Security Updates June 2019 overview
Description
Detailed overview of the Microsoft July 2019 Patch Day covering Windows security and non-security updates, advisories, known issues, and more.
Author
Martin Brinkmann
Publisher
Ghacks Technology News
Logo
Ghacks Technology News
Advertisement

Related:

  • No Related Posts

You don’t have permission to create an entry in this folder in Outlook [FIX]

A large number of users have reported seeing the message You don’t have permission to create an entry in this folder when trying to change data inside their Microsoft Outlook software.

The circumstances in which this happens are the following: two profiles using different Microsoft Outlook versions created two Microsoft Exchange Server accounts. A folder is created that can be seen by both users, but only one account has permissions to access it and change the information.

This error is caused by Outlook not being able to delete the stored cache when switching between accounts on the same profile. Because the account without permission tried first to access the folder created earlier, that account has momentary ownership of the folder, so the user with permission will see the same message.

In this article, we will explore the best troubleshooting methods to solve this issue. Read on to find out more.


What to do if you don’t have permission to create an entry in Outlook folder?

1. Clear the Outlook cacheOutlook Logo - you don't have permission to create an entry in this folderOutlook Logo - you don't have permission to create an entry in this folder

  1. Save your work and close the Outlook.
  2. Double-click on the Outlook executable file in order to open it again.
  3. This will clear the cache stored in Outlook.
  4. After the restart, make sure to try and access the folder created first with the account that has access to the resource. This will give that user full ownership of the created folder, so no error will appear.

Looking for an Outlook alternative? Try one of these apps!



2. Modify permission levels from admin accountLaptop on desk - YOu don't have permission to create an entry in this folderLaptop on desk - YOu don't have permission to create an entry in this folder

  1. Open Outlook and choose the folder you want to modify permissions to.
  2. Right-click on it and select Properties.
  3. Inside the newly opened window, select the Permissions tab.
  4. Select the user to which you want to give permission to from the list.
  5. Under the Permissions section of the same window -> click the button to activate the drop-down menu -> select permission level (owner, editor, author, etc.)
  6. Click the Apply button.
  7. Check to see if the issue persists.

3. Uninstall and re-install Office 365

  1. Press Win+X keys -> select Apps and features.Apps and features win 10 - you don't have permission to create an entry in this folderApps and features win 10 - you don't have permission to create an entry in this folder
  2. Scroll through the programs list, select Office 365 -> click Uninstall.
  3. Wait for the process to complete.
  4. Go to the Office website -> Sign in.Office 365 website - You don't have permission to create an entry in this folderOffice 365 website - You don't have permission to create an entry in this folder
  5. Install Office 365 by following the on-screen instructions.

You can also uninstall Office by using specialized uninstaller software such as Revo Uninstaller. By using this software, you’ll ensure that Office 365 is completely removed from your PC along with all of its files and registry entries.

In this article, we explored some of the best methods to deal with the permission error in Microsoft Outlook, on Windows 10. Please make sure to follow the steps presented in this list in the order that they were written (from the least to the most complicated), to avoid any unnecessary issues.

Please feel free to let us know if this guide helped you solve your issue, by using the comment section found below.

READ ALSO:

Related:

  • No Related Posts

You don’t have permission to book this resource error [QUICK FIX]

A number of users have reported seeing the error message You don’t have permission to book this resource whenever they try to book a room (or other assets), by using the Outlook Exchange.

This issue is caused by migrating the room mailbox from an on-premises location to the Outlook Exchange Online service. When the move is performed, the permissions of the server need to be assigned again to avoid this issue.

This error message can cause a lot of confusion, as the initial settings of the local room mailbox seem to be in order at first glance. Even though that is the case, these features become inactive for security reasons. This protects the information stored on the servers from any third-party that wants to extract that information.

For these reasons in this article, we will explore several troubleshooting methods to deal with this issue. Please follow the steps described in this guide closely to avoid any other issues.

How to fix You don’t have permission to book this resource error?

1. Assign corresponding permissions of the room mailbox to your Exchange Online account

  1. Log into the Exchange Admin Center with your administrator account.Microsoft Office 365 admin - You don't have permission to book this resourceMicrosoft Office 365 admin - You don't have permission to book this resource
  2. Navigate to Recipient -> Resources.Microsoft Office 365 admin - You don't have permission to book this resourceMicrosoft Office 365 admin - You don't have permission to book this resource
  3. Double-click the room mailbox.
  4. Inside the pop-up window that appears, select Mailbox Delegations.
  5. Add your administrator account inside the Full Access blank space.
  6. Click on the Save button.
  7. Open Room Mailbox again and check to see if the issue persists.

Note: It is recommended that when performing these above steps, you use a private browsing session. Press CTRL+SHIFT+P for Mozilla Firefox, Microsoft Edge, and Internet Explorer. For Google Chrome press CTRL+SHIFT+N.


Send emails like a pro with these great email clients!



2. Add your account to Open Room MailboxExchangeOnline - You don't have permission to book this resourceExchangeOnline - You don't have permission to book this resource

  1. Log into your Open Room mailbox account.
  2. Select Options -> Resource Schedule page -> Add your account to the list.
  3. Inside your Outlook (with admin access) -> right-click Calendar -> select Data Properties.
  4. Inside the Permissions tab -> add the users with the appropriate access level -> click Save.Microsoft Office permissions - you don't have permission to book this resourceMicrosoft Office permissions - you don't have permission to book this resource
  5. Try to see if the issue persists.

Another possible reason for this error message could be caused by users trying to book rooms with 1 year before the preset time limit. This information can be checked by going to Portal ->Exchance -> Recipients -> Calendar -> Edit booking options.

In this article we explored a quick fix for the error You don’t have permission to book this resource when trying to reserve a room or other assets on Exchange Online.

Because this issue is caused by porting the data storage from local to cloud, the problem can be fixed by re-allowing the access for each of the users inside your Microsoft Exchange Admin Center.

Please feel free to let us know if this guide helped you solved your problem, by using the comment section found below.

READ ALSO:

Related:

  • No Related Posts

Microsoft Windows Security Updates June 2019 overview

Microsoft released security updates for all supported versions of the Microsoft Windows operating system on the June 11, 2019 Patch Day.

Our overview of the June 2019 Patch Tuesday provides with you information about security and non-security updates that Microsoft released on this day.

The overview includes an executive summary, statistics, links to all updates, the list of known issues sorted by operating system, download links, and more.

Microsoft released the May 2019 Update for Windows 10 recently but it is available to users who seek for updates manually only at the time and only if the system is compatible.

You can check out the May 2019 Update overview here in case you missed it.

Microsoft Windows Security Updates June 2019

The following Excel spreadsheet lists security update information for June 2019. Click on the following link to download it to your system: Microsoft Windows Security Updates June 2019 Overview

Executive Summary

  • Microsoft released security updates for all supported versions of the Windows operating system in June 2019.
  • All client and server versions have critically rated vulnerabilities patched.
  • Microsoft released security updates for other products such as Internet Explorer, Microsoft Edge, Microsoft Office, Azure, Microsoft Exchange Server, and Skype.

Operating System Distribution

  • Windows 7: 42 vulnerabilities of which 3 are rated critical and 39 are rated important
    • CVE-2019-0722 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-0888 | ActiveX Data Objects (ADO) Remote Code Execution Vulnerability
    • CVE-2019-0985 | Microsoft Speech API Remote Code Execution Vulnerability
  • Windows 8.1: 35 vulnerabilities of which 3 are rated critical and 32 are rated important
    • same as 1903
  • Windows 10 version 1703: 41 vulnerabilities of which 4 is critical and 37 are important
    • same as 1709
  • Windows 10 version 1709: 43 vulnerabilities of which 4 is critical and 39 are important
    • CVE-2019-0709 | Windows Hyper-V Remote Code Execution Vulnerability
    • same as 1903
  • Windows 10 version 1803: 45 vulnerabilities of which 3 are critical and 43 are important
    • same as 1903
  • Windows 10 version 1809: 47 vulnerabilities of which 3 are critical and 44 are important
    • same as 1903
  • Windows 10 version 1903: 42 vulnerabilities of which 3 are critical and 39 are important.
    • CVE-2019-0620 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-0722 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-0888 | ActiveX Data Objects (ADO) Remote Code Execution Vulnerability

Windows Server products

  • Windows Server 2008 R2: 42 vulnerabilities: 3 are critical and 39 are important.
    • CVE-2019-0722 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-0888 | ActiveX Data Objects (ADO) Remote Code Execution Vulnerability
    • CVE-2019-0985 | Microsoft Speech API Remote Code Execution Vulnerability
  • Windows Server 2012 R2: 34 vulnerabilities: 3 are critical and 31 are important.
    • Same as Server 2019
  • Windows Server 2016: 39 vulnerabilities: 4 are critical and 35 are important
    • CVE-2019-0709 | Windows Hyper-V Remote Code Execution Vulnerability
    • Same as Server 2019
  • Windows Server 2019: 47 vulnerabilities: 3 are critical and 44 are important.
    • CVE-2019-0620 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-0722 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-0888 | ActiveX Data Objects (ADO) Remote Code Execution Vulnerability

Other Microsoft Products

  • Internet Explorer 11: 7 vulnerability, 5 critical, 2 important
    • CVE-2019-1080 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1055 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1038 | Microsoft Browser Memory Corruption Vulnerability
    • CVE-2019-0988 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-0920 | Scripting Engine Memory Corruption Vulnerability
  • Microsoft Edge: 14 vulnerabilities, 12 critical, 2 important
    • CVE-2019-0989 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-0990 | Scripting Engine Information Disclosure Vulnerability
    • CVE-2019-0991 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-0992 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-0993 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1002 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1003 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1023 | Scripting Engine Information Disclosure Vulnerability
    • CVE-2019-1024 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1038 | Microsoft Browser Memory Corruption Vulnerability
    • CVE-2019-1051 | Chakra Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1052 | Chakra Scripting Engine Memory Corruption Vulnerability

Windows Security Updates

Windows 7 SP1 and Server 2008 R2

KB4503292 — Monthly Rollup

  • Fixed a HTTP and HTTPS string character limit issue in Internet Explorer.
  • Security updates

KB4503269 — Security-only Update

  • Security updates only

Windows 8.1 and Server 2012 R2

KB4503276 — Monthly Rollup

  • Patched a security vulnerability by “intentionally preventing connections between Windows and Bluetooth devices that are not secure and use well-known keys to encrypt connections”.
  • Fixed the Preboot Execution Environment known issue.
  • Fixed a HTTP and HTTPS string character limit issue in Internet Explorer.
  • Security updates.

KB4503290 — Security-only Rollup

  • Same as KB4503276 with the exception of the IE string character limit issue.

Windows 10 version Windows 10 version 1709

KB4503284

  • Fixed Bluetooth vulnerability.
  • Fixed an IE11 issue that could prevent IE from opening if no or a malformed search provider was set as the default.
  • security updates

Windows 10 version 1803

  • Fixed the Preboot Execution Environment issue.
  • Same as 1709

Windows 10 version 1809

  • Fixed a Windows Mixed Reality keyboard rendering issue.
  • Fixed a Bluetooth vulnerability.
  • Fixed the Preboot environment issue.
  • Updated Broadcom Wi-Fi firmware to Microsoft HoloLens.
  • Fixed the IE11 default search provider issue.
  • Security updates

Windows 10 version 1903

  • Fixed Bluetooth vulnerability.
  • Security updates.

Other security updates

KB4503259 — Cumulative security update for Internet Explorer: June 11, 2019

KB4474419 — SHA-2 code signing support update for Windows Server 2008 R2, Windows 7, and Windows Server 2008: March 12, 2019

KB4503285 — Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012

KB4503287 — Security Only Quality Update for Windows Server 2008

KB4503308 — Security update for Adobe Flash Player

KB4503267 — Cumulative Update for Windows 10 Version 1607 and Windows Server Version 1607

KB4503291 — Cumulative Update for Windows 10 Version 1507

KB4503537 — Servicing Stack Update for Windows 10 Version 1607, and Windows Server 2016

KB4504369 — Servicing Stack Update for Windows 10 Version 1809, and Windows Server 2019

Known Issues

Windows 7 SP1 and Server 2008 R2

  1. Issue with McAfee Enterprise products that may cause the system to have slow startups or become unresponsive.
  2. Internet Explorer 11 may stop working when “loading or interacting with Power BI reports”.
    • Workaround: republish with Markers turned off.

Windows 8.1 and Server 2012 R2

  1. Same as Windows 7 SP1 and Server 2008 R2
  2. Certain operations on Cluster Shared Volumes still fail. Workaround is still valid.

Windows 10 version 1709, 1803

  1. Certain operations on Cluster Shared Volumes still fail. Workaround is still valid.

Windows 10 version 1809

  1. Certain operations on Cluster Shared Volumes still fail. Workaround is still valid.
  2. A printing issue in Microsoft Edge and other UWP apps that throws “Your printer has experienced an unexpected configuration problem. 0x80070007e.” errors.
    • Workaround: use another browser to print.
  3. Error “0x800f0982 – PSFX_E_MATCHING_COMPONENT_NOT_FOUND”after installing KB4493509 on devices with certain Asian languages.

Windows 10 version 1903

  1. Windows Sandbox may fail to start with ERROR_FILE_NOT_FOUND (0x80070002)

Security advisories and updates

ADV190015 | June 2019 Adobe Flash Security Update

ADV190016 | Bluetooth Low Energy Advisory

ADV990001 | Latest Servicing Stack Updates

Non-security related updates

KB4497935 for Windows 10 version 1903 and Windows Server 1903

KB4497934 for Windows 10 version 1809 and Windows Server 2019

KB4505056 for Windows 10 version 1809 and Windows Server 2019

KB4499183 for Windows 10 version 1803

KB4505064 for Windows 10 version 1803

KB4499147 for Windows 10 version 1709

KB4505062 for Windows 10 version 1709

KB4499162 for Windows 10 version 1703

KB4505055 for Windows 10 version 1703

KB4499177 for Windows 10 version 1607 and Windows Server 2016

KB4505052 for Windows 10 version 1607 and Windows Server 2016

KB4503539 — Dynamic Update for Windows 10 Version 1803

KB4494454 — Update for Windows 10

KB4501226 — Update for POSReady 2009

KB890830 — Windows Malicious Software Removal Tool – June 2019

Microsoft Office Updates

You find Office update information here.

How to download and install the June 2019 security updates

windows security updates june 2019

All Windows client systems are configured to download and install security updates automatically shortly after release. It is possible to run manual checks for updates to install these as early as possible.

We suggest that backups are created before any updates are installed as updates may introduce issues of their own or in worst case, break the system.

You can run a manual check for updates in the following way:

  1. Tap on the Windows-key, type Windows Update, and select the result.
  2. A click on “check for updates” runs a manual check. Updates may be installed automatically or on user request depending on system settings.

Direct update downloads

Windows 7 SP1 and Windows Server 2008 R2 SP

  • KB4503292 — 2019-06 Security Monthly Quality Rollup for Windows 7
  • KB4503269 — 2019-06 Security Only Quality Update for Windows 7

Windows 8.1 and Windows Server 2012 R2

  • KB4503276 — 2019-06 Security Monthly Quality Rollup for Windows 8.1
  • KB4503290 — 2019-06 Security Only Quality Update for Windows 8.1

Windows 10 (version 1709)

  • KB4503279 — 2019-06 Cumulative Update for Windows 10 Version 1709

Windows 10 (version 1803)

  • KB4503286 — 2019-06 Cumulative Update for Windows 10 Version 1803

Windows 10 (version 1809)

  • KB4503327 — 2019-06 Cumulative Update for Windows 10 Version 1809

Windows 10 (version 1903)

  • KB4503293 — 2019-06 Cumulative Update for Windows 10 Version 1903

Additional resources

Summary
Article Name
Microsoft Windows Security Updates June 2019 overview
Description
Detailed overview of the Microsoft June 2019 Patch Day covering Windows security and non-security updates, advisories, known issues, and more.
Author
Martin Brinkmann
Publisher
Ghacks Technology News
Logo
Ghacks Technology News
Advertisement

Related:

  • No Related Posts

May Patch Tuesday fixes zero-day, new Intel CPU bugs

Another day, another exploit comes to light

In other Microsoft security news, researchers from IT security company ESET on May 7 said they uncovered LightNeuron, a sophisticated backdoor and spying malware tailored for Exchange Server systems.

LightNeuron has two key ingredients: a transport agent for mail handling and a dynamic link library (DLL) that held the bulk of the malicious code. For any of this to work, it requires administrative access to the Exchange system.

Once the attacker registers and implements LightNeuron’s components, the malware takes control of the server to block, read and modify emails. ESET said the malware creates a command-and-control server and uses steganography to mask its commands inside JPG images and PDF documents in email attachments. ESET researchers believe LightNeuron’s targets and its characteristics indicate it is the handiwork of the notorious Turla hacking group.

Due to its advanced camouflage techniques, ESET researches said it’s possible LightNeuron has been in use since 2014. Moreover, eliminating the malware can result in disastrous consequences.

“Simply removing the two malicious files will break Microsoft Exchange, preventing everybody in the organization from sending and receiving emails,” according to an ESET whitepaper.

As of this article’s publication, Microsoft had no mitigation or patch. Microsoft’s Security Intelligence claims Windows Defender Antivirus can find and remove the threat, in a short advisory, but it’s not clear if this catches LightNeuron before installation or eliminates it after installation.

News of LightNeuron caught the attention of many administrators. Tony Redmond, a prominent Exchange expert and Microsoft MVP, sent out a tweet to suppress some of the hand-wringing related to the exploit, noting that IT pros who put more effort to lock down their systems should be less fretful.

“Lots of [fear, uncertainty and doubt] floating around about from recent reports of the ‘LightNeuron’ attack on Exchange. If attackers get inside your network and secure the admin [privileges] necessary to install transport agents, you’ve got bigger problems to worry about,” Redmond wrote.

LightNeuron’s exposure reinforces the message that once attackers get in a Windows system, they can burrow and remain undetected for quite some time and do significant damage.

IT pros must throw up as many obstacles as they can to prevent intrusions, such as two-factor authentication on dedicated Exchange administration accounts and tighter controls over PowerShell in the system, ESET said. Administrators should also adopt the habit to inspect the Exchange Server components, such as the transport agent, to verify they have the proper signatures.

Related:

  • No Related Posts

Researchers discover highly stealthy Microsoft Exchange backdoor

An extremely stealthy Microsoft Exchange backdoor can read, modify or block emails going through the compromised mail server and even compose and send new emails.

Microsoft Exchange backdoor

LightNeuron – as the backdoor has been dubbed by ESET researchers – is remotely controlled via emails using steganographic PDF and JPG attachments and is believed to have been used by the Turla cyber espionage group.

About LightNeuron

The LightNeuron backdoor is the first known instance of a backdoor employing a malicious Microsoft Exchange Transport Agent as a persistence mechanism.

“Microsoft Exchange allows extending its functionalities using Transport Agents that can process and modify all email messages going through the mail server. Transport Agents can be created by Microsoft, third-party vendors, or directly within an organization,” the researchers explained.

“The typical events handled by a Transport Agent occur when the mail server sends or receives an email. Before the event is actually executed, the Transport Agents are called and have the possibility to modify or block the email.”

They are usually used for legitimate purposes, but as we can see in this instance they can also be used for malicious ones.

Aside from the Transport Agent, which is dropped in the Exchange folder located in the Program Files folder and registered in the mail server’s configuration, the backdoor also uses a DLL file containing most of the malicious functions needed by the Transport Agent.

As mentioned before, the backdoor can block emails, modify their body, recipient and subject, created a new email, replace attachments, and re-create and re-send the email from the Exchange server to bypass the spam filter.

It can create email and attachment logs, encrypt emails and store then, and parse JPG/PDF attachments and decrypt and execute the commands found in them.

LightNeuron can also be instructed to write and execute files, delete and exfiltrate them, execute processes, disable itself, perform extensive logging (backdoor actions, debug, error, etc.) and perform automatic file exfiltration at a particular time of the day and night.

Microsoft Exchange backdoor

During their investigation, the researchers also noticed alongside LightNeuron the presence of tools like Remote Administration Software, RPC- based malware or .NET web shells targeting Outlook Web Access. By leveraging them, the attackers are able to control other machines on the local network using emails sent to the Exchange server.

Finally, judging by some strings decrypted from the malware samples, they believe its likely that a Linux variant of the malware exists and is used.

“That would not be surprising, given that many organizations have Linux mail servers,” they noted.

About Turla

Turla (aka Snake, aka Uroburos) is believed to be a Russian-speaking group of attackers that is likely state-sponsored. They’ve been active for more than a decade.

Their usual targets are government entities, diplomatic entities, military organizations and defense contractors, regional political organizations and research and education organizations around the world.

Even though LightNeuron dates back to at least 2014, it was discovered and analyzed by security researchers only now because of the previously unseen persistence mechanism, because it is hard to detect at the network level (no standard HTTP(S) communications), and because Turla deploys it only against its most important targets.

“This malware is not highly prevalent in the wild so it was able to stay under the radar for a long period of time,” ESET malware researcher Matthieu Faou told Help Net Security.

“We found LightNeuron while investigating machines already infected with known Turla malware. That’s how we were able to make the link between LightNeuron and Turla.”

The researchers pinpointed two targets hit with the backdoor: a Ministry of Foreign affairs in an Eastern European country and a regional diplomatic organization in the Middle East.

Removing the malware

ESET researchers have released IoCs for companies to check whether they’ve been with the malware, but warned against removing the two malicious files as the first order of business, as this will break Microsoft Exchange and prevent everybody in the organization from sending and receiving emails.

Administrators must first disable the malicious Transport Agents and then move to remove the two malicious files.

“If you do not plan to re-install the mail server, an important last step is to modify the passwords of all accounts that have administrative rights on the compromised server. Otherwise, attackers could access the server again to compromise it again,” they advised.

Related:

  • No Related Posts

Microsoft Windows Security Updates April 2019 overview

Microsoft released security updates for supported versions of Windows and other company today on the April 9, 2019 Patch Tuesday.

Updates are provided in various ways: via Windows Update, as direct downloads, and through Enterprise updating systems.

Our monthly overview of Microsoft’s Patch Day offers detailed information on updates, additional information that is relevant, and links to supported articles.

It starts with an executive summary, and is followed by the statistics, the list of released updates, known issues, and direct download links.

You can check out last month’s Patch Day in case you have missed it. As always, it is recommended that systems are backed up before new patches are installed. Note that some users had troubles installing the last cumulative update for Windows 10 version 1809; you can check a possible fix for System Service Exception blue screens here.

Attention: Reports of Windows 7 and 8.1, and Server 2008 R2 / 2012 R2 machines freezing after update installation. Is apparently related to Sophos products, only solution right now is to uninstall the update.

Microsoft Windows Security Updates April 2019

Download the following Excel spreadsheet listing security updates and related information for updates that Microsoft released in April 2019. Click on the following link to download the spreadsheet to your local system: microsoft-windows-security-updates-april-2019.zip

Executive Summary

  • Windows 10 version 1607 reached end of support for Enterprise and Education customers today.
  • Windows 10 version 1709 reached end of support for Home, Pro and Pro for Workstations today.
  • Microsoft released security updates for all client and server versions of Windows.
  • Other Microsoft software with security updates: Microsoft Edge, Internet Explorer, Microsoft Exchange Server, Team Foundation Server, Azure DevOps Server, Windows Admin Center, Microsoft Office
  • Microsoft fixed many long standing known issues.
  • The Update Catalog lists 133 updates.

Operating System Distribution

  • Windows 7: 29 vulnerabilities of which 6 are rated critical and 23 are rated important (links see W10 1809)
    • CVE-2019-0791 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0792 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0793 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0795 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0845 | Windows IOleCvt Interface Remote Code Execution Vulnerability
    • CVE-2019-0853 | GDI+ Remote Code Execution Vulnerability
  • Windows 8.1: 31 vulnerabilities of which 7 are rated critical and 24 are rated important (links see W10 1809)
    • CVE-2019-0790 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0791 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0792 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0793 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0795 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0845 | Windows IOleCvt Interface Remote Code Execution Vulnerability
    • CVE-2019-0853 | GDI+ Remote Code Execution Vulnerability
  • Windows 10 version 1607: 33 vulnerabilities of which 7 are critical and 26 are important
    • critical issues same as W10 1809 except for CVE-2019-0786 which is not listed.
  • Windows 10 version 1703: 35 vulnerabilities of which 7 are critical and 28 are important
    • critical issues same as W10 1809 except for CVE-2019-0786 which is not listed.
  • Windows 10 version 1709: 37 vulnerabilities of which 8 are critical and 29 are important
    • critical issues same as W10 1809
  • Windows 10 version 1803: 37 vulnerabilities of which 8 are critical and 29 are important
    • critical issues same as W10 1809
  • Windows 10 version 1809: 36 vulnerabilities of which 8 are critical and 28 are important

Windows Server products

  • Windows Server 2008 R2: 29 vulnerabilities of which 6 are critical and 23 are important.
    • same as Windows 7
  • Windows Server 2012 R2: 31 vulnerabilities of which 7 are critical and 24 are important.
    • critical issues same as W10 1809 except CVE-2019-0786 which is not listed.
  • Windows Server 2016: 33 vulnerabilities of which 7 are critical and 26 are important
    • critical issues same as W10 1809 except CVE-2019-0786 which is not listed.
  • Windows Server 2019: 36 vulnerabilities of which 8 are critical and 28 are important.
    • Critical issues same as W10 1809

Other Microsoft Products

  • Internet Explorer 11: 5 vulnerability, 1 critical, 4 important
  • Microsoft Edge: 9 vulnerabilities, 7 critical, 2 important

Windows Security Updates

Windows 7 Service Pack 1

Monthly rollups won’t include PciClearStaleCache.exe anymore starting with this update. Microsoft advises that administrators make sure that updates between April 20, 2018 and March 12, 2019 are installed prior to installing this update and future monthly rollup updates to make sure that the program is on the system.

The following symptoms may be experienced if the file is not available:

  • Existing NIC definitions in control panel networks may be replaced with a new Ethernet Network Interface Card (NIC) but with default settings. Any custom settings on the previously NIC persist in the registry but were unused.
  • Loss of static IP address settings.
  • Network Flyout does not display certain Wi-Fi profile settings.
  • Disabling of Wi-Fi network adapters.

KB4493472 — Monthly Rollup

  • Provides protections against Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754) for VIA-based computers.
  • Fixed an issue that caused the error “0x3B_c0000005_win32k!vSetPointer”.
  • Fixed the netdom.exe error “The command failed to complete successfully” appears.
  • Fixed the Custom URI Schemes issue.
  • Fixed the WININET.DLL issue.
  • Security updates

KB4493448 — Security only update

  • Same as monthly rollup except for error “0x3B_c0000005_win32k!vSetPointer” and Custom URI Schemes.

Windows 8.1

KB4493446 — Monthly Rollup

  • Provides protections against Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754) for VIA-based computers.
  • Fixes an issue with MSXML6 that could cause programs to stop responding.
  • Fixed an issue with the Group Policy Editor that caused it to stop responding when editing Group Policy Preferences for Internet Explorer 10 Internet settings.
  • Fixed an issue with Custom URI schemes for Application Protocol Handlers.
  • Fixed an authentication issue in Internet Explorer 11 and other apps that use WININET.DLL.
  • Security updates for various components.

KB4493467 — Security-only Update

  • Same as the Monthly rollup except the Custom URI schemes fix (not listed)

Windows 10 version 1607

KB4493470

  • Fixed several known issues.
  • Fixed an issue to meet GB18030 certificate requirements.
  • Security updates.

Windows 10 version 1703

KB4493474

  • Fixed several known issues
  • Security Updates

Windows 10 version 1709

KB4493441

  • Fixed several known issues
  • Security Updates

Windows 10 version 1803

KB4493464

  • Fixed several known issues
  • Addresses a stop error that occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.
  • Security updates.

Windows 10 version 1809

KB4493509

  • Fixed several known issues including EUDC blue screen, MXSML6 stop responding, Group Policy Editor stops responding, WININET.DLL
  • Security updates

Other security updates

KB4493435 — Cumulative Security Update for Internet Explorer

KB4491443 — Remote code execution vulnerability in Windows Embedded POSReady 2009

KB4493448 — Security Only Quality Update for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2

KB4493450 — Security Only Quality Update for Windows Embedded 8 Standard and Windows Server 2012

KB4493451 — Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012

KB4493458 — Security Only Quality Update for Windows Server 2008

KB4493471 — Security Monthly Quality Rollup for Windows Server 2008

KB4493472 — Security Monthly Quality Rollup for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2

KB4493478 — Security Update for Adobe Flash Player

KB4493563 — Remote code execution vulnerability in Windows Embedded POSReady 2009

KB4493730 — Security Update for Windows Server 2008

KB4493790 — Remote code execution vulnerability in Windows Embedded POSReady 2009

KB4493793 — Remote code execution vulnerability in Windows Embedded POSReady 2009

KB4493794 — Remote code execution vulnerability in Windows Embedded POSReady 2009

KB4493795 — Remote code execution vulnerability in Windows Embedded POSReady 2009

KB4493796 — Remote code execution vulnerability in Windows Embedded POSReady 2009

KB4493797 — Remote code execution vulnerability in Windows Embedded POSReady 2009

KB4493927 — Information disclosure vulnerability in Windows Embedded POSReady 2009

KB4494059 — Remote code execution vulnerability in Windows Embedded POSReady 2009

KB4494528 — You receive an Error 1309 message when you install an .msi file on Windows Embedded POSReady 2009

KB4495022 — Information disclosure vulnerability in Windows Embedded POSReady 2009

Known Issues

Windows 7 Service Pack 1

After installing this update, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. Workarounds available.

Windows 8.1

Authentication may fail for services that require unconstrained delegation after the Kerberos ticket expires. Workarounds available.

Windows 10 version 1607

For hosts managed by System Center Virtual Machine Manager (SCVMM), SCVMM cannot enumerate and manage logical switches deployed on the host after installing the update.

After installing KB4467684, the cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with greater than 14 characters.

And the Windows 7 SP1 issue.

Windows 10 version 1607 and newer

After installing the Internet Explorer cumulative update, custom URI schemes for application protocol handlers may not work properly in Internet Explorer. Workaround available.

Windows 10 version 1803

Same as Windows 7 SP1

Windows 10 version 1809, Windows Server 2016

Same as Windows 7 SP1

Security advisories and updates

ADV190011 | April 2019 Adobe Flash Security Update

ADV990001 | Latest Servicing Stack Updates

Non-security related updates

KB4487990 — Update for POSReady 2009

KB890830 — Windows Malicious Software Removal Tool – April 2019

Microsoft Office Updates

You find a list of all released updates for Microsoft Office — security and non-security – here.

How to download and install the April 2019 security updates

microsoft updates windows april 2019

Windows Updates get installed automatically on Home systems by default. You can block or delay the installation of updates on these systems.

It is not recommended to run a manual check for updates as it may lead to the installation of preview updates or feature updates, but you may do so in the following way:

  1. Open the Start Menu.
  2. Type Windows Update.
  3. Click on the “check for updates” button to run a manual check.

You may use third-party tools like the excellent Windows Update Manager or Windows Update Minitool to download updates.

Direct update downloads

Microsoft makes available all cumulative updates that it releases for Windows as direct downloads on the Microsoft Update Catalog website. Follow the links listed below to go there for the listed version of Windows.

Windows 7 SP1 and Windows Server 2008 R2 SP

  • KB4493472 — 2019-04 Security Monthly Quality Rollup for Windows 7
  • KB4493448 — 2019-04 Security Only Quality Update for Windows 7

Windows 8.1 and Windows Server 2012 R2

  • KB4493446 — 2019-04 Security Monthly Quality Rollup for Windows 8.1
  • KB4493467 — 2019-04 Security Only Quality Update for Windows 8.1

Windows 10 and Windows Server 2016 (version 1607)

  • KB4493470 — 2019-04 Cumulative Update for Windows 10 Version 1607

Windows 10 (version 1703)

  • KB4493474 — 2019-04 Cumulative Update for Windows 10 Version 1703

Windows 10 (version 1709)

  • KB4493441 — 2019-04 Cumulative Update for Windows 10 Version 1709

Windows 10 (version 1803)

  • KB4493464 — 2019-04 Cumulative Update for Windows 10 Version 1803

Windows 10 (version 1809)

  • KB4493509 — 2019-04 Cumulative Update for Windows 10 Version 1809

Additional resources

Summary
Microsoft Windows Security Updates April 2019 overview
Article Name
Microsoft Windows Security Updates April 2019 overview
Description
Microsoft released security updates for supported versions of Windows and other company today on the April 9, 2019 Patch Tuesday.
Author
Martin Brinkmann
Publisher
Ghacks Technology News
Logo
Ghacks Technology News
Advertisement

Related:

  • No Related Posts

Starting March 1, 2019, Bay Area Systems Will Begin Providing It Support Services on the Latest …

SAN FRANCISCO (PRWEB)February 23, 2019

Bay Area Systems, Inc. (http://www.BayAreaSystems.com), premier Information Technology (IT) consulting provider in San Francisco Bay Area, is on the forefront of providing cost-effective IT outsourcing solutions for small businesses.

Starting March 1, 2019, Bay Area Systems will begin providing IT support services on the latest Microsoft Server: Windows Server 2019. Through utilization of Microsoft Windows Server 2019’s native Hyper-V virtualization technology, Bay Area Systems helped deployed web server farms, clustered database servers, remote desktop workstations, and cloud computing platforms. When businesses need Virtual Private Network (VPN) access and remote desktop services; rather than adding individual workstations to be used for remote office desktop connection needs, virtual workstations offer the same experience with greater efficiency. Clients praise our virtual machine solutions that are space saving (often one server can serve the needs of 10 – 30 servers and/or workstations, reducing the need to have these physical machines scattered around in the office); energy saving in terms of electricity needs as well as cooling requirements; easy deployment – adding a server or workstation is much faster than having to order an additional machine, and often may not be of the same exact specification; fast recovery – by utilizing the cloning feature, essential virtual machines can be cloned and quickly replaced should a catastrophic software error occurred.

Microsoft Windows Server 2019’s Server Core App Compatibility feature on demand (FOD) significantly improves the app compatibility of the Windows Server Core installation option by including a subset of binaries and components from Windows Server with the Desktop Experience, without adding the Windows Server Desktop Experience graphical environment itself.

Windows Defender ATP Exploit Guard is a new set of host-intrusion prevention capabilities. The four components of Windows Defender Exploit Guard (Attack Surface Reduction (ASR), Network protection, Controlled folder access, Exploit protection) are designed to lock down the device against a wide variety of attack vectors and block behaviors commonly used in malware attacks, while enabling you to balance security risk and productivity requirements.

Microsoft Windows Server 2019’s Security with Software Defined Networking (SDN) delivers many features to increase cutstomer confidence in running workloads, either on-premises, or as a service provider in the cloud.

Windows Server 2019 also has a new Storage Migration Service that makes it easier to migrate servers to a newer version of Windows Server. It provides a graphical tool that inventories data on servers, transfers the data and configuration to newer servers, and then optionally moves the identities of the old servers to the new servers so that apps and users don’t have to change anything.

Hyper-V virtual server provides one of the most stable platforms for virtual machines, and the multitude of tools available making cloning, clustering and failover available to support critical business needs. The time it takes to restore a cloned Microsoft Exchange Server in Hyper-V could be as little as 2 hours, compared to having to rebuild a physical server, reinstall Operating Systems and Exchange Server, setup accounts, and can easily take 6 to 8 hours and thousands of dollars. In Windows Server 2019, you can now add NIC on the fly without taking down the server.

Bay Area Systems have fully tested and deployed Hyper-V solutions to solve customers’ growing needs of testing new Operating Systems as well as program upgrades. It is much more convenient, and cost-effective, to use a virtual machine to test system integration, software upgrades, patches, and new installations before deploying into the production environment. Efficient resource sharing and distribution in Hyper-V also ensure a much better performance for individual virtual machines than purchasing separate physical units.

The combination of cutting-edge, professional services of Bay Area Systems and production proven virtual machine solutions provided by Microsoft’s Windows Server 2019 will serve to deliver energy saving, cost-effective, cutting-edge, fast and complete services to Bay Area Systems customers.

Since 2002,Bay Area Systems has provided cost-effective computer systems and network support and services to small businesses all around the San Francisco Bay Area. Bay Area Systems LLC has become a pioneer in providing customized technology solutions that are efficient, cost-effective, and improve bottom line of small businesses. Bay Area Systems’ business model is based on their passion to provide the best customer service experience in the industry, and building long-term business relationship with their customers.

Related:

  • No Related Posts