Tag: X86 architecture
Installation Issues with Receiver While Upgrading OS to Windows 10
This article is intended for Citrix administrators and technical teams only.Non-admin users must contact their company’s Help Desk/IT support team and can refer to CTX297149 for more information
Users need to upgrade their Receiver for Windows to 4.3 before performing a Windows 10 OS in-place upgrade.
Note: Receiver 4.2 and earlier versions are not supported by Windows 10.
Issue description
If you are using Receiver for Windows prior to 4.3 installed on the machine and try to upgrade from Windows 7, Windows 8 or Windows 8.1 to Windows 10, you might not be able to uninstall Receiver through Add/Remove Programs. Upgrade or uninstallation fails.
Scenarios
Non-working Scenario
If a computer with Windows 7, Windows 8 or Windows 8.1 and Receiver for Windows 4.2.100 or earlier is upgraded to Windows 10, users are unable to remove Receiver using the control panel. The following error message is displayed. Upgrading to Receiver for Windows 4.3 also fails.
Working scenario – 1
-
Upgrade Receiver for Windows to 4.3.
-
Upgrade to the computer to Windows 10.
Working scenario – 2
-
On a computer which does not have Receiver installed, upgrade to Windows 10.
-
Install Receiver for Windows 4.3
Related:
Launching Citrix Virtual Desktop or App Sessions Prompts via Citrix Workspace App “An Online Application is attempting to access information on a device attached to your computer”
This is by design when Client Drive and/or USB redirection policies are enabled. In the event the end users do not select an option that is remembered they will continue to receive said prompts.
Instruct end users how to proceed, or if it is deemed the subset of users do not need these features they can be disabled via policy.
Related:
Error: “The remote session was disconnected because there was no terminal server license server available to provide a license”
Windows 2003 Terminal Servers do not recognize the Windows 2000 Licensing server and the following error occurs:
“The remote session was disconnected because there was no terminal server license server available to provide a license.”
The following event ids are logged:
Event ID 1004: No Terminal Server licenses available.
Event ID 1011: There are no Terminal Server licenses available.
Users cannot log on to a session using either ICA or RDP.
Background
Microsoft stated that Windows 2003 Server serves the Windows 2003 Terminal Server licensing. In the old licensing scheme, the licensing was on an Active Directory controller but in Windows 2003 this is no longer a requirement.
Refer to Q279561 Microsoft technote to install a Windows 2003 Server and point all Terminal Server users to the installed license.
Note: Windows XP and pre-release client OS requires TS License of 2003. Vista, Windows 7 and later require license from 2008 Terminal Server.
Related:
Legacy graphics mode with Windows 8, 8.1, 10, Server 2012, R2 & 2016
Legacy graphics mode is not tested or supported with modern operating systems: Windows Desktop OS: 8, 8.1, 10 or Windows Server 2012, 2012 R2 & Windows Server 2016.
Thinwire plus (aka: TW+ or compatibility mode) should be used instead and is the replacement for legacy mode.
The above doesn’t necessarily mean it will not work with modern operating systems. However, issues like: grey, frozen and black screens have been observed and reported.
Before calling your support representative please test the issue against Thinwire, the modern graphics delivery method.
Related:
Microsoft Windows Security Updates December 2020
Today is the last Microsoft Patch Day of the year 2020. Microsoft released security updates and non-security updates for all supported client and server versions of the company’s Windows operating system, and updates for other company products such as Microsoft Office, Microsoft Edge, Internet Explorer, or the .NET Framework.
Our Patch Day overview provides you with detailed information on released patches, security issues, and related information. You can download an Excel spreadsheet of the released security updates, check out the operating system distribution, find links to all support pages, and the list of known issues here in this guide.
Check out the November 2020 Security Updates overview here in case you missed it.
Microsoft Windows Security Updates December 2020
Download the following Excel spreadsheet that contains the released security updates to your system. Note that Microsoft’s new platform is quite slow and that it may be possible that updates are missing. Let us know in the comments if you notice anything missing: Security Updates 2020 12 Microsoft Windows
Executive Summary
- Microsoft released security updates for all supported versions of Windows.
- Security updates were also released for the following Microsoft products: Microsoft Edge (desktop and Android), Microsoft Office, Microsoft Exchange Server, Azure DevOps, Visual Studio, Azure SDK, Azure Sphere
- Windows 10 version 1903 has reached end of servicing today.
- There won’t be any Preview updates for Windows in December 2020.
- Microsoft .NET Core updates will be offered via Windows Updates from this month on.
Operating System Distribution
- Windows 7(extended support only): 9 vulnerabilities: 0 critical and 9 important
- Windows 8.1: 5 vulnerabilities: 0 rated critical and 5 rated important
- Windows 10 version 1809: 19 vulnerabilities: 1 critical and 18 important
- CVE 2020 17095 — Hyper-V Remote Code Execution Vulnerability
- Windows 10 version 1903 and 1909: 18 vulnerabilities: 1 critical and 17 important
- CVE 2020 17095 — Hyper-V Remote Code Execution Vulnerability
- Windows 10 version 2004 and 20H2: 19 vulnerabilities, 1 critical, 18 important
- CVE 2020 17095 — Hyper-V Remote Code Execution Vulnerability
Windows Server products
- Windows Server 2008 R2 (extended support only): 9 vulnerabilities: 0 critical and 9 important
- Windows Server 2012 R2: 6 vulnerabilities: 0 critical and 6 important.
- Windows Server 2016: 16 vulnerabilities: 1 critical and 15 important.
- CVE 2020 17095 — Hyper-V Remote Code Execution Vulnerability
- Windows Server 2019: 20 vulnerabilities: 1 critical and 19 are important
- CVE 2020 17095 — Hyper-V Remote Code Execution Vulnerability
Other Microsoft Products
- Internet Explorer 11: 0 vulnerabilities:
- Microsoft Edge (classic): 1 vulnerabilities: 1 critical
- CVE 2020 17131 — Chakra Scripting Engine Memory Corruption Vulnerability
- Microsoft Edge (Chromium)
- see here (latest security patches from the Chromium project)
Windows Security Updates
Windows 7 SP1 and Windows Server 2008 R2
Updates and improvements:
- Fixed a security vulnerability by preventing programs that runs as System from printing to FILE ports.
- Security updates
Windows 8.1 and Windows Server 2012 R2
Updates and improvements:
- Fixed an issue that prevented PDF24 Creator version 9.1.1 from opening .txt files. (Monthly Rollup only)
- Fixed a security vulnerability by preventing programs that runs as System from printing to FILE ports.
- Security updates
Windows 10 version 1809
- Support page: KB4592440
Updates and improvements:
- Fixed a security vulnerability by preventing programs that runs as System from printing to FILE ports.
- Security updates
Windows 10 version 1903 and 1909
- Support page: KB4592449
Updates and improvements:
- Fixed a security vulnerability by preventing programs that runs as System from printing to FILE ports.
- Security updates
Windows 10 version 2004 and 20H2
- Support page: KB4592438
Updates and improvements:
- Fixed a security vulnerability by preventing programs that runs as System from printing to FILE ports.
- Security updates
Other security updates
KB4592468 — 2020-12 Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012 (KB4592468)
KB4592497 — 2020-12 Security Only Quality Update for Windows Embedded 8 Standard and Windows Server 2012 (KB4592497)
KB4592498 — 2020-12 Security Monthly Quality Rollup for Windows Server 2008 (KB4592498)
KB4592504 — 2020-12 Security Only Quality Update for Windows Server 2008 (KB4592504)
KB4592464 — 2020-12 Cumulative Update for Windows 10 Version 1507 (KB4592464)
KB4593226 — 2020-12 Cumulative Update for Windows Server 2016 and Windows 10 Version 1607 (KB4593226)
KB4592473 — 2020-12 Cumulative Update for Windows 10 Version 1703 (KB4592473)
KB4592446 — 2020-12 Cumulative Update for Windows 10 Version 1803 (KB4592446)
Servicing Stack Updates:
2020-12 Servicing Stack Update for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2 (KB4592510)
2020-12 Servicing Stack Update for Windows Server, version 20H2, Windows 10 Version 20H2, Windows Server, version 2004, and Windows 10 Version 2004 (KB4593175)
Known Issues
Windows 7 SP1 and Windows Server 2008 R2
- Updates will fail to install with the error ““Failure to configure Windows updates. Reverting Changes. Do not turn off your computer” if ESU is not supported or activated.
- Certain operations may fail on cluster shared volumes. Workarounds available.
Windows 8.1 and Server 2012 R2
- Certain operations may fail on cluster shared volumes. Workarounds available.
Windows 10 version 1809
- Devices with “some” Asian language packs may throw the error “0x800f0982 – PSFX_E_MATCHING_COMPONENT_NOT_FOUND.”. Microsoft suggests to either try and uninstall the language packs and make sure that a recent version of Windows 10 is installed, or to reset the PC.
Windows 10 version 1903 and 1909
- System and user certificates may be lost when updating a device from Windows 10 version 1809 or later, to a later version of Windows 10. Does not affect Windows Update devices or Windows Update for business devices. Workaround available.
Windows 10 version 2004 and 20H2
- System and user certificates may be lost when updating a device from Windows 10 version 1809 or later, to a later version of Windows 10. Does not affect Windows Update devices or Windows Update for business devices. Workaround available.
- The correct Furigana characters may not be displayed when using the Microsoft Japanese Input Method Editor. Microsoft is working on a resolution.
Security advisories and updates
ADV 200013 — Microsoft Guidance for Addressing Spoofing Vulnerability in DNS Resolver
ADV 990001 — Latest Servicing Stack Updates
Non-security related updates
Microsoft Office Updates
You find Office update information here.
How to download and install the December 2020 security updates
Updates are already available via Windows Updates and other update management systems. Default Windows installations are configured to find and install updates automatically, but it is also possible to download updates manually to install them.
Tip: it is essential that you create a backup of the system before you install Windows updates as things may go wrong and backups help you restore the previous status quo.
You can check manually for updates in the following way:
- Open the Start Menu of the Windows operating system, type Windows Update and select the result.
- Select check for updates in the application that opens. Updates may be installed automatically when they are found or offered by Windows; this depends on the operating system and version that is used, and update settings.
Direct update downloads
Below are resource pages with direct download links, if you prefer to download the updates to install them manually.
Windows 7 and Server 2008 R2
- KB4592471 — 2020-12 Security Monthly Quality Rollup for Windows 7
- KB4592503 — 2020-12 Security Only Quality Update for Windows 7
Windows 8.1 and Windows Server 2012 R2
- KB4592484 — 2020-12 Security Monthly Quality Rollup for Windows 8.1
- KB4592495 — 2020-12 Security Only Quality Update for Windows 8.1
Windows 10 (version 1809)
- KB4592440 — 2020-12 Cumulative Update for Windows 10 Version 1809
Windows 10 (version 1903)
- KB4592449 — 2020-12 Cumulative Update for Windows 10 Version 1903
Windows 10 (version 1909)
- KB4592449 — 2020-12 Cumulative Update for Windows 10 Version 1909
Windows 10 (version 2004)
- KB4592438 — 2020-12 Cumulative Update for Windows 10 Version 2004
Windows 10 (version 20H2)
- KB4592438 — 2020-12 Cumulative Update for Windows 10 Version 20H2
Additional resources
- December 2020 Security Updates release notes
- List of software updates for Microsoft products
- List of the latest Windows Updates and Services Packs
- Security Updates Guide
- Microsoft Update Catalog site
- Our in-depth Windows update guide
- How to install optional updates on Windows 10
- Windows 10 Update History
- Windows 8.1 Update History
- Windows 7 Update History


Related:
Microsoft Windows Security Updates November 2020
Microsoft has released security updates for all support client and server versions of Windows as well as other company products such as Microsoft Office, Microsoft Edge, and Internet Explorer.
Our November 2020 Patch Day overview provides you with details on the released patches. It begins with an executive summary listing the most important bits of information; this is followed by the operating system distribution, details about cumulative updates for Windows, other released security updates, download links, and lots of links to Microsoft support pages.
Check out the October 2020 Security Updates overview here in case you missed it.
Microsoft Windows Security Updates November 2020
You can download the following Excel spreadsheet that includes information about the released security updates in November 2020. It is provided as an archive that you need to extract on the local system. A viewer such as Microsoft Excel or LibreOffice Cacl is needed to open the spreadsheet.
Click on the following link to download the spreadsheet to your system: Security Updates 2020-11-10-070727pm
Executive Summary
- Microsoft released security updates for all supported client and server versions of Windows.
- All server and client versions of Windows are affected by the same two critical vulnerabilities.
- Security updates are also released for Microsoft Office, Internet Explorer, Microsoft Edge, Microsoft Exchange Server, Microsoft Dynamics, Microsoft Windows Codecs Library, Azure Sphere, Windows Defender, Microsoft Teams, Azure SDK, Azure DevOps and Visual Studio.
- Products with known issues: SharePoint Server 2016 and 2019, Windows 10 versions 2004, 1903, 1809, Windows 7, Windows 8.1, Windows Server products and Microsoft Exchange Server
Operating System Distribution
- Windows 7(extended support only): 20 vulnerabilities: 2 critical and 18 important
- CVE 2020 17042 — Windows Print Spooler Remote Code Execution Vulnerability
- CVE 2020 17051 — Windows Network File System Remote Code Execution Vulnerability
- Windows 8.1: 33 vulnerabilities: 2 rated critical and 31 rated important
- CVE 2020 17042 — Windows Print Spooler Remote Code Execution Vulnerability
- CVE 2020 17051 — Windows Network File System Remote Code Execution Vulnerability
- Windows 10 version 1809: 48 vulnerabilities: 2 critical and 45 important, 1 low
- CVE 2020 17042 — Windows Print Spooler Remote Code Execution Vulnerability
- CVE 2020 17051 — Windows Network File System Remote Code Execution Vulnerability
- Windows 10 version 1903 and 1909: 53 vulnerabilities: 2 critical and 54 important, 1 low
- CVE 2020 17042 — Windows Print Spooler Remote Code Execution Vulnerability
- CVE 2020 17051 — Windows Network File System Remote Code Execution Vulnerability
- Windows 10 version 2004 and 20H2: 52 vulnerabilities, 2 critical, 49 important, 1 low
- CVE 2020 17042 — Windows Print Spooler Remote Code Execution Vulnerability
- CVE 2020 17051 — Windows Network File System Remote Code Execution Vulnerability
Windows Server products
- Windows Server 2008 R2 (extended support only): 20 vulnerabilities: 2 critical and 18 important
- CVE 2020 17042 — Windows Print Spooler Remote Code Execution Vulnerability
- CVE 2020 17051 — Windows Network File System Remote Code Execution Vulnerability
- Windows Server 2012 R2: 34 vulnerabilities: 2 critical and 22 important.
- CVE 2020 17042 — Windows Print Spooler Remote Code Execution Vulnerability
- CVE 2020 17051 — Windows Network File System Remote Code Execution Vulnerability
- Windows Server 2016: 40 vulnerabilities: 2 critical and 38 important.
- CVE 2020 17042 — Windows Print Spooler Remote Code Execution Vulnerability
- CVE 2020 17051 — Windows Network File System Remote Code Execution Vulnerability
- Windows Server 2019: 46 vulnerabilities: 2 critical and 44 are important
- CVE 2020 17042 — Windows Print Spooler Remote Code Execution Vulnerability
- CVE 2020 17051 — Windows Network File System Remote Code Execution Vulnerability
Other Microsoft Products
- Internet Explorer 11: 3 vulnerabilities: 3 critical
- CVE 2020 17052 — Scripting Engine Memory Corruption Vulnerability
- CVE 2020 17053 — Internet Explorer Memory Corruption Vulnerability
- CVE 2020 17058 — Microsoft Browser Memory Corruption Vulnerability
- Microsoft Edge (classic): 4 vulnerabilities: 3 critical, 1 important
- CVE 2020 17048 — Chakra Scripting Engine Memory Corruption Vulnerability
- CVE 2020 17052 — Scripting Engine Memory Corruption Vulnerability
- CVE 2020 17058 — Microsoft Browser Memory Corruption Vulnerability
- Microsoft Edge (Chromium)
- see here (latest security patches from the Chromium project)
Windows Security Updates
Windows 7 SP1 and Windows Server 2008 R2
Updates and improvements:
- Corrects DST start date for Fiji Islands to December 20, 2020
- Security updates
Windows 8.1 and Windows Server 2012 R2
Updates and improvements:
- Corrects DST start date for Fiji Islands to December 20, 2020
- Security updates
- Administrators may enable “Save Target As” in Group Policy for Microsoft Edge IE Mode (Monthly Rollup only).
- Fixes an issue with LDAP session authentication (Monthly Rollup only).
Windows 10 version 1809
- Cumulative Update: KB4586793
Updates and improvements:
- Corrects DST start date for Fiji Islands to December 20, 2020
- Security updates
Windows 10 version 1903 and 1909
- Cumulative Update: KB4586786
Updates and improvements:
- Corrects DST start date for Fiji Islands to December 20, 2020
- Fixed an issue with the package frame launcher.
- Security updates
Windows 10 version 2004 and 20H2
- Cumulative Update: KB4586781
Updates and improvements:
- Corrects DST start date for Fiji Islands to December 20, 2020
- Security updates
Other security updates
KB4586768 — 2020-11 Cumulative Security Update for Internet Explorer
KB4586807 — 2020-11 Security Monthly Quality Rollup for Windows Server 2008
KB4586817 — 2020-11 Security Only Quality Update for Windows Server 200
KB4586808 — 2020-11 Security Only Quality Update for Windows Embedded 8 Standard and Windows Server 2012
KB4586834 — 2020-11 Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012
KB4586787 — 2020-11 Cumulative Update for Windows 10 Version 1507
KB4586782 — 2020-11 Cumulative Update for Windows 10 Version 1703
KB4586785 — 2020-11 Cumulative Update for Windows 10 Version 1803
KB4586830 — 2020-11 Cumulative Update for Windows Server 2016 and Windows 10 Version 1607
Known Issues
Windows 7 SP1 and Server 2008 R2
- Updates will uninstall if the system is not subscribed to ESU (Extended Security Updates).
- Certain rename operations may fail on Cluster Shared Volumes. Workarounds available.
Windows 8.1 and Server 2012 R2
- Certain rename operations may fail on Cluster Shared Volumes. Workarounds available.
Windows 10 version 1809
- Some Asian language packs may throw the error “0x800f0982 – PSFX_E_MATCHING_COMPONENT_NOT_FOUND”. Microsoft suggest to remove the language packs and reinstall them, update Windows to the latest version, or Reset the PC.
Windows 10 version 1903, 1909, 2004, 20H2
- System and user certificates may be lost when updating from Windows 10 version 1809 or later to a newer version of Windows 10. This happens mainly when managed devices are updated using outdated bundles or media according to Microsoft. Devices that use Windows Update or Windows Update for Business are not impacted. Microsoft suggests to go back to the previous version of Windows to fix the issue.
Security advisories and updates
ADV 990001 — Latest Servicing Stack Updates
Non-security related updates
KB4497165 — 2020-09 Update for Windows Server, version 1909, Windows 10 Version 1909, Windows Server 2019 (1903), and Windows 10 Version 1903
KB4558130 — 2020-09 Update for Windows Server, version 2004 and Windows 10 Version 2004
KB4580419 — 2020-11 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows Server, version 20H2, Windows 10 Version 20H2, Windows Server, version 2004, and Windows 10 Version 2004
KB4580980 — 2020-11 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows Server, version 1909, Windows 10 Version 1909, Windows Server 2019 (1903), and Windows 10 Version 1903
KB4585207 — 2020-11 Cumulative Update for .NET Framework 4.8 for Windows Server 2016 and Windows 10 Version 1607
KB4585208 — 2020-11 Cumulative Update for .NET Framework 4.8 for Windows 10 Version 1703
KB4585210 — 2020-11 Cumulative Update for .NET Framework 4.8 for Windows 10 Version 1803 and Windows Server 2016
KB4586082 — 2020-11 Cumulative Update for .NET Framework 3.5, 4.7.2 and 4.8 for Windows Server 2019 and Windows 10 Version 1809
KB4589198 — 2020-11 Update for Windows 10 Version 1507
KB4589206 — 2020-11 Update for Windows 10 Version 1803
KB4589208 — 2020-11 Update for Windows Server 2019 and Windows 10 Version 1809
KB4589210 — 2020-11 Update for Windows Server 2016 and Windows 10 Version 1607
KB4589211 — 2020-11 Update for Windows Server, version 1909, Windows 10 Version 1909, Windows Server 2019 (1903), and Windows 10 Version 1903
KB4589212 — 2020-11 Update for Windows Server, version 20H2, Windows 10 Version 20H2, Windows Server, version 2004, and Windows 10 Version 2004
KB890830 — Windows Malicious Software Removal Tool
KB4585204 — 2020-11 Security and Quality Rollup for .NET Framework 4.6 for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, and Windows Server 2008
KB4585205 — 2020-11 Security and Quality Rollup for .NET Framework 4.8 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2
KB4585211 — 2020-11 Security and Quality Rollup for .NET Framework 4.8 for Windows Embedded 8 Standard and Windows Server 2012
KB4585212 — 2020-11 Security and Quality Rollup for .NET Framework 4.8 for Windows 8.1 and Windows Server 2012 R2
KB4585213 — 2020-11 Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows Embedded 8 Standard and Windows Server 2012
KB4585214 — 2020-11 Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Windows Server 2012 R2
KB4586083 — 2020-11 Security and Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2
KB4586084 — 2020-11 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded 8 Standard and Windows Server 2012
KB4586085 — 2020-11 Security and Quality Rollup for .NET Framework 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1 and Windows Server 2012 R2
KB4586086 — 2020-11 Security and Quality Rollup for .NET Framework 2.0, 3.0, 4.5.2, 4.6 for Windows Server 2008
Microsoft Office Updates
You find Office update information here.
How to download and install the November 2020 security updates
The November 2020 security patches are already available for all supported versions of Windows and other Microsoft products. Home users get these via Windows Updates or direct downloads, business customers and Enterprises get these via update management systems such as WSUS predominantly.
Updates are installed automatically by default on Home systems, but you can run a manual check for updates to download and install these earlier.
Note: we recommend that you create a backup of important data, better the entire system, before you install updates.
Do this to manually check for updates:
- Open the Start Menu of the Windows operating system, type Windows Update and select the result.
- Select check for updates in the application that opens. Updates may be installed automatically when they are found or offered by Windows; this depends on the operating system and version that is used, and update settings.
Direct update downloads
Below are resource pages with direct download links, if you prefer to download the updates to install them manually.
Windows 7 and Server 2008 R2
- KB4586827 — 2020-11 Security Monthly Quality Rollup for Windows 7
- KB4586805 — 2020-11 Security Only Quality Update for Windows 7
Windows 8.1 and Windows Server 2012 R2
- KB4586845 — 2020-11 Security Monthly Quality Rollup for Windows 8.1
- KB4586823 — 2020-11 Security Only Quality Update for Windows 8.1
Windows 10 (version 1809)
- KB4586793 — 2020-11 Cumulative Update for Windows 10 Version 1809
Windows 10 (version 1903)
- KB4586786 — 2020-11 Cumulative Update for Windows 10 Version 1903
Windows 10 (version 1909)
- KB4586786 — 2020-11 Cumulative Update for Windows 10 Version 1909
Windows 10 (version 2004)
- KB4586781 — 2020-11 Cumulative Update for Windows 10 Version 2004
Windows 10 (version 20H2)
- KB4586781 — 2020-11 Cumulative Update for Windows 10 Version 20H2
Additional resources
- November 2020 Security Updates release notes
- List of software updates for Microsoft products
- List of the latest Windows Updates and Services Packs
- Security Updates Guide
- Microsoft Update Catalog site
- Our in-depth Windows update guide
- How to install optional updates on Windows 10
- Windows 10 Update History
- Windows 8.1 Update History
- Windows 7 Update History


Related:
Microsoft November 2020 Patch Tuesday arrives with fix for Windows zero-day
The Microsoft November 2020 Patch Tuesday fixes 112 vulnerabilities, 24 of which are remote code execution (RCE) bugs.
Related:
Defcon 17 sql injection software
Related:
Power Settings in Citrix Hypervisor: C-states, Turbo and CPU Frequency Scaling
This article explains how to handle your power settings and how you can change the configuration to fit your specific needs.
Citrix Hypervisor (formerly XenServer) has the following power settings:
For Intel processors:
-
Use all available C-states regardless of BIOS settings
-
Use the “performance” CPU frequency governor
-
Use frequency scaling and Turbo mode as controlled by the BIOS settings
For AMD processors:
-
Use the BIOS settings to know which C-states are supported
-
Use the more power-friendly “ondemand” CPU frequency governor
-
Use frequency scaling and Turbo mode as controlled by the BIOS settings
It is recommended to use Citrix Hypervisor’s default configuration and to enable OS-controlled frequency scaling and Turbo mode in the BIOS.
C-states
- For Intel processors, Citrix Hypervisor uses all the available C-states regardless of the BIOS C-state settings.
- For AMD processors, changing C-state settings in the BIOS does have an effect for AMD processors.
Citrix Hypervisor uses Xen Project Hypervisor’s means of enumerating and using C-states for newer Intel processors. Xen Project Hypervisor comes preloaded with the C-states and performance characteristics of each processor family (like Sandy Bridge, Haswell, etc). It chooses the correct information at boot based on the processor used. This improves performance because Xen can make more accurate decisions about which C-state to use. For example, C1 and C1E are treated as two separate states which gives Xen more flexibility in the choice of C-state. Modern CPUs can transition between C-states very quickly so the use of deep C-states has minimal performance impact but provides great potential for power saving.
Falling back to use of BIOS C-state settings
To revert to the C-state configuration for Intel processors that was used by older versions of XenServer (6.2 and earlier), use the following command in dom0:
/opt/xensource/libexec/xen-cmdline --set-xen mwait-idle=false
A reboot is required for this change to take effect. After this, controlling C-states in the BIOS will have an effect on Citrix Hypervisor. This is not a recommended configuration as it is likely to lead to reduced performance.
To go back to the default configuration, use the following and reboot:
/opt/xensource/libexec/xen-cmdline --delete-xen mwait-idle
Exploiting Turbo mode
Using all the available C-states gives the processor most thermal headroom to enter Turbo mode. Hence the default configuration that uses all available C-states should give the best performance for processors supporting a Turbo mode.
For maximum performance, it is recommended that Turbo mode is enabled in the BIOS.
To determine whether Turbo mode is enabled, use the following command in dom0:
# xenpm get-cpufreq-para | fgrep turboturbo mode : enabled
To verify that Turbo mode is being used stress the CPU in a VM and check that the CPU frequency is higher than the rated value:
# grep "model name" /proc/cpuinfomodel name : Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz
With VMs idle:
# xenpm start 1|grep "Avg freq" Avg freq 3503030 KHz Avg freq 2856840 KHz Avg freq 2788820 KHz Avg freq 2312680 KHz Avg freq 2210650 KHz Avg freq 3537040 KHz Avg freq 3469020 KHz Avg freq 2584760 KHz
With VMs busy:
# xenpm start 1|grep "Avg freq" Avg freq 3673080 KHz Avg freq 3571050 KHz Avg freq 3503030 KHz Avg freq 3537040 KHz Avg freq 3469020 KHz Avg freq 3537040 KHz Avg freq 3469020 KHz Avg freq 3571050 KHz
Avoiding Turbo mode
Some users might wish to avoid using Turbo mode, for example when running workloads that require low-latency wakeups, or when desiring consistent rather than maximal performance. In practice, this can normally be achieved by forcing the processor to stay in C0.
The maximum C-state can be set as in previous versions of XenServer (6.2 and earlier). To immediately force the processor to stay in C0, execute the following command in dom0:
xenpm set-max-cstate 0
Or, to make this change persist across reboots, use the following command and reboot:
/opt/xensource/libexec/xen-cmdline --set-xen max_cstate=0
Note that forcing the processor to stay in C0 will significantly increase the power consumption and may reduce the lifespan of the processor (From Section 4.2.2 of the 4th Generation Intel Core Datasheet Volume 1: “Long term reliability cannot be assured unless all the Low-Power Idle States are enabled”).
When setting a maximum C-state, note that C-state numbers do not necessarily correspond directly with ACPI C-state names. The C-states mentioned in the output of “xenpm get-cpuidle-states” are simply a numerical list of all the C-states that Xen knows about, listed as C0, C1, C2, etc. This means that ACPI C0 will appear as C0, ACPI C1 will appear as C1, ACPI C1E will appear as C2, and so on. Furthermore, some states might not be individually addressable with “xenpm set-max-cstate <X>” and setting the maximum C-state to X does not necessarily mean that only C0..CX will be used.
CPU Frequencies
Frequency scaling and Turbo mode are controlled by the BIOS settings. Citrix Hypervisor controls each processor core’s frequency by adjusting the P-state.
Citrix recommends configuring the BIOS frequency scaling settings to use “OS control” mode (or equivalent) and to enable Turbo mode.
In its default configuration,Citrix Hypervisor uses the “performance” governor for Intel processors and the more power-friendly “ondemand” governor for AMD processors. This is the recommended configuration.
-
The performance governor always sets the processor to its maximum P-state which results in the highest frequency being used.
-
The ondemand governor dynamically downclocks the cores. This can provide some power savings at the cost of performance.
For AMD processors, the “ondemand” governor is normally preferred as it gives a good compromise between performance and power-saving. By contrast, Intel processors typically save power by entering deep C-states so the “performance” governor is preferred.
Changing governor
Some users may wish to change the CPU frequency governor – for example, to sacrifice performance to make power savings, or vice versa.
In order to use a different governor at runtime, run the following command in dom0:
xenpm set-scaling-governor performance
or:
xenpm set-scaling-governor ondemand
In order to make this change persist across reboots, use:
/opt/xensource/libexec/xen-cmdline --set-xen cpufreq=xen:performance
or:
/opt/xensource/libexec/xen-cmdline --set-xen cpufreq=xen:ondemand
Setting the CPU frequency governor to “performance” should not have a significantly detrimental effect on the ability of the processor to enter Turbo mode for Intel processors. Since entering Turbo mode usually relies on other cores being idle, having the idle cores at a higher frequency does not matter because the default C-state configuration allows the processor to stop its clocks when idle.
Thermal effects
In order to maximize performance, CPUs should be allowed to run at maximum frequency. However, many CPUs will decrease their operating frequency if they overheat. Overheating is more likely to happen if cores are forced to run in P0 and C0 or while there is a sustained high CPU load.
In order to avoid overheating, the CPU and chassis fans should be configured to maximum speed. This will ensure CPUs stay cool at the cost of increased power consumption. Note that “adaptive” or “automatic” fan speed settings may not always go to maximum speed so do not necessarily perform maximal cooling.