Microsoft announces ‘Windows 10 update history’ to show users what’s inside updates
To coincide with Patch Tuesday – the day Microsoft’s monthly security patches are released – Microsoft is also creating a Windows 10 update history site.
Because several Windows 10 users were complaining that Microsoft didn’t provide enough information about what its cumulative updates contained, it launched the cumulative update history page.
Microsoft’s new Window 10 update history website will contain notes on each update and serve as a hub for information on older releases.
The new site will do what it says on the tin, namely, documenting the salient points of each update beginning from the one rolled out yesterday, February 9.
While the Fast and Slow rings are already familiar to Insiders, Microsoft’s Gabe Aul said today that the company is now introducing a third option for both Mobile and PC users: the Release Preview ring.
PDF readers have historically been a source of many vulnerabilities, but this is the first patch for Microsoft’s implementation. Go to the Windows 10 Insider page and register using a Microsoft account.
In a Voat thread last week, a user by the name of CheesusCrust published his findings after running a network traffic analysis relating to the telemetry and surveillance features of Windows 10. The monthly updates and periodic upgrades bring with them a wide collection of security fixes, stability improvements, and new features. Although it’s maintained by Adobe, Flash Player is included with Internet Explorer 11 and Edge, so Microsoft is distributing Adobe’s patches through Windows Update.
The problem with that line of thinking, however, is that Windows 10 isn’t a web service that runs on Microsoft’s servers but software the runs locally on users’ machines. Microsoft is increasing the pace of new builds, and new bugs will arise as a result. According to the company, a feature or application update will be added to a Fast ring build as soon as it passes the automated testing in the company’s labs.
Improvements to the device reset experience when BitLocker/Device Encryption is enabled by enterprise policy or by the user.