Verify Patch Installation
My problem is that these patches were already deployed and installed in my environment when they were initially released. I used a custom patch installation verification application that utilizes file and registry checks to verify whether a patch has been installed on a system. I want to know if there is a file or registry change between the files modified in the initial patch and the rerelease patch. Checking the control panel on 2400+ computers is unfeasible. thank you for your time and effort on this issue. Your response would be apreciated.
October 19th, 2012 9:01am

In light of the re-release of Microsoft patches for the months of August and September, how can installation of these new re-released patches be verified with out the use of 3rd party tools? i.e through either file or registry check. Also, are there any differences in Update Deployment file verification information? Specifically Patches: ms12-053 ms12-054 ms12-055 ms12-058
Free Windows Admin Tool Kit Click here and download it now
October 20th, 2012 7:08am

Hi, Thanks for the reply. As far as I know, with Microsoft Solutions, we can try the following: 1. Use DISM utility to get a list of installed packages in each client. dism /online /get-packages > C:\InstalledUpdates.txt Running this command in each client can help to generate a text file with installed updates. You can collect the files and check them. More information: Deployment Image Servicing and Management Technical Reference 2. The another solution is to use WSUS Reporting Service. More information: WSUS 3.0 SP2 Reports Update Status Report Terminology for WSUS 3.0 SP2 Windows Server Update Services Hope this helps. Jeremy Wu TechNet Community Support
October 20th, 2012 9:39am

Hi, Based on my knowledge, you may only need to verity the right KB numbers list in Control Panel -> Programs -> Programs and Features -> Installed Updates. For more information, please refer to the Affected and Non-Affected Software sections of the following documents: Microsoft Security Bulletin MS12-053 - Critical Microsoft Security Bulletin MS12-054 - Critical Microsoft Security Bulletin MS12-055 - Important Microsoft Security Bulletin MS12-058 - Critical Hope this helps. Jeremy Wu TechNet Community Support
Free Windows Admin Tool Kit Click here and download it now
October 21st, 2012 4:07am

Hi, Thanks for the reply. As far as I know, with Microsoft Solutions, we can try the following: 1. Use DISM utility to get a list of installed packages in each client. dism /online /get-packages > C:\InstalledUpdates.txt Running this command in each client can help to generate a text file with installed updates. You can collect the files and check them. More information: Deployment Image Servicing and Management Technical Reference 2. The another solution is to use WSUS Reporting Service. More information: WSUS 3.0 SP2 Reports Update Status Report Terminology for WSUS 3.0 SP2 Windows Server Update Services Hope this helps. Jeremy Wu TechNet Community Support
October 22nd, 2012 9:37am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics