KB5020030

詳細情報

KB番号 KB5020030 Preview
リリース日 2022/11/15
Windowsバージョン Windows 10 22H2 / Windows 10 21H2 / Windows 10 21H1 / Windows 10 20H2
ビルド番号 19045.2311 / 19044.2311 / 19043.2311 / 19042.2311
URL(英語) https://support.microsoft.com/en-us/help/5020030
URL(日本語) https://support.microsoft.com/ja-jp/help/5020030
ダウンロード Microsoft Update Catalog

ハイライト

  • New! The search box now appears, by default, on the taskbar when the taskbar is at the top of your screen or when you turn on small taskbar button mode. You can use the search box to discover information and search your PC and the web directly from your taskbar. To configure how search appears, right-click the taskbar of your primary monitor and hover over Search. For more information, see Learn more about search.

  • New!  To streamline your taskbar experience, Cortana is no longer pre-pinned to your taskbar by default. If you want to re-pin Cortana to the taskbar, see Using Cortana in Windows.

  • It addresses some persistent update failures for the Microsoft Store.

  • It addresses an issue that affects certain printers. The print outputs are misaligned.

  • It addresses the suspension of daylight saving time (DST) in the Republic of Fiji for this year.

改良点

  • New!  It provides the Quick Assist application for your client device.

  • New! The search box now appears, by default, on the taskbar when the taskbar is at the top of your screen or when you turn on small taskbar button mode. You can use the search box to discover information and search your PC and the web directly from your taskbar. To configure how search appears, right-click the taskbar of your primary monitor and hover over Search. For more information, see Learn more about search.

  • New!  To streamline your taskbar experience, Cortana is no longer pre-pinned to your taskbar by default. If you want to re-pin Cortana to the taskbar, see Using Cortana in Windows.

  • New! It provides a way to authenticate Azure Active Directory joined devices to determine if they are on a trusted network. This helps the Windows Defender Firewall to apply the right policies as configured by your organization. This feature is only for enterprise customers. An IT administrator must configure this feature using a mobile device management (MDM) policy. For more information on how to configure a configuration service provider (CSP), see Policy CSP – NetworkListManager.

  • It addresses an issue that affects some devices that are managed by an enterprise. We improve the reliability of app installations for them.

  • It addresses an issue that affects cluster name objects (CNO) or virtual computer objects (VCO). Password reset fails. The error message is, " There was an error resetting the AD password... // 0x80070005”.

  • It addresses some persistent update failures for the Microsoft Store.

  • It addresses the suspension of daylight saving time (DST) in the Republic of Fiji for this year.

  • It addresses an issue that affects Microsoft Direct3D 9 (D3D9). It causes D3D9 to stop working when you use Microsoft Remote Desktop.

  • It addresses an issue that affects certain printers. The print outputs are misaligned.

  • It addresses an issue that might affect applications that run on the Windows Lock Down Policy (WLDP). They might stop working.

  • It addresses an issue that affects Microsoft Defender for Endpoint. Automated investigation blocks live response investigations.

既知の不具合

SymptomsWorkaround

Devices with Windows installations created from custom offline media or custom ISO image might have Microsoft Edge Legacy removed by this update, but not automatically replaced by the new Microsoft Edge. This issue is only encountered when custom offline media or ISO images are created by slipstreaming this update into the image without having first installed the standalone servicing stack update (SSU) released March 29, 2021 or later.

Note Devices that connect directly to Windows Update to receive updates are not affected. This includes devices using Windows Update for Business. Any device connecting to Windows Update should always receive the latest versions of the SSU and latest cumulative update (LCU) without any extra steps.

To avoid this issue, be sure to first slipstream the SSU released March 29, 2021 or later into the custom offline media or ISO image before slipstreaming the LCU. To do this with the combined SSU and LCU packages now used for Windows 10, version 20H2 and Windows 10, version 2004, you will need to extract the SSU from the combined package. Use the following steps to extract the SSU:

  1. Extract the cab from the msu via this command line (using the package for KB5000842 as an example): expand Windows10.0-KB5000842-x64.msu /f:Windows10.0-KB5000842-x64.cab <destination path>

  2. Extract the SSU from the previously extracted cab via this command line: expand Windows10.0-KB5000842-x64.cab /f:* <destination path>

  3. You will then have the SSU cab, in this example named SSU-19041.903-x64.cab. Slipstream this file into your offline image first, then the LCU.

If you have already encountered this issue by installing the OS using affected custom media, you can mitigate it by directly installing the new Microsoft Edge. If you need to broadly deploy the new Microsoft Edge for business, see Download and deploy Microsoft Edge for business.

After installing updates released on November 8, 2022 or later on Windows Servers with the Domain Controller role, you might have issues with Kerberos authentication. This issue might affect any Kerberos authentication in your environment. Some scenarios that might be affected:

  • Domain user sign in might fail. This also might affect Active Directory Federation Services (AD FS) authentication.

  • Group Managed Service Accounts (gMSA) used for services such as Internet Information Services (IIS Web Server) might fail to authenticate.

  • Remote Desktop connections using domain users might fail to connect.

  • You might be unable to access shared folders on workstations and file shares on servers.

  • Printing that requires domain user authentication might fail.

When this issue is encountered you might receive a Microsoft-Windows-Kerberos-Key-Distribution-Center Event ID 14 error event in the System section of Event Log on your Domain Controller with the below text. Note: affected events will have "the missing key has an ID of 1":

While processing an AS request for target service <service>, the account <account name> did not have a suitable key for generating a Kerberos ticket (the missing key has an ID of 1). The requested etypes : 18 3. The accounts available etypes : 23 18 17. Changing or resetting the password of <account name> will generate a proper key.

Note This issue is not an expected part of the security hardening for Netlogon and Kerberos starting with November 2022 security update. You will still need to follow the guidance in these articles even after this issue is resolved.

Windows devices used at home by consumers or devices that are not part of a on-premises domain are not affected by this issue. Azure Active Directory environments that are not hybrid and do not have any on premises Active Directory servers are not affected.

This issue was addressed in out-of-band updates released November 17, 2022, for installation on all the Domain Controllers (DCs) in your environment. You do not need to install any update or make any changes to other servers or client devices in your environment to resolve this issue. If you used any workaround or mitigations for this issue, they are no longer needed, and we recommend you remove them.

To get the standalone package for these out-of-band updates, search for the KB number in the Microsoft Update Catalog. You can manually import these updates into Windows Server Update Services (WSUS) and Microsoft Endpoint Configuration Manager. For WSUS instructions, see WSUS and the Catalog Site. For Configuration Manger instructions, see Import updates from the Microsoft Update Catalog.

Note The below updates are not available from Windows Update and will not install automatically.

Cumulative updates:

  • Windows Server 2022: KB5021656

  • Windows Server 2019: KB5021655

  • Windows Server 2016: KB5021654

Note You do not need to apply any previous update before installing these cumulative updates. If you have already installed updates released November 8, 2022, you do not need to uninstall the affected updates before installing any later updates including the updates listed above.

Standalone Updates:

  • Windows Server 2012 R2: KB5021653

  • Windows Server 2012: KB5021652

  • Windows Server 2008 R2 SP1: This update is not yet available. Please check here in the coming week for more information.

  • Windows Server 2008 SP2: KB5021657

Note If you are using security only updates for these versions of Windows Server, you only need to install these standalone updates for the month of November 2022. Security only updates are not cumulative, and you will also need to install all previous Security only updates to be fully up to date. Monthly rollup updates are cumulative and include security and all quality updates. If you are using Monthly rollup updates, you will need to install both the standalone updates listed above to resolve this issue, and install the Monthly rollups released November 8, 2022, to receive the quality updates for November 2022. If you have already installed updates released November 8, 2022, you do not need to uninstall the affected updates before installing any later updates including the updates listed above.

 

After you install this or later updates, you might be unable to reconnect to Direct Access after temporarily losing network connectivity or transitioning between Wi-Fi networks or access points.

Note This issue should not affect other remote access solutions such as VPN (sometimes called Remote Access Server or RAS) and Always On VPN (AOVPN).

Windows devices used at home by consumers or devices in organizations which are not using Direct Access to remotely access the organization's network resources are not affected.

 This issue is addressed in updates released December 13, 2022 (KB5021233) and later. We recommend you install the latest security update for your device. It contains important improvements and issue resolutions, including this one. If you install an update released December 13, 2022 (KB5021233) or later, you do not need to use a Known Issue Rollback (KIR) or a special Group Policy to address this issue. If you are using an update released before December 13, 2022, and have this issue, you can address it by installing and configuring the special Group Policy listed below. The special Group Policy can be found in Computer Configuration -> Administrative Templates -> <Group Policy name listed below>.

For information on deploying and configuring these special Group Policy, please see How to use Group Policy to deploy a Known Issue Rollback.

Group Policy downloads with Group Policy name:

  • Download for Windows 11, version 22H2 - KB5018427 221029_091533 Known Issue Rollback

  • Download for Windows 11, version 21H2 - KB5018483 220927_043051 Known Issue Rollback

  • Download for Windows Server 2022 - KB5018485 220927_043049 Known Issue Rollback

  • Download for Windows 10, version 22H2; Windows 10, version 21H2; Windows 10, version 21H1; Windows 10, version 20H2 - KB5018482 220927_043047 Known Issue Rollback

Important You must install and configure the Group Policy for your version of Windows to resolve this issue.

After installing this update, apps that use ODBC connections utilizing the Microsoft ODBC SQL Server Driver (sqlsrv32.dll) to access databases might fail to connect. You might receive an error within the app or you might receive an error from SQL Server, such as "The EMS System encountered a problem" with "Message: [Microsoft][ODBC SQL Server Driver] Protocol error in TDS Stream" or "Message: [Microsoft][ODBC SQL Server Driver]Unknown token received from SQL Server".

Note for developers Apps affected by this issue might fail to fetch data, for example when using the SQLFetch function. This issue might occur when calling SQLBindCol function before SQLFetch or calling SQLGetData function after SQLFetch and when a value of 0 (zero) is given for the ‘BufferLength’ argument for fixed datatypes larger then 4 bytes (such as SQL_C_FLOAT).

If you are unsure if you are using any affected apps, open any apps which use a database and then open Command Prompt (select Start then type command prompt and select it) and type the following command:  

tasklist /m sqlsrv32.dll

This issue is addressed in KB5022282.

ハイライト

準備中です

改良点

準備中です

既知の不具合

準備中です