August 2023 Patch Tuesday Updates are Now Available on Windows 11 and Windows 10

Windows 365

Microsoft has released today the August 2023 Patch Tuesday updates for Windows 11 and Windows 10. This month, Microsoft fixed 86 vulnerabilities in Windows, Office, and other components, and you can also expect the usual bug fixes and quality improvements.

After the July Patch Tuesday update for Windows 11 version 22H2 enabled the new “Moment 3” features on the latest version of Windows, we’ll likely need to wait until Windows 11 version 23H2 ships later this fall to see new features come to the OS. Microsoft already announced that the next annual update for Windows 11 will be released as an enablement package, which should guarantee a seamless update process for organizations

August 2023 Patch Tuesday updates fix over 80 vulnerabilities

As pointed out by the Zero Day Initiative, Microsoft released a total of 86 patches today, with fixes for six critical vulnerabilities. None of them are already being exploited by attackers, however. 

Here are the most important vulnerabilities you should know about this month:

  • CVE-2023-35385/36910/36911: These three Microsoft Message Queuing Remote Code Execution vulnerabilities could allow unauthenticated attackers to remotely execute code on the target server. However, the Windows message queuing service needs to be enabled to make systems vulnerable, and this feature can be enabled from the Control Panel. 
  • CVE-2023-29328/29330: These two Microsoft Teams Remote Code Execution vulnerabilities require attackers to trick victims into joining a Teams meeting which would enable them to perform remote code execution.
  • CVE-2023-21709: This Microsoft Exchange Server Elevation of Privilege vulnerability could allow attackers in a network-based attack to brute force user account passwords to log in as other users.

Here’s the full list of CVEs Microsoft released this month:

ProductImpactMax SeverityArticleDownloadDetails
Microsoft .NET Framework 2.0 Service Pack 2Elevation of PrivilegeImportant5029654Monthly RollupCVE-2023-36899
Microsoft .NET Framework 2.0 Service Pack 2Elevation of PrivilegeImportant5029569Security OnlyCVE-2023-36899
Microsoft .NET Framework 4.6.2Elevation of PrivilegeImportant5029654Monthly RollupCVE-2023-36899
Microsoft .NET Framework 4.6.2Elevation of PrivilegeImportant5029569Security OnlyCVE-2023-36899
Microsoft .NET Framework 3.5 AND 4.8.1Elevation of PrivilegeImportant5029649Security UpdateCVE-2023-36899
Microsoft .NET Framework 3.5 AND 4.8.1Elevation of PrivilegeImportant5029655Security UpdateCVE-2023-36899
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2Elevation of PrivilegeImportant5029653Monthly RollupCVE-2023-36899
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2Elevation of PrivilegeImportant5029568Security OnlyCVE-2023-36899
Microsoft .NET Framework 3.5 AND 4.7.2Elevation of PrivilegeImportant5029647Security UpdateCVE-2023-36899
Microsoft .NET Framework 3.5 AND 4.8Elevation of PrivilegeImportant5029650Security UpdateCVE-2023-36899
Microsoft .NET Framework 3.5 AND 4.8Elevation of PrivilegeImportant5029647Security UpdateCVE-2023-36899
Microsoft .NET Framework 3.5 AND 4.8Elevation of PrivilegeImportant5029655Security UpdateCVE-2023-36899
Microsoft .NET Framework 4.8Elevation of PrivilegeImportant5028952Security UpdateCVE-2023-36899
Microsoft .NET Framework 3.5 AND 4.8.1SpoofingImportant5028948Security UpdateCVE-2023-36873
Microsoft .NET Framework 3.5 AND 4.8.1SpoofingImportant5029648Security UpdateCVE-2023-36873
Microsoft .NET Framework 3.5 AND 4.8.1SpoofingImportant5029650Security UpdateCVE-2023-36873
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2SpoofingImportant5029652Monthly RollupCVE-2023-36873
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2SpoofingImportant5029567Security OnlyCVE-2023-36873
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2SpoofingImportant5029651Monthly RollupCVE-2023-36873
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2SpoofingImportant5029566Security OnlyCVE-2023-36873
Microsoft .NET Framework 3.5 AND 4.8SpoofingImportant5029649Security UpdateCVE-2023-36873
Microsoft .NET Framework 3.5 AND 4.8SpoofingImportant5029648Security UpdateCVE-2023-36873
Microsoft .NET Framework 4.8SpoofingImportant5029653Monthly RollupCVE-2023-36873
Microsoft .NET Framework 4.8SpoofingImportant5029568Security OnlyCVE-2023-36873
Microsoft .NET Framework 4.8SpoofingImportant5029652Monthly RollupCVE-2023-36873
Microsoft .NET Framework 4.8SpoofingImportant5029567Security OnlyCVE-2023-36873
Microsoft .NET Framework 4.8SpoofingImportant5029651Monthly RollupCVE-2023-36873
Microsoft .NET Framework 4.8SpoofingImportant5029566Security OnlyCVE-2023-36873
Azure DevOps Server 2019.0.1SpoofingImportantRelease NotesSecurity UpdateCVE-2023-36869
Microsoft Dynamics 365 Business Central 2023 Release Wave 1Elevation of PrivilegeImportant5029765Security UpdateCVE-2023-38167
Microsoft Teams for MacRemote Code ExecutionCriticalRelease NotesSecurity UpdateCVE-2023-29328
Microsoft Teams for AndroidRemote Code ExecutionCriticalRelease NotesSecurity UpdateCVE-2023-29328
Microsoft Teams for iOSRemote Code ExecutionCriticalRelease NotesSecurity UpdateCVE-2023-29328
Microsoft Visual Studio 2022 version 17.4Denial of ServiceImportantRelease NotesSecurity UpdateCVE-2023-38178
Microsoft Visual Studio 2022 version 17.2Denial of ServiceImportantRelease NotesSecurity UpdateCVE-2023-38178
Microsoft Visual Studio 2022 version 17.6Denial of ServiceImportantRelease NotesSecurity UpdateCVE-2023-38180
Microsoft ODBC Driver 18 for SQL Server on WindowsRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2023-38169
Microsoft ODBC Driver 17 for SQL Server on WindowsRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2023-38169
Microsoft SQL Server 2019 for x64-based Systems (CU 21)Remote Code ExecutionImportant5025808Security UpdateCVE-2023-38169
Microsoft ODBC Driver 18 for SQL Server on MacOSRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2023-38169
Microsoft ODBC Driver 17 for SQL Server on LinuxRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2023-38169
Microsoft SQL Server 2022 for x64-based Systems (CU 5)Remote Code ExecutionImportant5026806Security UpdateCVE-2023-38169
Microsoft ODBC Driver 17 for SQL Server on MacOSRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2023-38169
Microsoft ODBC Driver 18 for SQL Server on LinuxRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2023-38169
Microsoft OLE DB Driver 18 for SQL ServerRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2023-38169
Microsoft OLE DB Driver 19 for SQL ServerRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2023-38169
.NET 7.0Information DisclosureImportant5029689Security UpdateCVE-2023-35391
HEVC Video ExtensionsRemote Code ExecutionImportantDescriptionSecurity UpdateCVE-2023-38170
HEVC Video ExtensionRemote Code ExecutionImportantVLSCSecurity UpdateCVE-2023-38170
Visual Studio 2010 Tools for Office RuntimeSpoofingImportant5029497Security UpdateCVE-2023-36897
Windows Server 2012 R2 (Server Core installation)Denial of ServiceImportant5029312Monthly RollupCVE-2023-38172
Windows Server 2012 R2 (Server Core installation)Denial of ServiceImportant5029304Security OnlyCVE-2023-38172
Windows Server 2012 R2Denial of ServiceImportant5029312Monthly RollupCVE-2023-38172
Windows Server 2012 R2Denial of ServiceImportant5029304Security OnlyCVE-2023-38172
Windows Server 2012 (Server Core installation)Denial of ServiceImportant5029295Monthly RollupCVE-2023-38172
Windows Server 2012 (Server Core installation)Denial of ServiceImportant5029308Security OnlyCVE-2023-38172
Windows Server 2012Denial of ServiceImportant5029295Monthly RollupCVE-2023-38172
Windows Server 2012Denial of ServiceImportant5029308Security OnlyCVE-2023-38172
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Denial of ServiceImportant5029296Monthly RollupCVE-2023-38172
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Denial of ServiceImportant5029307Security OnlyCVE-2023-38172
Windows Server 2008 R2 for x64-based Systems Service Pack 1Denial of ServiceImportant5029296Monthly RollupCVE-2023-38172
Windows Server 2008 R2 for x64-based Systems Service Pack 1Denial of ServiceImportant5029307Security OnlyCVE-2023-38172
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Denial of ServiceImportant5029318Monthly RollupCVE-2023-38172
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Denial of ServiceImportant5029301Security OnlyCVE-2023-38172
Windows Server 2008 for x64-based Systems Service Pack 2Denial of ServiceImportant5029318Monthly RollupCVE-2023-38172
Windows Server 2008 for x64-based Systems Service Pack 2Denial of ServiceImportant5029301Security OnlyCVE-2023-38172
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Denial of ServiceImportant5029318Monthly RollupCVE-2023-38172
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Denial of ServiceImportant5029301Security OnlyCVE-2023-38172
Windows Server 2008 for 32-bit Systems Service Pack 2Denial of ServiceImportant5029318Monthly RollupCVE-2023-38172
Windows Server 2008 for 32-bit Systems Service Pack 2Denial of ServiceImportant5029301Security OnlyCVE-2023-38172
Windows Server 2016 (Server Core installation)Denial of ServiceImportant5029242Security UpdateCVE-2023-38172
Windows Server 2016Denial of ServiceImportant5029242Security UpdateCVE-2023-38172
Windows 10 Version 1607 for x64-based SystemsDenial of ServiceImportant5029242Security UpdateCVE-2023-38172
Windows 10 Version 1607 for 32-bit SystemsDenial of ServiceImportant5029242Security UpdateCVE-2023-38172
Windows 10 for x64-based SystemsDenial of ServiceImportant5029259Security UpdateCVE-2023-38172
Windows 10 for 32-bit SystemsDenial of ServiceImportant5029259Security UpdateCVE-2023-38172
Windows 10 Version 22H2 for 32-bit SystemsDenial of ServiceImportant5029244Security UpdateCVE-2023-38172
Windows 10 Version 22H2 for ARM64-based SystemsDenial of ServiceImportant5029244Security UpdateCVE-2023-38172
Windows 10 Version 22H2 for x64-based SystemsDenial of ServiceImportant5029244Security UpdateCVE-2023-38172
Windows 11 Version 22H2 for x64-based SystemsDenial of ServiceImportant5029263Security UpdateCVE-2023-38172
Windows 11 Version 22H2 for ARM64-based SystemsDenial of ServiceImportant5029263Security UpdateCVE-2023-38172
Windows 10 Version 21H2 for x64-based SystemsDenial of ServiceImportant5029244Security UpdateCVE-2023-38172
Windows 10 Version 21H2 for ARM64-based SystemsDenial of ServiceImportant5029244Security UpdateCVE-2023-38172
Windows 10 Version 21H2 for 32-bit SystemsDenial of ServiceImportant5029244Security UpdateCVE-2023-38172
Windows 11 version 21H2 for ARM64-based SystemsDenial of ServiceImportant5029253Security UpdateCVE-2023-38172
Windows 11 version 21H2 for x64-based SystemsDenial of ServiceImportant5029253Security UpdateCVE-2023-38172
Windows Server 2022 (Server Core installation)Denial of ServiceImportant5029250Security UpdateCVE-2023-38172
Windows Server 2022 (Server Core installation)Denial of ServiceImportant5029367Security Hotpatch UpdateCVE-2023-38172
Windows Server 2022Denial of ServiceImportant5029250Security UpdateCVE-2023-38172
Windows Server 2022Denial of ServiceImportant5029367Security Hotpatch UpdateCVE-2023-38172
Windows Server 2019 (Server Core installation)Denial of ServiceImportant5029247Security UpdateCVE-2023-38172
Windows Server 2019Denial of ServiceImportant5029247Security UpdateCVE-2023-38172
Windows 10 Version 1809 for ARM64-based SystemsDenial of ServiceImportant5029247Security UpdateCVE-2023-38172
Windows 10 Version 1809 for x64-based SystemsDenial of ServiceImportant5029247Security UpdateCVE-2023-38172
Windows 10 Version 1809 for 32-bit SystemsDenial of ServiceImportant5029247Security UpdateCVE-2023-38172
Azure HDInsightsSpoofingImportantRelease NotesSecurity UpdateCVE-2023-36881
Microsoft Exchange Server 2019 Cumulative Update 12Remote Code ExecutionImportant5029388Security UpdateCVE-2023-35368
Microsoft Exchange Server 2016 Cumulative Update 23Remote Code ExecutionImportant5029388Security UpdateCVE-2023-35368
Microsoft Exchange Server 2019 Cumulative Update 13Remote Code ExecutionImportant5029388Security UpdateCVE-2023-35368
Microsoft Office 2019 for 32-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2023-35372
Microsoft Office 2019 for 64-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2023-35372
Microsoft 365 Apps for Enterprise for 32-bit SystemsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2023-35372
Microsoft Office LTSC 2021 for 32-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2023-35372
Microsoft 365 Apps for Enterprise for 64-bit SystemsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2023-35372
Microsoft Office LTSC 2021 for 64-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2023-35372
.NET 6.0Information DisclosureImportant5029688Security UpdateCVE-2023-35391
ASP.NET Core 2.1Information DisclosureImportantRelease NotesSecurity UpdateCVE-2023-35391
Microsoft Dynamics 365 (on-premises) version 9.1Remote Code ExecutionImportant5026501Security UpdateCVE-2023-35389
Microsoft Dynamics 365 (on-premises) version 9.0Remote Code ExecutionImportant5026500Security UpdateCVE-2023-35389
Windows Server 2012 R2 (Server Core installation)Security Feature BypassImportant5029243IE CumulativeCVE-2023-35384
Windows Server 2012 R2Security Feature BypassImportant5029243IE CumulativeCVE-2023-35384
Microsoft Excel 2013 Service Pack 1 (64-bit editions)Remote Code ExecutionImportant5002451Security UpdateCVE-2023-36896
Microsoft Excel 2013 Service Pack 1 (32-bit editions)Remote Code ExecutionImportant5002451Security UpdateCVE-2023-36896
Microsoft Excel 2013 RT Service Pack 1Remote Code ExecutionImportant5002451Security UpdateCVE-2023-36896
Microsoft Excel 2016 (64-bit edition)Remote Code ExecutionImportant5002463Security UpdateCVE-2023-36896
Microsoft Excel 2016 (32-bit edition)Remote Code ExecutionImportant5002463Security UpdateCVE-2023-36896
Microsoft Office LTSC for Mac 2021Remote Code ExecutionImportantCVE-2023-36896
Microsoft Office Online ServerRemote Code ExecutionImportant5002435Security UpdateCVE-2023-36896
Microsoft Office 2019 for MacRemote Code ExecutionImportantCVE-2023-36896
Microsoft Office 2013 Service Pack 1 (64-bit editions)Remote Code ExecutionCritical5002445Security UpdateCVE-2023-36895
Microsoft Office 2013 Service Pack 1 (32-bit editions)Remote Code ExecutionCritical5002445Security UpdateCVE-2023-36895
Microsoft Office 2013 RT Service Pack 1Remote Code ExecutionCritical5002445Security UpdateCVE-2023-36895
Microsoft Office 2016 (64-bit edition)Remote Code ExecutionCritical5002464Security UpdateCVE-2023-36895
Microsoft Office 2016 (32-bit edition)Remote Code ExecutionCritical5002464Security UpdateCVE-2023-36895
Microsoft Outlook 2013 RT Service Pack 1SpoofingImportant5002449Security UpdateCVE-2023-36893
Microsoft SharePoint Server Subscription EditionInformation DisclosureImportant5002437Security UpdateCVE-2023-36894
Microsoft SharePoint Server 2019Information DisclosureImportant5002436Security UpdateCVE-2023-36894
Microsoft SharePoint Server 2019Information DisclosureImportant5002422Security UpdateCVE-2023-36894
Microsoft SharePoint Enterprise Server 2016Information DisclosureImportant5002453Security UpdateCVE-2023-36894
Microsoft SharePoint Enterprise Server 2016Information DisclosureImportant5002398Security UpdateCVE-2023-36894
Microsoft Outlook 2013 Service Pack 1 (64-bit editions)SpoofingImportant5002449Security UpdateCVE-2023-36893
Microsoft Outlook 2013 Service Pack 1 (32-bit editions)SpoofingImportant5002449Security UpdateCVE-2023-36893
Microsoft Outlook 2016 (64-bit edition)SpoofingImportant5002459Security UpdateCVE-2023-36893
Microsoft Outlook 2016 (32-bit edition)SpoofingImportant5002459Security UpdateCVE-2023-36893
Azure DevOps Server 2022.0.1SpoofingImportantRelease NotesSecurity UpdateCVE-2023-36869
Azure DevOps Server 2020.1.2SpoofingImportantRelease NotesSecurity UpdateCVE-2023-36869
Azure DevOps Server 2019.1.2SpoofingImportantRelease NotesSecurity UpdateCVE-2023-36869
Memory Integrity System Readiness Scan ToolDefense in DepthModerateRelease NotesUpdateADV230004
Microsoft Word 2013 Service Pack 1 (64-bit editions)Defense in DepthModerate5002445Security UpdateADV230003
Microsoft Word 2013 Service Pack 1 (32-bit editions)Defense in DepthModerate5002445Security UpdateADV230003
Microsoft Word 2013 RT Service Pack 1Defense in DepthModerate5002445Security UpdateADV230003
Microsoft Publisher 2013 Service Pack 1 (64-bit editions)Defense in DepthModerate5002391Security UpdateADV230003
Microsoft Publisher 2013 Service Pack 1 (32-bit editions)Defense in DepthModerate5002391Security UpdateADV230003
Microsoft Office 2013 Service Pack 1 (64-bit editions)Defense in DepthModerate5002439Security UpdateADV230003
Microsoft Office 2013 Service Pack 1 (32-bit editions)Defense in DepthModerate5002439Security UpdateADV230003
Microsoft Office 2013 RT Service Pack 1Defense in DepthModerate5002439Security UpdateADV230003
Microsoft Project 2016 (64-bit edition)Defense in DepthModerate5002328Security UpdateADV230003
Microsoft Project 2016 (32-bit edition)Defense in DepthModerate5002328Security UpdateADV230003
Microsoft Publisher 2016 (64-bit edition)Defense in DepthModerate5002462Security UpdateADV230003
Microsoft Publisher 2016 (32-bit edition)Defense in DepthModerate5002462Security UpdateADV230003
Microsoft Word 2016 (64-bit edition)Defense in DepthModerate5002464Security UpdateADV230003
Microsoft Word 2016 (32-bit edition)Defense in DepthModerate5002464Security UpdateADV230003
Microsoft Visio 2016 (64-bit edition)Defense in DepthModerate5002418Security UpdateADV230003
Microsoft Visio 2016 (32-bit edition)Defense in DepthModerate5002418Security UpdateADV230003
Microsoft PowerPoint 2016 (64-bit edition)Defense in DepthModerate4504720Security UpdateADV230003
Microsoft PowerPoint 2016 (32-bit edition)Defense in DepthModerate4504720Security UpdateADV230003
Microsoft Office 2016 (64-bit edition)Defense in DepthModerate5002465Security UpdateADV230003
Microsoft Office 2016 (32-bit edition)Defense in DepthModerate5002465Security UpdateADV230003
Microsoft Visio 2013 Service Pack 1 (64-bit editions)Defense in DepthModerate5002417Security UpdateADV230003
Microsoft Visio 2013 Service Pack 1 (32-bit editions)Defense in DepthModerate5002417Security UpdateADV230003
Microsoft PowerPoint 2013 RT Service Pack 1Defense in DepthModerate5002399Security UpdateADV230003
Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)Defense in DepthModerate5002399Security UpdateADV230003
Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)Defense in DepthModerate5002399Security UpdateADV230003
Microsoft Publisher 2013 Service Pack 1 RTDefense in DepthModerate5002391Security UpdateADV230003
Microsoft Project 2013 Service Pack 1 (64-bit editions)Defense in DepthModerate4484489Security UpdateADV230003
Microsoft Project 2013 Service Pack 1 (32-bit editions)Defense in DepthModerate4484489Security UpdateADV230003
Azure Arc-Enabled ServersElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2023-38176
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 – 16.10)SpoofingImportantRelease NotesSecurity UpdateCVE-2023-36897
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 – 15.8)SpoofingImportantRelease NotesSecurity UpdateCVE-2023-36897
Windows Defender Antimalware PlatformElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2023-38175
Microsoft Teams for DesktopRemote Code ExecutionCriticalRelease NotesSecurity UpdateCVE-2023-29328
Microsoft Edge (Chromium-based)Release NotesSecurity UpdateCVE-2023-4078
Microsoft Edge for AndroidSpoofingModerateRelease NotesSecurity UpdateCVE-2023-38173
Microsoft Edge (Chromium-based) Extended StableRelease NotesSecurity UpdateCVE-2023-3730
Microsoft Edge for iOSSpoofingModerateRelease NotesSecurity UpdateCVE-2023-36883

Quality and experience updates

For users running Windows 11 version 22H2, today’s KB5029263 patch includes the following quality improvements:

  • Brightness settings should be more accurate
  • Microsoft fixed an issue causing certain display and audio devices to go missing after systems resume from sleep.
  • Users connecting to the Internet via VPN on a wireless mesh network should no longer experience poor network performance. 
  • A bug causing widgets to unexpectedly unpin from the taskbar has also been fixed. 

For Windows 10 users, the KB5029244 update is now available on the versions 21H2 and 22H2 of the OS. It includes the following improvements:

  • Microsoft fixed an issue causing certain display and audio devices to go missing after systems resume from sleep.
  • Microsoft addressed an issue causing some VPN clients to fail to establish a connection.
  • Users should no longer have an issue with the Search app opening in full screen and blocking additional Start Menu actions. 
  • Microsoft has also fixed an issue affecting hybrid joined devices with Windows Hello for Business PIN or biometric credentials. Users could not sign in to them if they were not connected to the internet. 

Windows Update testing and best practices

Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary as hackers start to work out how to weaponize newly reported vulnerabilities.

A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.

There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.

If you have any problems with this month’s patches, please let us know in the comments below. Other readers might be able to share their experiences in how to roll back problematic updates or mitigate issues caused by patches that are important to have in place.