KB4100347 Intel microcode updates for Windows 10 v1803 - January 8 Win Update

Page 7 of 43 FirstFirst ... 5678917 ... LastLast

  1. Posts : 31,651
    10 Home x64 (22H2) (10 Pro on 2nd pc)
       #60

    Geosammy said:
    I haven't received any microcode patches/updates lately,
    that I'm aware of.
    You're a 'builder', I see from your specs. If you flashed your bios in the last 3-6 months or so you may have got the microcode without be aware you were doing so. Or you may just be using kit that's new enough not to need it.

    Whatever, you're fully protected, which is the main thing.
      My Computers


  2. Posts : 671
    Win 10 21H1 (OS Build 19043.1151)
       #61

    Bree said:
    You're a 'builder', I see from your specs. If you flashed your bios in the last 3-6 months or so you may have got the microcode without be aware you were doing so. Or you may just be using kit that's new enough not to need it.

    Whatever, you're fully protected, which is the main thing.
    @Bree
    Yes that's correct.
    Just after Spectre and Meltdown were announced, some time back in January, I think .
    It wasn't long before Gigabyte had a BIOS update for my mobo.
    So I download this update and flashed my BIOS.
    The date of my BIOS is from 1/11/2018.
    Before I did this, the InSpectre Utility wasn't yet available.
    However, a few days, or perhaps a week or so later.
    The InSpectre Utility was released.
    It's been showing that I'm protected ever since then.

    Is the InSpectre Utility the only way to tell, if these vulnerabilities have been patched?
      My Computer


  3. Posts : 2,832
    Windows 10 Pro X64
       #62

    Hi,

    Is the InSpectre Utility the only way to tell, if these vulnerabilities have been patched?
    No, there are other ways but I can assure you that Steve Gibson knows his stuff.

    Cheers,
      My Computers


  4. Posts : 31,651
    10 Home x64 (22H2) (10 Pro on 2nd pc)
       #63

    Geosammy said:
    Is the InSpectre Utility the only way to tell, if these vulnerabilities have been patched?
    It's by far the easiest test, with the added advantage that it includes a database of all current microcode updates that Intel/AMD have released. Frustratingly, it's been telling me for months that mine was available from Intel, but not from Microsoft (until now).

    There is a Powershell script from Microsoft, but at first glance that only seems to check the OS has the patches, not that the microcode is in place. I could well be wrong on that (not having tried it). Others who have used it and know more may correct me on that.

    To help customers confirm whether protections have been enabled, Microsoft has published a PowerShell script that customers can run on their systems. Install and run the script by running the following commands...
    Windows Client Guidance against speculative execution vulnerabilities
      My Computers


  5. Posts : 671
    Win 10 21H1 (OS Build 19043.1151)
       #64

    Bree said:
    It's by far the easiest test, with the added advantage that it includes a database of all current microcode updates that Intel/AMD have released.

    There is a Powershell script from Microsoft, but at first glance that only seems to check the OS has the patches, not that the microcode is in place. I could well be wrong on that (not having tried it). Others who have used it and know more may correct me on that.


    Windows Client Guidance against speculative execution vulnerabilities
    @Bree
    Okay thanks.

    As you can see from my screenshot.
    Things are looking good.
    KB4100347 Intel microcode updates for Windows 10 v1803 - January 8-speculationcontrolsettings.png
      My Computer


  6. Posts : 31,651
    10 Home x64 (22H2) (10 Pro on 2nd pc)
       #65

    Geosammy said:
    As you can see from my screenshot.
    Things are looking good.
    Ah, I see there's a line saying "Hardware support … is present: True". Guess that is referring to the microcode.
      My Computers


  7. Posts : 671
    Win 10 21H1 (OS Build 19043.1151)
       #66

    Bree said:
    Ah, I see there's a line saying "Hardware support … is present: True". Guess that is referring to the microcode.
    @Bree
    Yes, all the "True" responses seem to be in the right place.
    :)
      My Computer


  8. Posts : 324
    Windows 10 Pro 64bit
       #67

    Bree said:
    The protection for Meltdown is apparently possible with just the OS software (not this microcode patch, but OS patches in previous cumulative updates) but Spectre requires the microcode to be in place for the OS protection to be effective. Exactly how much of a performance hit you get depends crucially on which processor you have, some older ones require a lot more work on the OS software side.

    Microcode alone isn't sufficient to protect you, but you need the right microcode (in bios or loaded by this update) for the OS protection to be possible.
    Thanks a lot for your response. At least now it's clear for me and I understand things correctly. I still have one more question that maybe you can answer. Considering that the OS patch is slowing older CPU's (including mine) a lot, some may have (like me) decided to disable the protection from Windows registry. Can we know if the vulnerability is exploitable in certain situations (like doing specific tasks, using specific software, etc ) or is it a permanent open door . I ask this because as it's easy to enable or disable the protection with a click and a reboot, it would be a life saver to be able to use my PC running fast when watching a movie or playing a game and enable protection in needed cases (like accessing my bank account or opening private documents etc)!?
      My Computer


  9. Posts : 349
    Windows 10
       #68

    If your computer has a Sandy Bridge or Ivy Bridge processor and you're experiencing significant slowdown after installing the microcode update patch, I would recommend not immediately disabling it. When I first installed the patch, the slowdown on my old Ivy Bridge laptop was very noticeable. But after about 36 hours and several reboots, the slowdown is now much less noticeable. It's as if the processor needed time to adapt to the changes.
      My Computer


  10. Posts : 31,651
    10 Home x64 (22H2) (10 Pro on 2nd pc)
       #69

    rezpower said:
    Considering that the OS patch is slowing older CPU's (including mine) a lot, some may have (like me) decided to disable the protection from Windows registry.
    I'm (fortunately) not noticing a slowdown, although InSpectre says 'Perfomance: SLOWER'. Perhaps the hit is negligible because of this...
    If there's a bright side to all this, it's that the PCID feature in Intel's x86-64 chips since 2010 can reduce the performance hit from patching Meltdown....

    In other words, if you're seeing crap performance after applying these fixes, look at your kernel configuration and get PCID enabled – if the hardware feature is present in your chipset. Windows should, for what it's worth, use PCID if it's provided by the processor.
    https://www.theregister.co.uk/2018/0...ctre_slowdown/

    You can check if your processor supports PCID with Syinternals Coreinfo, it says that mine does.

    ...as it's easy to enable or disable the protection with a click and a reboot, it would be a life saver to be able to use my PC running fast when watching a movie or playing a game and enable protection in needed cases (like accessing my bank account or opening private documents etc)!?
    I don't understand enough about how these exploits could be used to assess the risks. I can say that disabling just Meltdown protection but leaving Spectre enabled give my machine a 'Performance: GOOD' report from InSpectre.
      My Computers


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 16:03.
Find Us




Windows 10 Forums