KB4100347 Intel microcode updates for Windows 10 v1803 - January 8 Win Update

Page 28 of 43 FirstFirst ... 18262728293038 ... LastLast

  1. Posts : 384
    Windows 10 Home x64
       #270

    andyouf said:
    You'd think an Intel document would have the processors in their proper place with the correct CPUIDs.

    Why are you retaining 0x22 instead of updating?

    Would a BIOS update change microcode versions on the CPU (say to 0x24) or that is at a higher level and just BIOS versions are changed? Are BIOS updates ongoing or is one update a permanent fix (or mitigation) for both Spectre and Meltdown?
    Because I think 0x24 and 0x25 contain only Spectre updates, and I'm choosing not to run them for performance reasons. Measurable CPU slowdowns don't help a gaming rig in any way. For the work laptop, I don't care about the penalties, I want to be secure as it's almost a 24/7 machine.
      My Computers


  2. Posts : 197
    Win10 Pro x64 / WinServer 2016 Essentials
       #271

    Ben Hastings said:
    My thoughts on this update:


    • A lot more CPUs are supported, even down to Sandy Bridge. This is good.
    • Some CPUs are still missing, like the Intel Celeron N3050 even though Intel has released microcode for these.
    • Indeed I was able to confirm on my devices that the update will come via Windows Update if it was previously installed on the 1709 build. However, this is not shown in the update history in the Settings GUI
    Also microcode versions are way behind! Intel publications of 13 July 2018 for several CPU's.
      My Computer


  3. Posts : 215
    Windows 10 Home x64
       #272

    winactive said:
    Because I think 0x24 and 0x25 contain only Spectre updates, and I'm choosing not to run them for performance reasons. Measurable CPU slowdowns don't help a gaming rig in any way. For the work laptop, I don't care about the penalties, I want to be secure as it's almost a 24/7 machine.
    Why not use InSpectre to disable? Just a different route you are taking? Is Spectre a harder performance hit than Meltdown since it deals with the speculative execution issue?
      My Computer


  4. Posts : 384
    Windows 10 Home x64
       #273

    andyouf said:
    Why not use InSpectre to disable? Just a different route you are taking? Is Spectre a harder performance hit than Meltdown since it deals with the speculative execution issue?
    Some Spectre variants need uCode and OS to mitigate. The uCode I have is in the UEFI. It won't be changed unless software tries to patch it, in which case I hide the update. Plus then I know if the Cumulative causes an issue, it's not because of Spectre. Software can easily be altered (reconfigured) and MS are throwing the switch automatically.

    If I used InSpectre or registry to turn it on and off, then MS could turn it back on. I can spot a uCode update in the installed updates easily if anything is downloaded other than the cumulative. If the cumulative tries to turn it back on, it can't because the uCode isn't there. Just call it prior experience of WU.

    Yes Spectre is harder on performance than Meltdown. Plus I don't want to disable Meltdown and I won't if I don't mess with the OS.
      My Computers


  5. Posts : 215
    Windows 10 Home x64
       #274

    Ah I see. I had seen discussion with you and other users talking about needing to hide updates because it was already patched at UEFI and I'm guessing making sure auto-update is off (pro only feature?) But then I thought I read that if the OS update recognizes that UEFI had been updated then it doesn't apply itself.

    winactive said:
    Just call it prior experience of WU.
    Yes, I think with pro users you can do this in settings but I yesterday had to dl that "wushowhide" tool because WU update kept insisting an Intel graphics driver from '16 was more applicable than the one from 2/18 I had just installed. I checked for updates (I do manually all the time I don't know why) and there it goes throwing the old one back on, laughing at me.

    *Oddly, I saw an MS Silverlight update that was already hidden when I first opened the tool.
      My Computer


  6. Posts : 384
    Windows 10 Home x64
       #275

    andyouf said:
    Ah I see. I had seen discussion with you and other users talking about needing to hide updates because it was already patched at UEFI and I'm guessing making sure auto-update is off (pro only feature?) But then I thought I read that if the OS update recognizes that UEFI had been updated then it doesn't apply itself.



    Yes, I think with pro users you can do this in settings but I yesterday had to dl that "wushowhide" tool because WU update kept insisting an Intel graphics driver from '16 was more applicable than the one from 2/18 I had just installed. I checked for updates (I do manually all the time I don't know why) and there it goes throwing the old one back on, laughing at me.

    *Oddly, I saw an MS Silverlight update that was already hidden when I first opened the tool.
    Yes, unfortunately I'm in the same boat as you, I have to use wushowhide.cab

    Hiding KB4100347 blocks it for me. Not really sure of the wushowhide mechanism either, does it work on the description or the KB number? I'd have to assume the latter. All I know is HWiNFO shows me on 0x22 and that's what's in my UEFI so that's good enough for me.
      My Computers


  7. Posts : 2,450
    Windows 10 Pro x64
       #276

    winactive said:
    Currently, I run uCode 0x22 (pre-Spectre) so I don't make any adjustments to the OS registry.

    Thank you for the registry file @ddelo. It will be very useful with the remarks within.
    You're welcome.

    As for your above statement, I believe that since your BIOS/UEFI is not patched with the appropriate (according to intel) μcode and your CPU is identified as vulnerable, you need to make the registry entries, to be able to receive the Microsoft updates with the mitigations.
    After all that's why the Microsoft updates exist. To cover your a**, while waiting for a BIOS/UEFI update.
      My Computer


  8. Posts : 384
    Windows 10 Home x64
       #277

    ddelo said:
    You're welcome.

    As for your above statement, I believe that since your BIOS/UEFI is not patched with the appropriate (according to intel) μcode and your CPU is identified as vulnerable, you need to make the registry entries, to be able to receive the Microsoft updates with the mitigations.
    Thank you but for this machine I am trying to avoid the uCode and mitigations. :)
      My Computers


  9. Posts : 2,450
    Windows 10 Pro x64
       #278

    winactive said:
    Thank you but for this machine I am trying to avoid the uCode and mitigations. :)
    As long as you're aware of the issue and possible risks, you do what you believe is right for you!
      My Computer


  10. Posts : 215
    Windows 10 Home x64
       #279

    winactive said:
    Yes, unfortunately I'm in the same boat as you, I have to use wushowhide.cab

    Hiding KB4100347 blocks it for me. Not really sure of the wushowhide mechanism either, does it work on the description or the KB number? I'd have to assume the latter. All I know is HWiNFO shows me on 0x22 and that's what's in my UEFI so that's good enough for me.
    I don't know, for my hidden Intel display adapter there is no KB# just the version. I'd think the KB also since that is the version otherwise the title with date would seem odd.
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 15:27.
Find Us




Windows 10 Forums