Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Cumulative Update for Windows Server 2016 Technical Preview 5: June 14, 2016


View products that this article applies to.

Summary

This security update includes improvements and fixes in the functionality of Windows Server 2016 Technical Preview 5.

Windows Server 2016 updates are cumulative. Therefore, this package contains all previously released fixes.

If you have installed previous updates, only the new fixes that are contained in this package will be downloaded and installed to your computer. If you're installing a Windows Server 2016 update package for the first time, the package for the x64 version is 128 MB.

↑ Back to the top


Known issues in this update

  • Issue 1

    Administrators receive the following error message when they try to uninstall KB 3163016 if the Wireless LAN Service is disabled:
    An error has occurred. Not all the updates were successfully uninstalled.
    To fix this issue, enable the Wireless LAN Service. For more information, follow the instructions in the Wireless LAN Service Overview.
  • Issue 2

    MS16-072 changes the security context with which user group policies are retrieved. This by-design behavior change protects customers’ computers from a security vulnerability. Before MS16-072 is installed, user group policies were retrieved by using the user’s security context. After MS16-072 is installed, user group policies are retrieved by using the computer's security context. This issue is applicable for the following KB articles:
    • 3159398 MS16-072: Description of the security update for Group Policy: June 14, 2016
    • 3163017 Cumulative update for Windows 10: June 14, 2016
    • 3163018 Cumulative update for Windows 10 Version 1511 and Windows Server 2016 Technical Preview 4: June 14, 2016
    • 3163016 Cumulative Update for Windows Server 2016 Technical Preview 5: June 14 2016

    Symptoms

    All user Group Policy, including those that have been security filtered on user accounts or security groups, or both, may fail to apply on domain joined computers.

    Cause

    This issue may occur if the Group Policy Object is missing the Read permissions for the Authenticated Users group or if you are using security filtering and are missing Read permissions for the domain computers group.

    Resolution

    To resolve this issue, use the Group Policy Management Console (GPMC.MSC) and follow one of the following steps:
    • Add the Authenticated Users group with Read Permissions on the Group Policy Object (GPO).
    • If you are using security filtering, add the Domain Computers group with read permission.

↑ Back to the top


How to get this update

Important If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Method 1: Windows Update

If your computer is configured to accept Windows Updates, the update is downloaded and installed automatically.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Prerequisites

There are no prerequisites for installing this update.

Restart information

You have to restart the computer after you apply this update.

Update replacement information

This update replaces the previously released update 3158987.

↑ Back to the top


File Information

For a list of the files that are provided in this cumulative update, download the file information for cumulative update 3163016.
File hash information
File nameSHA1 hashSHA256 hash
Windows10.0-KB3163016-x64.msu83D6E9BCA94A64A5D9BE3D81CDB182E540285848D9CD0B5242C8A804FC24FE4B47191FD7D9E6F76D49840CFDF8EB9038D97A66D1

↑ Back to the top


More Information

The .NET framework version 3.5 and earlier versions did not provide support for applications to use Transport Layer Security (TLS) System Default Versions as a cryptographic protocol. This update enables the use of TLS v1.2 in the .NET Framework 3.5.

The following registry keys can be set to use the operating system defaults for SSL and TLS instead of the hardcoded .NET Framework defaults for a managed application running on the computer.

  • For 64-bit operating systems:
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727]
    "SystemDefaultTlsVersions"=dword:00000001
     
    [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v2.0.50727]
    "SystemDefaultTlsVersions"=dword:00000001 
  • For 32-bit operating systems:
    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727]
    "SystemDefaultTlsVersions"=dword:00000001 

Note If the application has set the ServicePointManager.SecureProtocol in code or through config files to a specific value, or uses the SslStream.AuthenticateAs* APIs to specify a specific SslProtocols enum, the registry setting behavior does not occur.

In addition, we have added the SslProtocolsExtensions enumeration that you can use as an option for setting TLS v1.2, TLS v1.1, as well as operating system defaults for the ServicePointManager.SecurityProtocol property when targeting .NET framework version 2.0 SP2. (See the Developer Guidance section for the information on how to use the extensions.)

For more information about how to enable TLS v1.1 or v1.2 as operating system defaults, follow the instructions at https://technet.microsoft.com/en-us/library/dn786418(v=ws.11).aspx#BKMK_SchannelTR_TLS12.

↑ Back to the top


References

Learn about the terminology that Microsoft uses to describe software updates.

↑ Back to the top


Keywords: kbsurveynew, atdownload, kbfix, kbexpertiseadvanced, kbcontentauto, kb

↑ Back to the top

Article Info
Article ID : 3163016
Revision : 5
Created on : 3/31/2017
Published on : 3/31/2017
Exists online : False
Views : 265