Windows 7 - Issue w/KB3191566 + Build with all optional components integrated

It does appear to be very messy. Every time I deal with "newer" versions of Windows I'm reminded why I don't use them.
(An old Win 9x diehard here.. and XP is still my daily driver. And I thought building slipstreamed versions of Windows 9x by hand was difficult...)
SS, CU, net 4.8, and net CU, w10 is way easier and quicker to service than w7. Its the only reason i prefer it to w7.

I've been sending my builds to WU to check for updates mainly just for investigative purposes.
Easiest and safest way to do that is use WUMT + wsusscn2.cab(link on my interesting stuff page) and do an "offline" scan.

Good to see you all got to the bottom of the NVME drivers question.
I dont see any mention of nvme drivers in post no1, only garlin's suggestion, hmm.
It is relevant to your situation and for anyone esle building a final w7 image.
 
Last edited:
In this case, before I run yet another build culling superseded updates, is KB3138612 then also superseded by the final rollup?
KB3138612 is required.

"Preview version?" I saw that terminology used and wondered what that was supposed to mean, especially since 9602 is much smaller in size and I thought "there's no way everything that's in the larger package is in the smaller one..."

So, if I understand correctly: KB4539601 supersedes both KB4534310 and KB4539602 and neither of the latter will show up on WU if the former is used?
"Preview" is an overloaded word abused by MS.

Preview in this context means "next month's rollup, previewed one month early". This allows orgs to perform QA testing before they commit to updating. The idea is the preview rolls over and becomes the next monthly release -- barring any nasty bug reports. While the functionality is the same, the actual bits will vary slightly due to repackaging.

9601 is preview of Feb, which supersedes 4310 (Jan). 9602 is mostly the wallpaper fix (29MB vs 9601's 314MB).

So essentially these (nagware/telemetry + superseded updates) are only good for satisfying what Windows Update says..?
Don't install them even if WU suggests it.

I've been sending my builds to WU to check for updates mainly just for investigative purposes. While it's nice to show everything "satisfied," I never allow any of my machines to "auto update" and probably would never even send them to WU, preferring to hand pick, download, and install such things manually.
WU "satisfied" is sadly the only authorative sanity check we have. Don't get me started on why KUC is a cluster-eff.

Given that all that remains now for 7 is ESU, and from what I read those cannot be "integrated" anyway, I'm inclined to be more concerned with avoiding redundancy rather than satisfying WU...
The answer for ESU is sysprepping the updated image.
 
WU "satisfied" is sadly the only authorative sanity check we have.
WUMT + wsusscn2.cab, "offline" scan :D.

Don't install them even if WU suggests it.
Just shove them all in and let ntlite sort them out. If i cant report bug or request a new removal, nuhi hasnt stopped support for w7 yet and if this is any indicator he did semi recently add limited support for vista.

The answer for ESU is sysprepping the updated image.
You should be doing that anyway as w7 is EOL, add all required nets and c++'s, Enable/Disable Features as required. Do a final capture when ESU's end next year.

NTLite works very well on a captured wim file :cool:.
 
Last edited:
9601 is preview of Feb, which supersedes 4310 (Jan). 9602 is mostly the wallpaper fix (29MB vs 9601's 314MB).

To explain this better... 9601 is equivalent to 4310 & 9602 bundled.
The monthly and monthly preview are released simultaneously. They created 9602 to backport fixes to 4310.
 
Easiest and safest way to do that is use WUMT + wsusscn2.cab(link on my interesting stuff page) and do an "offline" scan.
Downloaded and added to my toolbox.
To explain this better... 9601 is equivalent to 4310 & 9602 bundled.
The monthly and monthly preview are released simultaneously. They created 9602 to backport fixes to 4310.
Makes better sense, this is what I assumed from what you said first as well.
WU "satisfied" is sadly the only authorative sanity check we have.
OK, went back and started from scratch again using my optionals + your EoL List (note a couple of minor changes).

KB917607 - Windows Help 32-bit Compatibility Update
KB943790 - File Management API Extensions For BitLocker
KB958559 - Windows Virtual PC
KB958830 - Remote Server Administration Tools
KB969168 - Microsoft Agent
KB970985 - Remote Administration Tools For Windows Media Services
KB974150 - Windows NTBackup Utility
KB974405 - Windows Identity Foundation
KB974674 - Windows NTBackup Restore Utility
KB975541 - AD LDS Feature
KB981390 - Windows Server Update Services Best Practices Analyzer
KB981392 - Application Server Best Practices Analyzer
KB2386667 - Application Server Best Practices Analyzer Rules Revision
KB2462137 - AD MMC & ADAC Country Update
KB2539513 - Repadmin Indefinate Query
KB2574819 - Support for Datagram Transport Layer Security (DTLS)
KB2589154 - AD MMC RODC Update
KB2592687 - Remote Desktop Protocol (RDP) 8.0
KB2647644 - AD Certificate Use Issuer Update
KB2666914 - DirectAccess Connectivity Assistant 2.0
KB2790338 - AD FS Update Rollup 3
KB2790621 - Windows Server Essentials Connector
KB2830477 - Remote Desktop Connection (RDC) 8.1 client
KB2891638 - Work Folders For Windows
KB2959936 - Embedded Lockdown Manager Feature Set Update
KB2984972 - Remote Desktop Protocol (RDP) 7.1 update
KB3012660 - Unable to install Security Update KB2853587
KB3020388 - Security update for Remote Desktop Connection 8.1
KB3075220 - Security Update for RDP 7.1
KB3075226 - Security update for RDP 8.1
KB3138612 - Windows Update Agent

31 total updates

*changes from previous run:
removed: KB949104 - (WindowsUpdateAgent-7.6-x64.exe)
removed: KB2898997
added: KB3020388
added: KB3075226

KB2545698 (IE core fonts reliability)
KB2547666 (IE clear history reliability)
KB2667402 (Terminal server security)
KB2670838 (Platform Update)
KB2676562 (Kernel-mode drivers security)
KB2685811 (KMDF 1.11)
KB2685813 (UMDF 1.11)
KB2698365 (MDAC security)
KB2706045 (Jscript and VBscript security)
KB2729094 (Segoe UI font)
KB2732059 (XPS doc format)
KB2750841 (IPv6 readiness)
KB2761217 (Calibri fonts update)
KB2773072 (Game rating systems)
KB2834140 (Hybrid vid cards config reliability)
KB2841134 (Internet Explorer 11)
KB2862330 (USB drivers security)
KB2894844 (superseded .NET update, req. for WU)
KB2900986 (AcitveX killbits security)
KB2919469 (Canada country code)
KB2970228 (Russian currency symbol)
KB3000483 (Group Policy security)
KB3004375 (Audit Process creation policy)
KB3006137 (Lithuanian currency symbol)
KB3031432 (Elevated priveleges security)
KB3046269 (Task Scheduler security)
KB3059317 (Common controls security)
KB3102429 (Crystal Reports update)
KB3118401 (Universal C runtime)
KB3123479 (Deprecate SHA-1)
KB3125574 (Update Rollup)
KB3150220 (Media Center security)
KB3156016 (Graphics component security)
KB3156019 (Graphics component security)
KB3159398 (Group Policy security)
KB3161102 (Removal of "Windows Journal")
KB3161949 (WPAD protocol security)
KB3172605 (Update Rollup 7-21-16)
KB3179573 (Update Rollup)
KB3185319 (superseded IE update, req. for WU)
KB4019990 (.NET 4.7 installation reliability)
KB4040980 (part of KB4049016 which was pulled???)
KB4474419 (SHA-2)
KB4490628 (Servicing Stack Update)
KB4532945 (.NET 3.5.1 rollup, last Non-ESU)
KB4534251 (IE11 Cum. Sec. Upd, last Non-ESU)
KB4536952 (last Non-ESU SSU)
KB4539601 (Monthly Rollup, last Non-ESU KB4534310 + Stretch wallpaper bug KB4539602)

48 total updates

*changes from previous run:
removed: KB4534310
removed: KB4539602
added: KB2894844
added: KB3161102
added: KB3185319
added: KB4040980
added: KB4539601

Noted KB4474419 (SHA-2) wasn't in your list; don't know if that was intentional or not.

I didn't use KB2533552 yet since it can't be integrated, but WU does not offer it to me anyway...

WU now offers under Important:
KB2952664 (Telemetry junk)
KB971033 (WGA/WPA junk)
KB976932 (SP1) - already integrated!
KB890830 (MSRT - 3 versions)
KB915517 (Windows Defender update)

WU now offers under Optional:
KB4493132 (EOL nag)
KB4503548 (.NET 4.8)
KB4567409 (Edge)
KB2603229
KB3021917 (Telemetry junk)
KB3068708 (Telemetry junk)
KB3080149 (Telemetry junk)
KB3150513 (Telemetry junk)
KB3184143 (remove GWX)

So it looks like everything has been successfully handled WU-wise except .NET 4.8, Edge (if I decide to fool with it), and KB2603229 which also can't be integrated normally.

Time to collect anything else update-wise that can be integrated without special handling...

Anything I should know about these.. anything superseded?
KB2818604 - AMD Microcode Update
KB3064209 - Intel Microcode Update
KB4072650 - Hyper-V Integration Components Update

Saw KB2864202 (Security Update for KMDF v1.11) mentioned in regard to the backported USB3 driver; is this superseded or already part of another rollup?

Time to look through all the other things WSUS Offline downloaded...

*Update on one of the things I mentioned earlier. With regard to making integrated updates "non Uninstall-able" - I believe it should be possible to do this based on using the information in this blog post in reverse to modify the update manifests. Would be a nice touch to add to "Custom clean update backup" if it's not too hard to implement. nuhi
"The XML attribute permanency="permanent" quotes an update as not uninstallable, while a missing attribute or an XML attribut value permanency="removable" quotes an update as uninstallable."
 
Noted KB4474419 (SHA-2) wasn't in your list; don't know if that was intentional or not.
It's supposed to be there. Maybe it got skipped from my scripted re-parsing of the preset.

I didn't use KB2533552 yet since it can't be integrated, but WU does not offer it to me anyway...
3552 is a weird fellow. You can't integrate it; but NTLite has special handling and silently moves 3552 to be executed as the final command in Post-Setup.

Anything I should know about these.. anything superseded?
KB2818604 - AMD Microcode Update
KB3064209 - Intel Microcode Update
This part is controversial, because some people claimed the microcode updates broke their systems. And additionally, the updates were limited to a subset of later CPU models. The better solution would be upgrading your microcode thru BIOS updates.

Plus W7 was going away soon, and MS wanted to use this feature gap as a W10 upgrade "carrot".

Saw KB2864202 (Security Update for KMDF v1.11) mentioned in regard to the backported USB3 driver; is this superseded or already part of another rollup?
Currently not superseded.
Here's the quick way to check on Microsoft Update Catalog.

Untitled.png

Untitled2.png

*Update on one of the things I mentioned earlier. With regard to making integrated updates "non Uninstall-able" - I believe it should be possible to do this based on using the information in this blog post in reverse to modify the update manifests. Would be a nice touch to add to "Custom clean update backup" if it's not too hard to implement.
This is abbodi's turf. If there was something useful with this knowledge, he would have addressed it years ago.
 
Last edited:
WUMT 2016 version is needed for w7(and w8.1) if i remember correctly, latest wont work. I got v2016, holler if you need it.
 
Last edited:
KMDF v1.11 is an optional driver framework. What some folks do is shoehorn W8 drivers into W7, using KMDF.
Works for some people, depends on the driver.
 
WUMT 2016 version is needed for w7(and w8.1) if i remember correctly, latest wont work. I got v2016, holler if you need it.
I saw some comments about the newer version not working; downloaded an older one named wumt_20.12.2016.zip.

Ran WUMT on a VM install of my "Pass 2" ISO; WUMT "succeeded with errors" and offers KB4519108, KB4579503 (ESU prep package), and 3x MSRT versions.

KB4519108 is a rollup also downloaded by WSUS Offline update (which I assume is superseded); more below on WSUS files.

3552 is a weird fellow. You can't integrate it; but NTLite has special handling and silently moves 3552 to be executed as the final command in Post-Setup.
I suppose I can add it later if it's really needed. I assumed everyone was keeping it to satisfy WU, but so far WU hasn't shown this one for me.

This part is controversial, because some people claimed the microcode updates broke their systems. And additionally, the updates were limited to a subset of later CPU models. The better solution would be upgrading your microcode thru BIOS updates.

Plus W7 was going away soon, and MS wanted to use this feature gap as a W10 upgrade "carrot".
I'm not sure what exactly a microcode update does anyway, but AFAIK one would have to have proper BIOS support for their CPU to begin with, regardless of what Windows does.

Probably not very important unless there's some issue on certain CPUs when not having it, such as high usage, overheating, etc etc.
Is this what MS actually used to "block" newer CPUs from WU or is that hidden somewhere else?

KMDF v1.11 is an optional driver framework. What some folks do is shoehorn W8 drivers into W7, using KMDF.
Works for some people, depends on the driver.
Currently not superseded.
Here's the quick way to check on Microsoft Update Catalog.
Ah yes, backporting fun. Been there with older WDM-framework drivers on the older Windows.

Just how reliable is that particular bit of information provided by the Update Catalog?
Because...
A very long list of updates that WSUS Offline Update downloaded for Windows 7 when I ran it have no information in that field... seemingly indicating they are not superseded. I checked the whole list, collecting the .MSU packages to go along with the .CABs downloaded by WSUS, and marking those that did show as being replaced. As one gets higher in KB numbers, many of them appear to be "rollups" - and I assume most of these are indeed properly superseded by the next month's rollup (and the final one) even though the Update Catalog does not report this. But there are still several updates in the KB2xxxxxx and KB 3xxxxxx range that leave one to wonder...

Not sure what to do next other than try to dig up info on these... In the old days one could just crack open an update with WinRAR or 7-Zip, check the versions of the updated files against those installed, read the .INF file that controlled the update, and know what was going on and whether or not the files were actually newer than the ones you have... now it's not so simple.

...making integrated updates "non Uninstall-able"
This is abbodi's turf. If there was something useful with this knowledge, he would have addressed it years ago.
I guess it depends on what one considers "useful." This is a cosmetic issue, so not "useful" as in "changes anything that matters" - but it would be a nice "polished touch."
 
Is this what MS actually used to "block" newer CPUs from WU or is that hidden somewhere else?
Our knollybods can confirm or deny this, cpu microcode updates are microcode updates only. WU blocking on certain cpu's is in an update or in multiple updates and just get skipped if the blocker is already installed. WU uses .msu but cab file updates are handled by dism and you can installed cab files that would be blocked if they were msu files.
 
Ran WUMT on a VM install of my "Pass 2" ISO; WUMT "succeeded with errors" and offers KB4519108, KB4579503 (ESU prep package), and 3x MSRT versions.
KB4519108 is a rollup also downloaded by WSUS Offline update (which I assume is superseded); more below on WSUS files.
KB4519108 - DST changes in Windows for Norfolk Island and Fiji Island: October 2019 (optional)
KB4579503 - Keep only if you're considering the abbodi ESU
MSRT is re-released every month with an updated malware signature definition. Don't bother including it in your image, WU will always provide the latest (well until Jan 2023).

I'm not sure what exactly a microcode update does anyway, but AFAIK one would have to have proper BIOS support for their CPU to begin with, regardless of what Windows does.
This was MS' knee-jerk attempt at Meltdown/Spectre mitigation while waiting for Intel/OEM's to catch up. It was very early ("something is better than nothing") and didn't age well. If you want to disable their microcode update (for performance reasons on older CPUs):

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
"FeatureSettingsOverride"=dword:00000003
"FeatureSettingsOverrideMask"=dword:00000003

A very long list of updates that WSUS Offline Update downloaded for Windows 7 when I ran it have no information in that field... seemingly indicating they are not superseded. I checked the whole list, collecting the .MSU packages to go along with the .CABs downloaded by WSUS, and marking those that did show as being replaced. As one gets higher in KB numbers, many of them appear to be "rollups" - and I assume most of these are indeed properly superseded by the next month's rollup (and the final one) even though the Update Catalog does not report this. But there are still several updates in the KB2xxxxxx and KB 3xxxxxx range that leave one to wonder...
WU purged all KB's classified as hotfixes when W7 was EOL'ed. Some fixes rolled over into the CU, but the majority were never explained as superseded or not. Most up-to-date users have never complained about the missing KB's (except for NVME).

There's a crap load of historical knowledge which hasn't aged well, especially in the last two years before EOL. People moved on to W10 by then, and lost interest. Best answer is testing your build.
 
And I've not even attempted yet to examine all of the files WSUS Offline Update downloaded for Windows 7 when I ran it, or how they fit (or don't fit) into the context of what I've already done
My own group of updates to EOL(wumt + wsusscn2.cab) take 7 to 6.1.7601.24546 but wsusoffline only takes it to .24384, grrrrr
 
Hmm, weird, Tool Downloader shows windows6.1-kb4534310-x64(last non esu rollup) as build number .24544 but im on .24546(eol only, no esu's).
 
24546 implies you have the stretched wallpaper hotfix, or Jan 20 Preview (which is a re-packaged Jan 20 + wallpaper).
 
Back
Top