We're not sure if you realize this, but Microsoft is in a constant sprint to fix some past bugs and enhance some of the operating systems we use today.
In fact, last month, the tech giant issued a reminder about Distributed Component Object Model (DCOM) hardening.
For those unaware, the Redmond company made these changes for a Windows DCOM Server security feature bypass, a vulnerability tracked under CVE-2021-26414.
However, today, Microsoft has released some additional resources on this content and has updated its support page on the matter, which now includes various Available dates for various error events in Windows operating systems.
As you might expect, these changes definitely include Windows Server editions, Windows 10, and Windows 11.
Microsoft added that these error events only apply to a subset of Windows versions and shared an interesting table.
Window version | Available on or after these dates |
---|---|
Windows Server 2022 | 27 April 2021 5005619 KB |
Windows 10, version 2004, Windows 10, version 20H2, Windows 10, version 21H1 | 1 January 2021 5005101 KB |
26-June-2021 5005103 KB | |
26-June-2021 5005102 KB | |
14-Jan-2021 5005573 KB | |
12 2021 5006714 KB | |
30 2022 5017389 KB |
Please remember that we can help with DCOM Error 1084 or if you are having difficulty using Distributedcom 10016.
And, if you're wondering what these error events mean, Microsoft explains that these events will help identify applications that may have compatibility issues after placing DCOM security hardening changes.
You may want to know more information, so we recommend that you visit the official support page of KB5004442.
The above is the detailed content of Microsoft reveals more about DCOM hardening on Windows 11 and 10. For more information, please follow other related articles on the PHP Chinese website!