You cannot access allowed applications that are managed by AppLocker in ...
Platform. Not applicable. Fixes an issue in which you cannot access allowed applications on a client computer that is running Windows 7 or Windows Server 2008 R2. This issue affects computers in a network environment, after you apply AppLocker rules by using Group Policy.
MS15-001: Vulnerability in Windows Application Compatibility cache ...
Summary. This security update resolves a privately reported vulnerability in Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a system and then runs a specially crafted application.
You can circumvent AppLocker rules by using an Office macro on a ...
Fixes an issue in which you can circumvent administratively-enforced AppLocker rules by using a simple Microsoft Office macro. This issue occurs on a computer that is running Windows 7 or Windows Server 2008 R2.
MS13-077: Vulnerability in Windows Service Control Manager could allow ...
Resolves a vulnerability in Windows Service Control Manager that could allow elevation of privilege if an authenticated user is convinced to execute a specially crafted application.
A FIPS-compliant recovery password cannot be saved to AD DS for ...
To do this, run the following command: Dism /Mount-Wim /WimFile: path_of_winre.wim /index:1 /MountDir:E:\Recovery. Notes. To find the WIM file, run the following command: reagentc /info. Note On legacy computers, you can find the WIM file in the following folder: C:\Windows\System32\Recovery\Winre.wim.
MS16-111: Description of the security update for Windows Kernel ...
This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a target system. To learn more about the vulnerability, see Microsoft Security Bulletin MS16-111.
MS13-063: Vulnerabilities in Windows kernel could allow elevation of ...
Appidpolicyconverter.exe. 6.1.7601.22379. 148,480. 08-Jul-2013. 03:31. x64. Not Applicable. Appidsvc.dll. 6.1.7601.22379. 34,304. 08-Jul-2013. 05:11. x64. Not Applicable. Conhost.exe. 6.1.7601.18015. 338,432. 30-Nov-2012. 03:23. x64. Not Applicable. Conhost.exe. 6.1.7601.22379. 338,432. 08-Jul-2013. 03:12. x64. Not Applicable. Csrsrv.dll. 6.1 ...
High CPU usage in Psxss.exe in Windows 7 or Windows Server 2008 R2
On a computer that is running Windows 7 or Windows Server 2008 R2, the Psxss.exe process frequently consumes 100 percent of the CPU's resources. Cause. This problem occurs because a local procedure call (LPC) live lock occurs in the kernel. Resolution Hotfix information. A supported hotfix is available from Microsoft.
Can't connect to an IEEE802.1X authenticated network after a computer ...
Can't connect to an IEEE802.1X authenticated network after a computer resumes from sleep or hibernation in Windows 7 SP1 or Windows Server 2008 R2 SP1 - Microsoft Support.
Process that runs in Untrusted integrity level is reported as an ...
You have a process that runs in the Untrusted integrity level (you can use a program such as Process Explorer to check the integrity level). In this situation, the process is reported incorrectly as an AppContainer, which is a process-isolation environment that is introduced in Windows 8.