If you’re freshly installing or re-installing the Remote Desktop Web Access (RD Web Access) role service, the auto-generated self-signed certificate is still using Secure Hash Algorithm 1 (SHA-1).
There are two options:
|This update introduced an issue in which, if an iSCSI target becomes unavailable, attempts to reconnect will cause a leak. Initiating a new connection to an available target will work as expected.||Microsoft is working on a resolution and will provide an update in an upcoming release. |
For more information about this issue, see the following section.
This update contains a crippling iSCSI connection leak in msiscsi.sys driver that results in computer hangs.
|Microsoft is working on a resolution and will provide an update in an upcoming release.|
Method 1: Windows UpdateThis update is provided as an Optional update on Windows Update. For more information about how to run Windows Update, see How to get an update through Windows Update.
Method 2: Microsoft Update CatalogTo get the stand-alone package for this update, go to the Microsoft Update Catalog website.
Note You must be running Microsoft Internet Explorer 6 or later versions.
Update detail information
PrerequisitesTo apply this update, you must have April 2014 update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 (2919355) installed on Windows 8.1 or Windows Server 2012 R2.
Restart requirementYou must restart the computer after you apply this update.
Registry informationTo apply this update, you don't have to make any changes to the registry.
Update replacement informationThis update doesn't replace any previously released update.
ID članka: 4012219 - posljednja izmjena: 13. lip 2017. - verzija: 26