Difference between revisions of "Windows Printer BSOD KB5000802 and KB5000808 GPO Script"

From WTFwiki
Jump to navigation Jump to search
(Created page with "Microsoft release an update that causes an BSOD on those computer with KB: 5000802 KB: 5000808, I've heard of others but I have not seen it first hand. In order to fix this o...")
 
Line 31: Line 31:
 
</pre>
 
</pre>
  
We do use WSUS but this update just jets by that and installs anyways.  I believe because it was tree'd as high priority.  The new update does seem to work but we're still facing this issue on certain printers (CANON).
+
We do use WSUS but this update just jets by that and installs anyways.  I believe because it was tree'd as high priority.  The new update does seem to work but we're still facing this issue on certain printers (CANON).  The script can also be used to remove any other future updates if this happens again.  Generally a good idea to test before deploying.

Revision as of 10:07, 16 March 2021

Microsoft release an update that causes an BSOD on those computer with KB: 5000802 KB: 5000808, I've heard of others but I have not seen it first hand. In order to fix this on our domain network I created the below script;

# "19041.867.1.8" = KB5000802
# "18362.1440.1.7" = KB5000808

$UpdateArray = @("19041.867.1.8", "18362.1440.1.7")

foreach ($UpdateVersion in $UpdateArray) {
    $SearchUpdates = dism /online /get-packages | findstr "Package_for" | findstr "$UpdateVersion"  
    if ($SearchUpdates) {
        $update = $SearchUpdates.split(":")[1].replace(" ", "")
        write-host ("Update result found: " + $update )
        dism /Online /Remove-Package /PackageName:$update /quiet /norestart
    } else {
        write-host ("Update " + $UpdateVersion + " not found.")
    }
}
exit 0 

Essentially you would add this to your GPO in "Computer Configuration > Policies > Windows Settings > Startup/Shutdown - Powershell" In this case I used startup to remove the two updates. I also added some registry hacks to delay updates.

reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\Settings" /v "PauseUpdatesExpiryTime" /d "2021-03-15T17:38:35Z" /f                                                                                       
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\Settings" /v "PauseFeatureUpdatesStartTime" /d "2021-03-11T17:38:40Z" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\Settings" /v "PauseFeatureUpdatesEndTime" /d "2021-03-15T17:38:35Z" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\Settings" /v "PauseQualityUpdatesStartTime" /d "2021-03-11T17:38:40Z" /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\Settings" /v "PauseQualityUpdatesEndTime" /d "2021-03-15T17:38:35Z" /f

We do use WSUS but this update just jets by that and installs anyways. I believe because it was tree'd as high priority. The new update does seem to work but we're still facing this issue on certain printers (CANON). The script can also be used to remove any other future updates if this happens again. Generally a good idea to test before deploying.