Microsoft releases cumulative update KB4284822 for Windows 10, version 1709 ( the second most-used OS release after the April 2018 Update.) Installing KB4284822 update bumps OS build number to 16299.522 and it fixes an issue caused by a previous cumulative update and leading to performance degradation. Microsoft explains:
“Addresses an application performance degradation issue in operating system functions. This degradation locks and frees large blocks of memory (such as VirtualLock and Heapfree) after installing KB4056892 and superseding fixes.”
Additionally, the same update fixes issues experienced when trying to resume from hibernating and resolves a problem preventing the editing of passwords fields using a touch keyboard. The update also increases the user account minimum password length in Group Policy from 14 to 20 characters.
Windows 10 KB4284822 update Improvements and fixes
Here the Entire Changelog Details of KB4284822 update for Windows 10 Build 16299. Microsoft has Announced this update as KB4284822 in the Windows support site, and it’s referred as “June 21, 2018—KB4284822 (OS Build 16299.522)”. If you’re already running the Windows 10 version 1709 on your PC, this update will address these problems:
- Addresses an application performance degradation issue in operating system functions. This degradation locks and frees large blocks of memory (such as VirtualLock and Heapfree) after installing KB4056892 and superseding fixes.
- Addresses performance regression in App-V that slows many actions in Windows 10.
- Adds a new MDM Policy, “DisallowCloudNotification”, for enterprises to turn off Windows Notification traffic.
- Changes the music metadata service provider used by Windows Media Player.
- Addresses an issue with the placement of text symbols in right-to-left languages.
- Addresses an issue with editing web password fields using a touch keyboard.
- Adds a Group Policy that provides the ability to hide recently added apps from the Start menu.
- Updates the Segoe UI Emoji font to use a water gun to represent a pistol emoji.
- Addresses a reliability issue with resuming from hibernation.
- Addresses an issue where SmartHeap doesn’t work with UCRT.
- Addresses an issue to ensure that Windows Defender Application Guard endpoints comply with regional policies.
- Increases the user account minimum password length in Group Policy from 14 to 20 characters.
- Addresses an issue that causes sporadic authentication issues when using Windows Authentication Manager.
- Addresses an issue where an Azure Active Directory account domain change prevents customers from logging on.
- Addresses an issue that displays unnecessary “Credential Required” and “Do you want to allow the app to access your private key?” messages. This issue occurs when running a Universal Windows Platform (UWP) application.
- Addresses an issue that causes the LSASS service to become unresponsive, and the system needs to be restarted to recover.
- Addresses an issue where client applications running in a container image don’t conform to the dynamic port range.
- Adds a new registry key that prevents access to the Internet using WWAN if a non-routable ethernet is connected. To use this new registry key, add IgnoreNonRoutableEthernet” (Dword) on HKEY_LOCAL_MACHINE\Software\Microsoft\Wcmsvc using regedit, and set it to 1.
- Adds a new registry key that allows customers to control access to the Internet using WWAN without using the default connection manager. To use this new registry key, fMinimizeConnections” (Dword) on HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\WcmSvc\Local using regedit, and set it to 0.
- Addresses an issue that prevented ISO/DVD mounts and eject from working using VM settings and Powershell because of menu transition issues in VMConnect.
- Addresses an issue where restarting the Hyper-V host with Hyper-V Replica (HVR) enabled could cause replication to stop. It may also require a manual restart to resume the replication from a suspended state. The replication state should be normal after the Hyper-V host/VMMS isrf restarted.
- Addresses an issue that might cause the Mitigation Options Group Policy client-side extension to fail during GPO processing. The possible errors are “Windows failed to apply the MitigationOptions settings. Mitigation Options settings might have its own log file” or “ProcessGPOList: Extension MitigationOptions returned 0xea.” This issue occurs when Mitigation Options have been defined using Group Policy, the Windows Defender Security Center, or the PowerShell Set-ProcessMitigation cmdlet.
- Addresses an issue that causes a connection failure when a Remote Desktop connection doesn’t read the bypass list for a proxy that has multiple entries.
- Addresses an issue where Windows Defender Security Center and the Firewall Pillar app stop working when opened. This is caused by a race condition that occurs if third-party antivirus software has been installed.
Get Windows 10 KB4284822 update
For the Users running Windows 10 V1709 The KB4284822 update should download and install automatically from Windows Update, but you can manually check for updates from Settings -> Updates & Security -> windows update -> check for updates.
Also you can get the standalone package for this update KB4284822, from the Microsoft Update Catalog website. Or you can check this Windows 10 KB4284822 Direct Download Links: 32-bit (x86) ( 457MB ) and 64-bit ( 825 MB)
To you check whether the update installed or not, just press Win key + R and then type winver.