Seeing superseded

I’m honestly at a loss for probably a simple thing. Why am I seeing windows server super old patches that have been superseded? :melting_face:

For Microsoft KB2868725 which is from 2013 it shows a few machines need that patch. This patch was superseded and I can find a bigfix reference to that here: [BESAdmin-Announcements] Content Modification in Patches for Windows (English) (bigfix.com)

We’ve always used previously WSUS and now going with Bigfix and it’s shows “applicable” computers with patches from 2009?

What is best practice? How do I know to ignore these or have it fixed so they show they are superseded?

I don’t see anything to indicate that one actually was superseded. It no longer appears in the Microsoft Catalog, but if you have machines that are relevant for it then I would check whether those actually still have the RC4 ciphers available (the ActionScript for this will disable those ciphers).

Normally when a patch is superseded, we append ‘(Superseded)’ to the fixlet title, and by default change the Relevance to make it appear Not-Relevant (that can be overridden by applying a client setting to continue evaluating superseded content).

Maybe because all of the operating systems it covers are end of life?

Thanks everyone! @JasonWalker I think I’ve read about a million of your responses on here… learned a ton from you on this forum already. :100:

I’m just really confused why the [[BESAdmin-Announcements]] link above showed this line:

KB2871997 supersedes KB2868725.

While the MS article shows for 2012 as last server also, I did see the registry settings on the 2019 machines though, so I’ll just snapshot and patch away.

Thanks Jason & D.Dean.

Interesting, because you can find that one in the catalog and it does not show it supersedes anything.

Strange the MS Catalog doesn’t list KB2868725 but it does list KB2871997. The KB2871997 doesn’t list it replacing KB2868725 , but who knows how much info Microsoft has already purged for unsupported OS.

Another weird thing is that the workarounds don’t appear to be related, I don’t see anything on 2871997 about disabling RC4 ciphers.

Now, to make things even more confusing, be sure about the Fixlet/Task you’re seeing. When there are no Default Actions it’s worth investigating a bit further. In this case note we have two fixlets - one to Enable the workaround (disable RC4), and another Disable the workaround (put RC4 back). So if you still have machines with matching OS, they’ll be relevant to one of these or the other, allowing you to toggle back and forth.

286872515 2868725: Security advisory: Update for disabling RC4 - Enable Workaround (Completely disable RC4) Unspecified Patches for Windows 16 / 16 0 Security Advisory Microsoft KB2868725 11/11/2013
286872517 2868725: Security advisory: Update for disabling RC4 - Disable Workaround (Completely disable RC4) Unspecified Patches for Windows 0 / 16 0 Undo Workaround Microsoft KB2868725 11/11/2013
1 Like