Follow these steps to identify problems that might crop up when you update to the Windows 10 1903 release. Credit: NiroDesign / Getty Images The May 2019 release of Microsoft Windows 10 1903 is now available to all who click on “check for updates” as long as there is no blocking issue with the machine. Microsoft is no longer using the term “semi annual targeted” in respect to Windows releases. Nor will it use “current branch” or “current branch for business,” the terms that Microsoft used for previous releases.These had been indicators that the releases were vendor tested, approved and ready for widespread deployment. Without these indicators, how can you determine if your firm is ready for deployment of security and other Windows updates? Here are some tips1. Follow known issues onlineYou can follow the known issue page for 1903 to review what issues Microsoft is tracking and when they will be resolved. One new way to track issues is to follow the Windows Update twitter account. As they post late-breaking known issues, you’ll be alerted to investigations and resolutions that Microsoft has identified.2. Review your security software for 1903 supportYou should also review what security software you use in your environment and if it supports 1903. Several vendors have already had issues with 1903 and some even recommend holding off until the issues are fixed. Next look to any tools you use to deploy or manage your operating systems and determine if they support 1903. 3. Make sure you have the latest servicing stackFor a successful updating experience, ensure that you have the latest servicing stack update installed on the build of Windows 10 you are upgrading from. It is not necessary to be on Windows 10 1809 before updating to Windows 10 1903. You can skip feature releases and jump to the version your software is supported on.4. Review line-of-business software for .NET 4.8 supportBefore deploying any new feature release, review the key line-of-business (LoB) software that your business depends on. If you do not have such a master list, use any number of PowerShell Scripts to inventory and build a report. Review this listing and identify the software that is key to your firm. Pay attention to LoB support of .NET. Some LoB software specifically only supports a certain version of .NET and you must wait for vendor approval before updating. The 1903 release specifically includes .NET 4.8 in its release. In a change from the past, .NET 4.8 is now also separately available to be installed on prior versions of Windows 10 feature releases. 5. Deploy on a test bed before going liveEven with published vendor support documentation, the best way to deploy Windows 10 either as an upgrade to Windows 7 or new deployments to Windows 10 is probably to have a test-bed deployment. Identify key departments in your organization that need to maintain full productivity. Next, identify a few individuals in those departments that will be both your beta testers as well as your tech enthusiasts for the department.The beta testers should have good communication skills and regularly use a variety of software that your firm depends on. Empower these users with special feedback processes and help desk communication so that they get priority. It can be as simple as ensuring they know how to use the steps recorder app in Windows 10 and they have an email alias they can send reports to.6. Check apps for browser supportReview what browsers your applications support. If they still rely on older Internet Explorer technologies, ensure that a feature release is compatible with any internal software you depend on.7. Take time to review the fixed issue listI review the fixed issue list in the various feature releases for a few months before determining if they are ready for deployment. In particular, look at the releases that come toward the end of each month and review what bugs have been fixed and if they would have affected you. These end-of-month releases are called C/D week releases and are previews of bug fixes that will be included in the following months second Tuesday security releases. They give an indication of how buggy a release might be. For example, for 1903, the first bug fixes in the late May release included fixes that addressed issues that:Prevent custom URI schemes for application protocol handlers from starting the corresponding application for local intranet and trusted sites on Internet Explorer.Prevent certain apps from launching when you set folder redirection for the Roaming AppData folder to a network path.Turn off night-light mode during display mode changes.Distort the rendering of a full-screen game when the Microsoft Game bar is visible on top of the game.Prevent the removal of Bluetooth peripheral devices from some systems with specific Bluetooth radios.Cause event 7600 in the Domain Name System (DNS) server event log to contain an unreadable server name.Create a mismatch between dots per inch (DPI) of the guest and the host.Cause an external USB device or SD memory card to be reassigned to an incorrect drive during installation. Prevent a file share witness from removing Server Message Block (SMB) handles, which causes a server to eventually stop accepting SMB connections.Prevent an application protocol URL from being opened when hosted on an intranet page.Prevent BranchCache from using more disk space than assigned for the republication cache when it’s in distributed cache mode. To fully address the issue, devices that have exceeded the disk space assignments should empty BranchCache using the netsh branchcache flush command.Prevent some Direct3D applications and games from entering full-screen mode if the display’s orientation has been changed from the default.Prevent a problem creating a Windows catalog file on an x64 system using Windows System Image Manager.Cause a delay when loading many unsigned DNS zones related to the Domain Name System Security Extensions (DNSSEC) feature.Prevent a problem related to input–output memory management unit (IOMMU) virtualization with third-party hypervisors8. Review your deployment and provisioning policiesIf you do not see any major issues that would impact you, and your pilot testing does not identify any issues, it’s probably safe to begin the rollout. Finally start reviewing processes that you currently use for deploying and provisioning systems. Windows 10 Autopilot, SCCM and Intune are all making changes and improvements to make getting Windows 10 out to end users faster and less painful for you the IT administrator. Start testing 1903 now. Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe