Reminder: April 14 - Microsoft updates for Windows computers
Starting April 14 at 4 p.m., Microsoft updates for Windows computers will run with a new process that aligns with our third-party application updates following the steps in Windows Computing Environment Updates. macOS devices will not be affected by this change.
This will make it easier for Windows computers to stay updated and for you to anticipate the impact. As cybercrime becomes more prominent and invasive, computer security becomes a high priority.
The first time this new update process runs on your computer, you will likely need to restart more than one time. Individuals with computers requiring an extended update have been emailed directly. Some departmental computers will also experience an extended update (an hour or longer). We apologize for this inconvenience. Subsequent updates should only require one restart and will take a shorter time.
- Before running updates, close affected applications as seen in the Software Center notification under “More information.” All Office applications (Outlook, Word, Excel, PowerPoint, etc.) must be closed if an update includes Microsoft Office patches.
- Employees not on the campus network will need to connect to Cisco AnyConnect VPN for a few hours anytime after 4 p.m. on April 14 to complete the update.
- Departments with a conference room computer or computers designated for students will want to start those computers on April 14 to initiate the update in order to avoid delays when computers are needed next.
ICIT tested this process before piloting it with more devices to ensure a smooth transition.
- Updates for lab and classroom computers have run this way for over a year to provide a large sample of test devices.
- Select ICIT employees’ computers have used this process for over six months.
- College of Business and Economics users piloted this process and provided feedback.
- Each month, test and pilot group devices will receive the updates before the rest of campus to enable issue resolution.
Ensuring a secure computing environment includes the prevention and management of IT vulnerabilities. Regular computer updates play a significant role. Proactive measures, like updates, minimize potential disruptions for you because they involve considerably less time and effort than responding after exploitation has occurred, like with a computer reimage or loss of access.