{"id":323722,"date":"2026-04-15T00:10:47","date_gmt":"2026-04-14T22:10:47","guid":{"rendered":"https:\/\/borncity.com\/blog\/?p=323722"},"modified":"2026-04-15T00:27:22","modified_gmt":"2026-04-14T22:27:22","slug":"patchday-windows-server-updates-14-april-2026","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2026\/04\/15\/patchday-windows-server-updates-14-april-2026\/","title":{"rendered":"Patchday: Windows Server-Updates (14. April 2026)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>Zum 14. April 2026 (zweiter Dienstag im Monat, Patchday bei Microsoft) wurden verschiedene kumulative Updates f\u00fcr die unterst\u00fctzten Versionen von Windows Server freigegeben. Nachfolgend habe ich die bereitgestellten Updates samt einigen Details f\u00fcr diese Windows Server-Versionen (von Windows Server 2012 bis 2025) herausgezogen.<\/p>\n<p><!--more--><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/82886ed69cbf4bb2be3f9583a0f0da4d\" alt=\"\" width=\"1\" height=\"1\" \/>Die nachfolgend aufgef\u00fchrten Updates beheben die in <a href=\"https:\/\/borncity.com\/blog\/2026\/04\/14\/microsoft-security-update-summary-14-april-2026\/\">Microsoft Security Update Summary<\/a> (14. April 2026) beschriebenen und f\u00fcr Windows Server relevanten Schwachstellen.<\/p>\n<h2>Updates f\u00fcr Windows Server 2025<\/h2>\n<p>Eine Liste der Updates f\u00fcr Windows Server 2025 l\u00e4sst sich auf dieser <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/windows-server-2025-update-history-10f58da7-e57b-4a9d-9c16-9f1dcd72d7d7\" target=\"_blank\" rel=\"noopener\">Microsoft-Webseite<\/a> abrufen. F\u00fcr Windows Server 2025 wurde das kumulative Update <a href=\"https:\/\/support.microsoft.com\/help\/5082063\" target=\"_blank\" rel=\"noopener\">KB5082063<\/a> freigegeben, welches Sicherheitspatches und diverse Fixes beinhaltet.<\/p>\n<ul>\n<li><b class=\"ocpLegacyBold\">[Secure Boot]<\/b>\n<ul>\n<li>With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout.<\/li>\n<li>This update addresses an issue where the device might enter BitLocker Recovery after the Secure Boot updates.<\/li>\n<\/ul>\n<\/li>\n<li><b class=\"ocpLegacyBold\">[Kerberos protocol]<\/b>\u00a0This update changes the default DefaultDomainSupportedEncTypes value for Kerberos Key Distribution Center (KDC) operations to leverage AES-SHA1 for accounts that don't\u00a0have an explicit msds-SupportedEncryptionTypes Active Directory attribute defined. For more information see,\u00a0<a class=\"ocpArticleLink\" href=\"https:\/\/support.microsoft.com\/en-us\/topic\/how-to-manage-kerberos-kdc-usage-of-rc4-for-service-account-ticket-issuance-changes-related-to-cve-2026-20833-1ebcda33-720a-4da8-93c1-b0496e1910dc\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Authentication]<\/b>\u00a0This update improves how Windows uses Kerberos encryption policies during authentication. After you install this update, Windows reads the configured policy settings as expected, which helps ensure encryption behavior is applied consistently across the domain.<\/li>\n<li><b class=\"ocpLegacyBold\">[Bluetooth]\u00a0<\/b>This update improves Bluetooth device management in Settings and Quick Settings, helping connected devices appear consistently and making them easier to add and manage.<\/li>\n<li><b class=\"ocpLegacyBold\">[Graphics]\u00a0<\/b>This update improves color rendering when printing from Win32 desktop apps.<\/li>\n<li><b class=\"ocpLegacyBold\">[Networking]<\/b>\u00a0This update improves reliability when Windows uses SMB compression over QUIC. After you install this update, SMB compression requests over QUIC complete more consistently, reducing the likelihood of timeouts and supporting smoother, more dependable performance.<\/li>\n<li><b class=\"ocpLegacyBold\">[PowerShell]<\/b>\u00a0This update improves how the Set-GPPrefRegistryValue cmdlet in PowerShell imports registry preference values. The cmdlet now preserves each imported value in full, including the final character.<\/li>\n<li><b class=\"ocpLegacyBold\">[Remote Desktop]<\/b>\u00a0This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see\u00a0<a class=\"ocpExternalLink\" href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2347342\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Understanding security warnings when opening Remote Desktop (RDP) files<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">\u200b\u200b\u200b\u200b\u200b\u200b\u200b[Texts and Fonts]<\/b>\u00a0This update improves Windows fonts by adding the new Saudi Riyal currency symbol. This change helps keep text clear, accurate, and visually consistent across your Windows apps and experiences\u200b\u200b\u200b\u200b\u200b\u200b\u200b.<\/li>\n<li><b class=\"ocpLegacyBold\">[Windows Deployment Services (WDS)]\u00a0<\/b>This update disables the \"Hands-Free Deployment\" feature in WDS by default and is no longer a supported feature. For more information about this change, see\u00a0<a class=\"ocpArticleLink\" href=\"https:\/\/support.microsoft.com\/en-us\/topic\/windows-deployment-services-wds-hands-free-deployment-hardening-guidance-related-to-cve-2026-0386-0daa3a3c-f3cd-4291-9147-a459c290c462\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Windows Deployment Services (WDS) Hands-Free Deployment Hardening Guidance related to CVE-2026-0386<\/a>.<\/li>\n<\/ul>\n<p>Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"https:\/\/www.catalog.update.microsoft.com\/home.aspx\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> und per WSUS sowie WUfB erh\u00e4ltlich. Im Patch ist das aktuelle Windows Servicing Stack Update integriert. Details zum Update sowie ggf. verursachte Probleme und Installationsvoraussetzungen sind im Support-Beitrag aufgef\u00fchrt.<\/p>\n<h2>Updates f\u00fcr Windows Server 2022\/23H2<\/h2>\n<p>F\u00fcr Windows Server 2022 sowie sowie f\u00fcr Windows Server 23H2 stehen folgende Updates zur Verf\u00fcgung.<\/p>\n<h3>Update KB5082060 f\u00fcr Windows Server 23H2<\/h3>\n<p>Eine Liste der Updates f\u00fcr Windows Server 23H2 l\u00e4sst sich auf dieser <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/windows-server-version-23h2-update-history-68c851ff-825a-4dbc-857b-51c5aa0ab248\" target=\"_blank\" rel=\"noopener\">Microsoft-Webseite<\/a> abrufen. F\u00fcr Windows Server 23H2 wurde das kumulative Update <a href=\"https:\/\/support.microsoft.com\/help\/5082060\" target=\"_blank\" rel=\"noopener\">KB5082060<\/a> freigegeben, welches Sicherheitspatches und verschiedene Fixes beinhaltet.<\/p>\n<ul>\n<li><b class=\"ocpLegacyBold\">[Graphics]<\/b>\n<ul>\n<li>This update improves stability for certain GPU configurations. It helps games and 3D apps run more reliably during intensive graphics use.<\/li>\n<li>This update improves stability affecting certain GPU configurations, helping devices shut down more reliably.\u200b\u200b\u200b\u200b\u200b\u200b\u200b<\/li>\n<\/ul>\n<\/li>\n<li><b class=\"ocpLegacyBold\">[Kerberos protocol]<\/b>\u00a0This update changes the default DefaultDomainSupportedEncTypes value for Kerberos Key Distribution Center (KDC) operations to leverage AES-SHA1 for accounts that do not have an explicit msds-SupportedEncryptionTypes Active Directory attribute defined. For more information see,\u00a0<a class=\"ocpExternalLink\" href=\"https:\/\/support.microsoft.com\/topic\/windows-deployment-services-wds-hands-free-deployment-hardening-guidance-related-to-cve-2026-0386-0daa3a3c-f3cd-4291-9147-a459c290c462\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Windows Deployment Services (WDS) Hands-Free Deployment Hardening Guidance related to CVE-2026-0386<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Networking]<\/b>\u00a0This update improves reliability when Windows uses SMB compression over QUIC. After you install this update, SMB compression requests over QUIC complete more consistently, reducing the likelihood of timeouts and supporting smoother, more dependable performance.<\/li>\n<li><b class=\"ocpLegacyBold\">[Remote Desktop]<\/b>\u00a0This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see\u00a0<a class=\"ocpExternalLink\" href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2347342\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Understanding security warnings when opening Remote Desktop (RDP) files<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Secure Boot]\u00a0<\/b>This update addresses an issue where the device might enter BitLocker Recovery after the Secure Boot updates.<\/li>\n<li><b class=\"ocpLegacyBold\">[Windows Deployment Services (WDS)]\u00a0<\/b>This update disables the \"Hands-Free Deployment\" feature in WDS by default and is no longer a supported feature. For more information about this change, see\u00a0<a class=\"ocpExternalLink\" href=\"https:\/\/support.microsoft.com\/topic\/windows-deployment-services-wds-hands-free-deployment-hardening-guidance-related-to-cve-2026-0386-0daa3a3c-f3cd-4291-9147-a459c290c462\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Windows Deployment Services (WDS) Hands-Free Deployment Hardening Guidance related to CVE-2026-0386<\/a>.<\/li>\n<\/ul>\n<p>Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"https:\/\/www.catalog.update.microsoft.com\/home.aspx\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> und per WSUS sowie WUfB erh\u00e4ltlich. Im Patch ist das aktuelle\u00a0 Windows Servicing Stack Update integriert. Details zum Update sowie ggf. verursachte Probleme und Installationsvoraussetzungen sind im Support-Beitrag aufgef\u00fchrt.<\/p>\n<h3>Update KB5082142 f\u00fcr Windows Server 2022<\/h3>\n<p>Eine Liste der Updates f\u00fcr Windows Server 2022 l\u00e4sst sich auf dieser <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/windows-server-2022-update-history-e1caa597-00c5-4ab9-9f3e-8212fe80b2ee\" target=\"_blank\" rel=\"noopener\">Microsoft-Webseite<\/a> abrufen. F\u00fcr Windows Server 2022 wurde das kumulative Update <a href=\"https:\/\/support.microsoft.com\/help\/5082142\" target=\"_blank\" rel=\"noopener\">KB5082142<\/a> freigegeben, welches Sicherheitspatches und diverse Bug-Fixes beinhaltet.<\/p>\n<ul>\n<li><b class=\"ocpLegacyBold\">[Connectivity]<\/b>\u00a0This update improves the reliability of audio features in Windows, helping reduce system unresponsiveness related to sound or audio activity.<\/li>\n<li><b class=\"ocpLegacyBold\">[Kernel]\u00a0<\/b>This update improves system stability during large file operations. Users should experience fewer unexpected interruptions while working with or transferring large files.<\/li>\n<li><b class=\"ocpLegacyBold\">[Kerberos protocol]<\/b>\u00a0This update changes the default DefaultDomainSupportedEncTypes value for Kerberos Key Distribution Center (KDC) operations to leverage AES-SHA1 for accounts that do not have an explicit msds-SupportedEncryptionTypes Active Directory attribute defined. For more information see,\u00a0<a class=\"ocpExternalLink\" href=\"https:\/\/support.microsoft.com\/topic\/how-to-manage-kerberos-kdc-usage-of-rc4-for-service-account-ticket-issuance-changes-related-to-cve-2026-20833-1ebcda33-720a-4da8-93c1-b0496e1910dc\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Networking]<\/b>\u00a0This update improves reliability when Windows uses SMB compression over QUIC. After you install this update, SMB compression requests over QUIC complete more consistently, reducing the likelihood of timeouts and supporting smoother, more dependable performance.<\/li>\n<li><b class=\"ocpLegacyBold\">[Remote Desktop]<\/b>\u00a0This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see\u00a0<a class=\"ocpExternalLink\" href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2347342\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Understanding security warnings when opening Remote Desktop (RDP) files<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Secure Boot]<\/b>\n<ul>\n<li>With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout.<\/li>\n<li>This update addresses an issue where the device might enter BitLocker Recovery after the Secure Boot updates.<\/li>\n<\/ul>\n<\/li>\n<li><b class=\"ocpLegacyBold\">[Texts and Fonts]<\/b>\u00a0This update improves Windows fonts by adding the new Saudi Riyal currency symbol. This change helps keep text clear, accurate, and visually consistent across your Windows apps and experiences.<\/li>\n<li><b class=\"ocpLegacyBold\">[Windows Deployment Services (WDS)]<\/b>\u00a0This update disables the \"Hands-Free Deployment\" feature in WDS by default and is no longer a supported feature. For more information about this change, see\u00a0<a class=\"ocpExternalLink\" href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Ftopic%2F0daa3a3c-f3cd-4291-9147-a459c290c462&amp;data=05%7C02%7Cv-riydawn%40microsoft.com%7C41d08e6924804fad47c208de9500e47b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C639112028248707413%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=btitmS8kK6uoZG8LC1hBmxhbZOpboVWq02mVOYwUUUk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Windows Deployment Services (WDS) Hands-Free Deployment Hardening Guidance related to CVE-2026-0386<\/a>.<\/li>\n<\/ul>\n<p>Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"https:\/\/www.catalog.update.microsoft.com\/home.aspx\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> und per WSUS sowie WUfB erh\u00e4ltlich. Im Patch ist das aktuell Windows Servicing Stack Update integriert. Details zum Update sowie ggf. verursachte Probleme und Installationsvoraussetzungen sind im Support-Beitrag aufgef\u00fchrt.<\/p>\n<h2>Updates f\u00fcr Windows Server 2016\/2019<\/h2>\n<p>Eine Liste der Updates f\u00fcr Windows Server 2016 und 2019 l\u00e4sst sich auf dieser <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/windows-10-and-windows-server-2019-update-history-725fc2e1-4443-6831-a5ca-51ff5cbcb059\" target=\"_blank\" rel=\"noopener\">Microsoft-Webseite<\/a> abrufen. Ich habe nachfolgend die betreffenden Update-Informationen herausgezogen.<\/p>\n<h3>Update KB5082123 f\u00fcr Windows Server 2019<\/h3>\n<p>Das kumulative Update <a href=\"https:\/\/support.microsoft.com\/help\/5082123\" target=\"_blank\" rel=\"noopener\">KB5082123<\/a> steht nicht nur f\u00fcr Windows 10 2019 Enterprise LTSC etc. bereit, sondern auch f\u00fcr Windows Server 2019. Das Update beinhaltet Sicherheitsfixes, und Verbesserungen bzw. Fehlerbehebungen (auf den Registerreiter zu Server 2019 umstellen), die im Supportbeitrag aufgef\u00fchrt sind.<\/p>\n<ul>\n<li><b class=\"ocpLegacyBold\">[PowerShell (known issue)]<\/b>\u00a0Fixed: After installing Windows updates released on or after January 13, 2026, Japanese language installations of Windows Server 2019 might not correctly display Japanese characters in the PowerShell console.<\/li>\n<li><b class=\"ocpLegacyBold\">[Remote Desktop]<\/b>\u00a0This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see\u00a0<a class=\"ocpExternalLink\" tabindex=\"0\" href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2347342\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Understanding security warnings when opening Remote Desktop (RDP) files<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Windows Deployment Services (WDS)]<\/b>\u00a0This update disables the \"Hands-Free Deployment\" feature in WDS by default and is no longer a supported feature. For more information about this change, see\u00a0<a class=\"ocpExternalLink\" tabindex=\"0\" href=\"https:\/\/support.microsoft.com\/topic\/0daa3a3c-f3cd-4291-9147-a459c290c462\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Windows Deployment Services (WDS) Hands-Free Deployment Hardening Guidance related to CVE-2026-0386<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Kerberos protocol]<\/b>\u00a0This update changes the default\u00a0<a class=\"ocpExternalLink\" tabindex=\"0\" href=\"https:\/\/learn.microsoft.com\/troubleshoot\/windows-server\/windows-security\/kerberos-protocol-registry-kdc-configuration-keys\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">DefaultDomainSupportedEncTypes<\/a>\u00a0value for Kerberos Key Distribution Center (KDC) operations to leverage AES-SHA1 for accounts that do not have an explicit msds-SupportedEncryptionTypes Active Directory attribute defined. For more information see,\u00a0<a class=\"ocpExternalLink\" tabindex=\"0\" href=\"https:\/\/support.microsoft.com\/topic\/1ebcda33-720a-4da8-93c1-b0496e1910dc\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Secure Boot]\u00a0<\/b>\n<ul>\n<li><b class=\"ocpLegacyBold\">\u200b\u200b\u200b\u200b\u200b\u200b\u200b<\/b>This update enables dynamic status reporting for Secure Boot states in the Windows Security App (<b class=\"ocpLegacyBold\">Settings<\/b>\u00a0&gt;\u00a0<b class=\"ocpLegacyBold\">Update &amp; Security<\/b>\u00a0&gt;\u00a0<b class=\"ocpLegacyBold\">Windows Security<\/b>).\u00a0<a class=\"ocpExternalLink\" tabindex=\"0\" href=\"https:\/\/support.microsoft.com\/topic\/5ce39986-7dd2-4852-8c21-ef30dd04f046\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Learn more<\/a>\u00a0about the status alerts via badges and notifications. Note that these enhancements are disabled by default on commercial devices and servers.<\/li>\n<li>This update fixes an issue that could cause a device to enter BitLocker Recovery after Secure Boot updates.<\/li>\n<li>With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Das Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"http:\/\/www.catalog.update.microsoft.com\/home.aspx\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>, per WSUS und WUfB erh\u00e4ltlich. Microsoft hat zudem das Service Stack Update (SSU) aktualisiert. Beachtet die im Support-Beitrag beschriebene Installationsreihenfolge, ggf. die Hinweise zu weiteren Anforderungen und eventuell vorhandener Probleme.<\/p>\n<h3>Update KB5078938- f\u00fcr Windows Server 2016<\/h3>\n<p>Das kumulative Update <a href=\"https:\/\/support.microsoft.com\/help\/5078938-\" target=\"_blank\" rel=\"noopener\">KB5078938-<\/a> steht nicht nur f\u00fcr Windows 10 2016 Enterprise LTSC, sondern auch f\u00fcr Windows Server 2016, bereit. Das Update beinhaltet Sicherheitsfixes, Fehlerbehebungen und Verbesserungen, die ggf. im Supportbeitrag aufgef\u00fchrt werden.<\/p>\n<ul>\n<li><b class=\"ocpLegacyBold\">[Windows Component Services (WinCS)]<\/b>\u00a0This update addresses an issue that affects Windows Component Services (WinCS) on Windows 10, version 1607 and Windows Server 2016. Some WinCS components were missing. Because of this, you could not turn on Secure Boot using WinCS.<\/li>\n<li><b class=\"ocpLegacyBold\">[Remote Desktop]<\/b>\u00a0This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see\u00a0<a class=\"ocpExternalLink\" tabindex=\"0\" href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2347342\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Understanding security warnings when opening Remote Desktop (RDP) files<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Windows Deployment Services (WDS)]<\/b>\u00a0This update disables the \"Hands-Free Deployment\" feature in WDS by default and is no longer a supported feature. For more information about this change, see\u00a0<a class=\"ocpExternalLink\" tabindex=\"0\" href=\"https:\/\/support.microsoft.com\/topic\/0daa3a3c-f3cd-4291-9147-a459c290c462\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Windows Deployment Services (WDS) Hands-Free Deployment Hardening Guidance related to CVE-2026-0386<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Kerberos protocol]<\/b>\u00a0This update changes the default\u00a0<a class=\"ocpExternalLink\" tabindex=\"0\" href=\"https:\/\/learn.microsoft.com\/troubleshoot\/windows-server\/windows-security\/kerberos-protocol-registry-kdc-configuration-keys\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">DefaultDomainSupportedEncTypes<\/a>\u00a0value for Kerberos Key Distribution Center (KDC) operations to leverage AES-SHA1 for accounts that do not have an explicit msds-SupportedEncryptionTypes Active Directory attribute defined. For more information see,\u00a0<a class=\"ocpExternalLink\" tabindex=\"0\" href=\"https:\/\/support.microsoft.com\/topic\/1ebcda33-720a-4da8-93c1-b0496e1910dc\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833<\/a>.<\/li>\n<li><b class=\"ocpLegacyBold\">[Secure Boot]<\/b>\u00a0With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout. \u200b\u200b\u200b\u200b\u200b\u200b\u200b<\/li>\n<\/ul>\n<p>Das Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"http:\/\/www.catalog.update.microsoft.com\/home.aspx\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>, per WSUS und WUfB erh\u00e4ltlich. Microsoft hat zudem das Service Stack Update (SSU) aktualisiert. Beachtet die im Support-Beitrag beschriebenen Installationsanforderungen und eventuelle Hinweise auf vorhandene Probleme.<\/p>\n<h2>Updates f\u00fcr Windows Server 2012 \/ R2<\/h2>\n<p>Windows Server 2012\/R2 sind im Oktober 2023 aus dem Support gefallen und bekommen nur noch mit ESU-Lizenz Updates. Beachtet die Hinweise auf die Installationsreihenfolge f\u00fcr Windows Server, die Microsoft in den KB-Artikeln angibt.<\/p>\n<h3>Update KB5082126 f\u00fcr Windows Server 2012 R2<\/h3>\n<p>Die Update-Historie f\u00fcr Windows Server 2012 R2 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009470\/windows-8-1-windows-server-2012-r2-update-history\" target=\"_blank\" rel=\"noopener\">dieser Microsoft-Seite<\/a> zu finden. F\u00fcr Windows Server 2012 R2 wurde Update <a href=\"https:\/\/support.microsoft.com\/help\/5082126\" target=\"_blank\" rel=\"noopener\">KB5082126<\/a> (Monthly Rollup for Windows Server 2012 R2) f\u00fcr Systeme mit ESU-Lizenz freigegeben.<\/p>\n<blockquote><p><b class=\"ocpLegacyBold\">[Remote Desktop]<\/b>\u00a0Improved:\u00a0This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see\u00a0<a class=\"ocpExternalLink\" href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2347342\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Understanding security warnings when opening Remote Desktop (RDP) files<\/a>.<\/p><\/blockquote>\n<p>Dieses Update wird in Windows Server 2012 R2 automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"https:\/\/www.catalog.update.microsoft.com\/\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> sowie per WSUS erh\u00e4ltlich. Details zu Fixes sowie ggf. bekannte Probleme in Verbindung mit dem Update sind im Supportbeitrag genannt.<\/p>\n<h3>Update KB5082127 f\u00fcr Windows Server 2012<\/h3>\n<p>Die Update-Historie f\u00fcr Windows Server 2012 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/windows-server-2012-update-history-abfb9afd-2ebf-1c19-4224-ad86f8741edd\" target=\"_blank\" rel=\"noopener\">dieser Microsoft-Seite<\/a> zu finden.\u00a0F\u00fcr Windows Server 2012 mit ESU-Lizenz wurde Update <a href=\"https:\/\/support.microsoft.com\/help\/5082127\" target=\"_blank\" rel=\"noopener\">KB5082127<\/a> (Monthly Rollup for Windows Server 2012) freigegeben. Es enth\u00e4lt Sicherheitspatches und Bug-Fixes.<\/p>\n<blockquote><p><b class=\"ocpLegacyBold\">[Remote Desktop]<\/b>\u00a0Improved: This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see\u00a0<a class=\"ocpExternalLink\" href=\"https:\/\/go.microsoft.com\/fwlink\/?linkid=2347342\" target=\"_blank\" rel=\"noopener\" data-bi-type=\"anchor\">Understanding security warnings when opening Remote Desktop (RDP) files<\/a>.<\/p><\/blockquote>\n<p>Dieses Update ist im <a href=\"https:\/\/www.catalog.update.microsoft.com\/\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> sowie per WSUS erh\u00e4ltlich. Bei einer manuellen Installation ist das neueste Servicing Stack Update (SSU) vorher zu installieren \u2013 wobei dieses SSU nicht mehr deinstalliert werden kann. Probleme im Zusammenhang mit dem Update sind im KB-Artikel angegeben.<\/p>\n<p>Details zu obigen Updates sind im Zweifelsfall den jeweiligen Microsoft KB-Artikeln zu entnehmen.<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2026\/04\/14\/microsoft-security-update-summary-14-april-2026\/\">Microsoft Security Update Summary<\/a> (14. April 2026)<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2026\/04\/15\/patchday-windows-10-11-updates-14-april-2026\/\">Patchday: Windows 10\/11 Updates<\/a> (14. April 2026)<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2026\/04\/15\/patchday-windows-server-updates-14-april-2026\/\">Patchday: Windows Server-Updates<\/a> (14. April 2026)<br \/>\nPatchday: Microsoft Office Updates (14. April 2026)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zum 14. April 2026 (zweiter Dienstag im Monat, Patchday bei Microsoft) wurden verschiedene kumulative Updates f\u00fcr die unterst\u00fctzten Versionen von Windows Server freigegeben. Nachfolgend habe ich die bereitgestellten Updates samt einigen Details f\u00fcr diese Windows Server-Versionen (von Windows Server 2012 &hellip; <a href=\"https:\/\/borncity.com\/blog\/2026\/04\/15\/patchday-windows-server-updates-14-april-2026\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,185,2557],"tags":[15577,4328,4315,4364],"class_list":["post-323722","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-update","category-windows-server","tag-patchday-4-2026","tag-sicherheit","tag-update","tag-windows-server"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/323722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=323722"}],"version-history":[{"count":5,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/323722\/revisions"}],"predecessor-version":[{"id":323729,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/323722\/revisions\/323729"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=323722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=323722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=323722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}