White Papers
6 Update 1803 for Cloud Platform System (CPS) Standard
2 Update 1803—Summary
Update 1803 for CPS Standard includes updates for Windows Server and other software components. This update
includes the following components:
1803 update. This is the main package. It contains Windows Server, System Center, and SQL Server updates.
IMPORTANT: Update 1703 is a prerequisite for installing update 1803.
IMPORTANT: New installations of Data Protection Manager (DPM) or Azure Onboarding for Azure Site Recovery
(ASR) requires the install of update 1803 before install/expansion. Once the install/expansion are complete, re-run
update 1803 to update the newly installed servers.
IMPORTANT: Update 1712 (and higher) contains 3 updated SMA Management Packs for SCOM. These need to be
installed manually after the P&U run is complete.
IMPORTANT: The OEM OOB (Out-of-Band Management) web interface may not work correctly after applying P&U
1706 (or higher). See the troubleshooting section at the end of this document for workarounds/resolution.
IMPORTANT: Update 1803 contains manual steps post-install to ensure protection from vulnerabilities. See “Step 5:
Post-update manual steps” in the “Update the computers” section of “Apply P&U updates”
IMPORTANT: Update 1712 (and higher) contains the Windows binary and registry changes to mitigate “speculative
execution side-channel attacks” in Security Advisory ADV180002.
For detailed update payload information, see Payload information.
2.1 Additional update information
This update includes new functionality to enforce Transport Layer Security (TLS) 1.2 communications across the stamp.
Details and impacts include:
Microsoft Support KB# 3117336 – Recommendation to migrate all Windows computers to TLS 1.2.
TLS 1.0/1.1 are disabled across all hosts and VMs.
Update 1606 (minor release) and 1611 (major release) for CPS disabled SSL 2.0/3.0 communications to protect
against POODLE SSL vulnerabilities.
Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008 will no longer be able to access
stamp resources. Examples include the WAP Admin Portal, WAP Tenant Portal, and RDP access to the Console
VMs.
Configuration changes force Windows SChannel communications, Internet Explorer Security, and .NET
Framework 4.0 to all use TLS 1.2 only.
https://requirements.azurewebsites.net/Requirements/Details/6417#guide – Details of registry key changes to
force TLS 1.2 communication cipher suites (“Opportunity for Excellence, < Windows 10” section)