Thanks for this full detailed description guys, however still one open question on the vulnerability part.
CVE-2018-8581 initially talked about removing the DisableLoopBackCheck Key:
To address this vulnerability, a registry value which enables NTLM authentication on the network loopback adapter needs to be removed. Future cumulative updates will ensure that this registry setting is configured correctly during installation of the cumulative update.
---
We have removed this key on our EX2016 CU11 Servers to be on the safe side and didn't see any negative side effects so far. Is this key also being removed during CU12 install and the recommendation above still valid even after the changes been implemented with the updates been released today?
Thanks for clarifying!