On Tuesday, the company said it was putting off releasing any updates for February due to what it said was "a last minute issue that could impact some customers".
In an updated blog post on Thursday, the company said: "We will deliver updates as part of the planned March Update Tuesday, March 14, 2017."
The zero-day exploit in question implements a SMB3 server and clients connecting to it would be affected.
Instead, the company is switching to a system where those looking for information will have to search a database.
Another change is that there will be cumulative updates for both Windows 7 and 8.1, from this month onwards. Windows 10 has had cumulative updates from the time it was released 18 months ago.
The Internet Security Centre's Johannes Ulrich noted the change in dates for the updates, saying it was "probably overall the least disruptive solution at this point".
However, commenters were not so sanguine, with one writing, "So no February patch Tuesday... but why? If Windows update has been compromised (server or client side) the potential impact is huge. Remember flame?"
Another said: "No evidence, only speculation. But I think this indicates the infrastructure to support the switch from MS##-### bulletin system must have encountered major problems. If there was a patch with major issues they would just postpone that patch."
And a third commented: "So, the Adobe Flash critical update has been released for Chrome and Firefox, but has been held up for IE due to Microsoft. Anyone else concerned that this could allow for the reverse engineering on one platform to give insight into how to construct an attack on another?"