Windows 10, version 22H2

Find information on known issues and the status of the Windows 10, version 22H2 rollout. For immediate help with Windows update issues, click here if you are using a Windows device to open the Get Help app or go to support.microsoft.com. Follow @WindowsUpdate on X (formerly Twitter) for Windows release health updates. If you are an IT administrator and want to programmatically get information from this page, use the Windows Updates API in Microsoft Graph.

Current status as of October 31, 2024 

On October 14, 2025, Windows 10 will reach end of support*. After this date, devices running Windows 10 will no longer receive fixes for known issues, time zone updates, technical support, or monthly security and preview updates containing protection from the latest security threats. 

Today we published a new blog post to help you prepare for Windows 10 end of support and outlined options for moving to Windows 11. The options include:   
  • Check if your current Windows 10 PC can upgrade to Windows 11.   
  • Purchase a new Windows 11 PC.  
  • Purchase Extended Security Updates (ESU) for organizations of all sizes as previously announced in April of this year.  
  • For the first time, purchase an ESU option for individuals. 
*Note: Long-Term Servicing Branch (LTSB) and Long-Term Servicing Channel (LTSC) releases are subject to different lifecycle support policies. Check out the Microsoft lifecycle website for more information.  

To learn about Windows 10 servicing timelines and lifecycle, see Windows 10 release information and Lifecycle FAQ - Windows

    Known issues

    See open issues, content updated in the last 30 days, and information on safeguard holds. To find a specific issue, use the search function on your browser (CTRL + F for Microsoft Edge).

    SummaryOriginating updateStatusLast updated
    AVD users might experience extended black screen during logon and SSO failures
    This issue affects enterprise users using FSLogix user profile containers on multi-session environments.
    OS Build 19045.4717
    KB5040525
    2024-07-23
    Confirmed
    2024-11-01
    14:11 PT
    Apps that set UIAccess=true might fail to start for non-admin users
    This issue is due to child processes of these apps running with Integrity level low instead of Integrity level medium
    OS Build 19045.4957
    KB5043131
    2024-09-24
    Mitigated
    2024-10-30
    13:19 PT
    Azure Virtual Desktop users might experience black screen during login
    This issue affects enterprise users with multi-session environments due to issues with AppX Deployment Service
    OS Build 19045.4717
    KB5040525
    2024-07-23
    Resolved
    KB5045594
    2024-10-22
    10:16 PT
    August 2024 security update might impact Linux boot in dual-boot setup devices
    This issue might impact devices with dual-boot setup for Windows and Linux when SBAT setting is applied
    OS Build 19045.4780
    KB5041580
    2024-08-13
    Mitigated
    2024-09-20
    12:41 PT

    Issue details

    November 2024

    AVD users might experience extended black screen during logon and SSO failures

    StatusOriginating updateHistory
    ConfirmedOS Build 19045.4717
    KB5040525
    2024-07-23
    Last updated: 2024-11-01, 14:11 PT
    Opened: 2024-11-01, 14:11 PT

    After installing the July 2024 non-security preview update (KB5040525), released July 23, 2024, or subsequent updates, you might experience an extended black screen that stays between 10 to 30 mins when you login to Azure Virtual Desktop (AVD). Additional symptoms you might experience include:

    • ​Failures related to single sign-on (SSO) experience on Office applications such as Outlook and Teams, which could prevent you from connecting to backend services or synchronizing data.
    • ​Office apps display losing network connectivity even though other applications, such as Edge, retain intranet and internet access.

    This issue is caused by a deadlock in the interactions between the Azure Active Directory(AAD) broker and the underlying AppX deployment service(AppxSvc) and Background tasks infrastructure service.You are more likely to experience this issue if you are using FSLogix user profile containers on multi-session environments. FSLogix is a Microsoft tool that helps manage and speed up user profiles on computers, especially in virtual environments like remote desktops.

    Please note that this issue is different from the scenario where the AppX Deployment Service (AppxSvc) was in an invalid state, causing a black screen. That issue was resolved with Windows updates released on October 22, 2024 (KB5045594), and later.

    Windows 10 Education edition users and home users of Windows using Home or Pro editions are unlikely to face this issue as Azure Virtual Desktop is more commonly used in enterprise environments.

     

    Next Steps: We are investigating the issue and provide an update where more information is available.

     

    Affected platforms:

    • ​Client: Windows 10, version 22H2
    • ​Server: None

    October 2024

    Apps that set UIAccess=true might fail to start for non-admin users

    StatusOriginating updateHistory
    MitigatedOS Build 19045.4957
    KB5043131
    2024-09-24
    Last updated: 2024-10-30, 13:19 PT
    Opened: 2024-10-30, 12:45 PT

    After installing the September 2024 preview update (KB5043131), released September 24, 2024 or later, you might observe that apps such as Quick Assist, Microsoft Teams, Windows Narrator, etc might fail to start if you are a non-admin user. You might experience this issue on any app that sets UIAccess=true while trying to run the app as a non-admin user. The uiAccess=true attribute in an application's manifest file is used to request that the application be granted higher privileges. Apps using this attribute launch from a secure path, such as :

    • ​%ProgramFiles% (including subdirectories)
    • ​%ProgramFiles(x86)% (including subdirectories for 64-bit versions of Windows)
    • ​%systemroot%\system32
    • ​%systemroot%\syswow64 (for 64-bit versions of Windows)

    If you have the Procmon monitoring tool installed in your device, you will observe that the application runs with the wrong integrity level, Integrity:Low instead of the expected Integrity:Medium. You are less likely to encounter this issue if you are running the application as an administrator.

    Resolution: This issue is mitigated using Known Issue Rollback (KIR). Please note that it might take up to 24 hours for the resolution to propagate automatically to consumer devices and non-managed business devices and business devices that are not managed by IT departments. Restarting your Windows device might help the resolution apply to your device faster. 

    For enterprise-managed devices managed by IT departments that have installed the affected update and encountered this issue, IT administrators can resolve it by installing and configuring the Group policy listed below. The special Group Policy can be found in Computer Configuration > Administrative Templates > <Group Policy name listed below>.

    For information on deploying and configuring these special Group Policy, please see How to use Group Policy to deploy a Known Issue Rollback.

    Group Policy downloads with Group Policy name:

    Important: You will need to install and configure the Group Policy for your version of Windows to resolve this issue. You will also need to restart your device(s) to apply the group policy setting.

    Note: The below steps apply to enterprise devices that are domain joined.

    1. ​Wait for the KIR group policy changes to replicate in Active Directory and the SYSVOL
    2. ​Follow one of the steps below before applying the KIR:
      1. ​Wait for group policy to refresh in the background then restart your device (or)
      2. ​Run ‘gpupdate /force’ from a command prompt then restart your device
            

    Next Steps: We are working on a resolution and will provide more information when it is available.

    Affected platforms:

    • ​Client: Windows 10, version 22H2
    • ​Server: None

    Azure Virtual Desktop users might experience black screen during login

    StatusOriginating updateHistory
    Resolved KB5045594OS Build 19045.4717
    KB5040525
    2024-07-23
    Resolved: 2024-10-22, 10:00 PT
    Opened: 2024-10-14, 11:48 PT

    After installing the July 2024 non-security preview update (KB5040525), released July 23, 2024 or subsequent updates, you might experience a black screen when you login to Azure Virtual Desktop (AVD). You might also notice that you are unable to log out of your account and the black screen persists even after disconnecting and reconnecting to AVD. Resulting from this issue, the application event log in Event viewer will show an application error with Event ID:1000 indicating a fault with the application ‘svchost.exe_AppXSvc’.

    Please note that AppX Deployment Service (AppxSvc) being in an invalid state could also cause other symptoms like the Start Menu to close unexpectedly due to registration issues.

    Windows 10 Education edition users and home users of Windows using Home or Pro editions are unlikely to face this issue as Azure Virtual Desktop is more commonly used in enterprise environments.

     

    Resolution: This issue was resolved by Windows updates released October 22, 2024 (KB5045594), and later. We recommend you install the latest update for your device as it contains important improvements and issue resolutions, including this one.

    If you install an update released October 22, 2024 (KB5045594) or later, you do not need to use a Known Issue Rollback (KIR) or a special Group Policy to resolve this issue. If you are using an update released before October 22, 2024, and have this issue, you can resolve it by installing and configuring the special Group Policy listed below. 

    The special Group Policy can be found in Computer Configuration > Administrative Templates > <Group Policy name listed below>.

     

    For information on deploying and configuring these special Group Policy, please see How to use Group Policy to deploy a Known Issue Rollback.

     

    Group Policy downloads with Group Policy name:

     

    Important: You will need to install and configure the Group Policy for your version of Windows to resolve this issue. You will also need to restart your device(s) to apply the group policy setting.

    Affected platforms:

    • ​Client: Windows 10, version 22H2
    • ​Server: None

    August 2024

    August 2024 security update might impact Linux boot in dual-boot setup devices

    StatusOriginating updateHistory
    MitigatedOS Build 19045.4780
    KB5041580
    2024-08-13
    Last updated: 2024-09-20, 12:41 PT
    Opened: 2024-08-21, 18:33 PT

    After installing the August 2024 Windows security update, (KB5041580) or the August 2024 preview update, you might face issues with booting Linux if you have enabled the dual-boot setup for Windows and Linux in your device. Resulting from this issue, your device might fail to boot Linux and show the error message “Verifying shim SBAT data failed: Security Policy Violation. Something has gone seriously wrong: SBAT self-check failed: Security Policy Violation.”

    The August 2024 Windows security and preview updates apply a Secure Boot Advanced Targeting (SBAT) setting to devices that run Windows to block old, vulnerable boot managers. This SBAT update will not be applied to devices where dual booting is detected. On some devices, the dual-boot detection did not detect some customized methods of dual-booting and applied the SBAT value when it should not have been applied.

    IMPORTANT: This known issue only occurs with the installation of the August 2024 security and preview updates. The September 2024 security update (KB5043064) and later updates do not contain the settings that caused this issue. If you install the September 2024 update, you don’t need to apply the workaround below.

    Workaround:

    If your Linux becomes unbootable after installing the August 2024 security or preview updates, you can recover your Linux system by following these instructions.

    Important: This documentation contains information about how to modify the registry. Make sure that you back up the registry before you modify it. Make sure that you know how to restore the registry if a problem occurs. For more information about how to back up, restore, and modify the registry, see How to back up and restore the registry in Windows. Also, note that modifying firmware settings incorrectly might prevent your device from starting correctly. Follow these instructions carefully and only proceed if you are confident in your ability to do so.

            a) Disable Secure Boot:

    • ​Boot into your device’s firmware settings.
    • ​Disable Secure Boot (steps vary by manufacturer).
            b) Delete SBAT Update:

    • ​Boot into Linux.
    • ​Open the terminal and run the below command:
    sudo mokutil --set-sbat-policy delete
    
    • ​Enter your root password if prompted.
    • ​Boot into Linux once more.
            c) Verify SBAT Revocations:

    • ​In the terminal, run the below command:
    mokutil --list-sbat-revocations
    
    • ​Ensure the list shows no revocations.
            d) Re-enable Secure Boot:

    • ​Reboot into the firmware settings.
    • ​Re-enable Secure Boot.
            e) Check Secure Boot Status:

    • ​Boot into Linux. Run the below command:
     mokutil --sb-state
    
    • ​The output should be “SecureBoot enabled”. If not, retry step d).
            f) Prevent Future SBAT Updates in Windows:

    • ​Boot into Windows.
    • ​Open Command Prompt as Administrator and run:
    reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\SBAT /v OptOut /d 1 /t REG_DWORD
    

    At this point, you should now be able to boot into Linux or Windows as before. It’s a good time to install any pending Linux updates to ensure your system is secure.

    NOTE: On Windows-only systems, after installing the September 2024 or later updates, you can set the registry key documented in CVE-2022-2601 and CVE-2023-40547 to ensure the SBAT security update is applied. On systems that dual-boot Linux and Windows, there are no additional steps necessary after installing the September 2024 or later updates.

    Next Steps: We are working on a final resolution that will be available in a future Windows update. We recommend you install the September 2024 update or later Windows updates to avoid this issue.

    Affected platforms:

    • ​Client: Windows 11, version 23H2; Windows 11, version 22H2; Windows 11, version 21H2; Windows 10, version 22H2; Windows 10, version 21H2; Windows 10 Enterprise 2015 LTSB
    • ​Server: Windows Server 2022; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012

    Report a problem with Windows updates

    To report an issue to Microsoft at any time, use the Feedback Hub app. To learn more, see Send feedback to Microsoft with the Feedback Hub app.

    Need help with Windows updates?

    Search, browse, or ask a question on the Microsoft Support Community. If you are an IT pro supporting an organization, visit Windows release health on the Microsoft 365 admin center for additional details.

    For direct help with your home PC, use the Get Help app in Windows or contact Microsoft Support. Organizations can request immediate support through Support for business.

    View this site in your language

    This site is available in 11 languages: English, Chinese Traditional, Chinese Simplified, French (France), German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, and Spanish (Spain). All text will appear in English if your browser default language is not one of the 11 supported languages. To manually change the display language, scroll down to the bottom of this page, click on the current language displayed on the bottom left of the page, and select one of the 11 supported languages from the list.