Yes same issue for us too. Not limited to 1909 feature update, also the same for 20h2 pre-release.
We have updated several previously to bother is versions but this week updates result in devices missing certificates.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Any one seen this issue ,only occurring in about the last week. It maybe a wider issues globally. Not sure what triggered it.
Basically in the last few days some updates from 1809 to 1909, after completed, the local laptop certs are missing. Which is a problem for all our home users on VPN! (i.e. with covid still around)
Yes same issue for us too. Not limited to 1909 feature update, also the same for 20h2 pre-release.
We have updated several previously to bother is versions but this week updates result in devices missing certificates.
And what about the customers who distribute the IPU via servicing in MEMCM? Currently there is no possibility to update the Servicing Image.
Hi,
Thank you for coming Microsoft Q&A forum!
Does the issue only occur on Windows home system or your environment only have Windows 10 home system?
What the existing system build? Please run "winver" to check on several devices.
Bests,
============================================
If the Answer is helpful, please click "Accept Answer" and upvote it.
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.
we also face the same issue and there is a workaround of deleting the vpn connection from the NCPA.CPL and rerun the package fix or else connect to corporate network to get the new certs downloaded.
Hi All,
I understand you are stuck in a trouble caused by this issue which is caused as target system version (without 2020 9B / 10B package) is lower than existing system version (with 2020 9B / 10B package) . Here is a workaround which could help us get out of it. Please try on your side.
First, we need to rollback to previous OS. Then re-launch the in-place upgrade to a target OS with dynamic updates enabled OR in-place upgrade to an OS image that contains 2020 9B / 10B package or later.
Admins may be successful initiating an OS rollback remotely within the 10 days. The default value is 10 days, we also could configure it through DISM command line (run as admin) as below.
DISM /Online /Set-OSUninstallWindow /Value:<days>
Tip: If value passes anything <2 or >60, the default value of 10 will be set.
Then roll back with the command line DISM /Online /Initiate-OSUninstall [/NoRestart|/Quiet]
For more information about this command tool, please refer to DOCS: DISM operating system uninstall command-line options
Important: OEMs shouldn't use this setting in imaging or manufacturing scenarios. This setting is for IT administrators.
Windows gives a user the ability to uninstall and roll back to a previous version of Windows.
For adding update package into ISO image, we could use DISM tool with add-package parameter.
More details about it, please refer to: To add packages to an offline image by using DISM
Or we could configure image through SCCM.
At last, Thanks for all your patience and continued use for Microsoft products.
Bests,
Joy
============================================
If the Answer is helpful, please click "Accept Answer" and upvote it.
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.