There is no supported policy-based method in the provided information that can reliably roll back or permanently block a specific driver version when it is delivered as part of a cumulative Windows update like KB5077241.
From the available guidance:
- Windows always installs drivers from the driver store, and Windows Update can add newer drivers there and then apply them to devices. If Windows Update detects a missing or older driver, it can reinstall or replace it, even after manual changes.
- To permanently remove a driver package so it cannot be re-used, the supported method is to delete that specific driver package from the driver store using
pnputil(for example,pnputil /delete-driver <Published Name> /uninstall). However, if Windows Update later decides that driver is required, it can download and stage it again, so this is not a guaranteed long‑term block when the driver is embedded in cumulative updates. - Intune/Windows Update for Business driver policies explicitly do not support driver rollback. The documented recommendation is to avoid broad deployment of problematic drivers by using deployment rings and manual approvals, not to centrally enforce a rollback once a problematic driver is already deployed.
Relevant points from the documentation:
- Driver selection behavior
- Windows searches the driver store first, then Windows Update and other locations, and selects the “best” matching driver package based on its internal ranking rules. When a better match is found (for example, a newer or higher-ranked Realtek driver), Windows stages it into the driver store and installs it, replacing the existing driver.
- This behavior is by design and is not described as being overridden by
ExcludeWUDriversInQualityUpdateor by hardware ID restrictions when the driver is part of a cumulative update.
- Removing driver packages
- The supported way to ensure a specific driver package is not reused locally is to remove that package from the driver store using
pnputil /delete-driver <Published Name> /uninstall. This forces devices to fall back to another available driver package (for example, the OEM-supplied one) or to have no driver if no alternative exists. - The documentation also warns that Windows Update can reinstall a “necessary” driver, and that Windows Update settings might need to be adjusted to prevent this. No additional mechanism is documented that would prevent a cumulative update from reintroducing the same driver.
- The supported way to ensure a specific driver package is not reused locally is to remove that package from the driver store using
- Policy limitations for rollback/blocking
- Windows Update client policies do not support driver rollback.
- The guidance for avoiding problematic drivers is to use deployment rings and manual approval so that issues are detected before broad rollout, not to block or roll back a specific driver once it is included in a cumulative update.
Based on this information, the only supported levers described are:
- Manually managing the driver store (using
pnputil) to remove the problematic driver package and reinstall the OEM driver. - Adjusting Windows Update behavior at a policy level to control which driver updates are approved and deployed in the first place (for managed environments using Intune/Autopatch), so that problematic drivers are not broadly deployed.
However, there is no documented, supported mechanism here that guarantees a specific driver embedded in a cumulative update like KB5077241 will never be reinstalled, nor any statement that this specific Realtek regression in KB5077241 is a known issue.
References: