KB5074109 January 2026 Windows 11 Update: DISM Sequencing & Offline Image Servicing

  • Thread Author
Microsoft has published the January 13, 2026 cumulative security update for Windows 11 (KB5074109), and it’s available now via Windows Update and the Microsoft Update Catalog as a set of MSU packages that must be installed in a specific order for offline deployments and image servicing.

Background / Overview​

Microsoft’s January 2026 cumulative (KB5074109) updates both Windows 11 release branches covered by the package and are labeled for the OS builds 26200.7623 and 26100.7623. The package follows Microsoft’s modern cumulative + servicing-stack pattern where the update may include checkpoint differentials and servicing stack components; when applied manually from the Microsoft Update Catalog it can appear as two or more MSU files that must be staged and applied in sequence or installed together with DISM so prerequisites are resolved automatically. This article summarizes the KB’s delivery model and installation mechanics, analyzes the practical impact for home users, administrators, and image builders, and offers clear, actionable deployment guidance and mitigations for known pitfalls. Key recommendations and technical steps are provided to help you install the update reliably and verify successful application.

What’s inside KB5074109 — the short summary​

  • The update is a monthly cumulative security and quality rollup for Windows 11 (January 13, 2026). It targets the two relevant servicing branches referenced by the KB (Windows 11 OS builds 26200.7623 and 26100.7623).
  • Microsoft delivers the package as one or more MSU files in the Microsoft Update Catalog; the KB notes that the MSU files may include prerequisite checkpoint packages that must be applied in order if installed individually. The vendor recommends placing all MSU files in a single folder and using DISM to install the update so the service will discover and sequence prerequisites automatically.
  • The KB includes the usual mix of security fixes and quality improvements (the KB’s detail section lists the resolved issues and the affected components). Administrators should assume the update contains both the latest LCU content and the required servicing updates that ensure reliable installation.

Why the installation order and method matter​

Microsoft’s Update Catalog and KB pages emphasize two installation models:
  • Install all MSU files together (recommended for offline image servicing): place every MSU file for KB5074109 in a single folder and run DISM (or use the Windows Update Standalone Installer). DISM will use the folder you point at to discover and apply prerequisite MSU files in the correct order automatically. This is the simplest approach for image servicing and bulk offline installs.
  • Install each MSU file individually and in order: some catalog packages are delivered as a chain of checkpoint MSUs (a small checkpoint followed by the full cumulative). If you choose to install files individually you must follow Microsoft’s specified sequence; installing them out of order can fail or leave the system in a partially serviced state. The KB explicitly lists the MSU filenames and the recommended sequencing.
The distinction is important because servicing stack updates (SSUs) or checkpoint packaging can create dependencies that make simple “double-click” installation of the newest MSU fail or behave unpredictably on offline images. Microsoft’s Learn documentation on checkpoint cumulative updates explains the rationale and how DISM’s package discovery simplifies sequencing for administrators.

How to install KB5074109 — step-by-step (recommended)​

This section provides the precise commands and recommended workflow for both running PCs and offline images. These steps match Microsoft’s guidance for catalog packages and DISM sequencing.

For a running Windows PC (elevated prompt)​

  • Download all MSU files for KB5074109 from the Microsoft Update Catalog and save them into a single folder, for example C:\Packages.
  • Open an elevated Command Prompt and run DISM to apply the package set (DISM will discover prerequisites in the folder automatically):
    DISM /Online /Add-Package /PackagePath:C:\Packages\Windows11.0-KB5074109-x64.msu
  • Alternatively, from an elevated PowerShell session you can run:
    Add-WindowsPackage -Online -PackagePath "C:\Packages\Windows11.0-KB5074109-x64.msu"
  • You can also use the Windows Update Standalone Installer (wusa.exe) against each MSU or the combined one, but when SSUs are bundled the /uninstall switch will not remove the SSU; treat SSUs as effectively permanent once included in a combined package.

For Windows installation media or an offline WIM image​

  • Mount the target install.wim (or the offline image directory).
  • Copy the MSU files into a folder accessible on the servicing host.
  • Use DISM against the mounted image:
    DISM /Image:mountdir /Add-Package /PackagePath:Windows11.0-KB5074109-x64.msu
  • Or from PowerShell:
    Add-WindowsPackage -Path "C:\offline" -PackagePath "Windows11.0-KB5074109-x64.msu" -PreventPending
  • After adding packages, run component cleanup and unmount per standard image servicing best practices (for example, DISM /Cleanup-Image /StartComponentCleanup and DISM /Export-Image to optimize size). Remember SafeOS/Dynamic Update guidance if you update WinRE/WinPE images.

If you prefer to install each MSU individually​

The KB lists the MSU filenames and the required order. Install them strictly in that order using DISM or wusa. Example (the KB’s order is authoritative — follow it exactly):
  • windows11.0-kb5043080-x64_...msu
  • windows11.0-kb5074109-x64_...msu
(Use the exact filenames and cryptographic hashes you downloaded from the Update Catalog; the KB and Catalog entries identify the precise filenames to ensure sequencing.

Verification and post-install checks​

After installation, verify success and build numbers:
  • Run winver or check Settings → System → About to confirm the OS build is the one listed in the KB (e.g., 26200.7623 or 26100.7623).
  • Use DISM to list installed packages:
    DISM /Online /Get-Packages | findstr /i 5074109
  • Check Windows Update history in Settings for the KB entry and confirm any required reboot completed.
  • Inspect the System and Application event logs for servicing and Component-Based Servicing (CBS) events (use Event Viewer or the Get-WinEvent PowerShell cmdlet).
  • If you applied the update to WinRE images or installation media, verify the WinREAgent servicing events (Event ID 4501) and use reagentc /info and DISM /Get-ImageInfo against the mounted winre.wim. Recent KBs and community guidance remind admins that SafeOS DU changes to WinRE are non-reversible on images — keep golden images backed up.

Known issues, risks, and past patterns to watch for​

Microsoft’s KBs and community reporting through the past year have established a few recurring themes that administrators should consider when applying monthly cumulatives:
  • Servicing Stack and SSU behavior: Microsoft increasingly bundles the SSU with LCUs. When SSUs are included in a combined package they are not removable; manually installed combined packages can complicate rollbacks. If you need the ability to uninstall an LCU, be aware that the SSU component will remain. This is an operational reality that influences rollback planning.
  • Checkpoint cumulative sequencing and DISM prerequisites: Offline image servicing with multiple checkpoint MSUs requires correct sequencing; DISM’s package discovery behavior simplifies this when all files are placed in one folder, but manual individual installs must follow the precise order. Failing to do so is a common source of installation errors.
  • Known product conflicts (historical examples): Several previous monthly updates have produced compatibility issues with specific third‑party components (for example, certain Citrix Session Recording Agent versions caused reboots and rollbacks during update application, and OpenSSH permission regressions after October 2024 updates required ACL remediation). While KB5074109 doesn’t necessarily reproduce those exact problems, admins should review the KB’s “Known issues” section and validate critical third‑party agents and drivers in a pilot ring before broad deployment. Historical community reporting reflects the same mitigations recommended by Microsoft and vendors.
  • WinRE / SafeOS updates: When the KB includes a Safe OS Dynamic Update and you inject it into WinRE, note that changes to a WinRE image are effectively permanent for that image; rollback requires restoring from backup. Test recovery flows (Reset, cloud reinstall, Automatic Repair) after WinRE servicing.
  • WSUS / Hotpatch implications: Recent out‑of‑band scenarios involving WSUS and Hotpatch demonstrated that certain server-side updates required specific sequencing and produced temporary Hotpatch gaps for affected systems. If you manage WSUS servers or Hotpatch-enrolled hosts, validate the KB’s guidance for server components and follow vendor remediation steps if your management infrastructure is in scope.

Deployment guidance: safe rollout plan for IT organizations​

  • Pilot ring first: Stage KB5074109 in a small, representative pilot group that includes various OEM hardware models, virtual machine images, and endpoints with critical third‑party software (security agents, Citrix, device-management hooks). Validate boot/recovery, BitLocker, and any enterprise drivers.
  • Image servicing: If you service offline images, obtain every MSU associated with KB5074109 from the Microsoft Update Catalog and inject them into your golden image using DISM with all files in the same directory so DISM can sequence prerequisites correctly. Back up your golden WIMs before modifying them.
  • WSUS/Intune strategies: For managed environments use Windows Update for Business or WSUS/Intune phased deployments with ringed approvals. Avoid broad, immediate forced reboots during business hours—schedule maintenance windows.
  • Driver and agent compatibility: Confirm AV, EDR, virtualization agents (Citrix, VMware tools), backup clients, and kernel-mode drivers are supported against the new OS build. Where possible, stage updated agents first or use vendor guidance documented for prior monthly rollups. Community reporting and vendor collaboration have repeatedly shown that early coordination reduces rollout regressions.
  • Verification and telemetry: Confirm build numbers (winver), review event logs, and ensure monitoring scripts validate critical services and remote access paths (RDP, SSH) after the update. If you have a configuration management tool, create a compliance query to verify KB5074109’s presence across the estate.

Troubleshooting common failures​

  • Installation fails with CBS or DISM errors: Collect %windir%\Logs\CBS\CBS.log and DISM logs, run DISM /Online /Cleanup-Image /RestoreHealth, and ensure the servicing stack is current. Then retry the package.
  • Reboots roll back the install: Check for incompatible drivers or a pending reboot from previous operations; uninstall or update conflicting third‑party components before reattempting. Vendor advisories (Citrix, storage drivers) often publish a specific workaround if a pattern emerges.
  • OpenSSH or service start issues post-update: Historically, permission regressions on C:\ProgramData\ssh required admin PowerShell ACL fixes; if SSH fails to start validate ACLs and review Microsoft’s workaround guidance for similar symptoms. If you rely on OpenSSH for remote management, test this in the pilot ring.

Rollback and recovery considerations​

  • Uninstalling the LCU: You can remove the LCU with DISM /Online /Remove-Package but not the SSU if it was bundled. Use DISM /Online /Get-Packages to identify the package names for removal. Running wusa.exe /uninstall against a combined SSU+LCU will not remove the SSU component. Plan accordingly before attempting rollbacks.
  • Image rollbacks: For images, keep an unmodified golden image offline so you can redeploy if the updated image produces an unforeseen regression. SafeOS updates and WinRE servicing are effectively one-way changes on images — you must restore from a preserved golden image to undo them.

Critical analysis — strengths, practical value, and remaining risks​

Strengths​

  • Microsoft’s packaging model (combined SSU+LCU and checkpoint cumulatives) reduces the risk of update‑time failures for the majority of online devices and simplifies Windows Update delivery. This improves reliability for most end users and reduces the “failed installs” noise that previously forced manual interventions.
  • DISM’s package discovery when all MSU files live in one folder is a pragmatic improvement for image servicing and reduces human sequencing errors when applying multiple checkpoint MSUs to WIMs.

Remaining risks and operational trade-offs​

  • Bundled SSUs are effectively permanent on an updated host; this reduces uninstall flexibility for environments that need to revert an LCU quickly. The operational cost of an irreversible SSU must be reflected in change control and rollback strategy.
  • Third‑party compatibility remains the most frequent cause of problematic rollouts. While Microsoft and vendors often collaborate quickly, real-world estates with complex agent stacks or legacy drivers should expect careful pilot-testing and potential vendor-coordinated mitigations. Community incident patterns over past cycles validate this concern.
  • SafeOS/WinRE image changes are non-reversible on a serviced image — an important consideration for recovery image hygiene and disaster recovery planning. Always retain golden media before WinRE servicing.

Quick reference: commands and checks​

  • Apply MSU via DISM on a running PC:
    DISM /Online /Add-Package /PackagePath:C:\Packages\Windows11.0-KB5074109-x64.msu
  • Apply to a mounted image:
    DISM /Image:mountdir /Add-Package /PackagePath:Windows11.0-KB5074109-x64.msu
  • Verify installed packages:
    DISM /Online /Get-Packages | findstr /i 5074109
  • Confirm OS build:
    winver
  • Check WinRE (if you updated WinRE):
    reagentc /info
(Use exact MSU filenames from the Microsoft Update Catalog when applying files individually; the KB and catalog provide the canonical filenames and the sequence to follow.

Final recommendations​

  • Home users: Install KB5074109 via Windows Update as offered. If you manually install updates from the Microsoft Update Catalog, download all MSU files for the KB and use the recommended DISM method or the Windows Update Standalone Installer rather than applying MSUs out of order.
  • IT admins and image builders: Stage KB5074109 in a pilot ring, validate third‑party agents and recovery scenarios, and use DISM with all MSUs in a single folder to let DISM handle sequencing. Back up golden images and WinRE images before injecting SafeOS updates.
  • If you encounter problems during installation: collect CBS and DISM logs, check for known vendor incompatibilities, and consult vendor advisories for security/agent products that interact with kernel or update flows. Community reporting has repeatedly shown that collecting these artifacts speeds resolution.
KB5074109 is the current January 13, 2026 monthly cumulative for Windows 11; applying it promptly on production and personal systems reduces exposure to the security issues addressed by Microsoft while observing the sequencing and verification guidance above reduces the operational risk of deployment.
Conclusion
The January 2026 update (KB5074109) follows Microsoft’s modern cumulative and servicing-pattern approach: the content is delivered as checkpoint-style MSUs that require proper sequencing, the recommended DISM-based method simplifies offline and image servicing, and standard pilot/testing discipline remains the single most effective mitigation against deployment regressions. Treat servicing-stack implications, third‑party driver compatibility, and WinRE image hygiene as first-class concerns in your deployment plan to ensure a smooth, secure rollout.
Source: Microsoft - Message Center January 13, 2026—KB5074109 (OS Builds 26200.7623 and 26100.7623) - Microsoft Support
 
Microsoft has confirmed that the January 13, 2026 cumulative update for Windows 11, KB5074109 (OS builds 26100.7623 and 26200.7623), can cause classic Outlook POP account profiles to hang, freeze, or fail to exit properly, leaving users unable to restart Outlook or reliably save sent messages.

Background​

Microsoft shipped KB5074109 as the January 2026 security and quality rollup for Windows 11. The update was intended to address multiple issues—including a fix for devices with Neural Processing Units (NPUs) that were consuming power while idle and changes to Secure Boot certificate deployment—but it has also been linked to a set of regressions affecting several areas of Windows client functionality. Administrators and users reported problems ranging from Remote Desktop credential prompts to application hangs; within days Microsoft added a formal support notice for the Outlook POP issue and opened investigations. KB5074109 covers both Windows 11 version 24H2 and 25H2, and installs as OS builds 26100.7623 (24H2) and 26200.7623 (25H2). The Outlook-specific support advisory was posted and updated by Microsoft on January 15, 2026; their guidance identifies the problem as emerging and notes that Outlook and Windows teams are actively investigating.

What went wrong: how KB5074109 affects Outlook POP profiles​

Symptoms reported by users​

Users have reported consistent symptoms after installing KB5074109:
  • Outlook does not exit correctly — closing the application leaves background processes running so Outlook cannot be restarted without a reboot or manual process termination.
  • Hangs and freezes — Outlook becomes non-responsive during normal operations such as sending mail, opening folders, or accessing profile data.
  • Sent items missing or not being recorded reliably — messages may be delivered but do not appear in Sent Items in affected profiles.
These issues appear most commonly with classic (desktop) Outlook configured with POP accounts, although reports indicate some variability by user environment and by email provider. Community threads show users who resolved the issue by uninstalling the update; others report the problem persists even after standard troubleshooting.

Technical surface area likely involved​

At present Microsoft has not published a definitive root-cause analysis for the Outlook POP regression. Public discussion and telemetry indicate the problem is related to Outlook’s shutdown and profile handling logic under the updated Windows environment, but that explanation remains provisional until Microsoft publishes a technical update or hotfix. Until then, confirmable facts are limited to observed symptoms and Microsoft’s acknowledgment that the issue is under investigation. This distinction matters: there are credible user reports and a Microsoft notice, but the exact code path or conflicting component has not been disclosed.

Who is affected​

Consumer vs. enterprise​

  • Individual/Home users running Outlook with POP profiles can be impacted. Many consumer reports come from people with POP accounts for providers such as Yahoo or ISP-hosted mailboxes.
  • Managed/Enterprise devices are also affected. In some cases enterprises deploying the January patch at scale saw widespread user impact and raised urgent support tickets. Microsoft’s support notices and forum activity demonstrate that the problem is not purely isolated to unmanaged PCs.

Platforms and builds​

The problem has been observed on devices that received the January 13, 2026 KB5074109 update—Windows 11 builds 26100.7623 and 26200.7623. If a machine has not installed that specific cumulative update, it is unlikely to experience this regression. Confirm the installed build via Settings → System → About or by running winver.exe.

Likely configurations at higher risk​

Based on current reports (community and corporate), the most commonly affected setups are:
  • Desktop Outlook profiles using POP/SMTP (not modern Exchange or Microsoft 365 account configurations).
  • Profiles with older PST/OST structures or large local data stores—though this is anecdotal and not yet validated as a causal factor. Treat such provider-specific observations as unverified until Microsoft releases formal details.

Why this matters: impact and risk assessment​

Classic, desktop Outlook remains a dominant mail client in many enterprises and for many individuals who rely on POP-based mail delivery. A Windows update that causes Outlook to hang or fail to exit cleanly has real operational impacts:
  • Productivity loss: Users unable to restart Outlook lose access to new mail, sent-item tracking, and other essentials. This can be especially damaging for small businesses that still use POP mailboxes.
  • Support overhead: IT help desks see a spike in tickets for “Outlook not responding” or “Outlook won’t restart,” which strains resources during a mass rollout of updates. Community threads show administrators spending hours rolling back updates or performing system restores.
  • Operational continuity: In managed environments with automatic updates enabled, a problematic cumulative update can propagate quickly unless IT departments intervene with hold policies or targeted mitigations.
Given widespread adoption of Windows Update automatic delivery, such regressions can cascade quickly across organizations that do not stage updates or enforce pre-deployment testing.

What Microsoft has said​

Microsoft has published a support advisory acknowledging the Outlook POP regression and marking the issue as “Investigating.” The advisory confirms the problem appeared after installing the January 13, 2026 update (KB5074109) and that the Outlook and Windows teams are collaborating to diagnose the behavior. Microsoft’s page encourages affected users to follow the discussion in the Microsoft Learn forums and promises updates when more information is available. Separately, the KB5074109 release notes list several fixes and improvements—most notably the NPU power behavior fix and Secure Boot deployment enhancements—showing that the update itself contains legitimate platform-level improvements even as it introduced regressions in certain scenarios. Microsoft has used Known Issue Rollback (KIR) mechanisms and, where necessary, out-of-band updates to remediate other windows update regressions in recent months; an out-of-band or follow-up fix for this Outlook issue is the likely remediation path.

Workarounds and mitigation strategies​

Until Microsoft issues a formal fix, administrators and users have a few practical options to reduce impact or restore functionality. Each option carries trade-offs—particularly in managed environments—so weigh the business considerations before implementing.

Short-term user/workstation steps​

  • Restart and terminate lingering Outlook processes: Open Task Manager, end any Outlook.exe and Office-related background processes, then reopen Outlook. This can be a temporary workaround but is not a scalable fix.
  • Start Outlook in Safe Mode: Launch Outlook with safe mode (hold Ctrl while opening or run outlook.exe /safe) to determine whether add-ins exacerbate the issue. If safe mode avoids hangs, progressively disable add-ins and test.
  • Use Outlook Web Access (OWA) or provider webmail: For immediate mail access, use webmail until a patch is available. Microsoft and community posts have recommended webmail as a stopgap.
  • Repair Office installation: Run the Office online repair from Programs and Features—this resolves some post-update corruption scenarios but may not address the underlying compatibility fault introduced by the KB.

Uninstalling KB5074109​

Some users report that uninstalling KB5074109 restores normal Outlook behavior. However, unlinking the update is not always straightforward:
  • Standard uninstall: Settings → Windows Update → Update history → Uninstall updates may show KB5074109 on some systems—but on others it may not be removable because the package includes a servicing stack update (SSU) or because it’s a combined rollup.
  • DISM remove-package: Advanced users and administrators have used DISM to enumerate and remove the rollup package via command line. The Microsoft Q&A thread contains step-by-step community guidance for using dism.exe /online /get-packages followed by dism /online /remove-package /PackageName:<package> to remove the offending rollup. This method requires administrative privileges, careful package selection, and a system reboot. It may fail if other updates depend on the package or if the package is protected. Proceed only when you can accept the consequences of removing a cumulative security update.
Important cautions when uninstalling:
  • Removing a cumulative security update can reduce system security and may reintroduce vulnerabilities fixed by the patch.
  • In managed environments, uninstalling an update may violate policy or complicate update compliance reporting. Coordinate with security teams before rollback.

Enterprise-level mitigations​

  • Hold deployment: For organizations still rolling out updates, apply a temporary block to KB5074109 and continue testing until a vendor fix is released. Staging updates in a ring-based model prevents widespread impact.
  • Escalate through Microsoft support: Open a support ticket for production-impacting outages—Microsoft has dedicated channels for enterprise customers and may expedite a resolution.
  • Work with Known Issue Rollback (KIR): Microsoft uses KIR to roll back problematic changes remotely for targeted device subsets in some scenarios. Monitor Microsoft’s enterprise communications for KIR guidance specific to this issue; at publication KIR was referenced for other KB5074109 regressions and may be part of the remediation toolkit.

Step-by-step: how to check whether you’re affected​

  • Verify the installed OS build: run winver.exe or check Settings → System → About to confirm you’re on 26100.7623 or 26200.7623.
  • Observe Outlook behavior: confirm if Outlook remains running after you close it, or if Sent Items are missing despite successful sends.
  • Check Event Viewer for Outlook crash or hang events: Windows Logs → Application may contain Event 1000 or related hang/error entries that help diagnose the type of fault. Microsoft community moderators have requested these logs to triage the issue.
  • If confirmed and urgent: consider the mitigations above—webmail, safe mode, or controlled uninstall under IT guidance.

What to expect next: Microsoft’s likely remediation path​

When Microsoft acknowledges a regression introduced by a security or cumulative update, the typical remediation sequence includes:
  • Investigation and telemetry analysis by the product teams (already in progress).
  • Out-of-band (OOB) update or hotfix if the problem is severe and widespread; Microsoft has used OOB updates in the past for similar regressions. Several community threads and news outlets noted that Microsoft often releases a follow-up patch within days when fixes are required.
  • Known Issue Rollback (KIR) for targeted, reversible changes when feasible. KIR is often used when a behavior change introduced by an update must be disabled for impacted devices.
Until a fix appears, expect Microsoft to update its support page and Learn/Q&A threads with progress notes and any available hotfix. Administrators should watch the Windows Update health dashboard and their Microsoft 365 admin center notices for official remediation notices.

Practical recommendations (concise checklist)​

  • For home users: If you rely on POP Outlook and see problems, temporarily use webmail or Outlook Web Access, try Outlook safe mode, and consider uninstalling the update only if you understand the security implications or with vendor guidance. Back up Outlook PST files before making major changes.
  • For IT administrators: Pause or stage KB5074109 deployments, establish a communication channel to affected users, and consider blocking the update in your management tooling until Microsoft releases an official fix. Escalate to Microsoft support for production-impacting incidents.
  • For security teams: Balance the operational risk of uninstalling a security update against the productivity loss. If rollback is required, document the change, monitor endpoints for re-exposures, and plan timely reinstallation when a patch is available.

Strengths and weaknesses of Microsoft’s response so far​

Notable strengths​

  • Rapid acknowledgment: Microsoft posted an advisory recognizing the Outlook POP behavior and that the teams are investigating—this transparency is important for IT planning.
  • Track record of remediation mechanisms: Microsoft has multiple tools—KIR, out-of-band updates, and staged deployments—to correct high-impact regressions, providing several avenues for a timely fix.

Risks and weaknesses​

  • Insufficient technical detail yet: The advisory confirms the symptom set but does not provide a root-cause analysis or a timeline for a patch, leaving administrators to weigh rollback risks without full information.
  • Patch complexity: Cumulative updates that include SSUs or combined packages complicate uninstall procedures, creating potential friction for users and support teams trying to recover. Community threads show that some users cannot uninstall via standard GUI paths and must use advanced DISM commands. This raises the bar for recovery.

Final analysis and guidance​

The KB5074109 incident is a timely reminder of the trade-offs inherent in modern cumulative update models: bundling fixes improves security and simplifies patching, but when a regression slips through, the combined nature of updates can complicate quick rollback paths. Microsoft’s public acknowledgment and the existing toolset for mitigation (KIR, OOB updates, support escalation) are positive signs. At the same time, the lack of a published root cause and the complexity of uninstalling the package create a practical gap for organizations needing immediate remediation.
Actionable takeaways:
  • Treat KB5074109 as blocked in production rings until Microsoft confirms a fix, and prioritize systems that run legacy POP-based Outlook profiles for testing.
  • For affected end users, use webmail or OWA and run Outlook in safe mode as temporary measures; involve your help desk for any rollback steps that require elevated privileges.
  • Document any rollback and security trade-offs, and plan to reapply security updates when Microsoft issues a corrected package or an OOB fix.
Microsoft’s advisory and community threads make the situation clear: the bug is real and recognized. The resolution path—while likely to arrive through a targeted or out-of-band patch—has not yet been published. Until then, conservative patching, proactive user communication, and careful rollback planning remain the best lines of defense.
Outlook users and administrators should monitor Microsoft’s support pages and the Microsoft Learn forums for updates; prepare rollback procedures for critical workstations; and test any remedial steps in a controlled environment before applying them broadly. The coming days are likely to reveal either a KIR deployment or an OOB hotfix from Microsoft—when that happens, re-evaluate staged deployment plans and resume routine patching only after validation.
Source: Windows Report https://windowsreport.com/windows-1...ok-for-pop-accounts-microsoft-confirms-issue/