KB5079271 and KB5079270: Urgent Windows 11 Pre boot and WinRE Updates for 2026 Secure Boot

  • Thread Author
Microsoft’s quietly published February 24, 2026 platform updates — KB5079271 (a Setup Dynamic Update) and KB5079270 (a Safe OS / WinRE Dynamic Update) — target the under‑the‑hood plumbing that runs before Windows fully boots and during feature upgrades, and they carry an urgent operational message: a multi‑year Secure Boot certificate refresh must be completed before the 2011 certificates begin to expire in mid‑2026.

Computer setup with a Secure Boot shield, a WinRE monitor, and a June 2026 calendar on a circuit-board background.Background​

Microsoft uses two narrow, targeted servicing channels to patch the tiny set of binaries that matter during OS installation and recovery: Setup Dynamic Updates (which refresh setup binaries used during in‑place upgrades and installs) and Safe OS (WinRE) Dynamic Updates (which refresh the Windows Recovery Environment image and the drivers and pre‑boot binaries WinRE uses during Reset, Automatic Repair and recovery flows). These updates are intentionally surgical: they don’t add consumer features but can have outsized effects on image reliability, upgrade success rates, and across fleets.
Community trackers and deployment specialists noticed the February packages shortly after publication; Windows deployment forums and reporting outlets flagged the packages as the latest in a string of behind‑the‑scenes updates administrators need to account for when servicing images and recovery media.

What Microsoft shipped: the essentials​

KB5079271 — Setup Dynamic Update (Windows 11, 24H2 & 25H2)​

KB5079271 is a Setup Dynamic Update for Windows 11, versions 24H2 and 25H2 that updates the small set of setup binaries the operating system relies on during feature upgrades and media installs. The package is available via Windows Update, the Microsoft Update Catalog and Server Update Services (WSUS), and it replaces a prior update (KB5074110). Microsoft’s file manifest lists updated appraiser components, setup platform binaries, and supporting DLLs for both x64 and ARM64 builds.
Key operational notes:
  • Applies to Windows 11 versions 24H2 and 25H2 (all editions).
  • Distributed through standard enterprise channels (Windows Update, Update Catalog and WSUS).
  • The package refreshes files such as Appraiser.dll and SetupPlatform binaries that Setup uses to evaluate compatibility and run the upgrade flow.

KB5079270 — Safe OS (WinRE) Dynamic Update (Windows 11, 24H2 & 25H2)​

KB5079270 is a Safe OS Dynamic Update that refreshes the Windows Recovery Environment (WinRE) image — the minimal Windows environment that runs when a machine boots into recovery, performs Reset workflows, or executes Automatic Repair. The package updates WinRE components and drivers (including USB and TPM stack files) and marks the WinRE image version to 10.0.26100.7920 once applied. Notably, Microsoft states that this update cannot be removed once it’s applied to a Windows image, and it replaces an earlier Safe OS update (KB5077180).
Key operational notes:
  • After installation, administrators can verify the WinRE image version using the provided PowerShell helper (GetWinReVersion.ps1), the WinREAgent servicing events in Event Viewer, or DISM commands against the winre.wim file.
  • The update is designed to be injected into offline images and recovery partitions as part of image hygiene and pre‑deployment servicing.

Why this release matters: the Secure Boot certificate deadline​

The most consequential public message bundled with these updates is a calendar‑driven warning: the original Microsoft Secure Boot certificates issued in 2011 are set to begin expiring in June 2026, with consequential rollout windows extending later in the year. Microsoft is using these Safe OS and Setup refreshes to make sure recovery and setup flows are ready for the certificate rotation and to push replacement certificates to most devices ahead of expiry.
Independent reporting and platform coverage underscore the risk profile: devices that do not receive updated Secure Boot certificates may enter a degraded security state where boot‑time protections are weakened, future platform updates that rely on the newer signing chain may fail to install, and new boot‑time software or drivers might refuse to load. For many modern Windows 11 PCs this will be automatic; older devices and some server or specialized hardware may require firmware updates from OEMs in addition to Windows patches.

Deep dive: technical specifics and verification​

What the Setup DU touches (KB5079271)​

The Setup Dynamic Update contains refreshed versions of the setup evaluation and platform code — Appraiser.dll, SetupPlatform.exe, SetupCore.dll, SetupPrep.exe and related resource MUIs — on both x64 and ARM64 images. Those components are responsible for:
  • Evaluating hardware compatibility during upgrades.
  • Handling media UI and platform flow during an in‑place feature update or when booted into installation media.
  • Calling into pre‑boot logic that can interact with firmware and boot settings.
Because Setup uses these small files early in the upgrade pipeline, Microsoft can deliver targeted fixes without shipping a full cumulative OS update. Administrators should treat the Setup DU as image‑level maintenance and validate it against any custom detection logic used by deployment tooling.

What the Safe OS/WinRE DU contains (KB5079270)​

The Safe OS update replaces the WinRE image with one that includes newer drivers (USB, TPM) and platform binaries, as well as the updated WinRE service components. Important files in the manifest include USB stack drivers (USBHUB3.SYS, usbport.sys), TPM drivers, setupplatform MUIs and a refreshed kernel and user‑mode DLLs where appropriate. The update is intended to improve device recovery reliability across a wide variety of failure scenarios — especially those involving disk, USB, and TPM interactions.

How to verify WinRE after applying KB5079270​

Microsoft provides three practical verification methods:
  • Run the supplied GetWinReVersion.ps1 script with administrative privileges; it will report the installed WinRE version.
  • Inspect the System event log for WinREAgent servicing events (Event ID 4501) which report servicing success and the new WinRE version.
  • Use DISM to read the winre.wim image directly (Dism /Get-ImageInfo /ImageFile:<path to winre.wim> /index:1) and confirm the image version string.
These checks are critical because once the Safe OS DU is applied to an image it cannot be removed, and administrators need to ensure their recovery media and partitions match the expected version before wide rollout.

Deployment and operational recommendations​

For IT teams responsible for fleet readiness, the February packages are a reminder to treat pre‑boot and recovery components as first‑class citizens in the servicing plan. Here’s a practical checklist:
  • Inventory: Identify devices running Windows 11 24H2 and 25H2 and any devices using custom recovery partitions or offline WinRE images. Verify whether images used by your provisioning pipelines include the updated WinRE version.
  • Test: Inject KB5079270 into a test WinRE image and validate recovery scenarios (Reset, Automatic Repair, USB recovery). Confirm the WinRE version using the GetWinReVersion.ps1 script or DISM.
  • Validate Secure Boot chain: For hardware that predates 2024 (or for servers and specialized appliances), coordinate with OEMs to confirm firmware updates are available that accept the new 2023‑era certificates; test Secure Boot boot paths after certificate replacement.
  • Update images: Inject the updated WinRE as part of image maintenance so that every newly provisioned device gets the refreshed recovery environment. Remember that Safe OS DUs may not be removable once applied — plan rollouts accordingly.
  • Delivery: Use WSUS or the Microsoft Update Catalog for offline deployment to machines that won’t automatically receive the dynamic updates via Windows Update. Sync classifications and products appropriately to ensure the packages are visible to your management tooling.
These steps emphasize image hygiene — keeping recovery media and pre‑boot binaries current is the best insurance against surprises during mass upgrades and in failure scenarios.

Risks, edge cases, and known constraints​

  • Non-removability of Safe OS update: KB5079270 cannot be removed once it’s been applied to a Windows image. That’s intentional — Microsoft views WinRE as a persistent image component — but it raises the stakes for testing before injecting the update into production images.
  • OEM firmware dependencies: Secure Boot certificate replacement can require OEM firmware changes on some older or specialized hardware. If an OEM firmware update is not available, devices may remain in a degraded security posture after the 2011 certificates expire. Organizations with mixed hardware should inventory OEM update availability and plan exceptions/replacements where needed.
  • Phased visibility for consumers: Dynamic Updates sometimes behave differently across consumer channels; although Microsoft publishes the packages to the Update Catalog and WSUS, not every endpoint will show the update in the same way or at the same time. For managed environments, relying on WSUS / catalog downloads and offline injection is the safest path.
  • Legacy systems and unsupported OS versions: Devices running unsupported versions of Windows (for example, many copies of Windows 10 after its support window closes) will not receive the new certificates unless enrolled in Extended Security Updates, which leaves some fleets unable to get the protection automatically and therefore at higher risk.
  • Operational complexity for large fleets: Rolling out updated WinRE images and coordinating firmware updates across dozens or hundreds of OEM SKUs and BIOS/UEFI versions requires turf‑aware planning and automated inventorying of firmware capabilities. This is not a simple “push a patch” exercise for large enterprises.

Critical analysis: benefits vs. operational friction​

On balance, these updates are necessary and positive: they harden recovery paths and ensure the platform’s boot‑time security chain continues functioning as certificates age out. Refreshing the WinRE image and setup binaries ahead of the certificate rollover reduces the likelihood of mass failures during feature upgrades and helps preserve recovery reliability. For organizations that maintain disciplined image servicing practices, these updates will be low‑risk and high‑value.
That said, the certificate rotation reveals a perennial tension in platform management: cryptographic lifecycles are long, but the ecosystem of OEM firmware, server hardware, and custom images is fragmented. Microsoft can distribute updated certificates through Windows servicing, but some hardware will still need firmware action from OEMs. The benefit — continued Secure Boot enforcement and the ability to apply future signed updates — comes with operational friction that will disproportionately affect older devices and heterogeneous fleets. Independent coverage has described the situation accurately as a planned, predictable rotation that nevertheless requires active work by administrators.
Two further observations deserve emphasis:
  • Microsoft’s choice to make Safe OS updates non‑removable is understandable from a platform‑integrity perspective, but it raises the cost of a botched image injection. Treat WinRE servicing like firmware lifecycle changes.
  • Dynamic Updates are a useful mechanism for targeted fixes, but they are not a substitute for regular cumulative update discipline; dynamic updates should be integrated into standard image build and test pipelines rather than applied ad‑hoc.

Recommended technical checklist (actionable, step‑by‑step)​

  • Identify affected OS builds:
  • Target: Windows 11 versions 24H2 and 25H2. Confirm which builds you run and which images your provisioning pipelines produce.
  • Acquire the packages:
  • Download KB5079271 and KB5079270 from the Microsoft Update Catalog and stage them in a test catalog or WSUS instance. Confirm that your management tooling is configured to surface these classifications and products.
  • Test WinRE servicing:
  • Inject KB5079270 into a representative WinRE image.
  • Boot into recovery, run Reset and Automatic Repair scenarios, and confirm hardware interactions (USB devices, TPM operations). Use reagentc /info and DISM to verify paths.
  • Verify WinRE version programmatically:
  • Run GetWinReVersion.ps1 as part of test automation to confirm the WinRE image reports 10.0.26100.7920 after servicing. Monitor System event log for WinREAgent Event ID 4501.
  • Coordinate OEM firmware:
  • For older or server hardware, liaise with OEMs to confirm firmware images that accept the new Secure Boot certificates. Schedule firmware updates where required and validate post‑update boot paths.
  • Roll out with an image‑first approach:
  • Inject the Safe OS DU into your golden images and recovery partitions. Use phased rollouts, beginning with pilot groups and expanding as telemetry and logs confirm stability.
  • Monitor and report:
  • Use telemetry to detect upgrade failures, WinRE servicing events, and certificate states. Prioritize remediation where OEM updates are unavailable.

What to watch for in the weeks ahead​

  • OEM firmware advisories and firmware update packages targeted at older models. Expect vendors to publish instructions and packages for platform families at risk.
  • Telemetry spikes in deployment tooling that indicate compatibility regressions (for example, USB mass storage detection in WinRE or BitLocker interactions during Reset).
  • Additional Microsoft guidance or follow‑up dynamic updates as certificate refreshes progress into their in‑field rollout windows. Microsoft has already published preparatory guidance for server operators and administrators that should be followed closely.

Conclusion​

KB5079271 and KB5079270 are not glamorous feature packs; they are operationally crucial updates aimed at the thin, brittle surfaces of Setup and WinRE that determine whether upgrades succeed and systems recover. Their publication on February 24, 2026 is timely because Microsoft is coordinating a multi‑year Secure Boot certificate rotation that begins to take effect in June 2026. For administrators and imaging teams, the work here is straightforward but non‑optional: test, inject, verify, and coordinate with OEMs where firmware hops are required.
Put differently: treat these dynamic updates as image hygiene, not cosmetic tweaks. They preserve the platform’s ability to verify boot‑time integrity and to recover from failures — and they buy you time to replace or update hardware that cannot accept the new signing chain. The recommended response is pragmatic, methodical, and urgent: inventory, test, and roll out the updated WinRE and setup binaries before the certificate expiry window impacts your environment.

Source: Neowin Microsoft released Windows 11 KB5079271, KB5079270 setup and recovery updates
 

Microsoft has quietly pushed three narrowly scoped but operationally critical Dynamic Updates for Windows 11 — KB5078169, KB5079270, and KB5079271 — that refresh the Windows Recovery Environment (WinRE) and Setup binaries and carry an urgent, calendar-driven warning: Microsoft’s Secure Boot certificates issued in 2011 begin expiring in June 2026, and administrators must act now to avoid degraded pre‑boot security and potential long‑term disruption.

Blue Windows 11 infographic highlighting Secure Boot, setup flow, updates, and a June 2026 calendar.Background​

What are Dynamic Updates, Safe OS, and Setup DUs?​

Dynamic Updates are surgical packages Microsoft uses to refresh a small set of pre‑boot and setup binaries that are critical during feature upgrades, image servicing, and pre‑boot recovery. They are not monthly cumulative security rollups; instead, they target the Safe OS (WinRE and other recovery payloads) and Setup components (files used by Windows Setup during feature updates and in-place upgrades). These updates are often applied automatically during upgrades, can be injected into offline images, and — in the case of many Safe OS updates — become effectively permanent once merged into a WinRE image on disk.
Microsoft published the three Dynamic Updates on February 24, 2026: KB5078169 (Safe OS Dynamic Update for Windows 11 version 26H1), KB5079270 (Safe OS Dynamic Update for Windows 11 versions 24H2 and 25H2), and KB5079271 (Setup Dynamic Update for Windows 11 versions 24H2 and 25H2). Each KB page includes the same, blunt operational alert about the Secure Boot certificate renewal and links to Microsoft’s guidance for different device classes.

Why this release matters: the Secure Boot certificate timeline​

The certificate problem, in plain terms​

Secure Boot relies on a chain of trust: a set of certificates the platform (OEM firmware + Windows) uses to validate early boot code like bootloaders, option ROMs, and recovery components. The certificates Microsoft deployed in 2011 are reaching the end of their validity window; Microsoft’s guidance states the 2011 family begins expiring in June 2026 and will be fully cycled out by October 2026. If a device still relies on the 2011 certificates after they expire, Microsoft warns it “will be unable to receive security updates for boot components,” which over time will leave the device in a degraded security state.
Put bluntly: the first code a PC executes when it powers on is protected by certificates that are about to expire. If these are not replaced (or the device is not enrolled in a certificate rollout path), the platform can still boot initially, but it will not be able to receive future updates to early-boot components — and that reduces Microsoft’s ability to ship mitigations for future threats that target the pre‑OS environment.

How Microsoft plans to mitigate the risk​

Microsoft has issued a set of replacement 2023 CA certificates and is delivering them to many eligible Windows devices via Windows Update and Dynamic Updates. For most endpoints shipped since roughly 2012 and for devices that are actively updated, Microsoft expects the transition to be automatic. But the KB entries and the Secure Boot guidance are explicit: not every device will be updated automatically, and some server and specialized device classes may require manual coordination with OEMs and firmware updates. The guidance is intentionally prescriptive and time‑bounded — that is why these Dynamic Updates and the public warnings are significant for IT operations.
News and industry reporting emphasize the same operational reality: the move is a coordinated, ecosystem‑wide certificate refresh that must be completed before the 2011 certificates lapse, otherwise organizations face escalating security and compliance risk.

What’s actually in KB5078169, KB5079270, and KB5079271​

KB5078169 — Safe OS Dynamic Update (Windows 11 version 26H1)​

  • Purpose: refreshes the Windows Recovery Environment (WinRE) payload for the 26H1 servicing family.
  • Scope: updated WinRE binaries (boot manager, winload, hypervisor components, drivers used by WinRE) and associated servicing helpers; the KB notes the WinRE version that should be reported after successful servicing. Microsoft includes guidance on verifying the WinRE version via the provided GetWinReVersion.ps1, reagentc /info, and DISM checks.

KB5079270 — Safe OS Dynamic Update (Windows 11 versions 24H2 and 25H2)​

  • Purpose: refreshes the WinRE payload for the 24H2 and 25H2 servicing families.
  • Scope: similar to KB5078169 with a different targeted WinRE version string; Microsoft documents the file manifest and provides verification methods. The KB explicitly replaces an earlier Safe OS DU and reiterates that these changes are designed to be applied without a host restart and are often permanent for the image on disk.

KB5079271 — Setup Dynamic Update (Windows 11 versions 24H2 and 25H2)​

  • Purpose: updates the Setup runtime and supporting binaries that Windows Setup relies on when applying feature updates or when boot/upgrade workflows run.
  • Scope: refreshed Setup components, appraiser modules, and other small utilities used by Windows Setup; KB5079271 also lists file versions and clarifies that this update replaces earlier setup DUs.
Across all three KBs, Microsoft repeats the Secure Boot certificate expiration notice and links administrators to the broader Secure Boot certificate guidance, underlining that the updates are about more than WinRE cosmetics — they are part of a platform‑level continuity plan.

Operational impact and risk analysis​

Key strengths of Microsoft’s approach​

  • Targeted, low-risk delivery: Dynamic Updates are designed to be small, narrowly scoped, and applied without a full OS reinstallation. That reduces the blast radius versus a full feature update or in-place upgrade.
  • Automated distribution path: For many consumer and managed devices, Windows Update will deliver the DU automatically, minimizing manual work for standard endpoints.
  • Clear, calendarized warning: Microsoft’s public timeline gives organizations a known deadline (June–October 2026 window) to plan remediation rather than an opaque or surprise change. This is better than last‑minute advisories.

Notable risks and operational caveats​

  • Some Safe OS updates are effectively permanent. Once a Safe OS DU is injected into a WinRE image on disk it cannot be removed in the field; rollback typically requires restoring a previous image. That raises the stakes for undocumenteght affect device recovery workflows.
  • Opaque change descriptions. Microsoft often summarizes these packages with short, nondisclosive notes (“makes improvements to WinRE” or “improves setup binaries”), which leaves IT reliant on testing and telemetry to assess regressions and compatibility. This lack of granular disclosure is a real problem for risk‑averse enterprises.
  • Firmware dependencies and OEM coordination. Some devices may need firmware updates or manual certificate enrollment from OEMs. Servers, specialized hardware, and some older devices are especially at risk of falling outside automatic update paths. That means an otherwise small DU can cascade into a multi‑vendor coordination effort.
  • Delivery gaps for managed environments. WSUS, SCCM/ConfigMgr, and offline image pipelines must be synchronized correctly to make sure the DU reaches every target. Organizations that rely on manual image capture for deployment must inject these DUs into their golden images proactively. Failure to do so could create fleets with an inconsistent pre‑boot security posture.
  • Windows 10 and unsupported platforms. Older systems or those not enrolled in Extended Security Updates (ESU) may not receive the 2023 CA certificate rollouts automatically, leaving the devices unable to receive boot-level security protections after expiry. Microsoft has called this out repeatedly as an area where planned obsolescence meets operational risk.
Community discussion has already highlighted these concerns: administrators on forums and specialist communities warn that a Safe OS regression can seriously complicate remote recovery and imaging workflows, and they urge immediate inventory, testing, and image hygiene.

Practical guidance: a prioritized checklist for IT teams​

Below is a pragmatic, prioritized sequence you can apply this week. These steps are designed to reduce operational risk while ensuring devices receive the necessary pre‑boot updates in time.
  • Inventory vulnerable device classes now.
  • Catalog all Windows devices by OS version, firmware vendor, and manufacture date.
  • Flag servers, IoT appliances, and image‑based devices that may not receive automatic DU delivery. Why: these are the highest‑risk devices for certificate and firmware gaps.
  • Confirm WinRE and Setup versions on golden images and production hosts.
  • Verify WinRE version with reagentc /info and the DISM technique Microsoft documents; run GetWinReVersion.ps1 for scripted checks where possible. Microsoft’s KBs show expected WinRE version strings after DU application.
  • For Setup, review file versions listed in KB5079271 to ensure your images include the updated setup binaries.
  • Patch test rings and lab images first.
  • Inject the three DUs into test golden images and validate image boot, BitLocker behavior, WinRE workflows (Reset, Recover, Startup Repair), and vendor recovery tools.
  • Remember: Safe OS DUs can be permanent once integrated into the image; test before broad deployment.
  • Ensure update distribution paths are ready.
  • For WSUS/ConfigMgr: sync the Microsoft Update Catalog entries and approve the packages for your rings.
  • For automated cloud management: confirm Windows Update for Business and endpoint policies permit delivery of these Dynamic Updates.
  • Coordinate with OEMs for older or server hardware.
  • For servers and older devices, contact OEM support to confirm firmware readiness and whether any vendor-specific steps are required for certificate enrollment. Microsoft’s guidance explicitly flags OEM firmware as an external dependency.
  • Prepare recovery fallbacks.
  • Capture rollback images and ensure up‑to‑date recovery media (with injected DUs where appropriate) are available before large‑scale rollouts.
  • Document help‑desk playbooks for handling WinRE anomalies post‑DU application.
  • Monitor telemetry and community channels.
  • Watch event logs for WinREAgent servicing events (Event ID examples appear in the KBs) and collect any device‑level failures for rapid remediation.
  • Follow vendor advisories for anti‑cheat and third‑party drivers that may interact with Secure Boot; gaming anti‑cheat ecosystems were specifically mentioned in reporting about this transition.

How to verify the certificate state and WinRE status​

  • WinRE version check: use reagentc /info, DISM to inspect winre.wim metadata, or the GetWinReVersion.ps1 script Microsoft publishes alongside these KBs. KBs include the expected WinRE version strings to help you verify successful servicing.
  • Certificate state and Secure Boot compatibility: Microsoft’s “Windows Secure Boot certificate expiration and CA updates” guidance explains the certificate families (2011 → 2023) and provides device‑class guidance. For many desktops and laptops the certificate rollouts are automatic via Windows Update, but servers and bespoke hardware may require manual enrollment or firmware updates. If you need a per‑device check, Microsoft’s guidance provides the necessary operational paths for Windows, servers, and OEMs.
Note: there is no single universal PowerShell one‑liner Microsoft recommends for swapping KEK/DB certificates across all OEM platforms because UEFI variables and OEM tools differ. The correct course is to follow the Microsoft guidance for your device class and, where necessary, coordinate with OEM firmware updates.

Real‑world scenarios and caveats​

  • Scenario: A remote image fleet uses a captured WinRE image that’s several months old. If that image lacks the 2023 certificates and relies on the 2011 CA, devices restored from that image could still boot today but won’t be eligible to receive new boot‑level protections after certificate expiry. The result: a fleet that is functionally operational but on a downward security trajectory.
  • Scenario: A service provider synchronizes WSUS but misses the dynamic update package in their approvals workflow. A subset of devices in production keep an older WinRE and thus miss certificate enrollment. The fix is administrative but operationally painful: track down which devices missed the update and apply image remediation or force the update path.
  • Scenario: An enterprise tests DUs only on consumer laptops and misses a server-class regression. Because server firmware and Secure Boot policies differ, this can cause post‑update recovery tools to fail in a datacenter context. The recommended mitigation is explicit cross‑platform testing and OEM coordination for server SKUs.

What to tell stakeholders (brief talking points)​

  • For executives: “Microsoft issued targeted Dynamic Updates on February 24, 2026, and warned that Secure Boot certificates issued in 2011 begin expiring in June 2026. We must ensure our images and critical servers receive the 2023 certificates to avoid degraded pre‑boot security.”
  • For help‑desk teams: “Test the updated WinRE and Setup on your reference machines; be aware that some Safe OS updates are permanent for the WinRE image. Keep rollback images and recovery media ready.”
  • For security/compliance teams: “Devices that don’t receive the new 2023 CA certificates before the 2011 certificates expire will be out of compliance for future boot‑level security updates; plan remediation timelines accordingly.”

Final analysis: why this is small but serious​

These three KBs are not dramatic feature updates — they are narrow, behind‑the‑scenes packages. But they tie directly into the integrity of the Windows boot chain, and that link elevates operational risk. Microsoft’s method — update WinRE and Setup with small, targeted packages and coordinate a certificate rollover — is technically sound and minimizes disruption for the majority of devices. However, the real challenge is the edge cases: older firmware, custom images, server platforms, and air‑gapped or offline deployments.
Administrators should treat this as a calendarized program with a concrete deadline: inventory now, test now, and remediate older images and devices that cannot receive automatic certificate rollouts. The cost of inaction is a slowly increasing security liability that becomes harder and more expensive to repair the longer you wait. Microsoft’s KBs and the Secure Boot guidance provide the necessary detail — but they are intentionally concise; success will depend on careful testing, image hygiene, and coordination with OEMs where firmware dependencies exist.

Quick reference: essential links (for your internal playbooks)​

  • Microsoft KB for KB5078169 — Safe OS DU (Windows 11 26H1).
  • Microsoft KB for KB5079270 — Safe OS DU (Windows 11 24H2 / 25H2).
  • Microsoft KB for KB5079271 — Setup DU (Windows 11 24H2 / 25H2).
  • Microsoft guidance on Secure Boot certificate expiration and CA updates (detailed device‑class guidance and timelines).
  • Microsoft Learn article on injecting Dynamic Updates into installation media — recommended if you maintain golden images or offline deployment media.

Microsoft’s February 24, 2026 Dynamic Updates are a classic example of maintenance that is invisible until it isn’t: small files, big consequences if ignored. Treat these KBs as operationally urgent for machines that you expect to remain secure and manageable beyond mid‑2026 — and begin the simple but necessary work of inventory, test, and remediation before the calendar forces you into reactive triage.

Source: Windows Report https://windowsreport.com/microsoft...and-kb5079271-dynamic-updates-for-windows-11/
 

Back
Top