KB5079473 Breaks Microsoft Account Sign-Ins on Windows 11 24H2/25H2

  • Thread Author

The latest Patch Tuesday update for Windows 11 24H2 and 25H2 is now carrying an officially documented sign-in problem that can make Microsoft account authentication fail inside several consumer apps, including Teams Free and OneDrive. Microsoft says the issue began after the March 10, 2026 release of KB5079473, and it can also affect Edge, Excel, Word, and Microsoft 365 Copilot when those apps try to use a Microsoft account sign-in flow. The company says the bug is tied to a specific network connectivity state rather than a simple loss of internet access, which helps explain why users may see an error claiming they are offline even while they remain connected. (support.microsoft.com)

Background — full context​

Microsoft’s March 2026 cumulative update, KB5079473, applies to Windows 11 version 25H2 and 24H2 and was released on March 10, 2026. The update bundles security fixes and non-security improvements from the prior month’s optional preview release, making it the sort of monthly patch that typically reaches a very broad installed base quickly. Microsoft’s own support page lists the package for both Windows 11 branches, confirming that the issue affects the current mainstream client track rather than an obscure preview-only build. (support.microsoft.com)
What makes this week’s problem especially disruptive is that it doesn’t just touch one app. According to Microsoft’s documented known issue, sign-in with Microsoft accounts can fail in Microsoft Teams Free and OneDrive, while Edge, Excel, Word, and Microsoft 365 Copilot may also throw the same offline-style error whenever a Microsoft account is needed. In practical terms, this can block access to common consumer and small-business workflows that many users now treat as everyday infrastructure. (support.microsoft.com)
Microsoft is careful to distinguish this consumer account failure from enterprise identity systems. The company states that the issue does not affect organizations using Microsoft Entra ID for authentication, which means the bug is narrower than a full identity outage, even if it feels broad to home users and personal-device owners. That distinction matters because the same Windows machine may fail for a personal Microsoft account while remaining fully functional for work sign-in. (support.microsoft.com)
The issue also lands in a week already marked by visible Microsoft service turbulence and by a stream of patch-related complaints from Windows users. In that context, even a relatively targeted sign-in defect becomes more damaging to confidence, because it reinforces the idea that the platform’s update pipeline is producing side effects faster than they can be absorbed. The result is a familiar but unwelcome pattern: users install an important security update and immediately begin troubleshooting the very services the update is supposed to protect. (support.microsoft.com)

What Microsoft says is happening​

The symptom pattern​

Microsoft describes the bug as a failure in Microsoft account sign-in after installing KB5079473. The visible symptom is an error message that tells the user they need the internet, even though the device is already online. That mismatch between the message and the actual network state is the clue that the root cause is not ordinary connectivity loss, but a broken internal connectivity state on the device. (support.microsoft.com)

Affected apps and workflows​

The affected surface is broader than one might expect from a single known issue entry:
  • Microsoft Teams Free
  • OneDrive
  • Microsoft Edge
  • Excel
  • Word
  • Microsoft 365 Copilot
Microsoft says the same issue can appear anywhere an application feature depends on Microsoft account authentication. That means the defect is not limited to launching the app; it can also interfere with identity-backed features inside an otherwise functional session. (support.microsoft.com)

What is not affected​

The support note explicitly says Microsoft Entra ID sign-ins are not affected. For managed environments, that means corporate identity flows should remain intact even while consumer account sign-ins misbehave on the same update. That separation is a relief for enterprise IT, but it also increases the likelihood that the problem will be misdiagnosed in homes and small offices where both consumer and work accounts may be used on the same device. (support.microsoft.com)

The workaround Microsoft recommends​

Restart while connected​

Microsoft’s first workaround is simple but easy to get wrong: restart the affected device while it remains connected to the internet. The company says this should repair the device’s connectivity state and prevent the issue from happening again, at least in the immediate case. (support.microsoft.com)

Why the workaround may be fragile​

The fragility comes from Microsoft’s own warning. If the device is restarted without an active internet connection, it may return to the same faulty connectivity state and the bug can reappear. In other words, this is not a permanent fix; it is a state-reset procedure that depends on the device being online at the moment of reboot. (support.microsoft.com)

The update may self-correct​

Microsoft also says the issue may resolve on its own because it occurs only when the device enters a specific network connectivity state. That suggests the problem is intermittent rather than deterministic, which is both good and bad news: good because not every install is doomed to fail, bad because reproducibility will be inconsistent and troubleshooting will likely frustrate users and support staff alike. (support.microsoft.com)

Practical user steps​

For users stuck in the error loop, the most relevant sequence is straightforward:
  • Confirm the device is online before rebooting.
  • Leave the device connected during the restart.
  • Retry the Microsoft account sign-in after the reboot completes.
  • Avoid testing the workaround with the network disconnected, since that may reintroduce the condition.
  • If the problem clears, keep the machine online through the next restart as well. (support.microsoft.com)

Why this bug feels worse than a single app crash​

Identity sits at the center of Windows services​

Modern Microsoft apps increasingly treat account identity as the gateway to storage, collaboration, sync, and AI-assisted features. When the sign-in layer fails, the error may present as a network issue, but the user impact is closer to a service lockout. That is why a defect in authentication feels much larger than a typical application bug. (support.microsoft.com)

Consumer and productivity apps converge​

The list of affected apps spans consumer, productivity, and browser experiences. That matters because users often assume browser sign-in should remain independent from office productivity sign-in, yet Microsoft’s ecosystem ties those flows together more tightly than many people realize. Once the account layer goes sideways, the browser, documents, chat, and cloud storage can all be dragged into the same failure mode. (support.microsoft.com)

The offline message is especially misleading​

The error text resembles a simple connectivity problem, which means users will first inspect Wi-Fi, Ethernet, routers, VPNs, and firewall rules. But Microsoft’s description indicates the device can be perfectly connected and still hit the defect. That makes the bug unusually confusing because the message points people in the wrong direction. (support.microsoft.com)

The scope is broad enough to disrupt daily routines​

For many users, the affected apps are not optional extras:
  • Teams Free for personal or small-group communication
  • OneDrive for file access and sync
  • Edge for browsing and account-backed sessions
  • Word and Excel for document work
  • Copilot for AI-assisted productivity tasks
When all of those are potentially blocked by one sign-in failure, the problem becomes a productivity outage rather than a cosmetic issue. (support.microsoft.com)

What this means for Windows 11 24H2 and 25H2 users​

Home users may be hit hardest​

Home users and consumers are the most exposed because the defect specifically targets Microsoft account authentication. These are the users most likely to rely on Microsoft’s free services and most likely to be surprised by a sign-in problem that appears after a routine security update. (support.microsoft.com)

Small businesses can still feel the pain​

Even though Entra ID is unaffected, small businesses often operate in mixed environments where some users sign in with work accounts and others use Microsoft accounts for convenience. That makes the bug a support headache: the same machine may work for one account type and fail for another, increasing confusion in helpdesk troubleshooting. (support.microsoft.com)

Browser-based sign-in may not rescue users​

Because Edge itself is listed among the affected apps, the usual fallback of “just sign in through the browser” may not be reliable. That is particularly awkward on a browser-centric platform where account sign-in is supposed to smooth out sync and service access. (support.microsoft.com)

Patch Tuesday trust takes another hit​

This issue arrives at a time when cumulative updates are already under scrutiny for side effects. The more frequently a monthly patch produces a visible regression, the more users will hesitate before installing updates, especially on family PCs and work-from-home laptops that must remain dependable. (support.microsoft.com)

How Microsoft framed the release​

Security fixes plus post-preview changes​

Microsoft’s support documentation says KB5079473 includes the latest security fixes and improvements, plus non-security updates from the previous month’s optional preview release. That is standard monthly servicing behavior, but it also helps explain why a wide range of code paths may be touched in a single release. (support.microsoft.com)

Servicing stack integration​

The update page also notes that Windows 11’s latest servicing stack update is bundled with the cumulative package. While that normally improves reliability of update installation, it also underscores how complex the servicing pipeline has become. More moving parts can mean more places for a regression to surface, even when the final goal is a smoother patch process. (support.microsoft.com)

Microsoft says a fix is coming​

Microsoft states it is working on a resolution and expects to provide additional information in the coming days. That wording suggests the company regards the issue as active but not yet fully remediated, which is important for admins and users deciding whether to keep troubleshooting or simply wait for a follow-up update. (support.microsoft.com)

What users should do now​

Immediate actions​

If you’re impacted, the steps are low-friction:
  • Keep the device connected to the internet.
  • Restart the device once while online.
  • Retry Microsoft account sign-in in the affected app.
  • If the issue returns, repeat the restart only after verifying connectivity.
  • Watch for a follow-up Microsoft fix in Windows Update. (support.microsoft.com)

What not to assume​

Do not assume the problem proves your router, ISP, DNS, or firewall is broken. Microsoft’s description indicates that the device can report the wrong state even when the connection is valid. That means the error message is not a trustworthy indicator of real-world internet availability in this case. (support.microsoft.com)

When to escalate​

Escalate to IT or support if:
  • multiple users on the same device are affected,
  • the issue persists across reboots while online,
  • work accounts remain functional but Microsoft accounts fail,
  • or the device keeps falling back into the same error state.
Those patterns can help separate an intermittent state bug from a genuine network outage. (support.microsoft.com)

Strengths and Opportunities​

Microsoft’s transparency is useful​

The company has documented the problem publicly and listed affected apps and the workaround. That transparency gives users and admins something concrete to act on instead of forcing them to guess at random. That matters because ambiguous identity failures can waste hours. (support.microsoft.com)

The scope is limited to Microsoft accounts​

Because the bug does not affect Entra ID authentication, enterprise managed environments have a clearer path forward than consumer devices. That containment reduces the chance of a full corporate outage. (support.microsoft.com)

The workaround is simple​

A reboot while online is not elegant, but it is accessible. Simplicity is valuable when the problem affects broad consumer services and users need a quick way to get back to work. (support.microsoft.com)

The issue may self-resolve​

Microsoft’s note that the bug may clear on its own suggests the underlying state condition is transient. If that proves true, it may limit the duration of impact for many affected devices. (support.microsoft.com)

Risks and Concerns​

The bug is easy to misread​

Because the error says the machine is offline, users may chase the wrong problem for a long time. Misdiagnosis is one of the biggest operational risks here. (support.microsoft.com)

The workaround is not durable​

If restarting offline can return the device to the bad state, then the problem may keep coming back. That makes the issue cyclical, not one-and-done. (support.microsoft.com)

The impact extends across several core apps​

This is not limited to a niche utility. Teams, OneDrive, Edge, Word, Excel, and Copilot are all common enough that the bug can interrupt many different routines in one household or office. (support.microsoft.com)

Confidence in monthly updates can erode​

When a security update introduces authentication regressions, some users will delay installing future patches. That creates a secondary security risk because unpatched systems then remain exposed longer than intended. (support.microsoft.com)

What to Watch Next​

A Microsoft follow-up fix​

The most obvious next step is a servicing update or out-of-band correction from Microsoft. Watch Windows Update closely for a fix note or revised known-issue entry. (support.microsoft.com)

Whether the issue is intermittent or reproducible​

Microsoft’s description implies the bug depends on a specific connectivity state. If telemetry confirms that pattern, the company may narrow the trigger more precisely in future documentation. (support.microsoft.com)

Whether more apps are added to the list​

Right now Microsoft names a specific set of affected applications, but the list may grow if the same sign-in component is used elsewhere. Additional app reports would indicate the underlying issue is broader than initially stated. (support.microsoft.com)

Whether admins see any enterprise spillover​

Even though Entra ID is unaffected, IT teams should still watch mixed-use devices and remote-user setups. In real deployments, consumer account failures can produce support load even when the business identity stack remains healthy. (support.microsoft.com)

Microsoft’s KB5079473 problem is a reminder that modern Windows issues are often less about a broken app and more about a broken trust chain between the device, the network state, and the identity layer. The good news is that Microsoft has already acknowledged the bug, narrowed the affected sign-in path, and offered a workable reboot-based mitigation. The bad news is that the symptom looks exactly like a basic internet problem, which means many users will waste time checking the wrong layer before they discover the patch itself is the trigger. For now, the practical advice is straightforward: stay online, reboot once, and keep an eye out for Microsoft’s follow-up fix.

Source: neowin.net Microsoft: KB5079473 breaks internet access to Windows 11 Teams, Edge, OneDrive, Copilot
 
Last edited: