Outlook Hangs After January 2026 Updates: Move PSTs Out of OneDrive

  • Thread Author
Microsoft has confirmed that its January security update can leave Outlook unstable when users open or save files that live in cloud‑backed folders such as OneDrive or Dropbox — a problem that in some configurations causes the classic Outlook desktop client (especially profiles using POP and PST files stored in OneDrive) to hang, refuse to restart, or fail to show sent messages.

Computer screen shows a PST file warning in a OneDrive cloud icon.Background​

Microsoft shipped the January 13, 2026 cumulative updates for Windows, the packages commonly identified by KB numbers such as KB5074109 (Windows 11 builds 26200.7623 and 26100.7623) and KB5073724 for Windows 10. Those updates were intended to carry routine security fixes plus a handful of quality improvements, but multiple regressions were reported almost immediately — including problems with shutdown/hibernate on some systems, Remote Desktop authentication failures, and now application hangs when interacting with cloud‑backed storage. Microsoft issued an emergency out‑of‑band update on January 17 (KB5077744) to address certain Remote Desktop and authentication problems, but the Outlook/cloud storage hang remained a separate, acknowledged issue. This story sits at the intersection of three trends:
  • Desktop applications that expect low‑latency, atomic file access are increasingly interacting with cloud sync clients that present virtualized or on‑demand files.
  • Enterprises and power users still rely on legacy Outlook profiles and PST containers, sometimes placing PST files inside sync folders for backup or roaming convenience.
  • Microsoft’s post‑release telemetry and remediation mechanisms (including Known Issue Rollback) are under strain when regression volume and diversity rise.
The immediate operational impact is clear: Outlook users who keep PSTs inside OneDrive folders — a configuration Microsoft and many admins recommend against for reasons this article will explain — may find the application “not responding” and unable to reopen without force‑killing processes or restarting the machine. Sent items can appear to vanish. Microsoft’s current guidance is to move PST files out of OneDrive or, where necessary, use webmail until a fix ships.

What Microsoft has said (and what it did not say)​

The official acknowledgements​

Microsoft’s Outlook support and Windows release pages list the problem as a known issue after the January 13 updates and describe the symptoms: Outlook hanging, failure to reopen unless the process is ended, sent emails not appearing, and Outlook re‑downloading mail in some cases. The company lists affected update packages and platforms and recommends workarounds including using webmail, moving PSTs out of OneDrive, or uninstalling the offending update where feasible. Microsoft has also used Known Issue Rollback and a targeted Group Policy approach for some of the other regressions introduced with these updates.

What Microsoft did not confirm (and what remains open)​

Microsoft has not published a detailed root‑cause analysis explaining why the January update interacts badly with cloud‑backed PST files. The company’s initial messaging focuses on symptoms and mitigations rather than an engineering post‑mortem. That leaves room for multiple technical hypotheses (discussed below) and complicates planning for IT teams that must weigh the security cost of uninstalling or blocking a security update against the operational cost of a broken Outlook client. Reporting from industry outlets and community threads confirm the issue is widespread across consumer and managed devices, but specifics — which OEMs or storage configurations are most affected, whether particular OneDrive settings (Files On‑Demand, differential sync, placeholder files) are implicated — are not yet fully mapped in public documents.

Why PST files and cloud sync are a risky mixing​

Putting an Outlook PST inside a cloud‑sync folder is a long‑standing source of problems; Microsoft's own documentation has historically warned against treating PST files as live, synchronized documents. Yet many users do it for convenience (backup, roaming access, or because their profile was configured that way years ago). Here’s why that combination is fragile:
  • PST files are monolithic, file‑locked containers. Outlook expects exclusive, consistent local file access. Sync clients may open or inspect the file, cause transient locks, or attempt to upload partially updated blocks while Outlook is still writing, producing race conditions.
  • Sync clients virtualize file I/O. Features like Files On‑Demand or placeholders make files appear present when metadata alone is available. Apps that expect to open a fully local block of bytes find a virtual pointer instead.
  • Conflict and chunked uploads can interrupt app semantics. When sync clients snapshot files for upload, they may create temporary files, rename items, or delay completion — operations Outlook isn't designed to withstand on the PST level.
  • Backup/restore vs live use mismatch. Cloud sync is excellent for backup but poor as a transactional store for database‑style files. PSTs behave as local databases; they should be treated as such.
Those architectural mismatches are the reason Microsoft and many sysadmins recommend against storing PSTs directly in OneDrive or other active sync folders. The current regression simply highlights the brittle boundary between legacy file containers and modern sync clients — but it’s not a brand‑new class of problem.

What the evidence supports (technical possibilities, not proven causes)​

Because Microsoft has not yet released a formal post‑mortem, the following are plausible technical explanations consistent with observed symptoms and prior experience. Each is presented as a possibility, not a claim Microsoft has confirmed.
  • File access semantics changed in the OS update. A cumulative update can modify kernel file system behavior, NTFS semantics, or caching that cloud sync clients rely on. If those changes alter timing or lock semantics, apps that assume specific behaviour can deadlock. The January updates included core component updates and other changes which could plausibly affect interactions between applications and file system filter drivers.
  • Sync client/file filter interaction. OneDrive implements a file system filter/driver and background sync engine. If the update changes how callbacks, IRP handling, or deferred writes are scheduled, Outlook’s threaded I/O could spin waiting on an operation the filter never resolves, producing a “Not Responding” UI hang.
  • Metadata or indexing race. Changes to indexing components or sqlite/WinSqlite DLLs in the update can break assumptions in some sync engines, causing background tasks to interfere with the primary app thread. (The January rollup referenced a WinSqlite3.dll update in its list of changes.
  • Edge cases in Known Issue Rollback or Group Policy. Where Microsoft deploys KIR or targeted Group Policy to neutralize a bad change, differences in configuration across enterprise fleets can leave some machines stuck in intermediate states, producing inconsistent symptoms. KIR is a mitigation tool but not a substitute for a root‑cause fix.
These possibilities explain how the symptoms could appear; they do not replace the need for a Microsoft analysis confirming which component and code path is responsible.

Impact: who is affected and how badly​

Affected user profiles​

  • Home users who keep PST files inside OneDrive or Dropbox for backup or convenience can see Outlook hang or fail to reopen. Because consumer devices are less likely to have Group Policy mitigations applied, the simplest user workaround is to move the PST file out of the cloud‑sync folder and into a local profile folder.
  • Small businesses and shops using POP‑based classic Outlook profiles are disproportionately impacted, because POP + PST workflows continue to rely on the local PST container. Exchange, IMAP, andnd modern Microsoft 365 accounts that use OST or server‑side mailboxes are less frequently reported as impacted.
  • Enterprises that must keep patch compliance face a tough choice: uninstalling a security update increases attack surface, while leaving the update in place risks large numbers of helpdesk tickets and lost productivity.

Operational consequences​

  • Temporary mail loss or visibility issues. Users have reported sent messages not appearing in Sent Items, and Outlook sometimes re‑downloads messages. While these symptoms often resolve when the app is properly restarted and the PST is local, they create confusion and potential loss of trust in mail workflows.
  • Helpdesk load surge. Unresponsive Outlook instances, forced restarts, and migration of PSTs generate ticket volumes beyond normal churn. Where admins must rollback updates or apply Group Policy-based KIRs selectively, the remediation window expands.

Practical, step‑by‑step mitigations for end users and admins​

The following steps are practical, sequential options to reduce immediate impact. They are presented in order of least to most invasive.
  • Try the least disruptive: use webmail (Outlook Web Access or your provider’s web UI) until a fix ships. Microsoft explicitly recommends webmail as a short‑term mitigation.
  • Move PST files out of OneDrive or any cloud‑sync folder to a local folder inside the user’s profile (for example C:\Users\<username>\Documents\Outlook Files), then re‑point Outlook’s data file mapping to the new location. Microsoft documents this workaround.
  • If the above is insufficient for managed devices, consider uninstalling the January update that introduced the regression (for example KB5074109) after evaluating the security impact and discussing with security teams. Uninstalling a monthly security update is a high‑risk move and should be treated as temporary triage only.
  • For enterprise fleets, use Known Issue Rollback (KIR) or the special Group Policy Microsoft has published where applicable — this allows targeted mitigation without fully removing a security update. Microsoft’s KB pages reference these mechanisms for related problems.
  • Avoid putting PSTs into live sync folders going forward. If backup or mobility is the goal, use dedicated backup solutions that quiesce the file or store the PST as an archival copy rather than a live working set. Consider modern mailbox architectures (Exchange Online, IMAP with cloud storage, or migrating mailboxes off PSTs) to remove the dependency entirely.
Administrators should document any temporary rollback and prepare to reinstall security updates once Microsoft issues a permanent patch. Keep careful change logs and user communication scripts ready — users who rely on archived PST content will need guidance and steps to relocate files safely.

Long‑term recommendations and lessons for Windows users and IT teams​

  • Treat PSTs as local databases, not cloud documents. Backup PSTs with scheduled, application‑aware backups that quiesce or copy the file, rather than relying on continuous cloud sync.
  • Prefer server‑side mail where possible. Modern Exchange/Office 365 mailboxes remove the single‑file risk and provide native cloud redundancy and per‑message synchronization.
  • Test updates in representative environments. The regression pattern here underlines the value of layered testing: consumer, corporate image with common sync clients, and edge cases like PSTs in OneDrive.
  • Inventory and reduce legacy artifacts. The more PSTs and POP profiles installed across a fleet, the greater the blast radius for an update that affects file I/O semantics.
  • Have rollback and communication plans. Where a security update produces a productivity‑blocking bug, organizations need documented decision criteria for rollback vs mitigation so business continuity is aligned with security posture.

Risks of rolling back or uninstalling updates​

Uninstalling a security update is not a neutral action. While doing so may restore Outlook functionality for affected users, it reopens vulnerabilities fixed by that update and may leave devices noncompliant with organizational policies. Known Issue Rollback can provide a safer, targeted alternative for certain regressions, but it is not a universal remedy and requires careful deployment. Admins must weigh risk exposure, timeline to patch, and the scope of user impact when choosing a remediation path.

Why this matters beyond Outlook​

This incident is emblematic of a broader friction between legacy application assumptions and modern OS/cloud features. As more productivity workflows are hybrid — local apps accessing cloud‑backed files — the tolerance for subtle file system regressions shrinks.
  • App vendors and OS maintainers must coordinate interfaces. When OS updates alter file system semantics even slightly, filter drivers and sync engines need validation.
  • Cloud sync as a default has hidden costs. AutoSave and default cloud redirection improve convenience but also increase risk when apps were designed with local storage assumptions.
  • Enterprise posture must evolve. IT groups should accelerate moving users to cloud‑native mail where feasible, and treat legacy PST/POP users as high‑risk groups during monthly patch cycles.
Industry reporting and community threads show this pattern is not limited to a single update cycle — similar breakages have happened in prior months and years — making the case for better test coverage and faster engineering feedback loops.

What to watch next​

  • Microsoft will publish a fix in a future update; watch the Windows release health dashboard and the dedicated Outlook support page for confirmed remediation and a technical root‑cause once available. Microsoft has said it is “working on releasing a resolution for this issue as soon as possible.”
  • If you are an admin, monitor the Known Issue Rollback and Group Policy guidance from Microsoft for targeted mitigations before resorting to full update removal.
  • Users should check their OneDrive settings (Files On‑Demand, systray sync client version) and move any PSTs out of synced folders immediately if they observe hangs. Community threads indicate the move often restores behavior.

Final assessment: strengths, weaknesses and the broader risk picture​

The patch process delivered important security updates, but the collateral damage in productivity is real. Microsoft’s quick identification and public documentation of the Outlook/PST symptom set is a strength: the company acknowledged the issue and provided actionable mitigations rather than leaving users to guess. That transparency shortens the time to triage for administrators and users alike. However, there are clear weaknesses:
  • The lack of an immediate, detailed root‑cause analysis leaves enterprise teams forced to make conservative, sometimes risky choices (uninstalling security fixes) to restore functionality.
  • The dependence on legacy file containers in modern sync environments is an unresolved architectural mismatch that will continue producing brittle outcomes unless organizations prioritize migration off PSTs.
  • The cadence and complexity of modern cumulative updates raise the bar for realistic, representative testing across diverse client configurations — a challenge for both Microsoft and third‑party tool vendors.
Bottom line: the January update regression is fixable, and Microsoft is working on a resolution. But the incident is a reminder that cloud convenience can mask operational risk when legacy file formats and sync clients collide with OS changes. Users should follow Microsoft’s current guidance — move PSTs out of cloud‑synced folders, use webmail for immediate relief, and coordinate with IT before uninstalling security updates — and organizations should accelerate migration away from PST‑centric workflows to reduce the blast radius of future regressions. Conclusion
The Outlook hangs tied to the January Windows updates are a concrete, avoidable disruption for users who mix legacy PST‑based workflows with cloud sync. The shortest path to stability for affected users is simple: relocate PST files off OneDrive or use webmail until Microsoft ships a permanent fix. For IT teams, the incident underlines the urgency of inventorying legacy mail architectures, testing updates against representative endpoint configurations, and using Microsoft’s targeted rollout and mitigation tools instead of blanket rollback wherever possible. The technical fix will arrive, but the more durable lesson is organisational: reduce reliance on monolithic local containers in cloud‑centric workplaces.
Source: theregister.com Outlook might freeze when saving files to OneDrive
 

Microsoft has acknowledged a serious regression in the January 13, 2026 Windows cumulative update that can leave Outlook (classic Win32 client) unusable for many users — particularly those running POP accounts or storing PST files on cloud‑backed storage such as OneDrive. The company’s support notices now list the issue as investigating, advise affected users to use webmail until a fix is available, and recommend moving PST files out of OneDrive or uninstalling the January update as temporary mitigations. At the same time Microsoft pushed out emergency out‑of‑band updates to address other post‑Patch Tuesday regressions, but those fixes do not resolve the Outlook hangs; organizations and end users are left balancing productivity loss against the security risk of removing a cumulative security update.

Monitor shows Outlook Not Responding with Windows Update progress and a PST cloud icon.Background​

What shipped on January 13, 2026​

On January 13, 2026 Microsoft released the monthly cumulative updates for Windows. The update for Windows 11 — commonly noted by its catalog designation — arrived as a combined servicing stack update (SSU) plus cumulative update (LCU). That package included routine security fixes and quality improvements, but telemetry and community reports quickly surfaced multiple regressions on a variety of platforms and configurations.

The Outlook problem in brief​

Shortly after deployment, Microsoft published support advisories confirming that classic Outlook profiles with POP accounts and PSTs can hang or become unresponsive after installing the January updates. The support text highlights several concrete symptoms: Outlook showing “Not Responding”, inability to reopen Outlook without terminating its background process or rebooting the system, sent messages not appearing in Sent Items, and previously downloaded messages being re‑downloaded. The advisory explicitly calls out PST files stored on OneDrive as a configuration that may trigger the behaviour.

A rapidly evolving incident​

Within days the Windows team issued out‑of‑band (OOB) cumulative updates to remediate separate high‑impact issues (for example, Secure Launch shutdown regressions and Remote Desktop authentication failures). Those OOB releases restored some system functionality, but Microsoft’s public guidance continued to list the Outlook hang and the “apps might become unresponsive when saving files to cloud‑backed storage” condition as investigating or confirmed items. Microsoft’s interim mitigations — using webmail and moving PSTs out of OneDrive — point to a file‑access or sync interaction as the likely surface of the regression.

Symptoms and technical profile​

Primary symptoms reported by users​

  • Outlook windows freeze or display “Not Responding” during normal use.
  • Closing the Outlook UI sometimes leaves an OUTLOOK.EXE process running; attempts to restart the UI fail until the background process is terminated or the system is rebooted.
  • Sent messages fail to appear in the Sent Items folder despite successful sending.
  • Previously downloaded mail may be downloaded again, indicating problems with local state and synchronization.
These behaviors are particularly disruptive: they risk lost drafts, missing records of sent mail, and repeated reboots or forced terminations to restore service.

Which setups are most affected​

  • Classic Outlook for Microsoft 365 (Win32) using POP3 account profiles.
  • Profiles that rely on PST files — especially when those PSTs are placed inside OneDrive (or other cloud‑backed folders such as Dropbox).
  • Affected OS branches include Windows 11 25H2 and 24H2 builds patched by the January cumulative update, and there are reports from Windows 10 22H2 variants as well.

Likely technical surface​

The pattern of failures strongly implicates interactions between legacy PST file access patterns and cloud‑sync/file‑placeholder semantics. PST is a legacy, single‑file format with tight local I/O dependencies; when a sync client (e.g., OneDrive) interposes on file streams, locking, or placeholder handling, it can disturb the Outlook process’ assumptions about atomic file access. Combined servicing stack changes and updated file system drivers or filters in the cumulative update make this a plausible root cause. At the same time, the symptoms showing sent mail not being recorded hint at state‑management or write‑through failures that manifest under edge timing conditions introduced by the updated OS components.

Timeline — how events unfolded​

  • January 13, 2026 — Microsoft publishes the monthly cumulative update (LCU + SSU combined). Administrators begin deploying via Windows Update, WSUS and the Microsoft Update Catalog.
  • Within hours–days — Users and administrators report Outlook hangs and other regressions on multiple forums and support channels. Community troubleshooting shows that uninstalling the January update restores Outlook functionality on many systems.
  • January 17, 2026 — Microsoft issues out‑of‑band updates addressing distinct regressions (shutdown/hibernate issues tied to Secure Launch and Remote Desktop authentication failures). These do not remedy the Outlook/PST hangs.
  • January 15–20, 2026 — Microsoft posts support advisories acknowledging Outlook hangs for POP/PST profiles and updates the message as investigations progress. Guidance points affected users toward webmail and moving PSTs out of OneDrive as interim mitigations.
  • January 21, 2026 — Microsoft’s Windows message center adds a confirmed notification that "apps might become unresponsive when saving files to cloud‑backed storage," explicitly calling out PST‑in‑OneDrive scenarios that impact Outlook.
This progression — initial update → community reports → targeted OOB fixes for some issues → ongoing investigation of Outlook — is crucial context for administrators weighing remediation options.

Who is impacted — scale and real‑world effects​

End users and small businesses​

  • Users relying on POP3 and PST workflows — common among small businesses, ISPs, and personal mail setups — are disproportionately affected. These environments often keep PSTs in user profile folders that cloud sync clients protect or back up by default.
  • Home users who store PSTs in OneDrive or other cloud‑synced directories (sometimes for backup convenience) may experience hangs or repeated downloads and risk losing Sent Item records.

IT departments and service providers​

  • Managed Service Providers (MSPs) and IT help desks face an influx of support tickets: Outlook that won’t restart, missing sent items, and frustrated users.
  • Firms that enforce automatic patching or have aggressive update rings face a tradeoff: leave systems patched (and risk Outlook downtime) or roll back security updates (and expose systems to patched vulnerabilities).

Enterprise risk​

  • Removing a cumulative security update is not a neutral operation; it exposes endpoints to vulnerabilities fixed by the same package. Organizations with regulatory or security constraints must evaluate rollback risk carefully and consider temporary mitigations rather than blanket uninstallations.

Practical mitigations and step‑by‑step guidance​

The situation forces administrators and users to choose between short‑term productivity and security. The recommendations below prioritize safety while offering practical workarounds.

For end users (quick, low‑risk)​

  • Use Outlook Web Access (webmail) while Microsoft investigates. This bypasses the local PST access path entirely and preserves workflow continuity.
  • Avoid storing PST files inside OneDrive or other cloud‑backed folders. If a PST resides in a cloud sync folder, move it back to a local-only directory on the device (for example, inside %LOCALAPPDATA% or another user folder not watched by the sync client). After moving, re‑attach the PST in Outlook via File → Account Settings → Data Files.
  • If you cannot move the PST immediately, do not repeatedly close and open Outlook; instead, terminate the background process from Task Manager only when necessary to avoid inconsistent state.
  • Consider switching a POP account to IMAP if your provider supports it — IMAP keeps mail on the server and avoids PST‑centric local storage.

For IT administrators (operational guidance)​

  • Assess exposure: inventory devices with POP profiles or local PSTs in cloud‑synced directories. Prioritize users who must send mail reliably.
  • Communicate: issue a user advisory explaining symptoms, temporary webmail usage, and the plan to remediate. Clear guidance reduces helpdesk volume.
  • Isolation and rollback: for critical users, rollback of the January cumulative update can restore Outlook behavior in many cases. If rollback is chosen, implement compensating controls (e.g., enhanced endpoint monitoring, temporary network restrictions for risky endpoints) because rollback removes security patching.
  • Use Known Issue Rollback (KIR) and Group Policy where applicable: For other January regressions Microsoft shipped KIR artifacts and Group Policy templates that allow enterprise admins to mitigate certain problems without full rollback. Evaluate those options for your environment.
  • Test before broad rollback: do not apply rollback widely without testing in your pilot ring. The January updates include SSU components which can change uninstall semantics and complicate removal. In some combined SSU+LCU packages, standard uninstall paths may be restricted; use documented DISM/Remove‑Package commands for safe removal when needed.
  • Temporary PST handling policy: instruct users not to keep PSTs in OneDrive; provide step‑by‑step help for moving PSTs; schedule a migration plan away from local PST dependence where possible.

Advanced alternatives and tradeoffs​

  • For power users, the new Outlook app (the reimagined client) or mobile Outlook clients may sidestep the problem if they do not rely on local PST files. However, account configuration differences and feature parity mean this is not a one‑size‑fits‑all fix.
  • Long term, migrate mailboxes to Exchange Online / Microsoft 365 or a centrally managed Exchange server to remove PST reliance. This is a strategic IT investment rather than a stopgap.

Risks and tradeoffs — what to weigh before acting​

Security vs. availability​

Uninstalling a cumulative security update is effective at restoring Outlook in many reports, but it comes with immediate security exposure. January cumulative updates often close actively exploited vulnerabilities; rolling back should be a last resort and must be accompanied by compensating security measures.

Data integrity and PST manipulation​

Moving PST files between folders, detaching and reattaching in Outlook, or performing manual file operations increases the risk of file corruption if not done correctly. Always instruct users to close Outlook before moving PSTs and take backups (copy the PST to a safe location) before making changes.

Support complexity​

Microsoft’s combined SSU + LCU packaging can complicate rollback and reinstall workflows. Some systems may require DISM package removal commands rather than simple wusa uninstall steps. IT teams should review vendor guidance and test rollback processes before wide execution.

Operational cost​

Frequent reboots, forced process terminations, and increased helpdesk tickets erode productivity and consume IT resources. The incident highlights the operational cost of a single high‑impact regression in widely deployed OS updates.

Root‑cause hypotheses and engineering implications​

While Microsoft’s public advisories stop short of declaring a single root cause, the empirical evidence points to a class of problems that are common in complex OS+app ecosystems:
  • File system and sync client interplay: cloud sync clients alter file states with placeholders, on‑demand fetch, and background uploads; these behaviors can interfere with legacy apps that expect exclusive, synchronous local I/O.
  • Service and driver changes: cumulative updates sometimes modify filters, file system drivers, or servicing stack behavior that affect how applications open and hold file handles. Legacy formats like PST are particularly sensitive to such changes.
  • Combined SSU+LCU packaging side effects: combining servicing stack changes and LCU in the same package accelerates delivery but reduces the ability to cleanly roll back changes, increasing the risk surface when regressions appear.
  • Telemetry blind spots: the update reached many devices before these regressions were detected at scale, suggesting either incomplete pre‑deployment test coverage for specific legacy workflows, or low telemetry signal for edge configurations.
For product teams these are familiar tradeoffs: faster update cadence vs. the complexity of maintaining interactions with legacy formats and sync clients across thousands of possible configurations.

What Microsoft has done — and what remains missing​

Microsoft acknowledged the Outlook hang and the cloud‑storage app unresponsiveness publicly and provided interim guidance (webmail, move PSTs, uninstall update). The company also released targeted OOB updates on January 17 that fixed other high‑impact regressions (shutdown and remote desktop problems). However:
  • There is no targeted hotfix for the Outlook POP/PST hang published at the time of writing.
  • Official guidance focuses on workarounds rather than a guaranteed in‑place fix: move PSTs out of OneDrive, use webmail, or uninstall the update.
  • The presence of a known message center item confirming "apps might become unresponsive when saving files to cloud‑backed storage" indicates Microsoft recognizes a broader class of issues involving OneDrive/other sync clients — but the specific remediation timeline for Outlook remains open.
Taken together, the response is transparent but incomplete from an enterprise remediation perspective: acknowledgement and mitigations exist, but a repair path that restores both security and Outlook functionality without manual intervention is not yet available.

Recommendations — immediate and strategic​

Immediate, for every Windows + Outlook user​

  • If you use PST files in OneDrive: move the PST out of OneDrive now, backup the PST file, and re‑attach it from a local folder. Use webmail in the interim.
  • If your workflow depends on POP/PST and you cannot move PSTs safely, consider temporarily using a different device that is not updated to the January patch or roll back the update only for the most critical endpoints — but do so with compensating security controls.

For IT leaders and admins​

  • Inventory: run a quick audit to identify devices with PSTs in cloud folders and users on POP profiles.
  • Staged remediation: implement user communications and scripted guidance to move PSTs out of sync folders, then push standard policy changes to exclude PST locations from OneDrive backups.
  • Patch governance: pause automatic rollout to uncontrolled rings. Move to a staged deployment until Microsoft publishes a fix.
  • Monitor: increase endpoint monitoring for abnormal Outlook process behavior and check for symptoms like OUTLOOK.EXE processes persisting after UI closure.
  • Plan migration: accelerate any program to reduce PST dependency (e.g., mailbox migration to Exchange Online, enabling IMAP/Exchange for ISP mailboxes).

For product and engineering teams (broader)​

  • Reexamine update testing matrices to include legacy workflows like PST + OneDrive on representative device configurations.
  • Consider separating SSU changes from LCUs when the risk of rollback is material, or provide clearer, safer uninstall mechanics.
  • Improve in‑update feature flags or Known Issue Rollback (KIR) coverage to allow targeted, reversible mitigations for high‑impact regressions.

Strengths and limits of the current guidance​

Microsoft’s strengths in this incident are visible: the company has been transparent about the problem, published support notices quickly, and issued OOB fixes for some of the most disruptive regressions. The visible support messaging and message center acknowledgements are appropriate for a high‑impact post‑patch environment.
However, limitations remain. The lack of a straightforward in‑place hotfix for the Outlook hang, combined with the security tradeoffs required to uninstall a cumulative update, leaves many organizations in a difficult position. The root‑cause remains exploratory in public messaging, which constrains precise mitigations for enterprise environments. Finally, because PST file manipulation carries corruption risk, the recommended workaround (move PST out of OneDrive) is operationally safe only when performed carefully and backed up.

Final assessment — what this means for users and IT​

This incident is a reminder that modern OS servicing touches many legacy workflows and that cloud sync clients, while convenient, create fragile boundaries with older file formats. For affected end users the immediate effect is lost productivity and frustration; for IT teams it is a spike in operational overhead and a hard security/availability choice.
Short term: prioritize user continuity by using webmail and moving PSTs out of cloud‑synced folders. If rollback is used, protect the endpoints through compensating controls and limit the scope to critical users.
Medium term: reassess the reliance on PSTs and POP workflows. Migrate to server‑side mail storage (IMAP/Exchange), exclude PST locations from sync clients by policy, and harden patch governance to catch and mitigate similar regressions earlier.
Microsoft will need to publish a fix that restores Outlook functionality without requiring users to remove security updates. Until that fix is released, administrators must balance operational risk, user impact, and security exposure carefully — and communicate clearly to users about what steps to take to avoid data loss or corruption.

Microsoft’s public acknowledgement and the interim guidance are useful, but incomplete. For now, the safest practical posture is: if your workflow depends on local PSTs, remove them from cloud‑synced folders immediately, adopt webmail for high‑priority mail flows, and treat any rollback of the January update as an emergency measure that requires tight operational controls. The coming days will determine whether Microsoft can deliver an in‑place resolution that restores both security and application stability without forcing this compromise.

Source: Forbes Microsoft Issues Critical Update Warning For All Outlook Users
 

Back
Top