• Thread Author
Microsoft’s official tools for moving millions of PCs off Windows 10 and onto Windows 11 stumbled at the worst possible time: an updated Windows 11 Media Creation Tool released in late September can close immediately or fail to run on certain Windows 10 hosts, leaving users scrambling for alternatives mere days before Windows 10’s support cutoff on October 14, 2025. This is a high-friction, high-risk regression at a moment when many home users and smaller IT teams are executing last-minute migrations or building recovery media—and Microsoft has formally acknowledged the problem while pointing customers to manual ISO downloads and alternative upgrade paths.

Two-panel guide contrasting a risky ESU upgrade with a safe Windows 11 upgrade via ISO/USB.Background​

Why October 14, 2025 matters​

Microsoft has set a hard end-of-support deadline for Windows 10: after October 14, 2025, routine security updates, non-security fixes, and free technical assistance for Windows 10 editions (Home, Pro, Enterprise, Education and related SKUs) cease unless an organization or user buys or qualifies for Extended Security Updates (ESU). For most users, staying supported means upgrading eligible devices to Windows 11 or enrolling in ESU for a limited bridge period. The practical urgency is real: unpatched endpoints quickly become attractive targets for attackers and are operational liabilities for businesses.

What the Media Creation Tool (MCT) does—and why people rely on it​

The Windows 11 Media Creation Tool is Microsoft’s supported, one-click utility for downloading official ISOs and creating bootable USB installation media. For many consumers and technicians the tool is the simplest, quickest way to build recovery sticks, perform clean installs, or prepare an in-place upgrade when Windows Update doesn’t offer the feature update yet. That convenience is also why a failure in the tool produces disproportionate disruption—the alternative paths are reliable but more manual. Community best practice has long been to keep canonical ISOs on hand, but many ordinary users never do this and expect the MCT to “just work.”

What broke, exactly​

The regression in the updated MCT​

Microsoft’s release-health/update-history documentation states that the Windows 11 Media Creation Tool version 26100.6584, published around September 29, 2025, might not work as expected on Windows 10 devices; the tool can close unexpectedly with no error message. The public advisory originally flagged the issue with Arm64 hosts and then expanded to note behaviour on Windows 10, version 22H2 clients: users report the executable opens, shows the Windows splash briefly, then exits with no diagnostic dialog. Microsoft says a fix is in the works and recommends workarounds in the meantime.
Community reproductions match Microsoft’s description: independent testers have reported the exact symptom—clicking the MCT on Windows 10 shows the UAC prompt and the Windows logo, then the tool exits and produces no ISO or bootable USB. Event Viewer traces shared by admins indicate SetupHost.exe crashing with ntdll.dll exceptions in some instances, suggesting an early-stage initialization fault that aborts the process.

Scope: who’s affected​

  • Primary: Windows 10, version 22H2 devices running the updated MCT package. Reports show the failure is host‑OS specific; the same MCT binary often runs on Windows 11 hosts without issue.
  • Secondary: Device builders or enthusiasts using Arm64 development devices to create Arm64 media; Microsoft explicitly notes the MCT “doesn’t support creating media for use on Arm64 devices,” and that on-device Arm64→Arm64 creation is not working as intended.
  • Enterprise imaging servers and managed deployment pipelines are largely unaffected if they use canonical ISOs, WSUS, or Windows Update for Business, but shops that rely on ad-hoc use of MCT from mixed-host build machines must change workflow immediately.

Immediate practical impact and risk assessment​

Operational friction, not a total outage — but timing amplifies harm​

This regression is not an OS-wide security vulnerability; it is an operational blocker. Still, the timing—weeks or days before Windows 10 reaches end of support—makes it consequential. Many users and small organizations plan a last-minute clean install or in-place upgrade as the final step before the EOL cutoff, and the MCT is their expected shortcut. Broken tooling raises the chance of delayed upgrades, which in turn raises the risk of exposure to post‑EOL vulnerabilities for systems left on Windows 10.

Security implications​

  • Delayed migration increases the number of internet‑connected Windows 10 devices not receiving security fixes after October 14, 2025. Those devices will grow riskier over time.
  • Workarounds that bypass Microsoft checks—such as community tools that disable TPM/Secure Boot checks during installation—can create long-term update and support problems and are unsupported by Microsoft. Avoid unsupported hacks at scale.

Who is most at risk​

  • Home users who lack an alternate host (a Windows 11 machine) or the technical comfort to download and verify an ISO and use a third-party USB writer.
  • Small businesses and non-profit organizations that typically rely on a single technician or a simple on-device flow to create recovery media.
  • Developers or device builders using Arm64 tooling on Arm64 hosts who need Arm64 installation media and expect to produce it on the same device.

Microsoft’s guidance and the official workarounds​

Microsoft has published a short-term set of mitigations while working on a fix:
  • Use the Windows 11 Installation Assistant for in-place upgrades (keeps files and apps). This path generally performs compatibility checks and downloads the necessary feature update for eligible PCs.
  • Download the Windows 11 Disk Image (ISO) for x64 devices directly from Microsoft’s software download page and create bootable media with a third-party utility (Rufus, Ventoy) or mount the ISO and run setup.exe for an in-place upgrade. Microsoft explicitly recommends the ISO fallback.
  • If you have access to a Windows 11 PC, run the Media Creation Tool there to create the USB and then use that USB on the target Windows 10 machine; the MCT appears to work more reliably on Windows 11 hosts.
Microsoft’s release-health entries emphasize the workaround and note that the issue is under investigation and will be resolved in a future update. That leaves users with manual routes until the vendor publishes a patched MCT.

Step-by-step recovery and upgrade options (practical, ranked)​

Below are recommended, sequential options ranked by reliability and safety. Each entry includes key steps and caveats.
  • In-place upgrade via Windows Update (safest for most users)
  • Open Settings → Update & Security → Windows Update → Check for updates.
  • If “Upgrade to Windows 11” appears, choose Download and install, follow prompts, and ensure backups are in place.
  • Advantages: least manual work, preserves apps/settings, maintains entitlement to updates.
  • Caveats: rollout is staged—offer may not be available for every eligible device immediately.
  • Windows 11 Installation Assistant (guided in-place upgrade)
  • Download the Windows 11 Installation Assistant executable from Microsoft’s Download Windows 11 page, run it, accept prompts and let it perform the upgrade.
  • Advantages: guided, checks compatibility, reliable on eligible machines.
  • Caveats: requires an internet connection and can take time; always back up important files first.
  • Download the official Windows 11 ISO and use Rufus or Ventoy to make a bootable USB (best manual fallback)
  • Download the x64 ISO from Microsoft’s official “Download Windows 11” page (choose “Download Windows 11 Disk Image (ISO) for x64 devices”).
  • Verify the ISO checksum when Microsoft publishes it (SHA‑256) if possible.
  • Use Rufus (run as Administrator) and choose Partition scheme: GPT (UEFI), Target system: UEFI, File system: NTFS, then Start → create bootable USB.
  • Boot the target PC from the USB and run setup.exe for an in-place upgrade or perform a clean install from the boot menu.
  • Advantages: full control, reproducible, independent of MCT behaviour.
  • Caveats: requires basic familiarity with Rufus/boot menus and BIOS/UEFI settings; verification of checksums is strongly recommended.
  • Use a Windows 11 friend/colleague’s machine to run MCT and make a USB
  • If MCT works on Windows 11 hosts, produce the bootable media there and use it on the Windows 10 target.
  • Advantages: preserves the simplicity of MCT-created media.
  • Caveats: requires access to another compatible PC; ensure the created media matches the edition and language required.
  • Enroll in Extended Security Updates (ESU) if hardware is incompatible or migration must be delayed
  • If the device won’t meet Windows 11 requirements or an immediate migration is impractical, the ESU program offers a one-year bridge of security updates for consumers in eligible regions or under specific conditions—review Microsoft’s ESU terms and eligibility. ESU is a temporary measure, not a long-term solution.

Enterprise and imaging guidance​

  • Maintain a canonical, hashed ISO repository and use established imaging pipelines (WSUS, WUfB, SCCM/MDT/Autopilot) rather than on-device use of MCT during large-scale rollouts. This incident reinforces the operational rule: avoid ad-hoc media creation for fleet imaging.
  • Run a small pilot ring (1–5%) before broad deployment. Validate drivers, AV/EDR, and enrollment in MDM. Confirm that the install image yields the expected winver/build number on first boot.
  • If build numbers matter to your baselines (for example, integration of a particular servicing stack or LCU), verify ISO contents and test updates post-install to ensure Windows Update remains healthy. Keep a documented rollback plan and recovery media for every step.

Technical analysis: plausible causes and what the logs suggest​

Public telemetry is limited; Microsoft has not published a detailed post‑mortem. Community evidence and Event Viewer traces, however, point to a likely early bootstrap failure in the MCT’s SetupHost process—some admins have reported ntdll.dll exceptions and SetupHost.exe terminations that would explain the observed silent exits. One plausible explanation is a regression introduced during an MCT update intended to include a fresher 24H2 baseline (build string 26100.6584), which may have added a host‑OS‑specific dependency or codepath that fails on Windows 10’s servicing/runtime environment but is satisfied on Windows 11 hosts. This is provisional analysis based on the public logs shared by technicians; Microsoft’s confirmation will be required for a definitive root cause.
Testing gaps likely contributed: producing and shipping an updated media tool with an insufficient host-OS test matrix (for example, focusing on Windows 11 hosts while reducing Windows 10 compatibility validation) would let this regression reach production, especially when the internal goal was to deliver fresher ISO baselines. That’s a classic operational testing blind spot with real-world consequences.

What Microsoft should have done differently (and what they can still do)​

  • Pre-release testing should explicitly include all supported host OS variants for a tool intended to run cross-host (Windows 10 and Windows 11). Tools used for migration and recovery are high-value and deserve conservative release practices.
  • Communicate an expected ETA for the fix and place a clearly visible advisory banner on the Windows 11 download page to prevent mass failed attempts and support tickets. Microsoft’s advisory existed but initially landed in Release Health rather than the primary download surface, creating discoverability friction.
  • Provide a signed, alternative MCT build (or a rollback) alongside a transparent change log so enterprise imaging teams can immediately revert to a known-good MCT binary while the investigation continues.

Long-term lessons for IT and power users​

  • Keep canonical, verified ISOs in an internal artifact repository. Maintain SHA‑256 checksums and a process for automated verification before media creation. This removes dependence on a single host-based tool.
  • Maintain at least one golden-build host of the target OS (Windows 11 in this case) that can create admission media reliably for troubleshooting and recovery.
  • For consumer guidance: prepare for lifecycle milestones ahead of time. Don’t leave upgrades, backups, or media creation to the last weekend before a support cutoff. The ecosystem will always have glitches around major change windows.

Quick checklist (for immediate action)​

  • If you need to upgrade today: prefer Windows Update → Windows 11 Installation Assistant → official ISO + Rufus, in that order.
  • If MCT fails: download the x64 ISO from Microsoft and create a USB using Rufus or Ventoy. Verify SHA‑256 if available.
  • If device is incompatible or migration must be deferred: enroll eligible devices in ESU or plan alternate OS migration (Linux, ChromeOS) and secure data backups.
  • If you manage fleets: use canonical ISOs and imaging servers (WSUS/WUfB/SCCM), pilot before broad rollout, and avoid on-the-fly MCT creation on mixed-host build stations.

Final assessment​

The Media Creation Tool regression is an avoidable, operational error with outsized visibility because of the Windows 10 end-of-support calendar. It is not a catastrophic security flaw—but it raises genuine, short-term exposure risks by increasing the chance that users will delay upgrades or mishandle unsupported workarounds. Microsoft’s immediate advisory and the straightforward ISO-based workarounds reduce the real danger, but the episode highlights one enduring truth for IT and power users: when the vendor’s convenience tools fail, well-practiced manual workflows (verified ISOs, Rufus/Ventoy, canonical image repositories) and conservative testing are the real safety net. The right posture going forward is practical: verify eligibility now, pick the safest upgrade path available for each device, and avoid last-minute dependence on a single point of failure.

Conclusion
The timing of the MCT regression turned a minor tooling bug into a major usability story because it collided with the Windows 10 end-of-support deadline. Microsoft has acknowledged the issue, documented reasonable workarounds, and promised a fix; meanwhile, users and administrators should switch to the ISO or Installation Assistant routes, verify images and checksums, and treat this as a reminder to build resilient upgrade and recovery procedures that do not rely on a single, fragile utility.

Source: XDA Microsoft breaks the Windows 10 to 11 upgrade tool mere days before the support deadline
 

Microsoft’s own Windows 11 Media Creation Tool has started failing for a key upgrade scenario just as millions of Windows 10 PCs face end-of-support, leaving an awkward gap between the company’s push to move users to Windows 11 and the practical tools people rely on to do so. The official Media Creation Tool (MCT) build tied to the September 2025 cumulative update (file-marked as version 26100.6584) can close without warning when launched on Windows 10 systems, and Microsoft has acknowledged the problem while promising a fix in a future update. The timing — with Windows 10 support ending imminently — makes the breakage more than a minor annoyance: it changes upgrade workflows for home users, IT admins, and anyone who planned to create Windows 11 installation media from a Windows 10 PC.

Windows 11 installation in progress on a monitor and laptop, with a calendar showing Windows 10 End of Support.Background and overview​

Windows 10 reaches its end of support in mid-October 2025, which means Microsoft will stop shipping routine security updates and non-security fixes for consumer and many business editions. That deadline has pushed a wave of last-minute upgrades and reinstallations as users attempt to move to Windows 11 or to secure longer-term update coverage through the Extended Security Updates (ESU) program.
The Media Creation Tool has long been Microsoft’s official, supported route for creating bootable Windows installation USBs or downloading fresh ISOs. It’s the tool most enthusiasts and technicians rely on for clean installs, recovery media and for producing upgrade media that will run setup.exe and preserve files, apps and settings. That utility is now misbehaving in at least one important scenario: when run on Windows 10 systems to produce Windows 11 media.
The immediate practical consequences are simple but meaningful: if your plan was to use Microsoft’s Media Creation Tool on a Windows 10 machine to build a Windows 11 installer, that path may not work. The problem has pushed many people to alternative, third-party utilities and to different upgrade approaches.

What exactly broke (and how Microsoft described it)​

The symptoms​

  • The updated Media Creation Tool that ships with build metadata tied to the September 2025 cumulative update (the binary labelled around 10.0.26100.1 / 26100.6584) will sometimes launch and then close immediately on Windows 10 without an error dialog.
  • Reports show the same tool otherwise still creates usable media when run on Windows 11 hosts; the failure appears bounded to running the new MCT binary on Windows 10 systems.
  • Additional reports indicate the issue affects ARM-powered Windows devices more acutely, where historically the tool did not create Arm64 install media but could be used on an Arm64 host to make x64 media — that scenario also appears to be failing.

Microsoft’s public acknowledgement​

Microsoft has added a note to the Windows 11 update/known-issues roll or release history stating that "the Windows 11 media creation tool version 26100.6584, released September 29, 2025, might not work as expected when used on Windows 10 devices. The media creation tool might close unexpectedly, displaying no error message." The company says it is investigating and working on a resolution that will ship in a future update to the tool.
This is an unusual situation in two ways: first, Microsoft’s official utility for building Windows 11 installers is itself unusable in a common upgrade scenario; second, the problem landed in the days when many users are trying to move away from Windows 10.

Why the timing makes this a real problem​

  • Windows 10 end-of-support deadline compresses upgrade activity. With security updates past the end-of-support date reserved for ESU subscribers or enterprise channels, many home users and IT teams are acting quickly. Tools that fail at the last minute create real resource and scheduling problems.
  • Clean install workflows are common at end-of-life. When people perform a final migration or clean installation, they typically prefer to build fresh media on a working Windows 10 machine. The MCT failure forces them to find another host or different tooling — not ideal in a pinch.
  • Enterprise imaging and recovery processes assume reliable Microsoft tooling. IT departments that scripted manufacturer-neutral provisioning, or relied on MCT within automated processes, must patch workflows or rely on sanctioned alternatives while Microsoft issues a fix.
  • ARM device caveat. Historically MCT did not produce Arm64 images for Arm64 target devices, but people could use an Arm64 host to produce x64 USB installers. With reports the tool no longer works from Arm64 hosts, technicians using small-form factor Arm laptops or tablets as “creation workstations” are impacted.

What’s causing it (and what we don’t yet know)​

There are legitimate reasons why a tool could behave this way: certificate changes, runtime compatibility differences between Windows 10 and the updated MCT binary, API usage relying on runtime components that differ between OS versions, or deliberate behavioral changes intended to tighten installation or OOBE flows.
At this stage the root cause hasn’t been officially itemized beyond Microsoft’s acknowledgement that the tool “might not work as expected on Windows 10 devices” in the specific MCT build. Any deeper diagnosis is speculative until Microsoft publishes a technical post-mortem or the MCT update that fixes the issue.
Caveat: suggestions online that this was an intentional “block” of Windows 10 to Windows 11 media creation or part of a broader push toward Microsoft Account/online-only setup are plausible interpretations but are not officially confirmed by Microsoft. Treat such theories as opinion unless Microsoft releases explicit rationale.

The practical options: workarounds and safe upgrade paths​

If the Media Creation Tool fails on your Windows 10 machine, you still have several legitimate and supported options to create installers or to upgrade. Each option has pros and cons; pick the one that fits your skill level, time available, and appetite for risk.

1) Download the Windows 11 ISO directly from Microsoft and use a third-party USB tool​

This is the most straightforward alternative:
  • Visit Microsoft’s Windows 11 download page (it offers ISO downloads in multiple languages and architectures).
  • Download the official ISO for the desired edition (x64 or Arm64 as available).
  • Use a reliable USB authoring tool to create bootable media:
  • Rufus — popular, actively maintained, and offers advanced options (including an “Extended Windows 11 Installation” mode that can relax certain hardware checks when you need them). Rufus also supports making install media with UEFI/GPT, and it can write ISOs to USB quickly and reliably.
  • Ventoy — useful when you want a multi-ISO USB drive that can boot many different installers without reformatting.
  • Boot from the USB and proceed with a clean install or run setup.exe from within Windows to perform an in-place upgrade.
Why this helps: you still use Microsoft’s official ISO image; only the USB creation portion uses alternative tooling. This preserves integrity of the install media while avoiding the broken MCT binary.
Caveats:
  • If you use Rufus’ bypass features to install on unsupported hardware, you accept the risk that Microsoft may not support your device or deliver updates normally in the future.
  • Always verify your ISO download and ensure it comes from Microsoft to avoid tampered builds.

2) Use the Windows 11 Installation Assistant (in-place upgrade from Windows Update)​

Microsoft’s Windows 11 Installation Assistant performs an in-place upgrade while preserving files, apps and settings. It will refuse to upgrade machines that fail core requirements, but where it works it is a simple path:
  • Download the Installation Assistant from Microsoft’s Windows 11 download page.
  • Run it on the Windows 10 device and follow prompts; it will verify compatibility and then download and install the upgrade.
Why this helps: it avoids creating bootable media entirely, works from within Windows, and keeps your setup intact.
Caveats:
  • If your device is blocked by compatibility checks, the Assistant will refuse to proceed.
  • The Assistant still depends on a stable internet connection; large downloads can take time on slower links.

3) Prepare a clean install from another machine​

If MCT fails on the machine you planned to use, use a different host (preferably a working Windows 11 or fully updated Windows 10 PC) to run MCT or create the USB, or use the direct-ISO + Rufus approach described above. IT shops often keep a dedicated “creation workstation” for this reason.

4) For advanced users: mount ISO and run setup.exe inside Windows 10​

You can mount the official ISO and run setup.exe from within your running Windows 10 environment to perform an upgrade that preserves apps and data. This effectively avoids the need to create bootable USBs entirely if you can download the ISO locally.
Caveats:
  • This is still an in-place upgrade; back up critical data first.
  • Compatibility checks may still block the setup if hardware is considered unsupported.

Safety checklist before you upgrade (recommended for home users and admins)​

  • Backup your data: full disk image or at minimum Documents, Pictures, and critical application data.
  • Create a recovery plan: ensure you have restore media and a verified image or System Image so you can roll back if needed.
  • Confirm minimum hardware requirements: TPM 2.0 enabled, Secure Boot available and enabled, CPU on the supported list or acceptable bypass plan.
  • Verify activation and licenses: make sure Windows 10 activation is healthy; upgrades generally retain activation but verifying is prudent.
  • Update drivers and firmware: BIOS/UEFI and drivers at the latest vendor-supplied versions reduces upgrade failures.
  • If you rely on corporate tools, consult your IT team before upgrading: enterprise images, BitLocker keys, VPNs and management agents can interfere with upgrades.

The larger context: Microsoft’s installation policy and the “account push”​

Windows 11’s setup experience has evolved to emphasize cloud integration, security features and tethering users to online services. In recent Insider and public releases, Microsoft tightened the requirement for a Microsoft Account and internet connectivity during the out-of-box experience (OOBE) for Home and, increasingly, Pro editions. Microsoft has closed several well-known local-account bypasses over the last year and continues to adjust the OOBE to favor online account creation.
There’s an understandable tension here: Microsoft argues that requiring an online account improves security, allows easier device recovery, and unlocks cloud features; critics see reduced choice and privacy trade-offs for users who prefer local accounts or offline setups. The broken Media Creation Tool does not prove intent behind those decisions, but the timing compounds frustration for users who find official tooling failing as Microsoft tightens setup controls.
Important note: claims that Microsoft intentionally sabotaged MCT to block Windows 10 users are not substantiated by public evidence. The company’s published advisory describes a compatibility failure, and Microsoft is working on a fix.

Enterprise and IT implications​

  • Imaging pipelines: Organizations that rely on MCT as part of a scripted or manual imaging process must adjust. The simplest mitigation is to deploy ISO-based imaging or revert to an unaffected MCT binary on a Windows 11 host.
  • Security and updates: Enterprises should assess ESU or staggered migrations for machines that can’t upgrade immediately. Plan remediation windows for machines stuck on problematic cumulative updates.
  • ARM scenarios: Admins who use Arm-based devices as imaging consoles must validate whether their workflows still run. If the MCT failure affects ARM hosts, use a different x64-based builder or use enterprise deployment tools like Microsoft Endpoint Configuration Manager, which can import official ISOs directly.
  • Communication: IT teams should proactively communicate alternative upgrade methods to users and supply verified install media where possible.

Long-term considerations and lessons​

  • Relying on a single-vendor “one tool” approach for critical transitional tasks introduces a single point of failure. Maintain multiple verified methods to build install media (official ISO + Rufus/Ventoy, network deployment via WDS/MDT/SCCM).
  • Keep a recovery standard: a tested USB recovery drive and documented rollback steps are essential during major OS transitions.
  • Expect rough edges around major lifecycle events. Big updates and support cutoffs always produce last-minute problems; plan for staged rollouts rather than last-minute mass upgrades.

Recommended step-by-step plan if you’re upgrading now​

  • Pause and back up. Create a full disk image (or at minimum back up user data) before touching the upgrade.
  • Check compatibility. Confirm TPM 2.0 and Secure Boot and that your CPU is on the supported list or decide to accept an unsupported installation with caveats.
  • Choose your upgrade route:
  • If the Windows 11 Installation Assistant works on your machine, use it.
  • If the MCT fails on your Windows 10 host, download the official ISO and write it with Rufus or Ventoy on a different machine or the same machine if you prefer.
  • If you prefer a clean install from a USB, create the USB from the ISO and boot from it to perform a clean install.
  • During installation:
  • Opt to keep files and apps if you want an in-place upgrade; otherwise choose clean-install.
  • Watch for driver warnings and let the installer complete its reboot cycles.
  • After upgrade:
  • Verify device drivers and Windows Update status.
  • Re-enable BitLocker if disabled for installation and ensure recovery keys are stored safely.
  • Confirm activation and sign-in behavior; if you want a local account, research current bypass options or plan to convert a Microsoft Account to a local account post-setup (bearing in mind Microsoft’s evolving OOBE).

Final analysis: strengths, risks and what to watch next​

Strengths
  • Microsoft’s rapid response and public acknowledgement of the MCT issue shows the company is tracking the problem and intends to ship a correction. That’s the right sequence: acknowledgement, investigation, remediation.
  • Official ISOs remain available from Microsoft servers, and robust third-party tooling (Rufus, Ventoy, etc.) provides reliable alternatives for USB creation and advanced installation scenarios.
  • For most users, the Windows 11 Installation Assistant still provides an easy in-place upgrade experience that retains settings and apps.
Risks
  • Timing. The breakage landed when many users are rushing to upgrade; that creates elevated risk of mistakes, data loss or rushed installs without backups.
  • Unsupported installs. Workarounds that bypass TPM and secure-boot requirements put systems into configurations that Microsoft may not support fully, and could degrade update reliability or security posture.
  • Further OOBE tightening. Microsoft’s push toward Microsoft Account sign-in and online setup increases friction for privacy-conscious users and administrators who preferred local account workflows.
What to watch
  • Watch for the updated Media Creation Tool release from Microsoft and the changelog describing the fix.
  • Monitor Microsoft’s update history and known-issues pages for any follow-up bulletins about the affected cumulative update and for guidance on recovery if the MCT-created media caused problems.
  • Keep an eye on community testing and IT forums for reports of residual issues, particularly around the September cumulative update build number tied to this Media Creation Tool release.

Microsoft’s Media Creation Tool failing to run on the very systems that need a supported, simple upgrade path is an inconvenient irony. The immediate reality is pragmatic: the official ISO and alternative USB builders already provide reliable, supported routes forward for most users. But the breakage is a reminder that during OS transitions — especially at end-of-support inflection points — organizations and individuals must rely on tested, redundant workflows, verified backups, and cautious rollout schedules rather than last-minute pushes. The tool will likely be fixed in due course; until then, use the official ISO + Rufus/Ventoy approach or the Windows 11 Installation Assistant and treat any bypasses and hardware compatibility hacks as options of last resort.

Source: Neowin Microsoft ironically blocks Windows 10 to 11 ISO upgrade as it breaks Media Creation Tool
 

Microsoft’s timing could not have been worse: an updated Windows 11 Media Creation Tool (MCT) release that should make it easier to build fresh Windows 11 install media instead closes without error on Windows 10 machines — and that regression arrived just days before Windows 10’s official end-of-support deadline on October 14, 2025.

Windows 11 Media Creation Tool displayed on a monitor with the Windows 11 ISO and Oct 14, 2025.Background​

Microsoft has been actively encouraging Windows 10 users to move to Windows 11 for months, highlighting security, performance, gaming, and management improvements. With Windows 10 scheduled to leave mainstream support on October 14, 2025, many users and IT teams have been rushing to create bootable media for clean installs or to prepare upgrade paths. Microsoft’s official Media Creation Tool is a familiar, trusted utility for producing USB installers or ISOs for Windows 11 installs; many people expect it to "just work" on Windows 10 hosts when preparing new media.
Instead, users discovered a regression in the Windows 11 Media Creation Tool identified as version 26100.6584 (distributed around late September 2025). When run on some Windows 10 22H2 systems the tool launches, shows the Windows splash, and then exits silently — no error dialog, no diagnostic guidance. Microsoft has publicly acknowledged the behavior and marked it as a known issue while promising a future fix.

What happened (concise timeline)​

  • Late September 2025: Microsoft ships updated MCT identified in community reports as build 26100.6584.
  • Early October 2025: Users running the new MCT from Windows 10 (22H2) report the tool closes immediately after the initial splash; the symptom reproduces across multiple community reports.
  • October 10–11, 2025: Microsoft posts advisory text confirming the MCT “might not work as expected when used on Windows 10 devices” and that the tool “might close unexpectedly, displaying no error message.” The company recommends downloading the ISO directly from the Windows 11 download page as a workaround while it develops a resolution.
This is a classical regression: a tool intended to ease migration instead becomes an obstacle at the worst possible moment — immediately before Windows 10’s end of support.

Who is affected​

  • Primary impact: Windows 10 clients running version 22H2 attempting to run the latest Media Creation Tool locally. Microsoft specifically referenced Windows 10 22H2 in its advisory.
  • Secondary impact: Users on Arm64 Windows devices were already facing limitations with MCT (Microsoft documents separate Arm64 support caveats), and that complexity adds to the friction.
  • Enterprises and managed customers: Not directly blocked — they have alternative channels (WSUS, Windows Update for Business, enterprise images, and ISO distribution via official channels) — but small shops and home users who rely on the consumer MCT are the most exposed.

Technical symptom and current understanding​

  • Symptom: After launching MCT on an affected Windows 10 host, the tool shows user account control (UAC) and the Windows splash screen, then exits silently with no error code or message. Event log entries supplied by community members show crashes referencing SetupHost.exe and ntdll.dll in some cases, indicating the failure happens early in the launch sequence.
  • Microsoft’s description: The vendor’s advisory uses the wording “might not work as expected … might close unexpectedly, displaying no error message,” indicating Microsoft has reproduced the condition and classified it as a known issue that will be fixed in a future MCT update.
  • What is not public: Microsoft has not published a root-cause post-mortem or a definitive explanation for why the MCT build interacts poorly with Windows 10 hosts. Until Microsoft publishes a technical breakdown, any explanation of precise causes (DLL version mismatches, signing/certificate path issues, compatibility shims, or build artifacts) remains speculation. That reality should be flagged to readers: the exact technical root cause is not publicly verifiable yet.

Why this matters now: the Windows 10 EOL context​

Windows 10 reaches end of support on October 14, 2025. That makes October 2025 a high‑volume, high‑stress window for upgrades. Millions of consumers, small businesses, and administrators are simultaneously:
  • Taking backups,
  • Preparing install media for in-place upgrades or clean installs,
  • Considering hardware refreshes,
  • Evaluating Extended Security Updates (ESU) for temporary coverage.
A broken MCT complicates a high‑priority migration workflow. Microsoft itself lists upgrade to Windows 11 or enrolling in Windows 10 ESU among primary user options as the deadline approaches. The timing of the regression amplifies disruption because many non‑enterprise users rely on the simplicity of a single executable to create bootable media.

Immediate workarounds and alternatives​

Microsoft’s official short-term guidance is simple: download the Windows 11 Disk Image (ISO) directly from microsoft.com and create bootable media manually until the MCT update is released. That is sound advice but requires more steps and, for some users, a third‑party tool.
Practical options that are being used in the wild:
  • Download the Windows 11 ISO from the Microsoft download page and use a utility such as Rufus to create a bootable USB. Rufus also provides options to bypass TPM and Secure Boot checks and to remove forced Microsoft Account requirements during OOBE, which makes it popular for installing Windows 11 on older hardware or for users who want local accounts. Use of Rufus is a legitimate, widely used workaround but it carries trade‑offs.
  • Use the Windows 11 Installation Assistant on an eligible device for an in-place upgrade (if Windows Update offers it). This avoids MCT entirely but only helps devices that meet Microsoft’s hardware requirements.
  • Have a friend or colleague with a Windows 11 PC run the MCT and create the USB for you; MCT reportedly runs on Windows 11 hosts even where it fails on Windows 10. Community reports indicate this practical, if clumsy, workaround has helped some users.
  • Enterprise channels (WSUS, WUfB, provisioning packages, and official enterprise ISOs) remain unaffected by the consumer MCT regression and are the recommended path for managed fleets.

Step-by-step: build bootable media from an ISO (quick how-to)​

  • Download the Windows 11 ISO from Microsoft’s Download Windows 11 page (choose the “Windows 11 Disk Image (ISO) for x64 devices” option).
  • Use a tool such as Rufus (Windows) to write the ISO to a USB stick:
  • Open Rufus, select the ISO, choose the USB drive, and pick the image options you need (MBR/GPT, UEFI/BIOS, and — if you are using Rufus specifically to bypass hardware checks — select the “Extended Windows 11 Installation” / bypass options).
  • Boot the target PC from the USB device and proceed with the installer. If performing an upgrade instead of a clean install, mount the ISO in Windows and run setup.exe from the mounted image instead of using USB.
  • If you must bypass TPM/Secure Boot checks or avoid the Microsoft Account requirement, document that these are unsupported/unsupported states by Microsoft and understand the security and update implications.

The trade-offs: security, updates, and support​

Using third‑party workarounds like Rufus or registry edits that allow installation on unsupported hardware works, but they carry real and non‑trivial costs:
  • Security guarantees can be weakened. Bypassing TPM or Secure Boot removes platform protections Microsoft expects Windows 11 to leverage for disk encryption and credential protection. That increases exposure to firmware and boot‑level attacks.
  • Update and driver support may be inconsistent. Systems installed outside of Microsoft’s supported upgrade model may still function, but device drivers and Windows Update behavior can be unpredictable. Microsoft may refuse support for issues on devices flagged as unsupported.
  • Enterprise compliance and management: For business customers with compliance obligations, bypassing hardware checks is rarely acceptable; managed deployment channels should be used instead.
  • Privacy and account model considerations: The move toward requiring Microsoft Accounts and online setup during OOBE is deliberate, and bypassing those steps may have implications for features that require account linkage (backup, OneDrive, device management, Copilot experiences, etc.). Microsoft is actively making offline and local-account workarounds more difficult.

Microsoft’s response and communications​

Microsoft authors acknowledged the MCT regression in official channels, described the symptom in near‑verbatim language, and provided immediate guidance (download the ISO instead). The company said it is working on a resolution and will release an update to the Media Creation Tool in a future release. No firm ETA was given at the time of Microsoft’s advisory.
This is a fairly standard vendor response pattern: confirm a known issue, publish a workaround, and promise a fix. That said, the lack of a technical post‑mortem and the timing — pushing a consumer tool update during a high‑pressure migration window — will raise questions among IT teams and privacy-conscious users.

Critical analysis — strengths, failures, and broader implications​

Notable strengths​

  • Microsoft was transparent: the vendor quickly acknowledged the symptom in its release-health/known issues documentation and provided a proactive workaround (direct ISO downloads). The public admission limits confusion and reduces wasted troubleshooting time for users.
  • Multiple alternate upgrade paths remain available: Windows Update, the Installation Assistant, direct ISOs, and enterprise channels provide routes to complete upgrades even while MCT is fixed. That mitigates the worst‑case damage for many users and IT orgs.

Notable weaknesses and risks​

  • Timing and testing lapse: Shipping an MCT update that regresses on the previous OS during the last weeks before Windows 10 EOL suggests gaps in pre‑release testing across host OS permutations. The incident raises questions about how thoroughly Microsoft validated consumer tools on older supported hosts prior to release.
  • User friction at scale: Many consumers rely on a single-file tool with a familiar UX. Breaking that tool during a mass-migration period causes disproportionate frustration and increases the chance users will pick risky or unsupported workarounds. The reputational cost of "it used to work" can be significant.
  • Policy and product direction tension: Microsoft’s move to encourage Microsoft Account use, TPM, and cloud-linked experiences is strategic. However, the company’s design choices (e.g., restricting offline setup, tightening bypasses) mean that when official tools fail, third-party alternatives become a lifeline — but with security trade-offs. The tension between security-first policies and the need for resilient tooling for migration is now visible and politically sensitive.

What this episode signals​

This regression exposes how brittle user-facing upgrade flows can be during large OS transitions. It also shows a broader organizational trade-off at Microsoft: moving the product forward (stricter security, cloud-first defaults) while managing a huge installed base running legacy systems. When a regression hits during a migration deadline, the impact is amplified.

Practical recommendations for users and admins​

  • If you have a Windows 11 machine available, run the Media Creation Tool there and create USB media for other devices. Community reports indicate the tool runs on Windows 11 where it may fail on Windows 10 hosts.
  • Otherwise, download the official Windows 11 ISO from Microsoft’s site and use Rufus or the built‑in ISO mounting + setup.exe method for in-place upgrades. Follow these safe practices:
  • Verify the ISO checksum if possible.
  • Use the latest Rufus release (or other trusted imaging software).
  • Back up full system images and validate recovery media before performing a migration.
  • For critical systems, prefer enterprise deployment methods (WDS/MDT/Intune/WSUS) rather than consumer tooling.
  • If you must install on unsupported hardware and choose to use Rufus bypasses, document the machine’s unsupported status and consider isolating it on a separate network segment until you are certain of update behavior and driver compatibility. Be aware of the security limitations of bypassing TPM/Secure Boot.
  • For organizations with compliance and update requirements, purchase ESU coverage or accelerate hardware refresh plans rather than relying on unsupported installs. Microsoft’s ESU program extends security updates for eligible Windows 10 devices for one additional year.

What remains uncertain​

  • Microsoft has not published the root cause analysis for why MCT build 26100.6584 fails on Windows 10 hosts. Community crash logs suggest a startup-time exception involving SetupHost.exe/ntdll.dll, but a definitive vendor explanation is absent. That lack of detailed transparency leaves room for speculation about whether the regression stems from changed dependencies, a certificate/manifest issue, or an aggresssive compatibility switch in the MCT binary. Until Microsoft provides a technical write-up, the exact cause is unverifiable.
  • Microsoft’s timeline for a fix is unspecified. The company stated a resolution will be released in a future update to the Media Creation Tool but did not publish an ETA — a problematic gap when the OS end-of-support window is actively closing.

Final assessment​

The Media Creation Tool regression is a clear and avoidable usability failure at a high-stakes moment. Microsoft did the minimum right things — it acknowledged the problem, provided a workaround, and promised a fix — but the incident highlights process and communication gaps that can have real user impact. For consumers and small IT teams, the practical path forward is to download the ISO directly and use a reputable imaging tool like Rufus, while understanding and accepting the trade-offs that come with bypassing hardware checks.
For enterprise customers, managed deployment remains the safe option, and organizations should accelerate migration or ESU enrollment rather than rely on consumer tooling during this fragile transition window. Microsoft must now close the loop with a timely update, a technical post-mortem explaining the regression, and improved validation of migration tooling — especially when those tools are critical to mass upgrades during an end-of-support deadline.
The immediate takeaways are simple and practical: verify your backup, use the ISO route if MCT fails, and treat bypasses as a last resort rather than a long‑term plan. The migration deadline will pass, but trust in upgrade tooling is harder to rebuild than a single installer.

Source: Neowin Microsoft ironically blocks Windows 10 to 11 ISO upgrade as it breaks Media Creation Tool
 

Microsoft’s official upgrade channel for moving PCs from Windows 10 to Windows 11 broke at the worst possible moment: users and technicians report that the updated Windows 11 Media Creation Tool (MCT) now frequently refuses to run on Windows 10 hosts, closing immediately with no error message. The regression affects a core, Microsoft‑recommended upgrade path just days before Windows 10 support ends on October 14, 2025, creating acute operational risk for home users, small IT teams, refurbishers and any organization relying on convenient, on‑device media creation. Multiple community reproductions and independent reporting show the tool’s binary (reported as version 10.0.26100.6584) can start, present the Windows splash, then exit silently; Microsoft has acknowledged the behavior and recommended ISO fallbacks while it works on a fix.

A man with a headset points to a Windows Media Creation Tool error: “Failed to start.”Background / Overview​

Windows 10’s end‑of‑support deadline—October 14, 2025—is non‑negotiable in Microsoft’s published lifecycle, and the calendar has pushed a significant number of remaining Windows 10 users into a last‑minute migration window. For many, the practical routes to Windows 11 are:
  • Windows Update (staged offer for eligible devices),
  • Windows 11 Installation Assistant (guided, in‑place upgrade), and
  • Media Creation Tool (MCT) or direct ISO (flexible for clean installs and multi‑PC deployments).
The Media Creation Tool is the go‑to convenience path for producing bootable USB installers and up‑to‑date ISOs; technicians and home users often prefer it because it abstracts complexity and automates build selection. When that tool fails on the older OS that most migrating PCs still run, it creates logistical friction and raises the chance of delayed or risky migrations.
Microsoft updated the MCT around late September 2025 with a build identified in community testing as 26100.6584. That updated binary reportedly delivers fresher Windows 11 24H2/25H2 images (reducing post‑install patching), but the same update appears to have introduced the host‑OS regression that prevents the utility from launching on many Windows 10 22H2 machines. Microsoft’s public guidance currently points affected users to download the ISO directly or use alternative upgrade paths while a fix is prepared.

What’s failing: symptoms and evidence​

The observable behavior​

  • The user double‑clicks the MediaCreationTool.exe on a Windows 10 host.
  • UAC prompts, the Windows logo or splash appears briefly.
  • The tool exits immediately with no visible error dialog and no media is produced.
  • Event Viewer traces in some reports show SetupHost.exe crashing and ntdll.dll exceptions (0xc0000409 or similar), indicating an early initialization fault.

Where it runs and where it doesn’t​

  • Community testing shows the same MCT binary often runs normally on Windows 11 machines, which has become a practical (if awkward) workaround: create media from a Windows 11 host and use it on the Windows 10 target. But when a Windows 11 host isn’t available, the failure is blocking.

How broadly it’s observed​

  • Reports are widespread across community forums (Reddit threads, Windows help communities) and independent outlets (WindowsLatest, international tech sites), and Microsoft has listed the problem as a known issue in its release‑health messaging. The volume of reports and vendor acknowledgement indicate this is more than an isolated edge case.

Why this matters right now​

The timing converts what would normally be an inconvenient bug into a consequential operational failure:
  • The Windows 10 EOL date (October 14, 2025) compresses migration timelines; many households and small businesses were planning clean installs or fresh upgrades immediately before the deadline. Delays raise post‑EOL exposure.
  • The MCT is the most accessible, Microsoft‑branded method for making bootable installation media; its failure forces users into more manual workarounds that can increase risk (data loss on clean installs, improper bypasses of security checks).
  • Support teams are likely to see a spike in tickets and triage burden as frustrated users attempt repeated upgrades or use unsupported hacks.

What Microsoft has said (and what it hasn’t)​

  • Microsoft has acknowledged a known issue with the Windows 11 Media Creation Tool version 26100.6584, noting that the tool “might close unexpectedly” when used on certain Windows 10 devices and that a future update will resolve the condition. The official guidance recommends downloading the Windows 11 Disk Image (ISO) and creating installation media manually, or using the Windows 11 Installation Assistant or Windows Update if offered.
  • Missing from public messaging: no firm ETA for a fix, no detailed technical root‑cause, and no rollback path announced. Microsoft’s advisory is functional but sparse; the absence of a post‑mortem leaves room for multiple plausible technical theories (see next section). Treat any public or community speculation about motives or intentional gating as unverified.

Plausible technical causes (analysis and caveats)​

The exact root cause hasn’t been published, so the following are informed hypotheses based on community logs, crash signatures, and how the MCT changed in late September:
  • Regression in host detection or compatibility logic. MCT may have been updated and primarily tested on Windows 11 hosts; a conditional or API usage incompatible with Windows 10 22H2 could trigger an early exit. Crash traces mentioning ntdll implicate low‑level initialization failure rather than download logic. This is plausible but not proven.
  • Driver/firmware validation tightening. If MCT added stricter checks for firmware, TPM or driver features (or refactored code that calls lower‑level firmware APIs), previously tolerated configurations might be rejected or cause unhandled exceptions. This explains why some ARM64 or unconventional hosts show more problems. This remains speculative until Microsoft publishes telemetry.
  • Packaging/signing or certificate path regression. An updated certificate/time stamp mismatch could cause early termination on older host OS environments, though most reports indicate the same binary runs on Windows 11, making pure signing errors less likely.
  • Server‑side or payload mismatch. If the tool expects a particular download endpoint or payload metadata and encounters unexpected responses, it could abort; however, the immediate crash behavior favors a local initialization fault over a remote content mismatch.
Important caution: none of these causes are confirmed by Microsoft; they are plausible engineering explanations drawn from crash symptoms and community forensic work. Treat them as technical inferences rather than facts.

Immediate practical workarounds (ranked by safety)​

When the MCT fails, here are safe and pragmatic alternatives—ranked from least to most manual/risky:
  • Use Windows Update if Microsoft offers the “Upgrade to Windows 11” feature on your device. This is the safest, least manual method and preserves apps and settings.
  • Run the Windows 11 Installation Assistant (official Microsoft tool for in‑place upgrades). It performs compatibility checks and downloads the update; it is suitable for single‑PC upgrades when Windows Update hasn’t offered the upgrade.
  • Download the Windows 11 ISO (official Windows 11 Disk Image for x64 devices) and mount it in Windows 10, then run setup.exe to perform an in‑place upgrade (choose “Keep personal files and apps”). This bypasses the MCT entirely while remaining on a supported upgrade path.
  • Create bootable USB media using the official ISO and a third‑party tool such as Rufus or Ventoy. Rufus is widely used and offers options that make the manual process easier, but some Rufus options explicitly bypass hardware checks—do not use those bypass options unless you understand the long‑term update and security implications.
  • If you can access a Windows 11 host, run MCT there to create a USB installer for use on the target Windows 10 machine; the MCT reportedly runs more reliably on Windows 11 hosts.
  • Avoid unsupported hacks at scale. Community registry edits or installer patches that disable TPM/Secure Boot checks will get you onto Windows 11, but they can invalidate update entitlement, reduce hardware‑backed security, and complicate future servicing. For fleets or compliance‑sensitive machines, these methods are unacceptable.

Step‑by‑step: Safe ISO in‑place upgrade (recommended for technicians)​

  • Back up everything—create a full system image or at minimum copy user data to an external drive or cloud. A reliable backup eliminates the biggest migration risk.
  • From a working browser on the Windows 10 PC, visit Microsoft’s official Download Windows 11 page and select Download Windows 11 Disk Image (ISO) for x64 devices. Save the ISO locally.
  • Verify the ISO checksum if Microsoft publishes SHA‑256 sums (recommended for security‑conscious environments). If no checksum is published, download from a trusted network and keep the ISO on trusted storage.
  • Right‑click the ISO and choose Mount (Windows 10 supports mounting .iso files), then open the mounted virtual drive and double‑click setup.exe.
  • Choose Keep personal files and apps to perform an in‑place upgrade; follow prompts and allow multiple reboots. Expect the process to take 30–90 minutes depending on hardware and network speed.
  • After upgrade, confirm activation and check Windows Update to ensure the system receives the latest cumulative patches. If Windows Update places any safeguard hold for a specific driver, follow vendor guidance to resolve it.

Risks and downstream consequences​

  • Delayed migrations: Organizations with tight timelines may be forced to defer upgrades, operate unsupported endpoints, or buy into Extended Security Updates (ESU) at cost.
  • Trust erosion: When a vendor’s own deployment utilities fail at scale, confidence in testing and release management declines—especially when failures occur during critical lifecycle milestones.
  • Support and warranty complexity: Using workarounds that bypass compatibility checks can create long‑term maintenance headaches. Vendors and third‑party software may refuse support for issues on systems installed outside standard upgrade paths.
  • Security exposure: If organizations delay upgrades and do not enroll in ESU, exposed endpoints will gradually accumulate known vulnerabilities that no longer receive vendor patches. That increases risk of compromise and elevates incident response costs.

Enterprise guidance and mitigation​

  • For managed fleets, prefer official ISO distribution, WSUS, Windows Update for Business or image‑based deployments rather than ad‑hoc MCT runs. Those channels are unaffected by the MCT host‑OS regression and offer predictable, testable rollout controls.
  • Prioritize pilot rings for any remaining Windows 10→11 migrations. Validate driver and firmware interactions on a small set of representative models before broad rollout. Document and remediate any driver holds that Windows Update may apply.
  • If relying on third‑party utilities (Rufus, Ventoy) for large‑scale media creation, maintain an internal validation step: verify that created media applies updates cleanly, and that in‑place upgrades preserve application compatibility and activation state.

Governance, QA and what this incident suggests about release practices​

Broken tooling at a critical lifecycle moment raises broader questions about software supply‑chain practices and test coverage:
  • Was the updated MCT primarily validated on Windows 11 hosts rather than Windows 10, producing a host‑specific regression? Community crash traces strongly support that hypothesis, and the pattern of the tool running on Windows 11 but not on Windows 10 fuels it. That would be a test‑coverage gap with high downstream cost.
  • The absence of an immediate rollback or ETA for a fix suggests the issue is non‑trivial; vendors should couple public advisories with clear remediation timelines to reduce operational uncertainty. Microsoft’s response so far documents the problem and recommends workarounds but lacks a hard timeline.
  • For organizations, this is a reminder to avoid single‑point conveniences for critical transitions—maintain canonical ISOs and validated golden images rather than relying exclusively on one‑click utilities.

Conclusion: pragmatic stance for the next 48–72 hours​

The broken Media Creation Tool is a high‑friction, high‑visibility regression that landed at a consequential time. The immediate reality is simple: if the MCT fails on your Windows 10 host, use the official ISO or the Windows 11 Installation Assistant, or run the MCT on a Windows 11 machine if one is available. Back up first; prefer supported upgrade paths; avoid registry or installer hacks unless you accept the ongoing maintenance risk. Microsoft has acknowledged the problem and promised a fix, but no fixed ETA means administrators and users should assume they may need to rely on ISO‑based workflows for the short term.
This episode is also a practical lesson in resilience: keep canonical install media on hand, validate migration steps in small pilots, and don’t let a single tool become the only way to execute a widely used lifecycle job. The clock to Windows 10 end of support is firm—plan accordingly, protect data with backups, and use the proven, documented methods until the vendor completes a formal correction.

Source: TechJuice Microsoft’s Windows 10 to 11 Upgrade Tool Reportedly Broken, Frustrating Users
 

Microsoft’s official Windows 11 Media Creation Tool has a regression that closes silently on Windows 10 hosts, disrupting one of the most common upgrade and clean‑install workflows just days before Windows 10 reaches its end‑of‑support deadline—Microsoft has acknowledged the problem and pointed users to manual ISO downloads and the Windows 11 Installation Assistant as immediate workarounds while an updated tool is prepared.

Error dialog shows Windows 10 installation has failed during a Windows 11 setup.Background​

Windows 10’s support window closes on October 14, 2025, a hard cutoff after which routine security updates and non‑security fixes are no longer distributed to consumer editions unless an organization or individual purchases Extended Security Updates (ESU). That deadline has driven large numbers of home users and small IT teams to prepare upgrade media, perform in‑place upgrades, or build recovery USB sticks ahead of the cutoff.
The Windows 11 Media Creation Tool (MCT) is Microsoft’s long‑standing, recommended utility for producing official ISOs and bootable USB installers. The tool is widely used because it automates download, ISO creation, and USB formatting in a single, supported flow. In late September 2025 Microsoft shipped an updated MCT binary tied to the September cumulative update (commonly identified as build 26100.6584). Reports and Microsoft’s own release‑health note show that when that binary is executed on many Windows 10 systems the tool launches, briefly shows the Windows splash, and then exits with no error dialog—leaving users with no usable ISO or bootable media from that host.

What exactly broke​

Symptoms and scope​

  • The failing MCT behaves the same way in reproductions: run the executable on Windows 10 (most reports reference 22H2), accept UAC, see a brief splash, and then the process terminates without presenting an error message or finishing the media creation task.
  • Event Viewer traces shared by administrators often show SetupHost.exe crashing with exceptions tied to ntdll.dll, indicating an early initialization fault. This suggests the tool aborts during very early bootstrap steps.
  • The same MCT binary appears to run more reliably on Windows 11 hosts in community tests, which has made a Windows 11 machine a practical (if inconvenient) workaround for creating installers.

Confirmed product build and timing​

Microsoft’s advisory specifically referenced the MCT binary associated with the September cumulative update (build metadata around 26100.6584, distributed in late September 2025). Microsoft has acknowledged the behavior as a known issue and said a fix will ship in a future update to the tool. Because the regression landed just before the Windows 10 end‑of‑support deadline, the practical impact is higher than it might otherwise be.

Why this matters now​

The timing elevates this from an annoyance to a logistical problem for many users:
  • Last‑minute migration rushes are typical before an OS reaches end of support. People plan clean installs, fresh backups, and recovery media; the MCT is the simplest supported method to create those assets on the computers they already own. The tool’s failure on Windows 10 removes that path for many users at the exact moment they most need it.
  • Home users and small teams who don’t keep canonical ISOs on hand rely on the MCT as a “single‑click” solution. Without it, either the upgrade is delayed or users turn to third‑party tooling and manual steps that increase complexity and risk.

Verified technical details and compatibility checklist​

Below are the key, verifiable technical points to use when you plan an upgrade now:
  • Windows 10 end of support date: October 14, 2025 (routine consumer updates stop after this date).
  • Affected MCT binary: referenced in community and Microsoft notes as version around 26100.6584 (distributed in late September 2025). Microsoft labeled this a known issue and is investigating.
  • Symptom: MCT closes unexpectedly on Windows 10 hosts with no error dialog; Event Viewer logs frequently show SetupHost.exe crashes.
  • Workaround options (official): Download the Windows 11 ISO directly and create media manually, or use the Windows 11 Installation Assistant for in‑place upgrades. Microsoft’s guidance points to these alternatives while the MCT regression is fixed.
  • Minimum Windows 11 requirements to check with PC Health Check (commonly recommended by Microsoft): a 64‑bit dual‑core processor, TPM 2.0, UEFI with Secure Boot, at least 4 GB RAM, and 64 GB of storage. Use the PC Health Check tool to validate your device before upgrading.
If any of the above numbers or version strings are critical to your process, treat the exact MCT build string and distribution date as documented by Microsoft’s advisory and independent reports, and expect Microsoft to publish a formal changelog when they ship the corrective update.

Practical workarounds (step‑by‑step)​

If you planned to use the MCT on a Windows 10 machine, these are reliable alternatives that will let you proceed immediately.

Option A — Manual ISO download and USB creation (recommended for clean installs)​

  • Visit Microsoft’s official Windows 11 download page and locate the Windows 11 Disk Image (ISO) section.
  • Download the Windows 11 (multi‑edition ISO) for x64 devices.
  • On the machine where you’ll build the USB, mount the downloaded ISO in File Explorer (right‑click > Mount) or use a tool to write it to USB.
  • Use a trusted USB creation utility (Windows’ built‑in mount + Rufus or Ventoy are common choices) to format a USB drive and write the ISO. Rufus offers options for advanced users (e.g., bypassing hardware checks), but those bypass options have long‑term support and update implications—use them only if you accept the risks.
  • Boot the target PC from the USB and choose either an in‑place upgrade (keep files/apps) or a clean install. Back up first.
Benefits:
  • Full control over the ISO version you install.
  • Avoids the MCT regression entirely.
  • Works from any host OS that can download or host the ISO.
Risks:
  • Manual steps are more error‑prone for casual users.
  • Using third‑party options to bypass TPM/Secure Boot may create unsupported configurations that could block future updates.

Option B — Windows 11 Installation Assistant (easiest for in‑place upgrades)​

  • Download and run the Windows 11 Installation Assistant from Microsoft on the Windows 10 PC you want to upgrade. The assistant performs readiness checks and upgrades in place when allowed.
  • Let the assistant verify hardware, then follow its prompts to update to Windows 11 while keeping apps and settings.
Benefits:
  • Automated and preserves apps/settings.
  • Fewer manual steps for non‑technical users.
Risks:
  • Only works when your device meets Windows 11 requirements; incompatible PCs will be blocked.

Option C — Use a Windows 11 host to run the Media Creation Tool​

  • If you have access to any machine already running Windows 11, the updated MCT reportedly runs there more reliably and can create USB installers for other PCs. This is an acceptable stopgap if you can borrow a Windows 11 host.

Advice for the cautious and enterprise admins​

Backup and recovery: non‑negotiable​

Before any upgrade, create a full disk image and a separate copy of user data. Clean installs and reboots can go wrong; having a verified image cuts recovery time and risk.

For IT teams and technicians​

  • Use canonical ISO images in your imaging server or deployment pipeline rather than relying on ad‑hoc MCT creation on desktops.
  • Test the ISO you intend to deploy in a small pilot group before broad rollouts.
  • Maintain a USB recovery standard and documented rollback steps for major transitions.

ESU and deferred migration​

If upgrading right now is impossible for logistical or hardware reasons, Microsoft’s Extended Security Updates (ESU) program provides a paid bridge for eligible devices for one additional year (through October 13, 2026, for typical consumer ESU enrollments). ESU pricing and availability vary; check eligibility and plan procurement early if you need it.

Technical analysis: why did this happen and what should Microsoft have done?​

The community‑shared Event Viewer traces (SetupHost.exe crashing with low‑level exceptions) and Microsoft’s host‑specific advisory point to a probable regression where the updated MCT binary introduced an initialization path incompatible with assumptions on Windows 10 systems. Differences in OS‑level libraries, security mediation, or service versions between Windows 10 and Windows 11 might expose untested code paths—particularly if the MCT was validated primarily on Windows 11 hosts. This inference is consistent with crash logs but is not a formal root‑cause published by Microsoft; thus it should be treated as plausible rather than definitive.
What Microsoft could and should do:
  • Publish an explicit post‑mortem (or an expanded Release Health note) describing the root cause once the fix ships.
  • Provide a clear, dated MCT download that documents which host OS versions were validated.
  • Offer an MCT fallback binary for Windows 10 hosts while the root cause is addressed to reduce last‑minute upgrade friction.

Strengths and weaknesses of Microsoft’s response​

Strengths​

  • Microsoft acknowledged the problem publicly and recommended practical, supported workarounds: direct ISO download and the Installation Assistant. Quick acknowledgement reduces user confusion and points people to safe alternatives.
  • Canonical ISOs remain available, preserving a robust manual fallback for technicians and power users.

Weaknesses and risks​

  • The regression landed at a sensitive time—immediately before Windows 10’s end‑of‑support—amplifying impact for users who prefer a clean install workflow.
  • The MCT’s silent failure mode (no error dialog) leaves non‑technical users with no guidance. Silent exits are a poor user experience for a tool positioned as a simple, fail‑safe method.
  • Reliance on community tools and documented bypasses (e.g., Rufus’s advanced options) will grow while the MCT remains broken, and those bypasses may create unsupported device states that complicate future updates.

Clear, actionable checklist (for users preparing to upgrade right now)​

  • Back up: create a full disk image and copy essential files to cloud or external storage.
  • Verify compatibility: run PC Health Check to confirm TPM 2.0, Secure Boot, CPU, RAM, and storage prerequisites.
  • If MCT fails on your Windows 10 PC, choose one of these paths:
  • Download Windows 11 ISO and create USB with Rufus or Windows’ built‑in tools.
  • Run the Windows 11 Installation Assistant for an in‑place upgrade.
  • Use another PC with Windows 11 to run MCT and build media for your target device.
  • If you cannot upgrade and must keep using Windows 10, evaluate ESU enrollment to maintain security coverage.

Final analysis and recommendations​

The MCT regression is a practical reminder that even widely used automation tools need robust cross‑OS validation. Microsoft’s acknowledgment and the availability of official ISOs and the Installation Assistant mean there are safe, supported alternatives today—but those alternatives require a small amount of technical confidence and time. For most home users, the best path is:
  • Use the Windows 11 Installation Assistant if your PC passes the health check and you want a low‑friction upgrade.
  • If you prefer a clean install or need bootable recovery media, download the Windows 11 ISO and write a USB installer using built‑in mounting or a trusted tool such as Rufus or Ventoy. Validate checksums and back up first.
For administrators and power users, maintain canonical ISOs and test images in your environment rather than relying on individual hosts running ad‑hoc MCT instances. This incident underlines a best practice that has always held true: keep verified media and a tested rollback plan.
Finally, treat any claims about exact build dates and internal root causes as provisional until Microsoft publishes a full technical explanation. Microsoft has confirmed the symptom and offered workarounds; a corrective MCT release is expected, and users should watch Microsoft’s release‑health / update history notes for the final fix.

The broken MCT is an inconvenient wrinkle at a sensitive moment, but it does not close the door on upgrading—only on the easiest single‑click path for some Windows 10 hosts. With careful backups, the official ISO and Installation Assistant routes, and an awareness of the risks around unsupported bypasses, users and admins can still move to Windows 11 safely and on their own timetable.

Source: PhoneWorld Windows 11 Installer Breaks for Windows 10 Users - PhoneWorld
 

Microsoft has confirmed that the Windows 11 Media Creation Tool (MCT) update published on September 29, 2025 — version 26100.6584 — can fail to run on machines still operating Windows 10, closing immediately after launch with no error message, and the company says a fix is coming in a future Media Creation Tool update.

Windows 11 error: Media Creation Tool failed to launch, with an ISO file and USB drive icon.Background​

The Media Creation Tool is Microsoft’s official utility for producing bootable installation media (USB drives or DVDs) and for downloading full Windows ISO images when the in-place upgrade path is not desired. It is widely used by technicians, IT departments, and power users to perform clean installs, reinstalls, and offline repair operations.
The recent problem involves the MCT build tied to Windows 11 version 25H2 (build series 26xxx). Microsoft’s release-health documentation states that MCT version 26100.6584, published on September 29, 2025, might not work as expected when run on devices still on Windows 10, version 22H2; the tool may simply exit immediately after the initial splash screen without showing an error or recovery prompt.
Independent reporting and community reproduction show the same symptom: users who double‑click the MCT executable on Windows 10 see a UAC prompt, then a quick Windows logo flash, and then the application closes with no error code. Multiple threads across Microsoft Q&A, Reddit, and news sites captured identical behavior within days of the MCT release.

What’s broken and who’s affected​

Symptoms​

  • The Media Creation Tool executable launches, the UAC permission prompt appears, and after approval the app briefly displays the Windows logo and quits.
  • No usable error dialog, crash code, or troubleshooting guidance is presented.
  • Attempts to run as Administrator or after re-downloading the tool produce the same behavior.
These symptoms are consistent across multiple user reports and have been explicitly acknowledged by Microsoft in its Release Health notes.

Affected platforms​

  • Client: Windows 10, version 22H2 (confirmed).
  • Server: None reported.
  • Architecture note: Arm64-based Windows 10 devices are particularly impacted by incompatibilities, but Microsoft clarifies that the Windows 11 Media Creation Tool is not currently supported for creating media on Arm64 hosts — the tool’s Arm64 behavior has historically been limited and the recent update exacerbated that caveat. In short: the tool is failing on Windows 10 (x64 and possibly x86) and was never intended to produce Arm64-targeted media when run on Arm64 Windows 10 hosts.

Timeline and context​

  • September 29, 2025 — Microsoft published Media Creation Tool version 26100.6584, aligned to Windows 11 25H2 media.
  • Early October 2025 — Users began reporting the MCT closing immediately when launched on Windows 10 systems; reports rapidly surfaced on Microsoft Q&A, Reddit, and specialist outlets.
  • October 10, 2025 — Microsoft updated its Release Health / Known Issues documentation to confirm the MCT problem on Windows 10 and to publish a temporary workaround: download the Windows 11 ISO directly from the Microsoft Software Download site (“Download Windows 11 Disk Image (ISO) for x64 devices”) until an MCT fix is released.
This timing matters because Windows 10 reaches official end-of-support on October 14, 2025. That deadline makes reliable upgrade and repair pathways more urgent for the many users who still plan to transition to Windows 11 before EoS, or who need to reinstall/repair Windows in the weeks around that cutoff. Microsoft’s own lifecycle documentation and its widely shared FAQs emphasize October 14, 2025 as the end-of-support date.

Why this matters​

  • Many users depend on the MCT as a trusted, convenient way to produce installers that are guaranteed to be aligned with Microsoft’s distribution mechanisms.
  • When the tool fails without diagnostics, less-technical users have no clear next step and can be left with broken upgrade workflows — precisely the kind of friction that is most harmful close to an EoS date.
  • IT teams planning mass rollouts, emergency recoveries, or refresh projects need predictable tools; MCT failures force them to adopt alternate procedures that may be slower or require third‑party utilities.
  • Users who delay or botch upgrades at EoS increase their exposure to unpatched security vulnerabilities if they continue on an unsupported OS.
Given Windows 10’s end-of-support timeline and the expected surge of upgrade and reinstall activity around mid‑October, even an apparently minor MCT regression can create outsized operational pain.

Microsoft’s guidance and official workaround​

Microsoft’s short-term guidance is straightforward: download the Windows 11 ISO directly from the Microsoft Software Download page and create bootable media from that ISO using a USB tool, or run the install from another Windows 11 PC. The company says it is working on a resolution that will ship as part of a future Media Creation Tool update.
Specifically, Microsoft directs Windows 10 users to the section titled “Download Windows 11 Disk Image (ISO) for x64 devices” on the official Software Download page and to use that ISO as an alternative until MCT is fixed. That keeps users on official Microsoft media rather than resorting to third-party or patched installers.

Practical, safe workarounds (step‑by‑step)​

Below are practical, conservative options to create Windows 11 installation media when MCT won’t run on a Windows 10 machine.

Option A — Download the ISO from Microsoft and use Rufus (recommended for flexibility)​

  • Open a modern web browser and visit Microsoft’s Windows 11 Download page. Choose Download Windows 11 Disk Image (ISO) for x64 devices and generate the download link. If Microsoft’s site gives a temporary tokenized link, save it and download the ISO.
  • Download Rufus (a widely used open-source tool) and run it on any Windows PC. Rufus can write the ISO to a USB drive and offers options to customize the installer (file system, partition scheme, and — if desired and understood — bypasses for hardware checks). Rufus also contains a built-in ISO verification option to help confirm authenticity.
  • Choose the downloaded ISO in Rufus, select the USB drive, click Start, and wait for the process to finish. You’ll have a bootable Windows 11 USB installer.
Advantages: Full control, cross‑version compatibility, built-in verification in Rufus. Caveats: Avoid using Rufus options you don’t understand (e.g., purposely bypassing TPM/Secure Boot checks) unless you know the implications.

Option B — Use another PC running Windows 11 to run the Media Creation Tool​

  • If you have access to a friend or colleague with a Windows 11 PC, run the MCT there to create the media. The MCT appears to run correctly on Windows 11 devices and will produce an installer for x64 hardware.
Advantages: Keeps you inside Microsoft’s default workflow. Caveats: Requires borrowing another machine.

Option C — Create the bootable USB manually (for advanced users)​

  • Mount the ISO (double-click in Windows 8/10/11), copy files to a formatted USB drive, and make the drive bootable by ensuring proper EFI file structure. Tools like Rufus automate this safely; manual steps are error-prone and not recommended for non-technical users.
  • Alternatively, use the DISM or PowerShell image servicing tools to apply a WIM to a USB volume — advanced system deployment techniques require care.
Advantages: Full automation for imaging fleets. Caveats: Complex; not for casual users.

Option D — If Microsoft’s site blocks the ISO download (error message flags)​

Some users report a Microsoft site message that blocks ISO generation (message code referencing blocked IPs or location filtering). Common mitigations include:
  • Try another browser or incognito mode.
  • Use a different network (home vs. mobile hotspot) to avoid provider-level restrictions.
  • If you see an explicit “we are unable to complete your request” message, Microsoft Q&A responders can sometimes generate a temporary 24‑hour direct link for you. This is an official support workaround often used when the site’s download form fails.
Caveat: Avoid using untrusted third‑party download sites. Always prefer Microsoft’s official download page or a trusted tool (Rufus) that itself pulls official Microsoft ISOs.

Verifying downloads and staying safe​

A key piece of safe practice is verification.
  • Use Rufus’s built‑in checksum verification feature to confirm the ISO’s integrity. Rufus can compute hashes and help you check whether an ISO matches a recognized Microsoft retail image.
  • On Windows you can compute checksums with built‑in tools: PowerShell’s Get‑FileHash or certutil -hashfile. While Microsoft doesn’t publish a single immutable SHA256 for every possible ISO variant (multiple languages, updated cumulative patches, and different builds mean many different legitimate hashes), Rufus’s verification plus downloading directly from Microsoft are practical, reliable methods.
Important safety notes:
  • Do not use ISOs from unverified third‑party aggregators unless you can cryptographically verify them or they are explicitly mirrored by reputable organizations.
  • Avoid running untrusted modifications that claim to “fix” MCT; these can embed unwanted modifications into the installer.
  • Always back up user data before performing an in-place upgrade or clean install.

Technical analysis: what likely went wrong (and what we can't prove)​

Microsoft’s release-health note confirms the symptom and the temporary workaround but does not supply a root-cause postmortem in public documentation. Community researchers and users noticed strange mismatches in binary signatures and file timestamps during early testing — for example, some community posts observed certificate or timestamp differences between MCT and setup.exe inside ISOs. Those observations are indicators of packaging or signing differences rather than definitive proof of a specific bug. Until Microsoft publishes an engineering root-cause, any deeper diagnosis remains speculative.
Possible (but not confirmed) technical causes include:
  • A packaging regression in the MCT build that introduced an OS-version check or dependency incompatible with Windows 10’s runtime environment.
  • A signing/certificate validation change that causes MCT to early-exit on older Win32 APIs used by Windows 10.
  • A mis-targeted installer bootstrap that accidentally expects a Windows 11 runtime component to be present.
All of the above are plausible developer regressions that happen during major refreshes, but they are not verified until Microsoft releases a root-cause statement. The only authoritative fact at present is Microsoft’s confirmed behavior note and the scheduled plan to release a corrected MCT update later.

Risks and strategic recommendations for IT teams and power users​

  • Do not panic. The problem has a straightforward workaround: download the ISO directly and create media with Rufus or create the media on a Windows 11 device. Microsoft is not preventing upgrades entirely — the path is just temporarily changed.
  • Plan for EoS. With Windows 10’s support ending on October 14, 2025, teams that still have substantial Windows 10 fleets should prioritize validated upgrade paths now, including testing the direct ISO-based workflows.
  • Avoid third‑party “fixes.” If a non-official patch or wrapper claims to “fix” MCT behavior, treat it as untrusted software until validated by independent security analysis.
  • Back up before upgrading. Regardless of the method used to upgrade — MCT, ISO, or in-place Windows Update — take full backups of critical systems and verify recovery plans.
  • Test media on a target machine. Before mass-deploying created installation media, test it on one or two representative devices to confirm the installer behaves as expected.

Why Microsoft’s quick acknowledgment matters​

Large platform vendors rarely issue public troubleshooting notes unless the issue affects a meaningful number of users or there is a risk to security or upgrade flow. Microsoft’s prompt Release Health entry does three things:
  • Confirms the problem for administrators and reduces the confusion caused by silent failures.
  • Provides an immediate, safe workaround that keeps users on official install media.
  • Commits to a future fix, allowing IT teams to decide whether to wait for the MCT patch or proceed with ISO-based workflows.
This response model follows Microsoft’s established pattern of acknowledging media‑creation issues in the past and providing ISO or updated media as mitigation. The company has handled similar situations previously by updating their media and offering guidance to rebuild installers with patched updates included.

Bottom line and practical takeaways​

  • The Windows 11 Media Creation Tool update (version 26100.6584, released September 29, 2025) can exit immediately on Windows 10 systems; Microsoft has confirmed this behavior and is working on a fix. Until that fix ships, the recommended workaround is to download the Windows 11 ISO directly and use a tool such as Rufus or a Windows 11 host to create the bootable media.
  • This issue is inconvenient but workaroundable. It does not prevent upgrades or installations if you follow the ISO route. However, with Windows 10 end-of-support on October 14, 2025, administrators and users should not delay preparations for upgrade or migration.
  • For the cautious: download ISOs only from Microsoft, verify using Rufus or built‑in hashing tools, and keep verified backups. Avoid any unofficial “fixes” that promise to patch Microsoft’s tool without clear provenance.
Microsoft’s acknowledgement ends the guesswork about whether the issue was a one-off or a broader regression; the company is now explicitly tracking it in the Release Health documentation and intends to ship a corrected Media Creation Tool in a subsequent update. For now, ISO downloads coupled with Rufus or cross‑host MCT runs are the safe, pragmatic paths forward.

Conclusion
The failed Media Creation Tool update is an unwelcome but manageable disruption: Microsoft has confirmed the problem, provided a clear workaround, and committed to a fix. Given Windows 10’s fast-approaching end-of-support, users and IT teams should treat the MCT regression as a reminder to finalize upgrade plans now, verify recovery and upgrade media, and ensure critical systems are either migrated to Windows 11 or enrolled in Extended Security Updates before the support deadline.

Source: Windows Report Windows 11 Media Creation Tool Not Working on Windows 10, Microsoft Confirms
 

Microsoft's decision to end support for Windows 10 on October 14, 2025, forces a crossroads for millions of users: upgrade to Windows 11, buy new hardware, or take Microsoft’s temporary Extended Security Updates (ESU) lifeline—an option that, importantly, includes free enrollment routes for many eligible consumer devices.

Tech infographic comparing Windows 10 and Windows 11 with upgrade milestones and security badges.Background / Overview​

Windows 10 debuted in 2015 and has been a dominant desktop platform ever since. Microsoft’s lifecycle policy sets fixed end-of-support dates for operating systems; when support ends, routine feature updates, quality updates, and the normal stream of security fixes stop for that product. For Windows 10, that hard cutoff is October 14, 2025. After that date the OS will continue to run — but unpatched machines become progressively more vulnerable to newly discovered exploits.
To reduce immediate risk to households and other consumers who cannot move to Windows 11 right away, Microsoft published a one‑year, consumer-facing Extended Security Updates (ESU) program that delivers security‑only updates for eligible Windows 10 devices through October 13, 2026. The program is deliberately narrow in scope: security fixes only (Critical and Important patches as defined by Microsoft’s Security Response Center), no new features, and no general product support.

What Microsoft announced — the essentials​

  • The official Windows 10 end‑of‑support date: October 14, 2025. After this date, un‑enrolled consumer Windows 10 devices will no longer receive routine security updates from Microsoft.
  • Consumer ESU coverage window: October 15, 2025 through October 13, 2026 for enrolled devices.
  • ESU delivers security-only updates classified as Critical or Important; it does not include feature updates, broad non‑security quality fixes, or full technical support.
  • Enrollment is performed via an in‑OS wizard in Settings → Update & Security → Windows Update; Microsoft rolled the enrollment experience out in phases, starting with Windows Insiders.
These are the load‑bearing facts that change the security calculus for anyone still on Windows 10.

Who is eligible — prerequisites and gotchas​

Microsoft limited the consumer ESU to devices that meet specific technical and administrative conditions. Before assuming ESU will be available for your PC, verify:
  • Operating system: Windows 10, version 22H2 (Home, Pro, Pro Education, or Workstation). Devices on earlier Windows 10 builds are not eligible.
  • Latest updates: Install the latest cumulative and servicing‑stack updates. Microsoft shipped preparatory cumulative updates in 2025 to fix early enrollment issues; devices that lack those updates may not see the enrollment wizard.
  • Account requirement: A Microsoft Account (MSA) is required for consumer ESU enrollment; the enrolling account must be an administrator on the device. Local Windows accounts are not eligible for the free consumer enrollment path, and enrollment ties the ESU license to the Microsoft Account used.
  • Device management: Domain‑joined, enterprise‑managed, kiosk‑mode, and many MDM‑managed devices are excluded from the consumer ESU path and must use enterprise channels.
These prerequisites mean that some classes of Windows 10 machines (corporate laptops under IT management, kiosk devices, or older branches) cannot use the quick consumer path. Plan accordingly.

The enrollment options — how to get ESU (including the free routes)​

Microsoft designed three consumer ESU enrollment routes. Each yields the same one‑year security coverage, but they differ in cost, convenience, and privacy trade‑offs:
  • Free (cloud backup / sync route): enable Windows Backup / settings sync to OneDrive while signed in with a Microsoft Account. Microsoft uses that sync as validation for free enrollment on eligible devices. One Microsoft Account license can protect up to 10 eligible devices.
  • Microsoft Rewards redemption: redeem 1,000 Microsoft Rewards points to claim ESU under a Microsoft Account.
  • One‑time purchase: pay roughly $30 USD (or local‑currency equivalent) for a one‑time ESU license tied to a Microsoft Account (again, usable on up to 10 eligible devices linked to that account).
If you choose the free backup/sync route, remember that the free OneDrive tier is limited (commonly 5 GB for free Microsoft accounts), and large backups may require additional OneDrive storage. Microsoft’s documentation and storage FAQ confirm the 5 GB free allotment for non‑paying accounts.
Practical note: Microsoft rolled the enrollment wizard out in waves. If you meet the technical prerequisites but don’t yet see the “Enroll now” banner under Settings → Update & Security → Windows Update, be patient — the company says the UI will appear before the October 14, 2025 cutoff. However, installing the preparatory cumulative updates (released in mid‑2025) improves your chances of seeing the enrollment prompt.

Step‑by‑step: Free ESU enrollment (quick checklist)​

  • Confirm your build: Open Settings → System → About and verify you’re on Windows 10, version 22H2. If not, install the 22H2 feature update first.
  • Install all pending Windows updates and reboot. Microsoft supplied an August 2025 cumulative update and servicing stack fixes that make the enrollment wizard behave reliably.
  • Sign in with a Microsoft Account that has administrator privileges on the PC. Local accounts will be prompted to convert or sign in.
  • Enable Windows Backup / settings sync to OneDrive (Settings → Accounts → Windows backup / Sync your settings). This is the no‑cost route for many users. Remember OneDrive’s free quota is limited (5 GB).
  • Go to Settings → Update & Security → Windows Update and click Check for updates. If eligible and the rollout has reached you, a banner with “Enroll now” will appear. Click it and follow the wizard to complete enrollment.
Follow these steps now rather than waiting; enrolling before the October 14, 2025 cutoff ensures continuous coverage into the ESU window and avoids any potential gap between the end of mainstream updates and the moment your enrollment completes.

Migration options and why ESU is a bridge, not a destination​

ESU is explicitly a one‑year bridge for consumers. Microsoft positions upgrading to Windows 11 as the long‑term solution for most home users, provided the device meets Windows 11’s system requirements (TPM 2.0, Secure Boot, supported CPU, minimum RAM and storage). For older hardware that fails Windows 11 checks, options include purchasing new hardware, switching to an alternative OS such as a Linux distribution or ChromeOS Flex for low‑dependency machines, or using hosted/virtualized Windows instances (Windows 365, Azure Virtual Desktop) for critical workloads.
Pros of ESU:
  • Immediate, low‑effort route to keep receiving security patches for a year.
  • Minimal disruption to apps and files — enroll and keep working.
Cons of ESU:
  • Time‑boxed (ends October 13, 2026) and narrow in scope (security-only).
  • Requires Microsoft account enrollment and, for the no‑cost route, syncing data to Microsoft cloud services — a privacy or policy concern for some users.
  • Does not give you modern hardware‑based protections intrinsic to newer platforms (e.g., hardware root-of-trust, virtualization-based security enhancements that are more prevalent in Windows 11).
Microsoft’s messaging emphasizes a managed transition to Windows 11 and new Copilot+ PCs; some of the company’s security and productivity claims about Windows 11 come from internal telemetry and should be treated as vendor‑supplied metrics until independently corroborated. Flag this as marketing-influenced, not an objective guarantee.

Security risks if you stay on unpatched Windows 10​

Running a network‑connected Windows 10 installation that no longer receives OS‑level security updates raises real, measurable risks:
  • New zero‑day exploits against kernel or platform components will not be patched on un‑enrolled devices, enabling privilege escalation and ransomware chains.
  • Over time, third‑party app and driver vendors will reduce or stop testing and issuing compatibility fixes for Windows 10, increasing breakage risk.
  • Even with antivirus and endpoint protection, unpatched OS vulnerabilities can enable bypasses and post‑exploitation persistence that endpoint tools cannot fully mitigate.
ESU reduces immediate exposure by providing critical/important patches, but it is not a substitute for the full, ongoing maintenance of a supported OS. Treat ESU as a runway to migrate safely, not a long‑term security plan.

Practical hardening for Windows 10 users who can’t or won’t upgrade immediately​

If you plan to keep a Windows 10 PC beyond October 14, 2025 — with or without ESU — adopt layered mitigations to reduce attack surface:
  • Apply the latest firmware updates (UEFI/BIOS) and driver updates from your OEM or hardware vendors.
  • Use a modern, updated browser and avoid legacy IE/Edge modes. Keep all applications (Office, browsers, PDF readers) patched.
  • Enable full‑disk encryption (BitLocker on Pro/Enterprise) and secure backups to an offline or segmented location.
  • Limit local administrator accounts and use a standard user profile for daily work; enable Windows Defender or another reputable endpoint solution with cloud protection.
  • Use multi‑factor authentication for online accounts tied to the device and isolate risky activities (banking, tax) to a dedicated, well‑hardened machine or a supported environment.
These controls lower risk but do not eliminate the need for vendor‑issued OS patches on serious vulnerabilities. ESU buys time while you implement a migration plan.

Regional and policy nuances to watch for​

Microsoft’s consumer ESU program has regional differences driven by regulation and privacy concerns. For example, regulators and consumer groups in the European Economic Area (EEA) pushed Microsoft to alter enrollment conditions — EEA residents received concessions that reduce mandatory cloud‑sync requirements while preserving the right to free ESU enrollment under certain conditions. If you travel or move devices across borders, be aware the enrollment mechanics and data‑handling requirements can vary. Where possible, confirm the enrollment UI on the device and read the on‑screen prompts carefully before consenting.

What to verify before you act (a sanity checklist)​

  • Confirm Windows 10 edition and build: Settings → System → About — must show Windows 10, version 22H2.
  • Confirm updates applied: open Settings → Update & Security → Windows Update and install pending cumulative/servicing stack updates; the ESU enrollment UI depends on those.
  • Confirm sign‑in method: if you use a local account you will need to sign in with a Microsoft Account (MSA) to enroll in the consumer ESU paths.
  • Back up your files: create a local image and an off‑device backup. The OneDrive free allotment is limited to 5 GB; if you rely on the free sync path, verify available space or plan to offload large files.
If you cannot meet the prerequisites, or if the device is enterprise‑managed, consult your IT administrator about commercial ESU options or migration pathways.

How long you can safely rely on ESU — and the endgame​

ESU is scheduled to stop issuing consumer security updates on October 13, 2026. After that date, the only options for continued vendor patching are enterprise ESU purchases (which historically have been available in multi‑year blocks at increasing per‑device prices) or migrating workloads to a supported infrastructure. Treat ESU as a finite runway for careful migration planning, application compatibility testing, or hardware refresh budgeting.

FAQs (quick answers)​

  • Will my Windows 10 PC stop booting after Oct 14, 2025?
    No. Machines will continue to boot and run; the risk is the absence of vendor‑issued security patches for new vulnerabilities.
  • Is ESU free for everyone?
    Microsoft offers free enrollment routes for many consumers (Windows Backup sync and Rewards redemption), but paid options exist and some device classes are ineligible for the consumer path. Terms vary by region.
  • Do I need to enroll before Oct 14, 2025?
    You can enroll any time until the ESU program ends on October 13, 2026, but enrolling before the Windows 10 cutoff avoids a potential exposure gap. Early enrollment also ensures you receive prior updates retroactively.

Critical analysis — strengths and risks of Microsoft’s approach​

Strengths
  • The consumer ESU program is pragmatic: it acknowledges a substantial Windows 10 install base and offers a targeted, low‑friction security bridge. The inclusion of free enrollment paths and a reasonable paid option reduces immediate security pressure on consumers who need more time to migrate.
  • Surface‑level continuity: Microsoft continues to deliver Defender threat intelligence and some Microsoft 365 app protections on extended timelines, which helps reduce immediate malware risks while migrations proceed. However, those protections are complementary, not substitutes for OS patches.
Risks and trade‑offs
  • Privacy and telemetry concerns: the free ESU route requires backing up/syncing settings to a Microsoft Account, which some users will view as an unacceptable trade‑off for security updates. Microsoft addressed some regional regulatory concerns, but the telemetry/data trade remains material for privacy‑sensitive users.
  • A temporary fix: ESU is time‑limited and narrow; organizations or individuals who postpone migration risk sudden exposure when ESU ends, so early migration planning is essential.
  • Rollout reliability: the phased rollout and the need for specific cumulative updates caused confusion and delayed enrollment for some users. That rollout friction created unnecessary risk for people who waited until the last minute.
Unverifiable or vendor‑supplied claims
  • Microsoft has publicized performance and security gains on Windows 11 based on telemetry; treat those numbers as vendor‑supplied and seek independent testing if you plan a mass migration. These metrics can inform decisions but are not immutable facts. Flag them as marketing‑influenced until independently reproduced.

Bottom line and recommended plan of action​

  • Immediate check (today): confirm you’re on Windows 10, version 22H2 and install all pending updates and servicing stack updates. If you are eligible for ESU and wish to keep your current PC, enroll now via Settings → Update & Security → Windows Update to avoid any coverage gap.
  • Back up: take a full image backup and a separate copy of critical files. If you use the free sync route, verify OneDrive free storage or plan to clear or augment cloud storage.
  • Plan to migrate: schedule application compatibility tests and a migration window to Windows 11 or another supported OS before October 13, 2026. Use ESU as a bridge—not a permanent solution.
  • For privacy‑conscious users: consider the paid ESU license if you want to avoid syncing to the Microsoft cloud, or evaluate alternative OS options and virtualized hosting for critical Windows‑only workloads.

Windows 10’s end of support is not a sudden shutdown — it’s a security inflection point that requires concrete action. Microsoft’s consumer ESU program provides a pragmatic, time‑limited lifeline with several free paths to enrollment, but it also places clear limits and conditions on who can use it. The safest strategy for most users is to verify eligibility now, claim ESU if needed to avoid an immediate security gap, and use the ESU window to migrate to a supported platform with modern protections before the extension expires.

Source: TechJuice Windows 10 Reaches End of Support—Here’s How to Keep It Running Securely for Free
 

Microsoft’s own status page confirmed a frustrating timing problem: the latest Windows 11 Media Creation Tool (MCT) update can and does close unexpectedly on Windows 10 devices, and Microsoft says it’s working on a fix — a hiccup that landed on the eve of Windows 10’s end-of-life and has left many users scrambling for safer, supported upgrade paths.

Windows 11 warning dialog with a loading bar and a USB installer labeled Windows 11 beside an ISO icon.Background​

The Media Creation Tool has long been one of the easiest ways for consumers and IT pros to produce bootable Windows installation media, whether for clean installs, reinstalls, or offline upgrades. In late September Microsoft shipped a new MCT build tied to the Windows 11 refresh, and on October 10 the company published a status update acknowledging that the tool “might not work as expected” when run on Windows 10, often closing with no error message.
That admission couldn’t be worse timing: Microsoft’s extended support for mainstream Windows 10 editions ends on October 14, meaning devices left on Windows 10 after that date stop receiving regular security updates, cumulative fixes, and general technical support. For organizations and home users alike, the window to migrate — while preserving data, settings, and productivity — has been narrow. The MCT problem complicates that transition for users who relied on the tool as a simple, one-stop method to create upgrade media.

What Microsoft said and what was observed​

Microsoft’s support and release-health documentation flags the issue as confirmed and notes the affected Media Creation Tool version and timeframe. The company states the tool “might close unexpectedly, displaying no error message” on Windows 10 systems, and specifies the problem is linked to the new MCT release. Microsoft also notes that the MCT is not currently supported on Arm64 Windows 10 devices for the affected build and that a fix will be released in a future update to the tool.
Independent testing and broad user reports show the symptom exactly as described: users download the MCT executable, respond to the UAC prompt, see a splash or progress indicator and then an abrupt exit with no diagnostic pop-up. Multiple community and industry outlets reproduced the behavior on Windows 10 22H2 machines, and Microsoft’s published status entry confirms it as a known issue under investigation.

Timeline — how this unfolded​

  • Late September: Microsoft released the new Windows 11 build and updated the Media Creation Tool tied to that refresh.
  • October 1–10: Reports surfaced from users who tried to run the new MCT on Windows 10; on October 10 Microsoft updated its status documentation to confirm the problem.
  • October 10–13: News outlets, community forums, and tech sites replicated the failure and documented workarounds. Microsoft indicated a fix is being worked on but gave no firm timeline.
This sequence matters: a tool update intended to help migrate large numbers of Windows 10 systems instead introduced a regression that blocks one of the simplest consumer upgrade routes during the final public support days for Windows 10.

Who’s affected and who isn’t​

  • Affected: Typical home and small-business users running Windows 10, version 22H2, who attempt to run the current Windows 11 Media Creation Tool to make a bootable USB or perform an in-place upgrade.
  • Not universally affected: Devices that upgrade through other supported channels (Windows Update or the Windows 11 Installation Assistant) are not inherently blocked by the MCT issue.
  • Arm64 nuance: Microsoft explicitly called out Arm64 hosts in its initial advisories — the new MCT build wasn’t intended to support creating Arm64-targeted media, and behavior on Arm64 hosts may differ or fail in other ways.
  • Large organizations: Enterprises using managed deployment tools, update rings, or Windows Update for Business generally have other channels and controls available; the MCT failure primarily impacts end users and some IT professionals who rely on self-service media creation.
It’s worth noting that while the MCT problem is real and reproducible, the total number of users affected is not publicly disclosed. Any headline that claims precise counts of “millions” impacted should be treated cautiously unless backed by concrete telemetry.

Immediate alternatives: reliable ways to migrate off Windows 10​

With the MCT temporarily unreliable for Windows 10 hosts, here are the vetted alternatives — ranked by safety and Microsoft supportability:
  • Windows Update (recommended for eligible machines)
  • Open Settings > Update & Security > Windows Update on your Windows 10 PC.
  • Click Check for updates; if your device is eligible, a “Download and install” option for Windows 11 will appear.
  • This is the cleanest, fully supported path that preserves apps, files, and most settings.
  • Caveat: Microsoft’s eligibility checks may prevent some hardware from being offered the upgrade.
  • Windows 11 Installation Assistant
  • Microsoft’s Installation Assistant is designed to upgrade directly from Windows 10 to Windows 11 on compatible devices.
  • It runs from the running OS, checks compatibility, and performs an in-place upgrade while keeping files and apps.
  • This tool is a supported route and avoids the MCT’s media creation step altogether.
  • Download a Windows 11 ISO directly from Microsoft
  • Microsoft provides a downloadable disk image (ISO) labeled for x64 devices. You can obtain the ISO and create a bootable USB with many third-party utilities.
  • This is a robust fallback when the MCT misbehaves, and it’s the same media used by many OEMs and tech professionals.
  • Always verify the ISO using Microsoft-provided hashes or checksums where possible — integrity checks prevent bad downloads and tampering.
  • Use a third-party USB creator (e.g., Rufus) with an official ISO
  • Community-trusted tools like Rufus can create bootable USB installers from the official ISO and, in some versions, offer advanced options to bypass hardware checks or adjust the setup flow.
  • Important: Bypasses that disable TPM, Secure Boot, or Microsoft account requirements are unsupported by Microsoft and can expose the device to stability or update-blocking risks. Use these only if you understand and accept the consequences.
  • Extended Security Updates (ESU) and other non-upgrade options
  • If upgrading immediately is not viable, organizations and eligible customers can enroll in Extended Security Updates — a paid program that provides critical security patches for a limited time.
  • Alternatively, migrating to a supported Linux distribution is a viable route for older hardware that cannot meet Windows 11 requirements.

Step-by-step: safe upgrade workflows​

Below are compact, practical steps for two common scenarios. Always back up critical data before any major OS upgrade.
Scenario A — Eligible consumer who wants the simplest supported path:
  • Confirm Windows 10 is fully updated: Settings > Update & Security > Windows Update; install pending updates and reboot.
  • Open Windows Update again and click Check for updates.
  • If Windows 11 is available for your device, use the “Download and install” option.
  • Allow the upgrade to run; keep the device plugged in. Follow prompts and verify post-install functionality.
Scenario B — When Windows Update or MCT isn’t available and you want manual media:
  • Download the official Windows 11 ISO from Microsoft’s download site for x64 devices.
  • Verify file integrity if checksums are provided.
  • Use Rufus or another bootable-USB tool to create the installer from the ISO.
  • Boot from the USB, choose whether to perform an in-place upgrade (run setup.exe from within Windows) or a clean install (boot to USB and follow installer prompts).
  • If you choose to bypass hardware checks with Rufus or other tweaks, do so with full awareness that you’re removing Microsoft’s compatibility protections — this may prevent future updates or support.

Risks and caveats: what users must weigh​

  • Unsupported installs and update blocking: Forcibly bypassing hardware checks (TPM, Secure Boot, CPU whitelists) can produce systems that are not eligible to receive feature or security updates — an unacceptable outcome for many users.
  • Data loss and application incompatibility: Always back up. Some third-party apps (drivers, anti-cheat middleware, legacy system tools) can interfere with upgrades. A clean install removes previous apps and drivers unless you explicitly preserve them.
  • Security exposure after Windows 10 EOL: Any device left on Windows 10 after its support end date will not receive routine security patches. This increases exposure to new threats and vulnerabilities.
  • Enterprise constraints: Organizations with managed devices should coordinate with IT to avoid widespread disruption — mass use of unsupported bypasses could create heterogeneous fleets that are hard to secure.
  • Trust and integrity: Downloading ISOs from any source other than Microsoft increases the risk of tampered media; always prefer official sources and validate checksums.
Flag on unverifiable claims: anecdotal statements about how “most users” upgrade, or exact counts of affected users, are often repeated in social posts and headlines but are not publicly verifiable without Microsoft telemetry. Treat such numbers as estimates unless Microsoft or another authoritative entity provides explicit figures.

Why this is more than an annoyance​

This is not just a usability bug. The MCT regression illustrates a broader operational risk when a single vendor-provided utility is heavily relied upon by millions of end users to perform critical transitions. The timing elevates the issue:
  • A tool regression during an OS EOL window increases pressure on support teams and community resources.
  • Consumers in a hurry to keep devices patched may adopt risky bypasses or third-party instructions that can compromise long-term updateability.
  • For IT administrators managing limited hardware refresh budgets, that pressure can force brittle choices — enroll in ESU, accept unsupported installs, or accelerate hardware replacements.
In other words, a small executable behaving unexpectedly can cascade into large-scale user confusion, inconsistent security postures, and avoidable helpdesk overload.

Microsoft’s response and likely timeline​

Microsoft’s public posture is straightforward: the issue is recognized and a resolution will ship in a future MCT update. The company did not publish a firm timeline in its initial advisory. Historically, Microsoft deploys fixes for release-health issues through either the MCT executable update itself or via broader update channels when the MCT downloads and consumes specific OS feature packages.
Given the sensitivity of an end-of-support milestone, expect Microsoft to prioritize a corrective MCT build rapidly. Still, until an updated MCT is published and verified by independent test runs, users should rely on the alternate upgrade methods described earlier.

Practical recommendations for users and admins​

  • Do not panic. There are multiple supported alternatives to the MCT to obtain Windows 11 media or perform upgrades.
  • Back up now. A verified backup — local and/or cloud — before attempting an upgrade is non-negotiable.
  • Prefer Windows Update and the Windows 11 Installation Assistant for eligible devices. These routes preserve support and are least likely to introduce post-upgrade update issues.
  • If you must use an ISO and create bootable media, download the official ISO and validate it. Use Rufus or another well-known tool to make the media; avoid untrusted sources.
  • Avoid bypasses unless you accept the implications. If you choose to bypass hardware checks, document your reasoning, expect potential update gaps, and consider compartmentalizing such devices from sensitive networks.
  • Enterprises should coordinate a measured plan: inventory hardware, determine upgrade eligibility, prioritize devices by risk and criticality, and consider short-term ESU if immediate hardware replacement isn’t possible.
  • Watch Microsoft’s release-health documentation and official channels for the updated MCT; an explicit resolution notice will indicate it’s safe to re-attempt the MCT path.

The broader lesson: redundancy and verified channels matter​

This episode is a textbook example of why redundancy in update and deployment channels matters. Relying on a single consumer utility for a mass migration creates a single point of failure. The MCT was always intended to be a convenience; when convenience fails during a collapse window, users with no technical fallback are left stranded.
For those responsible for dozens, hundreds, or thousands of machines, the right approach is disciplined:
  • Maintain multiple upgrade plans (Windows Update, Installation Assistant, ISO-based deployments).
  • Keep recovery and rollback plans active and tested.
  • Preserve device inventories so hardware eligibility checks do not become last-minute surprises.

Conclusion​

Microsoft’s confirmation that the Windows 11 Media Creation Tool may unexpectedly close on Windows 10 devices is an unwelcome complication in the final days before Windows 10’s end-of-life. Fortunately, the situation is manageable: supported in-place upgrade paths remain available, and direct ISO downloads provide a reliable, if more manual, route to Windows 11. The immediate priorities for users are straightforward — back up, choose a supported upgrade method where possible, and avoid unsupported bypasses unless there is a deliberate, documented reason to do so.
The episode is a reminder that even small regressions in widely used migration tools can have outsized practical and security consequences when they coincide with major lifecycle milestones. For now, users have alternatives; for the future, the imperative is clear: plan redundancies and verify upgrade channels so a single broken utility can’t derail a mass migration.

Source: Tom's Hardware Microsoft breaks Media Creation Tool on the eve of Windows 10 end-of-life — company confirms Windows 11 upgrade tool 'might not work as expected', outlines alternatives
 

Microsoft's own migration tool has conspicuously failed at one of the most awkward moments possible: the Windows 11 Media Creation Tool (MCT) published in late September — identified in vendor and community reporting as version 26100.6584 — can refuse to run on machines still using Windows 10, version 22H2, quitting immediately after launch and leaving no diagnostic for users who need a simple way to create bootable Windows 11 media. This regression was acknowledged by Microsoft in its release‑health notes and confirmed by multiple industry outlets, and it landed just days before Windows 10’s published end‑of‑support deadline of October 14, 2025, amplifying frustration and risk for users scrambling to migrate or to build recovery media.

Dual Windows 11 setup on two screens: Media Creation Tool on the left and ISO download on the right.Background / Overview​

Microsoft publishes the Windows 11 Media Creation Tool as the official, supported utility for downloading the current Windows 11 ISO and making a bootable USB installer. For years it has been the default recommendation for consumers and many small IT teams performing clean installs, reinstallations, or creating recovery media. The tool simplifies a multi‑step process — downloading a large ISO, selecting editions and languages, and writing a bootable USB — into a single workflow that "just works" for typical Windows users.
That convenience is precisely why the MCT matters: when it behaves reliably, it reduces upgrade mistakes, ensures users operate from official Microsoft images, and shortens support calls. When it breaks — and especially when it fails silently — it removes a key, trusted route to migration for people with limited time or technical expertise. The timing of this particular regression — appearing in MCT build 26100.6584 issued around September 29, 2025 and then acknowledged by Microsoft in early October — is significant because many users planned final migrations and recovery‑media makeovers in the run‑up to Windows 10’s end of support on October 14, 2025.

What Microsoft confirmed — the official facts​

  • Microsoft’s release‑health / known‑issues notes state that the Windows 11 Media Creation Tool version 26100.6584, released September 29, 2025, “might not work as expected when used on Windows 10 devices,” and that the utility “might close unexpectedly, displaying no error message.” The vendor advised affected users to download the Windows 11 ISO directly from Microsoft’s download page until a fix ships.
  • Microsoft’s lifecycle documentation also confirms the hard EoS date for Windows 10: October 14, 2025, after which Home and Pro editions stop receiving routine security and non‑security fixes unless covered by a paid or qualifying Extended Security Updates program. That date is a fixed anchor for migration urgency.
These two independent claims — the MCT regression and the Windows 10 end‑of‑support calendar — are verifiable through Microsoft’s own online materials and through contemporaneous reporting by recognized Windows coverage outlets. Where additional detail is missing (for example, a specific root‑cause analysis or a patch ETA), Microsoft has not published a public post‑mortem; its message is limited to acknowledging the problem and promising a future update to the Media Creation Tool.

Timeline — how this unfolded​

  • Late September 2025: Microsoft publishes an updated MCT binary tied to Windows 11 25H2 (community and vendor reports mark the binary metadata as 26100.6584).
  • Early October 2025: Users attempting to run the MCT from Windows 10 hosts (commonly 22H2) report a repeatable symptom: accept the UAC prompt, see a fleeting Windows splash, then the app exits with no error and no created media. Community Event Viewer traces shared by admins show early crashes involving SetupHost.exe and low‑level module faults in some cases.
  • October 10, 2025: Microsoft updates its Release Health / Known Issues documentation to acknowledge the MCT may not run as expected on Windows 10 devices and recommends the ISO download workaround while it prepares a fix.
  • October 14, 2025: Windows 10 support cutoff date (the calendar event that increased user activity and attention around installer media creation).
The proximate overlap of the regression announcement with the EoS deadline compressed options for users who planned to migrate at the last minute. The precise MCT build string and publication date (26100.6584, September 29) are repeatably reported across Microsoft documentation and independent outlets.

Symptoms and scope — who is affected and how badly​

  • Primary affected group: Windows 10 devices running version 22H2 that attempt to run the current MCT executable locally to build Windows 11 media. The tool often exits silently after the initial splash and UAC acceptance, producing no installer media.
  • Secondary complexities: Arm64 hosts have their own long‑standing compatibility caveats with the MCT. Microsoft’s notes also call out Arm64 behavior (MCT historically did not create Arm64 target media from Arm64 hosts), and the September/October MCT changes aggravated that scenario for some device types. Where previously an Arm64 Windows machine could be used to create x64 media, that workflow is less reliable with the affected tool release.
  • Where it still works: Community testing shows the same MCT binary tends to run more reliably when launched on a Windows 11 host. That makes a Windows 11 machine a practical (if inconvenient) workaround for producing Microsoft's official bootable media for use on other PCs.
  • Enterprise vs consumer impact: Large organizations and managed deployments typically rely on alternate channels — WSUS, Windows Update for Business, internal ISOs, and imaging workflows — so they are less exposed. The practical pain is concentrated among home users, refurbishers, small IT teams, and individuals who expected to use MCT from their existing Windows 10 PC.

Technical analysis — plausible causes and what we don’t know​

Event logs supplied by affected users often show SetupHost.exe terminating with exceptions in ntdll.dll, which suggests an early bootstrap or compatibility fault. That pattern fits a handful of plausible technical scenarios:
  • A tightened dependency on a runtime component or API that exists on Windows 11 but not on Windows 10, causing early termination when the MCT’s bootstrap logic fails a prerequisite check.
  • A signing, certificate, or installer bootstrap change that triggers a silent abort on older OS servicing stacks.
  • A packaging or build‑configuration regression that introduced an unhandled exception path when running on older host OS versions.
These explanations are plausible based on the observed behavior, but the exact root cause is not publicly documented by Microsoft at the time of writing; the vendor’s communication is limited to confirming the behavior and promising a fix. Treat any detailed causal claim as speculative until Microsoft publishes a post‑mortem or release notes for a corrective update.

Practical workarounds — safe, verifiable alternatives​

Microsoft’s immediate guidance — and the safest short‑term path — is to bypass the broken MCT and download the official Windows 11 ISO from Microsoft’s Software Download site, then create bootable media from that ISO. Community and industry reporting, as well as Microsoft’s release notes, recommend this approach until a patched Media Creation Tool is released.
Below are clear, step‑by‑step options ranked by safety and supportability.
  • Official ISO + Windows‑native install (supported)
  • Download the Windows 11 ISO for x64 (or Arm64 if available) from Microsoft’s official download page.
  • Double‑click the ISO from within Windows and run setup.exe to perform an in‑place upgrade (this preserves files and apps where supported).
  • Alternatively, mount the ISO and run the installer — or write the ISO to USB (next steps) if you need a bootable device.
  • Why: This uses Microsoft‑supplied media and keeps you on supported upgrade paths.
  • Official ISO + trusted third‑party USB writer (fast and flexible)
  • Tools commonly used:
  • Rufus — actively maintained, widely used, and offers advanced options (including “Extended Windows 11 Installation” modes that can relax TPM/Secure Boot checks). Rufus writes Microsoft ISOs reliably to USB and supports UEFI/GPT configurations.
  • Ventoy — ideal if you want a persistent multi‑ISO USB stick.
  • Steps:
  • Download the Windows 11 ISO from Microsoft.
  • Run Rufus (or preferred tool), select the ISO, choose the target USB (8 GB+ recommended), and write.
  • Boot the target PC from USB and follow setup.
  • Caveat: Rufus and similar tools are third‑party; they are widely trusted in the community but carry the normal operational risks of non‑Microsoft software. Use official ISOs only.
  • Use a Windows 11 host to run the MCT (practical workaround)
  • If you have access to a Windows 11 machine, run the Media Creation Tool there to create a bootable USB that will work on other PCs. This avoids the Windows 10 host regression entirely.
  • Windows 11 Installation Assistant or Windows Update (where available)
  • For eligible devices, Windows Update will offer the upgrade automatically; the Installation Assistant can perform an in‑place upgrade without creating external media.
  • These are Microsoft‑supported and preserve installed apps and settings. Use them if your device meets Windows 11 hardware requirements.

Risks and trade‑offs — what to watch for with workarounds​

  • Third‑party tools can be misused. Rufus and Ventoy are reputable, but using third‑party images or hacked ISOs is unsafe. Always download the ISO from Microsoft and verify checksum where possible.
  • Bypassing hardware checks (TPM/Secure Boot) has consequences. Rufus and other tools can create media that installs on machines that don’t meet Windows 11 minima — this is useful for hobbyists but may result in unsupported configurations or future update problems. Organizations should avoid unsupported installs for production devices.
  • Silent failures hide data‑loss risks. Because MCT can terminate with no message, users may assume an operation completed or an ISO was created when it wasn’t. Always verify the USB or ISO contents before using them for an install.
  • Timing and patch gaps. Media created from older ISOs may require many cumulative updates after install. The MCT release in late September aimed to provide fresher 25H2 base ISOs that reduce post‑install patching; using an older ISO means more downloads afterwards. Plan for update time and bandwidth.

Recommendations — practical guidance for different audiences​

For home users and small IT teams:
  • If MCT fails on your Windows 10 PC, download the official Windows 11 ISO and create a bootable USB with Rufus or mount the ISO and run setup for an in‑place upgrade. Verify the ISO file size and checksum when possible.
  • Prefer the Windows 11 Installation Assistant or Windows Update if your PC is offered the upgrade — they are the simplest supported paths that preserve apps and settings.
  • Keep backups. A last‑minute upgrade rush is a high‑risk time to make system changes; ensure a complete backup before attempting a clean install.
For IT admins and refurbishers:
  • Avoid relying on ad‑hoc runs of the consumer MCT on Windows 10 hosts. Maintain canonical ISOs in a secure, internal repository and use enterprise imaging workflows or Windows Update for Business to avoid last‑minute surprises.
  • If you need to create media at scale, use a Windows 11 build machine to generate the USB images until Microsoft ships the MCT update.
For Microsoft (lessons and expectations):
  • Critical tooling used for mass migration windows should have clearer compatibility gating and rollback options. When a tool central to migrations breaks, users expect either an immediate rollback or a hotfix and transparent timing. The lack of a public ETA and the terse advisory left many users scrambling and increased reliance on third‑party tools.

What to expect next — timeline and fixes​

Microsoft has stated it is “working on a resolution” and that a corrected Media Creation Tool update will be released in a future update. No firm ETA was provided in the public advisory; until Microsoft publishes a patch and release notes verifying which MCT build resolves the regression, the only reliable options are the ISO‑based workarounds and alternative upgrade paths outlined above. Community trackers and vendor coverage will typically confirm the fix once Microsoft rolls out the updated MCT — monitor Microsoft’s Release Health and Software Download pages for updates.

A broader perspective — why this matters beyond a single bug​

At scale, migrations are more than downloads: they’re coordination windows involving backups, hardware eligibility checks, peripheral and app compatibility, and user training. Tools like the MCT are designed to reduce friction in that ecosystem; when they fail at a high‑visibility moment, the results are not merely technical glitches — they are operational disruptions. For many users, the Windows 11 migration decision is already constrained by strict hardware requirements and by freshly introduced setup demands (for example, Microsoft Account requirements and tighter hardware gating). A broken official tool at the EoS cutoff increases the chance users will make unsafe choices, fall back to unsupported installs, or run unpatched Windows 10 systems beyond October 14, 2025.
From a product and trust standpoint, this episode underlines the need for:
  • Better compatibility testing against the older host OS when shipping migration utilities.
  • Improved communication channels with clear rollbacks and patch ETAs for critical tooling.
  • Preserving simple, offline upgrade paths so users without a modern host or fast internet can still move to supported configurations.

Conclusion​

The failure of the Windows 11 Media Creation Tool (version 26100.6584) to run on Windows 10 22H2 hosts — confirmed by Microsoft and widely reproduced in the community — is a concrete, avoidable headache landed at one of the worst possible moments: days before Windows 10’s end‑of‑support deadline. While Microsoft has acknowledged the issue and recommended downloading the Windows 11 ISO directly as a workaround, the incident spotlights how fragile migration channels can be when tooling is updated without a smooth compatibility fallback. Home users and small IT teams should follow the official‑ISO workarounds, prioritize backups, and avoid unsupported hardware hacks unless absolutely necessary. Enterprises should maintain canonical ISOs and managed update channels to prevent last‑minute exposure. Microsoft will need to publish a clear corrective update and a technical post‑mortem for this regression to restore confidence and to ensure the next mass migration window is less treacherous.

Source: theregister.com Problems with Windows 11 media creation tool on Windows 10
 

Microsoft shipped a Windows 11 Media Creation Tool update that can now refuse to run on many Windows 10 machines — and it landed at one of the worst possible moments: days before Windows 10’s scheduled end of support on October 14, 2025.

Calendar marks October 14, 2025 as Windows end-of-support, beside a Windows ISO and Media Creation Tool.Background​

Microsoft’s Media Creation Tool (MCT) is the familiar, one-file utility millions of users rely on to download official Windows ISOs and create bootable USB installers. For home users, refurbishers and small IT teams the MCT has long been the simplest supported route for producing installation media for clean installs, reinstalls and recovery. In late September Microsoft released an updated MCT identified by build metadata around 26100.6584; shortly thereafter users and independent testers began seeing the tool launch, show a brief UAC/Windows logo splash, then exit with no error and produce no media when run from Windows 10 hosts. Microsoft has acknowledged the problem in its release-health/update-history notes and recommended workarounds while it prepares a fix.
At the same time, October 14, 2025 is a fixed lifecycle milestone: Microsoft will stop issuing routine security updates for consumer editions of Windows 10 unless devices are enrolled in the company’s Extended Security Updates (ESU) program or migrated to Windows 11 or another supported OS. The collision of a migration-tool regression and a hard end-of-support deadline is the core of the current disruption.

What Microsoft has said — and what’s been observed​

Official statement and scope​

Microsoft’s public update-history entry calls out the Media Creation Tool version 26100.6584 (published September 29, 2025) and says it “might not work as expected when used on Windows 10 devices,” noting the tool may close unexpectedly with no error message. The company’s advisory highlights Arm64 hosts specifically — the MCT has never fully supported creating Arm64 install media from Arm64 hosts and Microsoft explicitly calls out an Arm64-related failure scenario — and offers the safe workaround of using an AMD64/x64 host or downloading the ISO directly.

Community and independent testing​

Independent outlets and multiple community reproductions report slightly different patterns: testers ran the MCT on typical Windows 10 (x64) machines and observed the same silent exit behavior, meaning the symptom is not strictly confined to niche Arm64 workflows in the wild. Repeated reports show the same UX: double-click the MCT, accept UAC, see a Windows logo flash, then the executable exits with no dialog or helpful diagnostic. Event logs shared by administrators in several community threads point to early lifecycle crashes (SetupHost.exe / ntdll.dll exceptions) in some cases. That difference — Microsoft’s Arm64-focused note versus community reports on x64 Windows 10 hosts — is important to highlight and remains unresolved until Microsoft publishes more technical detail.

Why this matters now: timing, scale and risk​

  • The timing is critical. Windows 10’s end of support is a hard, public date: October 14, 2025. That deadline pushed many users into a last-minute migration window, increasing reliance on the simplest possible upgrade flows.
  • The MCT is the single-click convenience tool many non-technical users trust to produce official media. When that tool fails silently, users can be left with no reasonable next step other than to seek help, use third-party tools (with attendant security trade-offs), or risk postponing migration.
  • A silent crash is worse than a clear error: it offers no diagnostic to guide non-experts, raising the chance they will attempt unsafe or unsupported workarounds (unsigned ISOs, bypass patches, or tools that relax TPM/Secure Boot checks).

The exact impact: who is affected​

  • Primary affected group: Windows 10 consumer devices (commonly version 22H2), where users attempt to run the new MCT locally to create Windows 11 media. Reports indicate many typical x64 desktops and laptops are affected.
  • Secondary affected group: Arm64 device users and device builders who try to create Arm64 media from Arm64 hosts — Microsoft notes this workflow is specifically unsupported in the affected build and is failing more obviously.
  • Not affected (in most cases): environments that already use canonical ISOs, enterprise imaging pipelines (WSUS/MDT/Intune), or Windows 11 hosts used to create media; these paths remain viable and are the practical recommended workarounds.

What Microsoft recommends (official workarounds)​

Microsoft’s public guidance — while the company fixes the MCT — points users to the following options:
  • Use the Windows 11 Installation Assistant to perform an in-place upgrade (if the device passes the health checks).
  • Download the Windows 11 ISO directly from Microsoft’s software-download page and use that ISO to create a bootable USB or perform an upgrade.
  • Create the media on a Windows 11 / AMD64 host if one is available; the MCT tends to run on Windows 11 hosts even when it fails on Windows 10 machines.
Community reporting and Microsoft’s note line up on these workarounds, but each has accessibility and technical implications for non-technical users.

Practical, safe alternatives for users and admins​

If you planned to use the Media Creation Tool on a Windows 10 PC and it fails, follow this checklist to migrate safely.

Immediate checklist (short)​

  • Back up your data first: full image or at minimum user folders to external storage or cloud.
  • Verify your PC’s eligibility for Windows 11 with PC Health Check or Windows Update prompts.
  • Choose one of the supported workarounds below, not unsupported hacks.

Supported paths (detailed)​

  • Use the Windows 11 Installation Assistant to perform a guided in-place upgrade. This preserves apps and settings and is the lowest-friction supported path when offered to your device.
  • Download the Windows 11 ISO and create bootable media:
  • Steps:
  • Download the official ISO from Microsoft’s software-download page.
  • Verify the ISO checksum when available (compare published SHA256).
  • Use a trusted tool such as Rufus or the built-in Windows mounting + setup.exe process to create or mount the media.
  • Run setup.exe from the mounted ISO for an in-place upgrade or boot from the USB for a clean install.
  • Benefits: full control, no third-party servers; drawbacks: slightly more technical.
  • If you have any Windows 11 PC handy, run the Media Creation Tool there to create USB media for your Windows 10 target(s). The MCT often runs fine on Windows 11 hosts.
  • For administrators: maintain canonical ISOs in an internal repository and use enterprise provisioning tools (WDS, MDT, Intune, WSUS) rather than ad-hoc MCT runs on mixed hosts.

Step-by-step: Download ISO and create bootable USB (safe path)​

  • Download the official Windows 11 ISO from Microsoft’s download page.
  • Connect a USB drive (8 GB+).
  • Verify the ISO’s checksum if Microsoft publishes it.
  • Use Rufus or the built-in Windows method:
  • Rufus: select ISO, target partition scheme, enable recommended settings and click Start.
  • Built-in: right-click ISO → Mount → run setup.exe and follow the in-place upgrade prompts.
  • If doing a clean install, boot the target PC from USB (enter UEFI boot menu) and follow the installer instructions.
  • After install: run Windows Update until the device reports “Your device is up to date.”
Note: If your hardware is unsupported by Windows 11 (TPM/CPU constraints), those unsupported installs can be performed with third-party tools, but doing so carries security and update risks. Prefer ESU or hardware upgrades instead.

The Extended Security Updates (ESU) consumer option — what you need to know​

Microsoft has provided a one-year bridge for consumer Windows 10 users: the ESU program for eligible devices offers security-only updates through October 13, 2026 if enrolled. Microsoft published enrollment mechanics that include a free route via Windows Backup (sync settings to a Microsoft Account), a free route via redeeming 1,000 Microsoft Rewards points, or a paid one-time option (reported around $30 USD per account to cover multiple devices). Microsoft also made a regional concession: users in the European Economic Area (EEA) can enroll for free without meeting the backup requirement, following regulatory and consumer pressure. These program details have been confirmed by multiple independent outlets and community reporting.
Important clarifications:
  • ESU is security-only — it does not include feature updates, non-security bug fixes, or broad technical support.
  • ESU is a migration bridge, not a permanent support plan. Plan device replacement or gradual migration during the ESU year.

Critical analysis: strengths, weaknesses and risks​

Strengths of Microsoft’s response​

  • Microsoft quickly acknowledged the problem in its Release Health/update history and offered practical, supported workarounds (direct ISO, Installation Assistant). That reduces confusion and points users to safe paths rather than unsupported hacks.
  • Canonical ISOs and enterprise imaging remain intact as resilient fallback paths; organizations that prepared ahead are largely unaffected.

Weaknesses and process failures​

  • The regression landed at a high-visibility, high-stakes moment — immediately ahead of Windows 10’s EoS deadline — which magnified user impact. Critical migration tooling should be validated across supported host OS versions, and here that validation appears to have been insufficient. Independent reproductions on x64 hosts suggest gaps between testing matrices and real-world usage.
  • The symptom is silent: a tool that exits with no error leaves non-technical users stranded. This UX failure is poor product design for a migration utility.
  • Microsoft’s advisory focuses on Arm64 behavior, while community reports point to broader host-OS problems. The mismatch between vendor messaging and community experience erodes trust and complicates decisions for users who need to act immediately.

Security and ecosystem risks​

  • Non-expert users are more likely to adopt risky third-party workarounds under pressure (unsigned ISOs, unsupported bypasses for TPM/Secure Boot), potentially creating unpatchable or insecure device states.
  • The ESU program is a one-year safety net. If users delay migration because of tooling issues, they may find themselves unprotected after ESU expires. Advocacy and regulatory pressure in Europe changed ESU terms for the EEA, exposing policy inconsistencies across regions.

What Microsoft should (and likely will) do next​

  • Release a corrected MCT build with an explicit note about which host OS versions are validated and the exact build string that resolves the regression.
  • Publish an engineering post‑mortem describing the root cause (dependency change, signing/manifest issue, or other), and the remediation timeline so administrators can plan.
  • Provide a temporary fallback MCT binary explicitly targeted and tested for Windows 10 hosts to reduce last-minute migration friction.
  • Improve in-product messaging on the download page: if a given MCT build is incompatible with Windows 10 hosts, show a clear banner telling users to download the ISO or use another PC.

Bottom line and actionable recommendations (for readers today)​

  • Don’t rely on a single tool. If you need to move off Windows 10 now, use the Windows 11 Installation Assistant if it’s offered, or download the ISO and create media yourself following the step-by-step guidance above.
  • Back up everything first. Last-minute migrations are when data-loss mistakes happen most often.
  • If your device cannot meet Windows 11 hardware requirements, evaluate the consumer ESU option today — learn the enrollment routes (Windows Backup sync with a Microsoft Account, Microsoft Rewards points, or the paid one-time route) and choose what fits your privacy and budget trade-offs. Remember EEA users have a different enrolment concession.
  • For IT admins and refurbishers: keep canonical ISOs in a secure repository, use enterprise deployment tooling, and avoid relying on ad-hoc runs of consumer MCT instances on mixed hosts.

Microsoft broke—or at least shipped a regression in—an installation utility that many users would have depended on in the final days of Windows 10 support. The immediate harm is manageable: verified ISOs, the Installation Assistant, and enterprise imaging remain valid alternatives. The longer-term damage is reputational and procedural: critical migration tools need conservative validation, clearer messaging, and predictable fallbacks when shipped during a mass-migration window. Microsoft has acknowledged the problem and provided safe workarounds; a corrected MCT build and a transparent technical explanation should be treated as priority one for the company to restore trust and to close this awkward chapter in the Windows 10 to Windows 11 migration.

Source: Windows Central Microsoft breaks Windows 11 upgrade tool when it’s needed most
 

Microsoft’s official Windows 11 Media Creation Tool (MCT) is failing to run on many Windows 10 systems — a regression Microsoft has acknowledged — and the timing couldn’t be worse: the problem arrived in late September in MCT build 26100.6584, immediately before Windows 10’s public end-of-support deadline, forcing users and small IT teams into manual, higher-risk upgrade workflows while a patch is developed.

Windows 11 Media Creation Tool displays a 'Something went wrong' error.Background / Overview​

The Windows 11 Media Creation Tool is Microsoft’s supported utility for downloading official Windows 11 images and creating bootable USB sticks or DVDs. For many users it’s the fastest, simplest way to create installation media or perform clean installs and repairs. The recent MCT update (reported in community testing and Microsoft’s release notes as version 26100.6584, published around September 29, 2025) introduced a regression: when executed on some devices still running Windows 10, version 22H2, the tool launches, briefly shows the Windows splash, and then exits without an error message or completed media creation. Microsoft marked the behavior as a known issue and has advised affected users to use manual ISO downloads until a corrected MCT is released.
This is not the first MCT-related snag this autumn — Microsoft previously documented Arm64-specific failures with the MCT after the Windows 11 25H2 release, and public reports confirm the new build exacerbated host-OS compatibility problems across both Arm64 and x64 Windows 10 machines. The company has promised a fix via a future MCT update but has not provided a firm ETA.

What Microsoft has confirmed​

  • Affected MCT build: Microsoft’s release notes reference Media Creation Tool version 26100.6584, released in late September 2025, as the build that “might not work as expected when used on Windows 10 devices.”
  • Symptom: The tool may close unexpectedly, displaying no error message after the initial UAC prompt and Windows splash screen. This is an early-process termination rather than a partial failure during ISO creation.
  • Scope called out by Microsoft: Microsoft explicitly noted Arm64 hosts as affected for creating Arm64-targeted media; community testing shows the silent exit also occurs on many x64 Windows 10 22H2 systems.
  • Official short-term guidance: Microsoft recommends downloading the official Windows 11 Disk Image (ISO) for x64 devices directly from the Windows software-download page and using that ISO to create bootable media until MCT is fixed.
These points mirror the community-sourced reproductions and a number of independent news reports that tested the failure and confirmed the behavior.

Why the timing matters: Windows 10 end-of-support​

Windows 10 reaches its hard end-of-support date on October 14, 2025. After that date, Microsoft will no longer provide routine security updates or technical support for standard consumer editions unless customers enroll in an Extended Security Updates (ESU) program. That firm deadline has driven many remaining Windows 10 users into last-minute upgrade or recovery-media creation activities, which is precisely the moment they most rely on an easy, officially supported tool like the MCT. Microsoft’s lifecycle documentation reiterates the October 14, 2025 end-of-support milestone and the options for staying supported — upgrade to Windows 11, get a new device, or enroll in ESU.
Because the MCT regression appeared in the final migration window, its impact is magnified: home users, refurbishers, and small IT teams that depend on on-device media creation now face extra steps or delays, increasing the risk of leaving endpoints unpatched after EoS.

Technical symptoms and likely root causes (what we know and what remains speculative)​

Observed behavior​

  • The MCT executable prompts for UAC, displays the Windows splash briefly, and then terminates with no visible error and no created ISO or USB. Event Viewer traces shared in community forums sometimes show early crashes in SetupHost.exe with ntdll.dll exceptions, suggesting the fault occurs during the MCT bootstrap phase.

Plausible technical explanations​

  • The MCT may have been built and tested primarily on Windows 11 host environments; subtle runtime differences (service versions, new APIs, or tightened library dependencies) between Windows 11 and Windows 10 could expose an incompatibility introduced in the new binary. A missing or incompatible dependency, or a host-OS conditional check that is mishandled, could lead to an early abort with no user-facing diagnostics.
  • For Arm64 hosts, Microsoft previously documented that the MCT doesn’t support creating Arm64-targeted media from Arm64 hosts; the latest binary appears to have regressed further and affected even Arm64→x64 creation paths.

What Microsoft has not (yet) published​

  • No public post‑mortem, stack trace dump, or root‑cause analysis has been released by Microsoft, and the company has not provided a fixed-release schedule besides saying “a future update to the Media Creation Tool” will include the fix. That lack of granularity leaves administrators to rely on manual workarounds for now.

Who is affected — and who is not​

  • Affected: Windows 10, version 22H2 devices attempting to run MCT build 26100.6584 locally to create Windows 11 media. The symptom has been reproduced on a range of x64 desktops and laptops in community labs and media testing.
  • Also affected: Some Arm64 device workflows (Microsoft explicitly called this out), where the MCT may refuse to run or show the generic “unable to run tool” error.
  • Not generally affected: Environments using managed deployment channels (WSUS, Microsoft Endpoint/Intune images, enterprise ISOs) or Windows Update / Installation Assistant workflows remain viable. The MCT regression primarily inconveniences users who relied on the single-click MCT flow on Windows 10 PCs.
Important caveat: Microsoft and third‑party reporting have not disclosed precise telemetry on how many users are impacted. Any headline claiming a specific number of affected devices should be treated cautiously unless backed by vendor telemetry.

Official temporary workarounds (safe and supported)​

Microsoft’s guidance — and the consensus from multiple independent outlets — is to bypass the Media Creation Tool and use supported alternative methods until a corrective MCT update ships. The two primary, safe workarounds are:
  • Download the official Windows 11 ISO directly from Microsoft’s Software Download page and create bootable USB media manually (recommended for clean installs or when MCT fails).
  • Use the Windows 11 Installation Assistant on the Windows 10 PC for an in‑place upgrade if the device is eligible; this path preserves apps and files and avoids MCT entirely.
Both approaches keep users on official media and avoid untrusted third‑party workarounds.

Step-by-step: Create a bootable Windows 11 USB from the ISO (safe procedure)​

  • Download the official Windows 11 (multi‑edition) ISO from Microsoft’s software download page. Ensure you select the correct architecture (x64 for most PCs).
  • Verify the downloaded ISO checksum if Microsoft provides one (use SHA‑256 tools built into many OS toolkits or third‑party hash utilities). Verification reduces risk of a corrupted or tampered image.
  • Choose a trustworthy USB creation tool:
  • For most users: mount the ISO in File Explorer (right‑click → Mount) and run setup.exe for an in‑place upgrade.
  • For bootable USBs: use a well-known utility like Rufus to write the ISO to a USB drive. Rufus is frequently updated and widely used for this purpose. Use its defaults unless you need advanced partitioning options.
  • If you need to bypass specific hardware checks (TPM / Secure Boot) on an ineligible device, be aware that using “bypass” options can produce an unsupported configuration that may affect future updates and support; proceed only after understanding the tradeoffs.
  • Boot from the created USB on the target PC (BIOS/UEFI boot menu), choose upgrade or fresh install, and backup first. Never start an OS install without current backups of critical data.
For enterprise workflows, continue using managed images distributed via MDT, SCCM, Intune, or WSUS rather than ad hoc MCT-based images.

Practical troubleshooting checklist if MCT fails​

  • Confirm you downloaded the latest MCT executable (re-download to rule out corruption).
  • Try running the tool on a Windows 11 host (if available) to create the USB and use it on the target machine — several community reports show the MCT continues to run on Windows 11 machines when it fails on Windows 10.
  • Use the Windows 11 Installation Assistant for in-place upgrades if hardware eligibility is met.
  • If you absolutely must use the MCT on an Arm64 device, switch to an AMD64/x64 host for media creation; Microsoft noted Arm64 hosts are currently unsupported for producing Arm64-targeted media with the affected build.

Risk analysis — what could go wrong if you follow ad-hoc routes​

  • Using unsigned, patched, or third‑party “MCT fixes” is risky. Unofficial wrappers or patched binaries can introduce malware or create unsupported OS states that may fail later updates. Avoid them unless vetted by trusted security auditors.
  • Bypassing hardware checks (TPM, Secure Boot) to run Windows 11 on unsupported hardware can leave a system out of Microsoft’s supported update path and may prevent future cumulative updates or features. Consider the long-term support implications before electing to bypass checks.
  • Rushed migrations without proper backups risk data loss; always create full images or at least file-level backups before mass upgrades or clean installs.

What IT teams should do now (prioritized checklist)​

  • Prioritize devices by risk and compatibility: identify machines that are eligible for direct Windows Update/Installation Assistant upgrades versus those requiring fresh images.
  • For high‑risk or critical endpoints, prefer managed, tested installation media built from canonical ISOs and validated with your standard agent/EDR stacks.
  • Batch‑test the manual ISO → Rufus → USB workflow on representative hardware before broad deployment.
  • Communicate to end users the official, supported workarounds and warn against downloading unofficial “fixes” or patched MCT binaries.
  • If extended protection is required, evaluate enrollment in Extended Security Updates (ESU) while migrations are staged. Microsoft’s documentation describes ESU options and tradeoffs.

Why this incident is notable — and where Microsoft is vulnerable​

This regression is noteworthy not because it blocks upgrades entirely but because it breaks a high-trust convenience path at a critical inflection point in Microsoft’s lifecycle timetable. The Media Creation Tool historically occupies a unique place for home users and small IT teams: it removes friction from creating official media. When that tool fails silently, non-technical users lose direction and are more likely to adopt dangerous or unsupported shortcuts.
From a process standpoint, the incident highlights three areas for scrutiny:
  • Testing coverage: A binary pushed with host‑OS regressions suggests gaps in cross‑OS validation (Windows 11 vs Windows 10 test matrices).
  • Error handling: The tool exits without a user-facing error; better telemetry, clearer messaging, or a fallback to direct ISO download instructions would reduce user confusion.
  • Communications cadence: Microsoft’s release-health entry and advisory are appropriate, but a more detailed timeline or rollback option would reduce uncertainty for administrators operating near EoS deadlines.

When can users expect a fix?​

Microsoft has stated a fix will be delivered “in a future update to the Windows 11 media creation tool,” but no firm date has been provided. Given the company’s emphasis on encouraging upgrades to Windows 11 and the high-profile nature of the regression, a corrective release is likely to be prioritized; however, until Microsoft publishes a concrete release note or replacement binary, organizations should continue with the ISO-based workarounds. Keep an eye on Microsoft’s release-health notifications and the Windows 11 update history for a formal resolution notice.

Quick reference — immediate actions for users who encounter the failure​

  • Do not install unofficial “MCT patches.”
  • Download the official ISO and create your USB with Rufus or the built-in mounting tools.
  • If eligible and you want to preserve apps and settings, run the Windows 11 Installation Assistant for an in-place upgrade.
  • Back up before you upgrade; verify backups can be restored.
  • If you manage a fleet, test workflows now and schedule staged upgrades rather than rushing a mass conversion on the EoS date.

Conclusion​

The Media Creation Tool failure is a textbook example of the operational friction that can happen when a vendor delivers a host‑sensitive binary at a critical lifecycle moment. Microsoft has acknowledged the problem with MCT version 26100.6584, recommended safe ISO-based workarounds, and promised a fix — but the lack of a precise ETA and the silent-crash symptom leave users dependent on manual procedures for the short term. For individuals and IT teams still migrating off Windows 10, the pragmatic response is simple: backup, download the official Windows 11 ISO, create verified media, and avoid third‑party “quick fixes.” Treat this episode as a reminder to keep canonical ISOs and tested upgrade playbooks on hand — good practice even when vendor tools “just work.”


Source: TechWorm Windows 11 Media Creation Tool Not Working on Windows 10 PCs
 

Microsoft’s migration toolkit stumbled at the worst possible moment: an update to the Windows 11 Media Creation Tool (MCT) published in late September — identified in community and vendor reporting as version 26100.6584 — can refuse to run on machines still running Windows 10, closing immediately with no error message, and Microsoft has acknowledged the problem while recommending ISO and other workarounds as a temporary fix.

Windows 11 Media Creation Tool on a laptop beside a calendar showing Windows 10 end of life on Oct 14, 2025.Background​

The Media Creation Tool is the one‑file utility many consumers, technicians, and small IT teams rely on to download an official Windows ISO and produce a bootable USB or DVD for installs and clean upgrades. It has long been the simplest Microsoft‑supported route to make installation media without wrestling with ISO links, image checksums, or third‑party utilities. The tool’s convenience is precisely why its failure matters: at scale, a silent crash leaves non‑technical users with no actionable diagnostics and creates a scramble for alternatives at a moment when the clock is ticking on migration decisions.
Windows 10 reaches its published end‑of‑support milestone on October 14, 2025, after which routine security and quality updates for consumer editions cease unless a device is covered by Extended Security Updates (ESU) or migrated to a supported OS. That fixed date compressed migration timelines for many users and small organizations, increasing reliance on Microsoft’s consumer upgrade flows — including the MCT. Independent reporting and Microsoft’s own release‑health notes confirm the MCT regression and recommend interim workarounds.

What Microsoft confirmed — the hard facts​

  • Microsoft’s release‑health/known‑issues entry identifies the affected binary as the Windows 11 media creation tool version 26100.6584, released September 29, 2025, and states that the tool “might not work as expected when used on Windows 10 devices” and that it “might close unexpectedly, displaying no error message.”
  • Microsoft’s recommended short‑term mitigations are straightforward: use Windows Update (if the Windows 11 offer is available for your device), use the Windows 11 Installation Assistant for an in‑place upgrade, run the MCT on a Windows 11 host to create media for other PCs, or download the Windows 11 ISO directly and write it to a USB drive using a trusted utility. Microsoft says it is “working on a resolution” and will release a fix in a future MCT update.
  • Community testing and independent outlets reproduced the symptom: the executable starts, a UAC prompt appears, a Windows splash briefly shows, and then the MediaCreationTool process exits with no visible error and produces no ISO or bootable media when run from Windows 10, version 22H2 systems. Event log tracings shared in forums show early crashes referencing SetupHost.exe and ntdll.dll in some reproductions, indicating the failure often occurs during early bootstrap steps.
These are the load‑bearing, verifiable claims: the build metadata (26100.6584), the observed symptom set (silent exit / no error), Microsoft’s public advisory and recommended workarounds, and the hard support deadline for Windows 10. Each of these points is cross‑checked by vendor guidance and independent reporting.

Why this failure is more than an annoyance​

A tool that “just works” matters more for a mass migration than any single new feature. The severity of this regression arises from several converging factors:
  • Timing: the MCT update landed in late September 2025 and the problem was acknowledged in early October — just days before Windows 10’s official end‑of‑support deadline on October 14, 2025. That deadline pushed many non‑tech users into last‑minute migration windows, heightening the impact of a broken, Microsoft‑branded path.
  • Visibility and trust: the Media Creation Tool is Microsoft’s sanctioned method to create official install media. When the vendor’s own tool fails silently, users may assume no other trustable option exists and either delay migration or turn to third‑party tools without verifying checksums or provenance.
  • Operational risk for small shops: enterprises with managed deployment pipelines (WSUS, Intune, enterprise images) have alternate, controlled routes. But home users, refurbishers, and small IT teams often rely on a single PC and a single‑click tool — the exact group most exposed by this regression.
  • Silent failure is dangerous: a visible error (with an error code and link to guidance) is fixable; a silent exit leaves users guessing. That ambiguity increases support calls, error‑prone workarounds, and potentially unsafe attempts to bypass hardware checks (TPM, Secure Boot) or to use unverified ISOs.

Who’s affected and who isn’t​

  • Affected: Users running Windows 10, version 22H2 (the version Microsoft references) who attempt to run the currently published MCT binary on that host. Community reports also show the symptom on x64 Windows 10 hosts, not only on Arm64 devices, so practical impact is broad where Windows 10 is still in use.
  • Particularly affected: home users without a Windows 11 host on hand; small businesses that use ad‑hoc media creation on existing Windows 10 machines; refurbishers and technicians who create media onsite for clients.
  • Less affected: Organizations using enterprise image pipelines (WSUS, MDT, Intune), admins who keep canonical ISOs, or users who can run the MCT from a Windows 11 device (the same MCT binary often runs normally on Windows 11 hosts) and then use that USB to upgrade a Windows 10 target.

Technical anatomy — what we know and what we don’t​

The manifest symptom — a rapid exit after the UAC and splash — and some shared Event Viewer traces implicate an early initialization fault in SetupHost.exe, with occasional references to ntdll.dll exceptions in community crash logs. That points to a host‑OS incompatibility or an early dependency check that fails on Windows 10 environments, but Microsoft has not published a root‑cause post‑mortem or a developer post explaining why the new MCT binary regresses on Windows 10. Until Microsoft releases deeper diagnostics, explanations beyond the observed behaviour remain speculative. Treat these theories as provisional:
  • Plausible (but unverified) causes:
  • A new runtime dependency or compatibility flag in the MCT that is present on Windows 11 but absent or differently configured on Windows 10.
  • An inadvertent build configuration or signing change that triggers a silent exit pathway on older hosts.
  • An Arm64 handling bug that also surfaces on some x64 Windows 10 stacks due to shared codepaths.
  • Unverifiable claims: assertions that Microsoft intentionally “blocked” Windows 10 hosts, or that the regression is a deliberate gating mechanism, are not supported by available evidence and should be treated with caution until independent telemetry or an official engineering post confirms motives or design intent.
Microsoft’s public advisory limits itself to confirming the symptom, recommending workarounds, and stating a fix will appear in a future MCT update. That lack of detail is pragmatic but dissatisfying for power users and IT professionals who want an ETA or rollback option.

Practical workarounds — safe, supported steps right now​

If the MCT exits on your Windows 10 PC, follow the paths Microsoft and independent experts recommend. These options are ordered by safety and supportability.
  • Use Windows Update (Settings > Update & Security > Windows Update) if the Windows 11 upgrade offer appears there. This is the simplest, fully supported path for eligible devices.
  • Use the Windows 11 Installation Assistant to perform an in‑place upgrade while retaining apps and files. This tool runs on Windows 10 and manages compatibility checks for you.
  • Download the official Windows 11 ISO directly from Microsoft’s Software Download page and create bootable media manually:
  • Download the ISO from Microsoft.
  • Verify the SHA‑256 checksum if Microsoft publishes it (always validate if available).
  • Use a trusted tool (Rufus, Ventoy, or Windows’ built‑in mounting and "create bootable USB" flows) to write the ISO to a USB drive. Verify the created media boots in UEFI/BIOS before using it for production upgrades.
  • If you have access to a Windows 11 PC, run the Media Creation Tool there to create a USB installer, then use that USB on the Windows 10 machine. Community reproductions show that the same MCT binary is more reliable when run on Windows 11 hosts.
  • If Windows 11 is not possible and you must remain on Windows 10, evaluate Extended Security Updates (ESU) eligibility or look at controlled alternatives (Linux, managed replacement) — ESU can offer a one‑year bridge in some regions or for qualifying devices.
Important cautions:
  • Avoid random “bypass” utilities or scripts that disable TPM or Secure Boot checks unless you understand the long‑term implications for updates and support. These hacks can hinder future Windows Update behavior or leave the device unsupported by Microsoft.
  • Always back up user data and create a recovery image before attempting a feature‑update or clean install.

Step‑by‑step: create a bootable USB from the official ISO (recommended fallback)​

  • On any PC with a reliable Internet connection, go to Microsoft’s Windows 11 download page and download the Disk Image (ISO) for x64 devices. (Use the official download link; do not rely on third‑party mirrors.)
  • Optionally, check the published checksum (if available) against the ISO you downloaded.
  • Use Rufus (or Windows’ built‑in tools) to write the ISO to a USB 8GB+ drive:
  • Rufus: choose GPT partition scheme for UEFI, FAT32 to preserve Secure Boot compatibility (or NTFS if the ISO >4GB and you know your firmware supports NTFS booting).
  • Select the ISO, confirm target drive, and create.
  • Boot the target PC from the USB drive, choose Upgrade (to keep files/apps) or Custom/Clean install if you prefer a fresh start.
  • If the installer complains about hardware compatibility (TPM, Secure Boot), prefer official Microsoft guidance rather than community bypasses.
This manual ISO route adds a few steps but is the most reliable, vendor‑supported fallback until Microsoft releases a corrected MCT.

What IT teams should do now — recommended policies​

  • Preserve canonical, verified ISOs and test images. One single trusted image per SKU reduces last‑minute chaos.
  • Validate upgrade paths in a lab before mass rollout. If a tool behaves inconsistently across host OSes, use Windows 11 hosts for media creation until Microsoft publishes the fix for MCT on Windows 10.
  • Communicate clearly with end users: include backup instructions and a clear migration window. If users cannot upgrade before October 14, 2025, publish ESU instructions or supported alternatives.
  • Avoid blanket instructions to use third‑party bypass tools. If your environment requires a compatibility workaround, document the long‑term implications and custom support burden.

Broader implications — what this says about Microsoft’s testing and rollout process​

This incident highlights several operational lessons for any vendor managing low‑level migration tooling:
  • Tools intended to be backward compatible must be tested on the oldest supported hosts in the upgrade window. A regression that affects the very OS users are upgrading from is a red‑flag for gaps in cross‑OS regression testing.
  • Silent failures are worse than noisy failures. The UX should surface a clear diagnostic with a link to actionable guidance to keep non‑technical users from attempting unverified fixes.
  • Release timing matters. Pushing a tool update with wide reliance close to a hard lifecycle deadline increases the consequences of regressions.
Microsoft has acknowledged the issue and provided a fallback plan, but the absence of a clear fix ETA and the limited diagnostic detail in the advisory leaves a gap in transparency that affects technicians and power users who need to schedule migrations reliably.

Alternatives worth considering beyond Windows 11​

For users whose hardware isn’t compatible with Windows 11 or who want to explore other options, the final‑support date is a natural moment to evaluate alternatives:
  • Modern GNU/Linux distributions (Ubuntu, Fedora, Linux Mint, Manjaro) offer live USB sessions that let you try the OS without installing. These distributions have matured in hardware support, driver availability, and application ecosystems. For many users, Linux is a viable, lower‑maintenance alternative for web browsing and productivity.
  • Chromebooks or ChromeOS Flex are practical for users whose primary needs are web/browser based.
  • Buying a new Windows 11 PC remains the easiest path for users dependent on first‑class Windows application compatibility (some professional and creative apps still achieve their best experience on native Windows).
If staying with Windows is the priority, evaluate ESU options. Microsoft’s ESU program provides a temporary bridge for security updates beyond October 14, 2025 in certain scenarios, which can be a valuable breathing room while you plan upgrades.

Final analysis and risk assessment​

This MCT regression is not a security vulnerability in itself; it’s an operational blocker with potentially serious downstream security implications because it elevates the chance that systems will remain on an unsupported OS beyond the EOL cutoff. The most pressing risk is timing: users delayed by a silently failing migration tool may be left exposed to newly found vulnerabilities after October 14, 2025. Microsoft’s advisory and the availability of the Windows 11 ISO and Installation Assistant decrease systemic risk, but the lack of an ETA for a corrected MCT imposes an avoidable coordination burden on those who relied on the tool.
Key takeaways:
  • For most users, the safest immediate path is the Windows 11 Installation Assistant or Windows Update if the offer is available.
  • If you need bootable media today, download the official ISO and create USB media with a trusted writer (Rufus/Windows tools).
  • Administrators should preserve verified ISOs and favor Windows 11 hosts for media creation until Microsoft publishes a corrected MCT.
  • Avoid unsupported bypasses of hardware checks; they create longer‑term update and support liabilities.
Microsoft has confirmed the regression and is working on a fix; until then, validated ISOs and the Installation Assistant are the practical, supported alternatives. Independent reporting and community reproductions back the observed behaviour and the recommended mitigations; the principle guidance is to act deliberately, back up first, and prefer vendor‑approved paths rather than expedient hacks.

Conclusion​

A utility that once stood for “one‑click convenience” now serves as a reminder that even familiar tools require thorough cross‑platform testing — especially when a hard lifecycle deadline has placed mass migration pressure on millions of endpoints. The Media Creation Tool regression is fixable, and Microsoft is reportedly working on the corrective release, but for users facing Windows 10’s end of support the reliable course remains: use Windows Update or the Installation Assistant where possible, create media from an official ISO when not, keep backups, and avoid unsupported workarounds. The immediate crisis can be managed with established, supported alternatives; the longer lesson will be operational: plan migrations assuming any single tool might fail, and preserve canonical media and rollback plans to avoid last‑minute surprises.

Source: Liliputing Windows 11 Media Creation Tool gets a buggy update on the even of Windows 10's EOL - Liliputing
 

Microsoft will stop providing security updates, quality fixes and standard technical support for mainstream Windows 10 editions on October 14, 2025 — a firm deadline that forces a choice: upgrade eligible devices to Windows 11, enroll eligible machines in the Windows 10 Consumer Extended Security Updates (ESU) program for a limited period, or accept growing security and compatibility risk for machines that remain on an unsupported operating system.

Windows 10 upgrades to Windows 11, with an end-of-support date of Oct 14, 2025.Background​

Windows 10 launched in 2015 and has been maintained on a rolling servicing model for a decade. Microsoft has published a lifecycle calendar that confirms October 14, 2025 as the end‑of‑support date for mainstream Windows 10 editions (Home, Pro, Enterprise, Education, IoT Enterprise, and many related SKUs). After that date the OS will continue to boot and run, but Microsoft will no longer ship OS security updates, non‑security quality rollups, feature updates or provide standard product support for non‑enrolled devices.
What “end of support” means in practice:
  • No monthly OS security patches for Windows 10 Home/Pro/etc. after Oct 14, 2025 unless a device is enrolled in ESU.
  • No feature or quality updates — the installed Windows 10 build is frozen at its last supported state (version 22H2).
  • Microsoft will not provide standard technical support for Windows‑10‑specific issues on unenrolled devices.
Microsoft has published guidance that frames the practical paths forward: (1) upgrade eligible devices to Windows 11, (2) enroll in the consumer ESU program for a one‑year security bridge, or (3) replace devices with Windows 11 hardware or move workloads to cloud/virtual environments. Industry coverage and migration guidance reiterate the same set of options.

Who is affected​

This end‑of‑support milestone covers the mainstream Windows 10 editions most consumers and many businesses use:
  • Windows 10 Home and Pro (including Pro for Workstations)
  • Windows 10 Education and Enterprise
  • Windows 10 IoT Enterprise and several long‑term servicing branches specified by Microsoft
Administrators of specialized long‑term servicing channel (LTSC/LTSB) versions should consult Microsoft’s lifecycle pages because those SKUs have distinct lifecycle timelines.
Enterprise and domain‑joined devices have different migration and ESU options from consumer PCs; many managed devices are excluded from the consumer ESU enrollment path and require volume licensing or enterprise ESU contracts.

The official lifeline: Windows 10 Consumer ESU (what it is and how it works)​

Microsoft created a consumer‑oriented Extended Security Updates (ESU) program to give households and small users a time‑boxed safety valve. The consumer ESU provides security‑only updates for enrolled Windows 10, version 22H2 devices through October 13, 2026 — one year after the OS reaches end of support. ESU does not include feature updates, non‑security quality fixes or standard technical support.
Key consumer ESU facts verified against Microsoft’s documentation:
  • Coverage window for consumer ESU: Oct 15, 2025 through Oct 13, 2026.
  • Eligible devices must be running Windows 10, version 22H2 with the recommended servicing stack and cumulative updates installed. If you are on an older Windows 10 build, update to 22H2 first.
  • ESU is security‑only: Critical and Important fixes delivered via Windows Update for enrolled devices. No feature improvements, no performance enhancements, and no broad tech support.
Enrollment routes for consumer ESU (three options):
  • At no additional monetary cost if you are syncing your PC Settings via Windows Backup to a Microsoft account (OneDrive).
  • Redeem 1,000 Microsoft Rewards points for an ESU license.
  • Pay a one‑time purchase (documented by Microsoft around US$30 or local currency equivalent, plus applicable tax) and associate the license with a Microsoft account. A single consumer ESU license can be used on up to 10 eligible devices linked to the same Microsoft account.
Practical enrollment details:
  • When your device meets the prerequisites and the enrollment UX has rolled out to your machine, you will see an “Enroll now” link in Settings > Update & Security > Windows Update. That wizard guides you through signing into a Microsoft account and choosing your enrollment method.
  • Consumer ESU is intentionally time‑boxed; it’s a bridge, not a destination. Use it only to buy time for a tested transition to a supported platform.
Caveats and regional nuance:
  • Domain‑joined, many enterprise‑managed, kiosk or MDM‑managed devices are excluded from the consumer ESU enrollment UX. Enterprises must use volume licensing ESU options.
  • Microsoft’s consumer UX rollout is staged. Even if your device is eligible and fully updated, the enrollment prompt may not appear immediately. Check Settings and install all pending updates to surface the option.

Upgrade to Windows 11: why it’s the recommended long‑term fix​

Microsoft positions Windows 11 as a more modern, secure and efficient platform, and upgrading returns a device to Microsoft’s regular servicing cadence: monthly quality and security updates, feature rollouts, and standard technical support. The platform also brings hardware‑backed security features — virtualization‑based security, hardware TPM 2.0 protections and enforced Secure Boot — that reduce the attack surface compared with older, unsupported hardware.
Windows 11 minimum system requirements (key points to verify for each PC):
  • 64‑bit processor on Microsoft’s supported CPU list (1 GHz or faster, 2 or more cores).
  • 4 GB RAM minimum and 64 GB storage minimum.
  • UEFI firmware with Secure Boot capability.
  • TPM 2.0 (discrete TPM or firmware fTPM) enabled and visible to Windows.
  • DirectX 12 / WDDM 2.x compatible graphics.
    Use the PC Health Check app for a definitive compatibility report. In many machines shipped since about 2018, enabling fTPM or Secure Boot in firmware is sufficient to clear the compatibility check.
Important practical caveats:
  • Some older-but‑capable CPUs are explicitly unsupported by Microsoft’s Windows 11 CPU list; functional hardware may be denied an official upgrade. Community workarounds exist (registry bypasses and installer hacks) but Microsoft warns these are unsupported and may result in blocked cumulative updates or stability problems. For most users, these hacks are a false economy.

How to check compatibility and prepare for an upgrade​

Short checklist to determine your path:
  • Run Settings > Update & Security > Windows Update and install all offered cumulative and servicing stack updates. The Windows 10 device must be fully patched to surface the ESU enrollment and for a clean migration.
  • Install and run PC Health Check to confirm Windows 11 eligibility. If PC Health Check reports TPM or Secure Boot disabled, check your PC firmware (UEFI) or vendor support pages to enable those features.
  • Inventory your applications, licenses and peripherals: note any specialty software that vendors certify only on older Windows 10 builds. For licensed desktop apps, verify activation and de‑registration steps in case you need to move licenses.
  • Back up everything: files, photos and browser settings. Use Windows Backup, OneDrive or a sector‑aware imaging tool to create a full copy of your drive. Export local mail stores (Outlook .pst) and confirm cloud syncs are up to date.
If you decide to upgrade in place:
  • Use the upgrade path surfaced in Windows Update where available, or Microsoft’s Windows 11 Installation Assistant or Media Creation Tool for a manual upgrade. Always backup first.
If you decide to buy new hardware:
  • Use Windows Backup or OneDrive to migrate files and settings to the new Windows 11 PC; most OEMs include migration tools, and Microsoft’s backup guidance covers restoring credentials and app settings.

Step‑by‑step: immediate actions to take before Oct 14, 2025​

  • Back up now (full system image + file‑level copy). Create at least two copies: one local external drive and one cloud backup (OneDrive/Google Drive).
  • Check Windows Update and install all pending updates. Reboot until the system is fully patched. This is required for ESU eligibility and for many upgrade flows.
  • Run PC Health Check to verify Windows 11 eligibility; if TPM or Secure Boot is disabled, consult your PC vendor for firmware steps to enable them.
  • Inventory critical apps, license keys, and peripherals. Note any legacy apps that may need vendor updates or replacement.
  • If your PC cannot run Windows 11 and you are not ready to purchase new hardware, enroll in consumer ESU to get security updates through Oct 13, 2026 while you plan migration. Enrollment options include enabling Windows Backup, redeeming Microsoft Rewards, or paying the one‑time fee.

Alternatives to upgrading or buying a new Windows 11 PC​

If upgrading or paying for ESU is not acceptable, there are other, sometimes sensible, options depending on the user’s needs:
  • Migrate to a supported Linux distribution (Ubuntu, Fedora, Linux Mint). Modern Linux distributions support broad hardware and receive regular security updates. Ideal for users who only need web browsing, email and office apps.
  • Try ChromeOS Flex on older laptops as a lightweight, cloud‑centric alternative. It’s free to install and maintained by Google, though it shifts the work model to web apps.
  • Move legacy Windows workloads into a cloud VM (Azure Virtual Desktop, Windows 365 or similar) and run the unsupported Windows 10 machine only for offline tasks. Cloud-hosted Windows VMs often retain vendor support.
Each alternative carries tradeoffs: application compatibility, learning curve, peripheral support and possible subscription costs.

Risks of staying on Windows 10 past Oct 14, 2025​

Staying on an unsupported Windows 10 system is feasible in the short term but risky over months and years:
  • Newly disclosed kernel/driver vulnerabilities will remain unpatched, increasing exposure to remote code execution, privilege escalation and ransomware. Antivirus helps but is not a substitute for platform patches.
  • Third‑party software vendors will gradually shift testing and support to supported OSes; drivers and applications may lose official support, causing stability or compatibility problems.
  • Regulatory, compliance and insurance frameworks may treat unsupported OSes as higher risk, which can matter for small businesses handling customer data. Consumer ESU is a short bridge, not a compliance guarantee.
Consumer sentiment and reporting suggest many users plan to continue on Windows 10 regardless of the risks — a choice experts warn could expose people to scams, malware and financial harm if the machine is used for online banking or work connectivity.

Enterprise and managed environments: different rules, bigger decisions​

Organizations should not rely on the consumer ESU path:
  • Domain‑joined, MDM‑managed and many enterprise devices are excluded from the consumer enrollment flow. Enterprises must use volume licensing ESU or other supported migration plans.
  • Commercial ESU can be purchased on a per‑device basis for up to three years, but pricing escalates each year (for example, published guidance in migration analyses showed Year 1 pricing often around US$61 per device and higher in subsequent years). Enterprises should evaluate migration automation, application compatibility testing, and phased rollouts rather than paying escalating ESU fees.
For IT teams, the recommended path is a controlled migration plan: inventory, application testing, pilot upgrades, phased rollouts, and fallback strategies (imaging and virtualization) rather than last‑minute emergency upgrades.

Practical migration checklist (compact)​

  • Backup: full image + file backup + cloud sync.
  • Inventory: list critical apps, licenses, keys and drivers.
  • Test: use a spare device or VM to test upgrades and app behavior.
  • Confirm: PC Health Check and firmware settings (TPM/Secure Boot).
  • Enroll: ESU only if needed — enable Windows Backup or redeem Microsoft Rewards or make the one‑time purchase.
  • Execute: choose in‑place upgrade, clean install or new PC path; verify activation and restore data from backups.
  • Harden: enable built‑in Windows security features (BitLocker, Secure Boot, Windows Defender), keep browsers and apps updated.

What we verified and what to watch for​

Verified facts:
  • The Windows 10 end‑of‑support date is October 14, 2025 and Microsoft’s lifecycle documentation is explicit about which SKUs are affected.
  • Microsoft published a consumer ESU program that provides security updates through October 13, 2026 and lists three enrollment routes: Windows Backup (no charge), redeeming 1,000 Microsoft Rewards points, or a one‑time paid purchase (documented around US$30 or local equivalent).
  • Windows 11 minimum requirements include TPM 2.0 and Secure Boot; PC Health Check is the official compatibility tool.
Items that vary or deserve caution:
  • The one‑time ESU price is published as about US$30 but local pricing, taxes, currency conversion and regional differences (EEA adjustments) may apply; confirm the final price in the Microsoft Store on your account before purchasing. Treat the $30 figure as a baseline rather than an immutable price.
  • Microsoft’s staged rollout of the ESU enrollment UI means not every eligible device will immediately display the “Enroll now” link; installation of the latest cumulative updates is a necessary precondition. If your device meets eligibility but doesn’t show the option, ensure the device is on version 22H2 and fully patched, then try again.

Final verdict — short, practical guidance​

  • If your PC is eligible for Windows 11: upgrade now or within a short maintenance window after backing up. It’s the long‑term path to receive security and feature updates.
  • If your PC cannot run Windows 11 and you need time: enroll in consumer ESU to receive security patches through Oct 13, 2026, and use that window to plan a migration to supported hardware or an alternative OS. ESU is a temporary, security‑only bridge — not a permanent solution.
  • If you operate in a managed, enterprise or domain environment: consult your IT admin or licensing specialist immediately because the consumer ESU path will likely be inapplicable — enterprise ESU and migration planning are the appropriate routes.
This deadline is predictable and actionable. Back up your data, confirm your device’s status in Settings and PC Health Check, and choose a migration path that fits your budget and risk tolerance — upgrading to Windows 11 where supported is the safest long‑term choice; ESU buys time for a thoughtful transition.

Microsoft’s lifecycle announcement and the consumer ESU mechanics provide the authoritative baseline for decisions; act now to avoid last‑minute compromises and to preserve both security and continuity.

Source: CP24 Windows 10 support ends Oct. 14. Here’s what to do
 

Laptop showing Windows 11 upgrade with security and update icons on a tech desk.
Microsoft has fixed October 14, 2025 as the definitive end-of-support date for Windows 10, and that calendar cutover changes the practical security, compatibility and migration calculus for millions of PCs worldwide.

Background / Overview​

Windows 10 arrived in 2015 and has been supported with regular feature and security updates for more than a decade. Microsoft’s lifecycle policy now closes that chapter: routine OS security updates, non‑security quality fixes and standard technical support for mainstream Windows 10 editions (Home, Pro, Enterprise, Education and many IoT/LTSC variants) end on October 14, 2025. After that date, devices will continue to run but will no longer receive normal vendor patches unless explicitly enrolled in an Extended Security Updates (ESU) program.
This milestone isn’t sudden: Microsoft has provided a set of transition options, including a consumer Extended Security Updates (ESU) window that offers one year of security‑only patches (through October 13, 2026) for eligible PCs, continued security updates for some application layers (notably Microsoft 365 Apps and Microsoft Defender definitions on extended timelines), plus upgrade and trade‑in pathways to Windows 11 and Copilot+ devices.
Estimates of how many machines remain on Windows 10 vary by measurement method and timing. Some outlets reported roughly 40–50% of Windows desktop installs still on Windows 10 in mid‑2025, while other datasets show Windows 11 adoption closing the gap; treat headline percentages as indicators of scale rather than audited device counts.

What’s changing on October 14, 2025​

  • No more routine OS security updates for mainstream Windows 10 editions unless enrolled in ESU. This includes kernel, platform and driver security patches normally delivered via Windows Update.
  • No more feature or quality updates. Non‑security fixes and new feature releases for Windows 10 stop.
  • No standard Microsoft technical support. Microsoft’s customer support channels will direct users to upgrade guidance or to ESU enrollment.
  • Application‑layer exceptions: Microsoft will continue to provide limited updates for some apps and runtimes (for example, Microsoft 365 Apps receive security servicing into 2028), but those are not a substitute for OS‑level patches.
The practical upshot: your PC won’t immediately “stop working,” but its exposure to new, unpatched vulnerabilities will increase over time—especially for internet‑connected devices used for banking, remote work or storing sensitive data.

The security risks of staying on Windows 10​

Short term, an unpatched machine can remain usable and reasonably safe if it’s well‑configured, offline or behind strong perimeter protections. Over months and years, the risk profile changes materially:
  • Kernel and driver exploits that require vendor patches will remain unaddressed for unenrolled devices, increasing the chance of privilege escalation and remote code execution.
  • Ransomware and supply‑chain threats are increasingly weaponized to target known vulnerabilities; an unsupported OS becomes a larger and easier target.
  • App compatibility and support gaps. Independent software vendors and hardware manufacturers will phase out validation and driver updates for an unsupported OS, which increases stability and performance risks.
  • Compliance and insurance exposure for businesses and regulated users: running an unsupported OS can lead to audit failures or insurance complications.
Security tools (endpoint protection, browser updates, and Defender definition updates) help but cannot replace kernel‑level patches. Think of them as mitigation layers, not a substitute for the underlying platform fixes.

How to mitigate risk: the recommended hierarchy of actions​

  1. Upgrade eligible PCs to Windows 11 (preferred). For devices that meet Microsoft’s requirements, the in‑place upgrade to Windows 11 is free and restores full vendor servicing and modern hardware‑enabled protections.
  2. Enroll in the consumer ESU program (stopgap). If you need time to migrate, ESU provides a one‑year security‑only bridge through October 13, 2026 for eligible consumer devices. Use it as breathing room, not a permanent plan.
  3. Move to an alternative OS or cloud desktop if the hardware cannot support Windows 11. Linux distributions and ChromeOS Flex are viable, secure options for many use cases. Back up data before making the switch.
  4. Replace or refurbish the PC — buy a Windows 11–capable machine or a certified refurbished Windows 11 system. Many OEMs and retailers offer trade‑in or recycling incentives.

Upgrade to Windows 11 — what you need to know​

Windows 11 minimum system requirements (official Microsoft baseline) include:
  • Processor: 1 GHz or faster with 2 or more cores on a compatible 64‑bit processor list.
  • RAM: 4 GB minimum.
  • Storage: 64 GB minimum.
  • Firmware: UEFI, Secure Boot capable.
  • TPM: TPM 2.0 (Trusted Platform Module).
  • Graphics/Display: DirectX 12 compatible and display with at least 720p.
Microsoft provides the PC Health Check app and Windows Update upgrade prompts to check eligibility. For many machines bought in the last 3–4 years, in‑place upgrades are straightforward; older hardware or systems lacking TPM 2.0/secure boot will often be blocked without hardware changes.
Practical tips for upgrade:
  • Back up your files (cloud or local image).
  • Ensure Windows 10 is updated to version 22H2 and has the latest cumulative updates.
  • Run PC Health Check; if eligible, follow the Windows Update upgrade path.
  • Retain application licenses or make sure your Microsoft 365 subscription and app installers are accessible.

Extended Security Updates (ESU): the consumer bridge explained​

Microsoft’s consumer ESU program offers a time‑boxed path for personal devices that cannot be upgraded immediately:
  • Coverage window: Security‑only updates for enrolled Windows 10 devices from Oct 15, 2025 through Oct 13, 2026.
  • Eligibility: Devices must run Windows 10, version 22H2 (with required servicing stack updates) and meet enrollment prerequisites.
  • Enrollment methods (typical):
    • Free by signing into a Microsoft account and enabling Windows Backup/settings sync (or equivalent cloud sync enrollment),
    • Redeeming 1,000 Microsoft Rewards points, or
    • A one‑time paid purchase (reported at $30 USD or local currency equivalent, plus taxes) that can cover up to 10 devices tied to the same Microsoft account.
Important enrollment caveats and regional differences:
  • Microsoft has linked ESU enrollment to Microsoft account sign‑in, and devices typically must be administratively signed in with the same Microsoft account used to enroll. If you normally use a local Windows account, you may need to switch to or add a Microsoft account to your device to enroll. Some outlets confirmed the Microsoft account requirement and the 60‑day signed‑in activity rule for free enrollment.
  • European Economic Area (EEA) customers received adjusted enrollment rules in response to regulatory requirements: Microsoft removed some enrollment conditions (like mandatory backup sync) for EEA users, but a Microsoft account is still used for enrollment in free ESU pathways in many cases. Regional policy differences exist and are evolving. Flag: these EEA exceptions are regionally specific and can change—check Microsoft’s official consumer ESU guidance for your country.
Security note: ESU delivers only Critical and Important security updates — no feature updates, non‑security fixes, or standard technical support. Use ESU as a controlled extension to buy migration time.

If you can’t or won’t move to Windows 11: alternatives that keep a device useful and secure​

  • Linux (desktop distributions): Ubuntu, Linux Mint, Fedora and others provide free, actively maintained OS choices for older hardware. Linux is an excellent option for general web, email, media and developer workflows. Backup first and be prepared for a learning curve with some Windows‑only applications (use Wine or virtualization if needed).
  • ChromeOS Flex: Google’s ChromeOS Flex can be installed on many legacy PCs as a lightweight, browser‑centric OS with automatic updates and strong sandboxing. It suits users whose workflows are web‑centric (email, documents, streaming). Follow Google’s hardware compatibility guidance before installing.
  • Cloud Windows / Virtual Desktops: For users who need Windows apps, cloud desktop services like Windows 365 or Azure Virtual Desktop provide a Windows experience hosted in the cloud, accessible from thin clients or older PCs. This shifts maintenance and patching to the provider.
Each alternative has trade‑offs in app compatibility, offline use, performance and user training. Back up data, test a live USB or trial environment, and document application dependencies before committing.

Buying a new PC: what to consider​

  • Look for Windows 11 certification (firmware/TPM 2.0, secure boot, compatible CPU). Certified devices avoid the upgrade friction and ship with full support.
  • Refurbished PCs can be cost‑effective if they meet Windows 11 requirements; verify the seller’s refurbishment warranty and return policy.
  • Trade‑in programs offered by OEMs and retailers can reduce the outlay for new devices; Microsoft’s trade‑in program and similar OEM offers are commonly available.

Practical migration checklist (step‑by‑step)​

  1. Inventory devices now: record OS version, model, CPU, RAM, storage, and whether a device is domain‑joined or personal.
  2. Run PC Health Check or check Windows Update eligibility on each device. If the device reports eligible, schedule the Windows 11 in‑place upgrade.
  3. Back up everything: cloud sync, full disk image or external drive. Test the backup restoration.
  4. For non‑eligible devices, evaluate alternatives: Linux, ChromeOS Flex, cloud desktop or purchase options. Test alternatives on non‑critical hardware first.
  5. If you need time, enroll eligible devices in consumer ESU following Microsoft’s enrollment wizard (Settings → Windows Update → “Enroll in ESU” when available) and ensure you meet Microsoft account and update prerequisites. Consider the paid option only as necessary.
  6. Reconcile licenses (Office, specialized apps) and confirm compatibility with the target platform. For critical business apps, test in a pilot group before broad migration.

Special cases and FAQs​

What if my PC is “unsupported” but I really want Windows 11?​

You can technically install Windows 11 on some unsupported hardware using unofficial workarounds, but Microsoft may block updates or not support the device. Unsupported installs carry stability and security risks and are not recommended for critical systems.

Will Microsoft still update browsers or Office on Windows 10?​

Microsoft will continue some application‑level security updates for Microsoft 365 Apps on Windows 10 into 2028, and browser vendors have signaled continued support into 2026 for major browsers; however, that does not replace OS patches and cannot fully mitigate kernel‑level vulnerabilities.

Are businesses treated differently?​

Yes. Enterprises can purchase multi‑year ESU through volume licensing at escalating per‑device prices designed to encourage migration. Organizations typically plan staged migrations, device refreshes and managed enrollment rather than relying on consumer ESU mechanics.

Strengths and potential risks in Microsoft’s approach​

Strengths:
  • Clear calendar and transition pathways. Microsoft set firm dates and published guidance, reducing uncertainty about long tails of support.
  • A limited consumer ESU bridge is pragmatic: it protects home users for a year without forcing immediate hardware replacement.
  • Continued app‑level servicing (Microsoft 365, Defender definitions) helps reduce immediate operational pain for many users while migrations proceed.
Risks and trade‑offs:
  • Account‑based enrollment friction. Tying free ESU enrollment to Microsoft account sign‑in and activity rules (60‑day re‑sign requirement reported by multiple outlets) raises privacy and usability concerns for users who prefer local accounts. This also introduces a two‑tier experience across regions where rules differ.
  • Short ESU timeline. One year is useful as breathing room but insufficient for many households and small businesses to refresh hardware or validate migration paths.
  • Environmental and economic pressure. The end-of-support encourages hardware churn; users with otherwise functional devices may feel compelled to replace hardware earlier than planned. That has both consumer cost and sustainability implications.
Cautionary note: some widely circulated device‑count estimates (hundreds of millions) are best treated as order‑of‑magnitude indicators rather than audited registries—different telemetry providers use different sampling methods. Flag any precise global device total as an estimate.

Final checklist — immediate actions for readers​

  • Verify your Windows 10 version (open Settings → System → About) and update to version 22H2 if you plan to enroll in ESU or to upgrade.
  • Run PC Health Check to confirm Windows 11 compatibility; if eligible, back up and schedule the free upgrade.
  • If you can’t upgrade immediately, decide whether to enroll in consumer ESU (free with Microsoft account, via Microsoft Rewards, or $30 one‑time payment) and follow the Settings → Windows Update enrollment flow. Treat ESU as a temporary bridge.
  • Test alternative OS options (Linux live USB or ChromeOS Flex) on spare hardware before committing. Make a copy of critical files and app installers.

The end of free Windows 10 support is a clear inflection point: devices will keep working, but the guarantee of vendor‑supplied OS maintenance ends on October 14, 2025. All users should act deliberately — verify device eligibility, back up data, and choose one of the realistic paths forward (upgrade, enroll in ESU, switch platforms, or replace hardware). The consumer ESU option provides a limited bridge for many households, but the long‑term safe posture is to move to a supported platform or environment.

Source: Emegypt End of Free Windows 10 Support: What Users Need to Know
 

Microsoft’s calendar and code collided this week: Windows 10 reached its official end-of-support cutoff on October 14, 2025, at the same time Microsoft’s freshly updated Windows 11 Media Creation Tool (MCT) began failing on a significant subset of Windows 10 machines — closing immediately after launch with no error and leaving users without the simplest, Microsoft‑recommended route to build bootable Windows 11 media. This broken upgrade path landed at the worst possible time for many home users, small IT teams and refurbishers, forcing immediate reliance on manual ISOs, alternative utilities and temporary policies to keep devices secure.

Blue tech collage showing Windows 11 logo, Oct 14, 2025 calendar, and USB boot tools Rufus and Ventoy.Background​

Why October 14, 2025 matters​

Microsoft’s lifecycle calendar establishes October 14, 2025 as the end of free, routine support and security updates for mainstream Windows 10 editions (Home, Pro and most consumer SKUs). After that date, devices that aren’t enrolled in Microsoft’s paid or qualifying Extended Security Updates (ESU) program stop receiving standard security patches and feature fixes — they keep running, but vendor maintenance ceases. That hard deadline has driven a last‑minute migration wave for millions of users who prefer to remain on a supported Microsoft OS.

The Media Creation Tool role — and the regression​

The Media Creation Tool is Microsoft’s familiar one‑file utility that automates downloading an official ISO, creating multi‑edition installs and writing a bootable USB in one flow. It’s the routine first choice for home users and technicians who want an official, up‑to‑date installer without hunting for direct ISO links.
In late September Microsoft shipped an updated MCT binary tied to Windows 11’s 25H2 refresh (community reports mark the tool’s build metadata as 26100.6584). Within days, multiple reproductions showed the tool launching on Windows 10 hosts, showing a UAC prompt and a brief Windows splash, then exiting silently without producing media. Microsoft confirmed the behavior as a known issue and advised workarounds while a fix is prepared.

What’s happening now: symptoms and immediate workarounds​

The observed failure mode​

  • Symptom: double‑click the MCT on a Windows 10 (22H2) machine, accept UAC, see a brief Windows logo flash, then the tool quits with no dialog, no helpful error and no created ISO or USB.
  • Reproducible across many consumer systems; more acute reports exist for some Arm64 hosts (though Microsoft stresses the MCT isn’t intended for creating Arm64 media from Arm64 Windows 10 machines). Event logs shared in community threads show early crashes referencing SetupHost.exe and low‑level modules in some reproductions.

Official short‑term guidance (what Microsoft recommends)​

Microsoft’s published release‑health note confirms the MCT issue and explicitly recommends these immediate mitigations:
  • Download the official Windows 11 ISO directly from Microsoft’s Software Download page (“Download Windows 11 Disk Image (ISO) for x64 devices”) and create a bootable USB manually.
  • Use the Windows 11 Installation Assistant for an in‑place upgrade on eligible devices.
  • Run the Media Creation Tool from a Windows 11 host if one is available to build installers for other machines.
    Microsoft says a corrective MCT update will be released in a future update but provided no firm ETA.

Practical alternative tools many users choose​

  • Rufus — dependable third‑party utility for writing an official ISO to USB and offers options to relax hardware checks (unsupported bypasses).
  • Ventoy — multi‑boot USB tool that makes maintaining multiple ISOs easy.
  • Built‑in Windows mounting and Diskpart or Explorer for manual writing when combined with the right toolset.
Community reaction has pushed these third‑party utilities into the spotlight as the de facto fallback while Microsoft repairs its official single‑file convenience path.

A concise, safe checklist for users today​

  • Back up critical files to an external drive or cloud before attempting any upgrade.
  • Confirm your device’s Windows 11 eligibility with the PC Health Check app or Microsoft’s system requirements. Minimums include: 64‑bit, 1 GHz dual‑core CPU on Microsoft’s approved list, 4 GB RAM, 64 GB storage, UEFI with Secure Boot, and TPM 2.0. If these aren’t met, you’ll need to choose ESU, hardware replacement, or an unsupported bypass.
  • If your device is eligible and you want the simplest in‑place path, try Windows Update first; if it’s not offered, use the Windows 11 Installation Assistant.
  • If you need bootable media or the MCT fails on Windows 10, download the official Windows 11 ISO from Microsoft and create a USB using Rufus or the built‑in tools. Verify checksums when possible.
  • Avoid unsupported registry hacks or modified ISOs on machines that require reliable, secure updates or enterprise compliance. Those approaches carry non‑trivial long‑term risks.

Technical verification and cross‑checks​

  • Microsoft’s release‑health page lists the MCT problem as confirmed and names the offending build metadata as version 26100.6584 (dated September 29, 2025). The advisory explicitly points Windows 10, version 22H2 as affected and recommends downloading ISO media as a workaround.
  • The Windows 11 minimum hardware requirements — including TPM 2.0, UEFI/Secure Boot and minimum memory and storage thresholds — are documented on Microsoft’s official system requirements and specifications pages. Those published requirements are the gate for a supported upgrade path.
  • Independent reporting and forum reproductions corroborate the symptom pattern (silent exit) and the timing: the regression followed an MCT refresh tied to the Windows 11 25H2 rollout and surfaced in early October as Windows 10 approached end‑of‑support.
If any single technical claim here matters most for planning — the MCT binary ID, the symptom, and Microsoft’s workaround — each is verifiable in Microsoft’s release‑health notes and in the immediate coverage by Windows‑focused outlets.

Why this broke now: timing, testing and the cost of regressions​

Timing amplifies pain​

A normally tolerable utility regression becomes a real problem when it hits the precise days users planned mass migrations, clean installs and recovery‑media creation. The Media Creation Tool isn’t a niche utility — for many non‑technical users it’s the only official tool they know to produce an installer. Breaking convenience at end‑of‑support raises both practical and security urgency.

How regressions like this typically arise​

  • Rolling a new MCT binary together with an OS release or cumulative update can introduce environment‑specific assumptions that weren’t covered in the test matrix (for example, interactions with Windows 10’s earlier system libraries or different default runtime conditions).
  • QA often focuses on the updated target OS (Windows 11) and may run less extensive on older hosts when there’s pressure to ship updated media aligned to a new OS baseline.
  • The fix is usually straightforward (a small compatibility adjustment) but finding and validating it across both the newer and legacy hosts can take time. Microsoft’s public note confirms a fix is planned but gives no schedule.

The trust problem​

Utilities that “just work” earn trust; when they fail silently, users are left uncertain which path is safe. Microsoft’s choice to recommend ISO download rather than a rollback of the MCT is practical, but for less technical users it imposes friction that can lead to unsafe shortcuts (unverified ISOs, unsupported registry bypasses or reliance on sketchy third‑party copies).

What admins and power users should do differently now​

Enterprise and small‑business steps (practical priorities)​

  • Ensure canonical ISO images for Windows 11 25H2 are added to internal repositories and verify checksums.
  • Use WSUS, Windows Update for Business, or enterprise deployment pipelines rather than ad‑hoc MCT runs on client hosts.
  • For emergency recovery, keep a validated Windows 11 USB or network boot image on hand so a broken client host never delays restore or migration activities.

Home user, refurbisher and refurbisher‑style advice​

  • If you refurbish or resell PCs, use a Windows 11 host to create MCT media or prefer an ISO + Rufus workflow until Microsoft publishes the MCT fix.
  • Keep a simple, clearly documented checklist: backup → verify eligibility → create installer → verify checksums → install → post‑install updates.

Safety risks and unsupported workarounds​

Registry bypasses and unofficial tweaks​

A number of community tools and registry keys (for example, MoSetup AllowUpgradesWithUnsupportedTPMOrCPU and LabConfig bypass values) have been used to install Windows 11 on unsupported devices. These are explicitly unsupported by Microsoft and can break future servicing, block updates or void the safety of the platform. Use them only if you understand the tradeoffs and have reliable backups.

Unverified ISOs and third‑party downloads​

Downloading modified ISOs from untrusted sites to avoid Microsoft’s tool problems exposes users to malware and tampered builds. The correct balance is to use the ISO directly from Microsoft’s download site or, when using third‑party tools like Rufus, feed them a verified Microsoft ISO. Microsoft’s official download pages provide direct, temporary links that can be used when the MCT is unavailable.

Step‑by‑step: create a bootable Windows 11 USB safely (official ISO + Rufus, quick guide)​

  • From a working browser, open Microsoft’s Windows 11 Software Download page and locate “Download Windows 11 Disk Image (ISO) for x64 devices.” Download the Windows 11 (multi‑edition ISO for x64 devices) file and note the temporary link expiration if one is generated.
  • Verify the ISO size and, if available, checksums (SHA‑256) against published values where Microsoft provides them. If there’s a mismatch, re‑download from a different connection.
  • Download Rufus (official site) and launch it. Select the ISO and your USB stick (8 GB or larger recommended). In Rufus, choose the default or “GPT / UEFI” profile for modern PCs. If installing to unsupported hardware, Rufus offers an “Extended Windows 11 Installation” option — use that only if you accept the risks.
  • Click Start and wait for Rufus to finish. Once done, eject the USB safely and keep it as a verified installer.
  • Boot the target PC from the USB, choose Upgrade (to retain files and apps) or Custom (clean install), and follow the installer prompts. Backups remain essential.

Longer‑term implications for Microsoft and the Windows ecosystem​

Lessons for vendor testing and communication​

  • Tools used widely for recovery and migration should be tested across current and immediately prior OS versions. The MCT regression shows the real cost when compatibility assumptions slip.
  • Public timelines for fixes and visible tracking make it easier for sysadmins and home users to plan; vague “future update” messaging increases operational uncertainty and spurs risky third‑party workarounds.

The market and user response​

  • Third‑party utilities that offer a faster, more reliable UX will continue to gain traction among power users and refurbishers.
  • Microsoft’s insistence on stronger Windows 11 hardware requirements (TPM 2.0, Secure Boot, approved CPUs) remains a driving force for upgrade or replacement decisions. For many, buying new hardware is now the safe, long‑term path; for others, ESU or alternate OSes will be the interim solution.

Final assessment and recommendations​

The technical facts are straightforward: Windows 10’s public support window closed on October 14, 2025, and Microsoft’s Windows 11 Media Creation Tool update (version 26100.6584) was reported to exit silently on Windows 10 hosts — an acknowledged, confirmed issue for which Microsoft recommends downloading the ISO or using alternative upgrade paths while it prepares a fix. These claims are verifiable in Microsoft’s release‑health notes and in wide‑ranging community reproductions.
For users and small admins, the immediate priorities are simple and practical:
  • Back up first.
  • Use the Windows 11 Installation Assistant if you want an in‑place upgrade and your device is eligible.
  • If you need bootable media and your Windows 10 host can’t run the MCT, download the official ISO and create media with Rufus or another trusted utility.
  • If your PC is incompatible with Windows 11, evaluate the one‑year consumer ESU option or plan hardware replacement.
This incident underscores an enduring truth: convenience tools matter. When they fail, the consequences aren’t merely technical — they erode trust and increase operational risk for users who expected a frictionless path forward. The recommended mitigations are sound, practical and safe; following them will keep most users on a supported path while Microsoft repairs the broken convenience pathway.
Conclusion
The simultaneous arrival of Windows 10’s support cutoff and a regression in Microsoft’s official migration tool created avoidable friction for many users. The fix is likely a small compatibility patch, but the larger lesson is about resilience: organizations and individuals should keep verified installation media, maintain clear upgrade playbooks, and treat vendor tools as convenient — but not singularly relied upon — paths. In the immediate term, the safest routes are the official ISO download, Windows Update/Installation Assistant for eligible PCs, and cautious use of established third‑party utilities for media creation when the MCT is unavailable.

Source: PC Guide Windows 10 loses support today, and Microsoft recently broke one of its Windows 11 upgrade tools
 

Just when millions of Windows 10 users were racing the calendar to move to a supported OS, Microsoft’s most convenient single‑click upgrade tool for Windows 11 began failing on the very machines that needed it most — and that failure has forced users and small IT teams into manual, more complicated routes to upgrade before Windows 10’s support cutoff.

Windows 11 Media Creation Tool on a monitor with an error pop-up, ISO icon, and October 14, 2025 calendar.Background​

Microsoft set a firm end‑of‑support date for Windows 10: October 14, 2025. After that date, consumer editions stop receiving security updates, bug fixes, and regular technical assistance unless an organization or user enrolls in Extended Security Updates (ESU) or migrates to Windows 11. This fixed deadline compressed upgrade windows for many users and increased reliance on straightforward, Microsoft‑provided upgrade flows.
The Windows 11 Media Creation Tool (MCT) has long been the easiest way for home users, refurbishers, and small IT teams to produce official installation media: download a single executable from Microsoft’s Software Download site, insert an empty USB drive, and let the tool create a bootable installer or ISO. That convenience is exactly why its sudden regression mattered. Community and vendor reporting identified a specific problematic MCT binary — identified in several reports as version metadata 26100.6584, published in late September 2025 — that may fail when run on Windows 10 hosts. Microsoft confirmed the symptom in its release‑health/known‑issues messaging and recommended a small set of workarounds while it works on a fix.

What exactly broke (symptoms and scope)​

The failure mode, in plain terms​

Multiple independent reproductions show the same symptom: run the updated MediaCreationTool.exe on a Windows 10 (22H2) machine, accept the UAC prompt, see a brief Windows splash, and then the tool exits silently without an error message — producing no ISO and creating no bootable USB. Event logs shared in community threads reveal SetupHost.exe crashing with low‑level exceptions in some cases, indicating an early bootstrap failure rather than a download or disk problem.

Who’s affected​

  • Primary: Windows 10, version 22H2 hosts attempting to run the updated MCT locally. Microsoft’s advisory explicitly referenced behavior on Windows 10 hosts.
  • Secondary: Arm64 devices and small teams that used Arm64 devices as "creation workstations" to build x64 media — MCT has historically been nuanced on Arm64 hosts and the recent update aggravated that complexity.
  • Less affected: Enterprises that already rely on managed channels (WSUS, Windows Update for Business, internal ISOs) are less impacted, since they generally distribute canonical ISOs or feature updates centrally.

What Microsoft officially said​

Microsoft labeled the behavior as a known issue: the Windows 11 Media Creation Tool version identified in community reports “might not work as expected when used on Windows 10 devices” and “might close unexpectedly, displaying no error message.” The company advised alternatives — Windows Update (if the Windows 11 offer is available), the Windows 11 Installation Assistant, running the MCT from a Windows 11 host, or downloading the Windows 11 ISO directly — and said it is “working on a resolution” with a corrective MCT update to come. Microsoft’s public guidance is intentionally short; no ETA or detailed root cause was published at the time of reporting.

Why the timing makes this far worse​

October 14, 2025 is a hard lifecycle milestone. After it passes:
  • Windows 10 consumer editions no longer receive routine security and quality updates.
  • Organizations and individuals who didn’t migrate must either enroll in ESU or accept increased exposure to newly discovered vulnerabilities.
The MCT regression landed in the final days before that deadline, turning what should have been a straightforward, last‑minute migration into a scramble for alternatives. For many home users and small IT operations that lack an alternate Windows 11 host or a pre‑downloaded ISO, the single‑file MCT was the plan A — and without it the friction, complexity, and risk all increased. Community threads and forum posts captured the frustration: silent failures, last‑minute media builds, and a spike in users turning to third‑party tools like Rufus or to manual ISO mounting procedures.

Safe, supported alternatives (what to do now)​

Microsoft and independent outlets have converged on a few practical mitigation paths. The following list ranks them roughly by safety and supportability.
  • Windows Update (safest for eligible devices)
  • Open Settings → Update & Security → Windows Update.
  • If “Upgrade to Windows 11” is offered, choose Download and install.
    Advantages: preserved apps, settings, and an officially supported path with minimal manual work. Drawbacks: staged rollouts mean not all eligible machines will immediately see the offer.
  • Windows 11 Installation Assistant (in‑place upgrade on the current device)
  • Download the Installation Assistant from Microsoft’s Download Windows 11 page and run it on the Windows 10 PC you want to upgrade.
  • It performs a compatibility check and performs an in‑place upgrade for eligible devices.
    Advantages: guided upgrade, preserves apps and settings. Drawbacks: works only on the host device (can’t create media for other machines).
  • Download the official Windows 11 ISO and use it directly (Microsoft‑recommended fallback)
  • On Microsoft’s Software Download page, download the Windows 11 Disk Image (ISO) for x64 (or Arm64 when available). The ISO file is roughly around 7 GB for x64 builds, depending on language and edition.
  • On the same PC: double‑click the ISO to mount it, then run setup.exe to perform an in‑place upgrade that preserves apps and files.
  • On a different PC: write the ISO to a USB drive using a trusted tool and boot the target machine from that USB for a clean install. Microsoft explicitly recommends ISO downloads as the short‑term path while MCT is fixed.
  • Create a USB installer using a trusted third‑party tool (practical fallback for many)
  • Use a well‑known utility (Rufus, Ventoy) to write the Microsoft ISO to a USB drive. Rufus, in particular, is frequently recommended in community testing for its speed and options. It also offers an “Extended Windows 11 Installation” mode that can relax TPM / Secure Boot checks when you knowingly choose to install on unsupported hardware — but that is an unsupported bypass with real long‑term tradeoffs.

Step‑by‑step: download ISO and make a USB with Rufus (concise)​

  • On any machine with a reliable internet connection, visit the Microsoft Download Windows 11 page and choose “Download Windows 11 Disk Image (ISO)” for x64 devices.
  • Save the ISO (expect ~7 GB file size).
  • Download Rufus (or another trusted USB tool). Run Rufus as Administrator.
  • Insert a blank USB drive (8 GB or larger recommended). In Rufus, pick the ISO, set partition scheme to GPT for UEFI devices, pick NTFS if the install.wim is large, and click Start. If you must use Rufus’ bypass features, review the options carefully and accept the consequences.
  • Boot the target PC from the USB and either run setup.exe from the installer (in‑place) or perform a clean install after booting into the USB environment.
Caveat: If you enable bypass options to install on unsupported hardware (no TPM, no Secure Boot), Microsoft may not consider that device supported for future updates or troubleshooting. Avoid such bypasses for business or compliance‑sensitive systems.

Technical checks and verification​

  • The problematic MCT build identified in community traces is often described with metadata 26100.6584 and was distributed in late September 2025; multiple independent outlets and community tracings reproduced the failure and linked that build string to the symptom. Microsoft’s release‑health documentation acknowledged the MCT “might not work as expected” on Windows 10 devices and recommended the ISO fallback while it works on a fix.
  • Windows 10’s end of support date — October 14, 2025 — is confirmed in Microsoft lifecycle and support articles and appears as the non‑negotiable cutoff for routine security updates for consumer editions. Users planning upgrades around that date should use Microsoft’s compatibility tools (PC Health Check) and migration guidance.
  • Windows 11 minimum hardware requirements (processor, 4 GB RAM, 64 GB storage, UEFI with Secure Boot, TPM 2.0) are documented by Microsoft and remain the baseline for eligibility; circumventing these checks via third‑party tools can affect update reliability and security posture.

Risks and tradeoffs — what to avoid​

  • Don’t use untrusted ISOs or mirror sites. Always download ISO images from Microsoft’s official download portal to avoid tampered or modified installers. The ISO fallback is safe only if you use official media.
  • Avoid unsupported registry hacks or community “bypass” scripts at scale. Hacks that disable TPM/Secure Boot checks or force a local account during OOBE can create systems that are eligible neither for vendor support nor for some future updates. In enterprise or compliance scenarios, these approaches are usually not acceptable.
  • Be cautious about older ISOs: the MCT update in late September targeted fresher Windows 11 25H2 images (reducing post‑install patching). If you use an older ISO you may face larger cumulative update downloads after install. Plan for additional bandwidth and time.

For IT pros and refurbishers: tactical checklist​

  • Maintain canonical ISOs internally. Don’t rely on ad‑hoc single‑machine MCT runs during critical migration windows. Store validated ISOs in an internal repository and validate checksums.
  • If you manage many devices, prefer WSUS, Windows Update for Business, or scriptable image deployments. These channels avoid consumer tooling regressions and offer reproducible results.
  • If you must create media quickly and don’t have a Windows 11 host, use the ISO + Rufus route. If a Windows 11 PC is available, running MCT there to create USB media for other targets is a practical workaround while Microsoft publishes a corrected MCT. Community reports indicate the same MCT binary often runs reliably on Windows 11 hosts.

How Microsoft handled the communications — and what could be better​

Microsoft acknowledged the MCT regression promptly in its release‑health notes and supplied safe, supported workarounds: Windows Update, Installation Assistant, ISO download, and running MCT on Windows 11. That transparency limited confusion and prevented mass reliance on risky community fixes. However, the advisory lacked a technical root‑cause explanation and a firm ETA for a fix — leaving users and small IT shops to improvise under a tight deadline. The timing of a regression in a convenience tool during a lifecycle cutoff magnified reputational and operational pain.
Lessons for future migrations are clear: critical consumer tooling should have compatibility rollback options and more explicit testing gates for older host OS permutations, especially when those tools are central to migrations away from a reaching end‑of‑life platform.

Final recommendations — a short, practical plan you can follow now​

  • Back up first. Create a full image or at minimum copy critical documents to external storage or cloud before attempting any major OS changes.
  • Try Windows Update (Settings → Update & Security → Windows Update). If “Upgrade to Windows 11” is available, use it.
  • If Windows Update doesn’t offer the upgrade, download and run the Windows 11 Installation Assistant on the machine you want to upgrade. It’s simple and preserves apps/settings.
  • If you must build media for other PCs or need a fresh install, download the official Windows 11 ISO from Microsoft and either:
  • Mount and run setup.exe to upgrade the current device, or
  • Use Rufus/Ventoy to create a bootable USB for other PCs. Validate the ISO source.
  • Avoid unsupported bypasses for production or business machines. If a device truly can’t meet Windows 11 requirements, evaluate consumer ESU enrollment or plan hardware replacement.

Conclusion​

A tool that “just worked” for years stopped working at the worst possible time for many users: the Windows 11 Media Creation Tool regression removed the simplest migration route just as Windows 10’s support window closed. The good news is this is not a show‑stopper: Microsoft’s official ISO, the Installation Assistant, Windows Update, and trusted third‑party USB utilities provide robust, supported alternatives. The bad news is the incident underscores a broader operational fragility — when a single convenience binary is a critical dependency during mass migration, gaps in compatibility testing and rollback mechanisms can have outsized consequences.
For now the path forward is straightforward and pragmatic: back up your data, prefer the official Windows Update or Installation Assistant where available, use the Microsoft ISO if you need media, and apply third‑party tools like Rufus only when you understand and accept the tradeoffs. Watch Microsoft’s release‑health and Download Windows 11 pages for the corrected Media Creation Tool; once Microsoft publishes the MCT update and confirms the fixed build, the single‑click path will return — but the utility of redundancy and verified internal media for critical migrations has never been clearer.

Source: ZDNET The Windows 11 upgrade tool stopped working at the worst possible time - but you have options
 

Microsoft’s own upgrade path tripped at the worst possible moment: the Windows 11 Media Creation Tool (MCT) update released in late September can exit without warning when launched on many Windows 10 hosts, and that bug landed as Windows 10 reached its official end-of-support deadline on October 14, 2025.

Windows 11 ISO icon on desktop with USB drive in foreground and a Windows 11 Media Creation Tool closing dialog.Background / Overview​

The Media Creation Tool is the single-file, Microsoft‑published utility millions of users and technicians rely on to download a Windows 11 ISO and create a bootable USB or DVD. It’s often the easiest, fastest route for home users and small IT teams to perform clean installs, reinstallations, or upgrades when Windows Update isn’t offering the feature update. In late September Microsoft shipped an updated MCT binary identified in vendor and community reporting as version 26100.6584; Microsoft’s release-health note now confirms that build may “not work as expected” when run on Windows 10 devices.
Concurrently, Microsoft’s public lifecycle schedule set October 14, 2025 as the end of mainstream support for Windows 10. After that date, routine security updates and free technical support for typical consumer editions cease unless the device is enrolled in Extended Security Updates (ESU). That fixed calendar amplified the impact of the Media Creation Tool regression for users trying to finish migrations or build recovery media before support ended.

What broke: symptoms, scope and official confirmation​

The observable behavior​

  • Users download and run MediaCreationTool.exe on a Windows 10 (commonly 22H2) PC.
  • UAC appears and, after consent, the tool briefly shows the Windows splash/logo.
  • The application then terminates immediately with no error dialog and produces no ISO or bootable media.
This silent exit is the consistent, reproducible symptom reported across community threads and independent testing. Event logs shared by technicians sometimes show early failures in SetupHost.exe with low-level exceptions, suggesting a bootstrap-stage fault rather than a mid‑process download or write error.

Who is affected​

  • Primary: Windows 10 clients (version 22H2) launching MCT build 26100.6584 locally. Microsoft’s advisory explicitly named Windows 10 as the affected host platform.
  • Secondary: Arm64 Windows 10 hosts—Microsoft notes the MCT is not currently supported for creating Arm64-targeted media and that Arm64→x64 creation paths are also unreliable under the problematic build. Community reports show Arm64 scenarios can be particularly brittle.
  • Not broadly affected: Environments that use canonical ISOs already stored on servers, WSUS/Intune deployment channels, or the Windows 11 Installation Assistant (when the device is eligible) are not blocked by this regression.

Official confirmation and vendor messaging​

Microsoft added a release-health / known‑issues entry describing the issue: the company states that “The Windows 11 media creation tool version 26100.6584, released September 29, 2025, might not work as expected when used on Windows 10 devices. The media creation tool might close unexpectedly, displaying no error message.” Microsoft also published the immediate mitigation: download the Windows 11 ISO directly from Microsoft’s software download page and create bootable media from that file until a fixed MCT is released.
Independent outlets and community posts reproduced the symptom and documented Microsoft’s advisory, making the failure widely visible across specialist press and forums.

Why the timing made this matter worse​

The MCT regression would be an annoyance at any time, but it collided with a hard, public deadline: Windows 10 support ends on October 14, 2025. That deadline drove a last‑minute wave of users into migration workflows—building recovery sticks, performing clean installs for supported baselines, or enrolling in ESU for more time. The MCT is the default, supported convenience route for many of those users; when it failed, the friction increased and less technical users were suddenly pushed toward more manual workarounds.
From an operational perspective, this matters because any delay or confusion around creating verified, official install media increases the chance that endpoints will remain on an unsupported OS longer than intended—raising exposure to vulnerabilities once Microsoft’s regular patch stream stops. Multiple news outlets framed the problem as a Microsoft‑confirmed regression arriving at the worst possible moment.

Short‑term workarounds (what to do now)​

Microsoft and independent observers converge on safe, pragmatic mitigations. These are the recommended immediate steps for home users, IT pros and refurbishers.

Official / supported options​

  • Download the Windows 11 ISO directly from Microsoft’s software‑download portal and create media from the ISO. This bypasses MCT entirely and uses a canonical Microsoft image. Microsoft explicitly listed this as the workaround.
  • Use the Windows 11 Installation Assistant on an eligible device to perform an in‑place upgrade if Microsoft Update offers it. This path preserves apps and settings without MCT.

Practical media‑creation steps (safe, reproducible)​

  • Download the Windows 11 ISO from Microsoft’s official download page (choose x64 for the majority of devices).
  • Verify the ISO hash (SHA‑256) where possible to ensure file integrity.
  • Use a trusted tooling workflow to write the ISO to a USB drive:
  • Rufus (run as Administrator) — dependable and widely used; offers partition and boot-mode options and is commonly recommended by technicians.
  • Windows’ built‑in ISO mount + built‑in Media Creation via another mechanism on a Win11 host, or manual dd-style write on Unix-like systems.
  • Test the bootable media on one representative machine before mass deployment.
Rufus and Ventoy are frequently suggested in community threads as practical third‑party utilities; they are not Microsoft products and any bypasses they offer (e.g., hardware checks removal) are unsupported by Microsoft and carry security or compatibility trade-offs.

Technical analysis: probable causes and what remains unknown​

What’s plausible (based on observed behavior)​

  • The crash pattern—immediate exit after bootstrap and occasional SetupHost.exe / ntdll.dll traces in Event Viewer—suggests the MCT aborts very early, possibly at a compatibility or initialization check that fails silently on Windows 10 host environments.
  • A likely scenario is a runtime dependency, API call, or manifest/test matrix that was validated primarily on Windows 11 hosts. Subtle API versioning differences or tightened dependency expectations in the MCT binary could cause a silent termination on older hosts.
  • Arm64 peculiarities are also consistent with the tool’s ongoing limitations for creating Arm64-targeted media; the new build may have regressed previously functioning Arm64→x64 creation paths.

What Microsoft has not published (and why to be cautious)​

  • There is no public post‑mortem or root‑cause breakdown from Microsoft at this time. The company’s public messaging acknowledges the symptom and promises a fix in a “future update to the Media Creation Tool,” but offers no ETA or technical trace. Any definitive claim about the internal bug (for example, an API change, signing issue, or specific DLL mismatch) would be speculative until Microsoft publishes specifics. Treat such claims as provisional.

Risk assessment: impact by user type​

  • Home users with a single PC: Low-to-moderate operational impact, because alternatives (Installation Assistant, ISO + Rufus) are viable—though they require slightly more confidence and time.
  • Small businesses and SMBs: Moderate impact, particularly for shops that rely on ad‑hoc, per‑machine media creation rather than maintaining a central ISO library. A broken MCT can cause delays in patching or migration windows.
  • IT departments / enterprise imaging: Low impact for teams that already maintain canonical ISOs, use WSUS/Intune, or have scripted deployment pipelines. The risk is operational only for groups reliant on MCT from mixed-host build machines.
  • Refurbishers and device resellers: High friction, since they frequently build installers on whatever host is available; the regression increases turnaround time and operational overhead.
Security considerations: the MCT bug itself is not a security flaw that introduces new vulnerabilities—its harm stems from making the supported migration path harder to use at a deadline that alters exposure windows. The real security risk is postponed upgrades and the resulting end-of-support exposure for delayed endpoints.

How Microsoft should have handled the release (editorial analysis)​

  • Broader test matrix: A media‑creation utility intended to run on older hosts should be validated exhaustively across supported host OSes—especially when the older OS is days from EoS. The regression suggests a Windows‑11‑centric validation path that missed host-side compatibility checks.
  • Faster, clearer communication: While Microsoft did publish a release‑health note and a workaround, an in‑product banner on the MCT download page (or MCT itself detecting a Windows 10 host and presenting a clear message) would have prevented confusion for many users who simply click the executable expecting it to “just work.”
  • Temporary rollback: For a widely used convenience utility, offering a rollback to the prior MCT binary or an alternative downloadable MCT version would have been an effective short-term mitigation for less technical users.

Recommendations and practical checklist​

  • If you need to create Windows 11 install media today:
  • Download the Windows 11 ISO directly from Microsoft; verify its checksum.
  • Use Rufus (or another trusted USB writer) and test the USB on a target machine before proceeding.
  • If you’re upgrading in-place and the device is eligible:
  • Use Windows Update or the Windows 11 Installation Assistant.
  • For IT teams:
  • Maintain canonical ISO images (signed, checksummed) in a central repository.
  • Prefer Windows 11 build servers for media creation until Microsoft issues a corrected MCT.
  • Run a small pilot ring (1–5%) before broad rollouts, and validate EDR/AV compatibility with the new OS image.
  • For users who cannot or will not upgrade:
  • Consider Extended Security Updates (ESU) or migration to an alternate OS; weigh security risks for continuing on unsupported Windows 10.

Wider implications: testing, telemetry and trust​

This incident is a reminder that convenience tooling—often used by non‑technical users—needs conservative change control. The consequences of a media tool regression are distributional: many users will either be delayed, adopt unsupported third‑party workarounds, or move to alternate installers without Microsoft’s guardrails in place. The broader lesson for large software vendors is to treat host‑compatibility and user‑facing diagnostics as first‑class requirements for migration tooling.
From a trust perspective, Microsoft’s quick admission and the availability of an official ISO help defuse the situation, but a lack of timeline or root‑cause transparency prolongs user uncertainty. A small, clearly stated ETA for the MCT fix or a temporary binary rollback would have been the better route to preserve confidence.

What to watch for next​

  • Microsoft’s release‑health page and update history for Windows 11 MCT entries for a corrected build or an updated advisory. The company said a resolution will be released in a “future update to the Windows 11 media creation tool.”
  • News outlets and community threads republishing Microsoft’s follow‑ups; independent reproduction of a fixed MCT build will be an early signal the regression is fully resolved.
  • Any Microsoft post‑mortem that clarifies whether the bug was an untested dependency, a packaging/signing error, or an API compatibility issue; until then, root‑cause explanations are speculative.

Conclusion​

The Windows 11 Media Creation Tool regression is an awkward, avoidable operational hitch that landed at the worst possible time—just as Windows 10 reached its end‑of‑support milestone on October 14, 2025. Microsoft has publicly acknowledged the failure (MCT version 26100.6584) and directed affected users to download the Windows 11 ISO directly while it prepares a fix. That official ISO‑first workaround keeps migrations possible and safe, but it places a modest burden on users who expected the MCT to handle the heavy lifting.
For most users and administrators the situation is manageable: use the ISO, verify checksums, and create media with a trusted tool—or run the Installation Assistant when available. For IT teams and refurbishers, the incident underscores the need to keep canonical ISOs, maintain test rings, and avoid last‑minute dependence on single‑host utilities. Microsoft’s acknowledgement was correct and necessary; now the expectation is for a swift, test-verified fix and clearer in‑product diagnostics so the next major lifecycle transition doesn’t repeat the same mistake.

Source: TweakTown Microsoft messes up Windows 11's Media Creation Tool just as Windows 10 support ends
 

Microsoft’s timing couldn’t have been worse: just as Windows 10 reached its official end-of-support deadline, Microsoft’s updated Windows 11 Media Creation Tool (MCT) began failing on many Windows 10 hosts—closing immediately with no error message—forcing users and small IT teams to rely on manual ISOs and third‑party utilities while Microsoft prepares a fix.

Split-screen Windows desktop: Media Creation Tool on the left, ISO and Installation Assistant icons on the right.Background / Overview​

The Media Creation Tool has long been Microsoft’s go‑to convenience utility for producing official Windows installers: it downloads the current Windows 11 image, lets users create multi‑edition ISOs, and can write a bootable USB in one guided flow. That single‑file convenience is why the MCT is so widely used by home users, refurbishers, and small IT shops who don’t keep a library of canonical ISOs.
In late September 2025 Microsoft shipped an updated MCT binary associated with the Windows 11 refresh. Community and vendor reporting identify that build as version 10.0.26100.6584 (often shortened to 26100.6584) and date it to September 29, 2025. Within days, multiple reproductions showed the utility routinely refused to run on Windows 10 systems—launching, briefly showing the splash, then exiting silently. Microsoft publicly acknowledged the behavior and advised workarounds while it develops a corrective update.
Why this matters now: Windows 10’s end of support date—October 14, 2025—was a hard calendar anchor that drove many last‑minute migrations, media builds, and fresh installs. The MCT regression hits the very workflow many users planned to use to complete upgrades or to create recovery media before EOL.

What happened: the symptoms in plain terms​

The reported behavior​

  • Users download the latest MediaCreationTool.exe and run it on Windows 10 (commonly 22H2).
  • UAC prompts as expected; the Windows splash/logo appears momentarily.
  • The MCT process then exits immediately with no error dialog, leaving no ISO or bootable media produced.
Community tracebacks and Event Viewer records included in forum reports point to early crashes of SetupHost.exe and exceptions referencing ntdll.dll, suggesting the failure occurs during very early initialization of the tool. But the visible result to users is a silent termination with no helpful guidance.

Scope and reproducibility​

  • The regression appears host‑OS specific: the same MCT binary often runs on Windows 11 machines but fails on many Windows 10 machines. That odd dichotomy made a Windows 11 host a practical (if inconvenient) workaround for creating media for Windows 10/11 targets.
  • Reported across numerous consumer and small‑business setups, the issue is not an isolated anecdote: multiple independent tech outlets and community threads reproduced the symptom.

Microsoft’s response and short‑term guidance​

Microsoft has acknowledged the problem in its release‑health / known‑issues documentation, explicitly naming the affected MCT build and stating the tool “might not work as expected when used on Windows 10 devices” and that it “might close unexpectedly, displaying no error message.” The company says a fix will be released in a future MCT update but did not publish an ETA.
Immediate, official workarounds Microsoft recommended include:
  • Download the official Windows 11 ISO directly from Microsoft’s software‑download portal and create a bootable USB manually.
  • Use the Windows 11 Installation Assistant for in‑place upgrades on eligible devices.
  • Run the Media Creation Tool from a Windows 11 host (if available) to create media for other machines.
Those alternatives preserve an official media path but require a bit more technical involvement than double‑clicking the MCT on the machine you intend to upgrade.

The immediate practical workarounds (step‑by‑step)​

If the MCT fails on your Windows 10 machine, follow a safe fallback workflow:
  • Download the Windows 11 ISO from Microsoft’s official download page. (Microsoft explicitly points to this as the supported workaround.)
  • Verify the ISO checksum using built‑in tools (Get-FileHash in PowerShell) to guard against a corrupted download.
  • Create a bootable USB using one of these methods:
  • Use a trusted third‑party utility such as Rufus to write the ISO to USB (Rufus is widely used and gives more control over partition scheme and target system type).
  • Use Windows’ built‑in mounting and diskpart or the GUI ISO burning options on another Windows machine to write media if you prefer not to use third‑party tools.
  • Test the bootable media on a non‑critical device before mass deployment to confirm the installer behaves as expected.
This workaround uses official ISOs and standard verifier practices, so it remains within recommended safety boundaries.

Technical analysis — what could be going on (and what we don’t know)​

Community reproductions and crash traces suggest the failure happens very early in MCT’s runtime (SetupHost.exe crashing, ntdll.dll exceptions). That pattern points to an initialization or environmental compatibility problem rather than a mid‑download or write failure. Plausible technical hypotheses include:
  • A dependency or API that MCT now expects is present in Windows 11 but not in Windows 10 builds, causing an unhandled exception when invoked on older hosts.
  • A signing/certificate, transport, or channel change that triggers a silent abort when the tool’s bootstrap code checks system components or service versions.
  • An unintended regression introduced in the new MCT build that wasn’t fully validated on Windows 10 test beds (for example, the binary or installer logic shifted to primarily target Windows 11 environments during development).
What is provably true: Microsoft has not published a detailed post‑mortem or technical root‑cause analysis as of the public advisories; therefore any specific causal explanation beyond the observed symptoms is speculative. The responsible editorial stance is to flag the root cause as currently unverifiable until Microsoft publishes a developer post‑mortem or fixed binary with release notes.

Why this is more than an inconvenience​

A broken MCT is not merely a UX annoyance for three reasons:
  • Timing risk: The regression landed immediately before a large, fixed deadline—Windows 10 EOL on October 14, 2025—when the volume of migrations and recovery‑media creation spikes. That magnifies the operational impact for home users and small shops with limited spare hosts.
  • Dependency risk: Many users rely on the MCT as their primary way to produce official, up‑to‑date media. When that single convenience point fails, it forces users to adopt alternative workflows that may be unfamiliar and increase the chance of user error.
  • Perception and trust: Incidents like this raise questions about Microsoft’s rollout testing matrix for consumer tools—especially when a vendor‑provided utility intended to help migration proves host‑OS fragile at a critical moment. That reputational cost is small in monetary terms but meaningful for user confidence.

Risks of common “quick fixes” and what to avoid​

  • Avoid unofficial “patches” or wrappers that claim to “fix” the MCT by modifying the executable or injecting compatibility patches from unknown sources—those can introduce malware or sabotage future official updates.
  • Exercise caution with tools that disable hardware checks or bypass activation/hardware requirements unless you fully understand the consequences; some Rufus options and third‑party scripts offer such bypasses for unsupported upgrades—use only if you accept the risks and legal/activation implications.
  • Do not postpone preparing a fallback plan: with Windows 10 EOL, unpatched systems are higher‑risk; get a tested plan in place whether you move to Windows 11, enroll eligible devices in Extended Security Updates (ESU), or maintain an isolated offline posture.

Recommendations for home users, power users, and IT teams​

For home users and enthusiasts​

  • If the MCT fails, download the official Windows 11 ISO and create a bootable USB using Rufus or Windows’ built‑in tools. Verify the ISO checksum.
  • Use the Windows 11 Installation Assistant for in‑place upgrades when eligible and when you want a guided experience.
  • Back up everything before upgrading and validate that backups are recoverable. Never rely on a single image or backup.

For small IT shops and refurbishers​

  • Maintain a canonical ISO library on a secured server and build test images that can be deployed without relying on per‑host MCT runs. This reduces last‑minute friction.
  • Use a Windows 11 host to produce installers where practical, but aim to centralize media creation in a controlled build pipeline to minimize per‑device failures.

For enterprise admins​

  • Enterprises typically have alternative channels—WSUS, Windows Update for Business, managed images—so they are less exposed to consumer MCT regressions. Still, validate patch windows and update schedules so EOL clients are either migrated or enrolled in ESU where needed.

The broader lifecycle question: Windows 10 options after EOL​

Microsoft’s lifecycle calendar is explicit: after October 14, 2025, mainstream security updates for consumer Windows 10 editions stop unless an organization or user enrolls in Windows 10 Extended Security Updates (ESU) or migrates to Windows 11. Some reporting notes Microsoft offered a one‑year ESU bridge for qualifying devices through October 13, 2026, which can be a pragmatic stopgap for late migrations. Keep in mind ESU availability and eligibility rules vary by SKU and region—confirm your options through official channels if you need this path.

What Microsoft should and likely will do​

Short term:
  • Ship a corrected MCT binary that restores Windows 10 host compatibility and roll the update through the same channels; Microsoft has stated it will release such an update.
Medium term (recommended):
  • Publish a post‑mortem explaining the root cause and the testing gap that allowed a host‑OS regression to ship during a major migration wave. Transparency here helps restore trust and helps admins prepare better in future EOL windows.
  • Add clearer telemetry and automated rollback for consumer tools that impact migration flows—so a bad binary can be pulled or compatibility fixes pushed without depending solely on docs pages.

Timeline recap (concise)​

  • Late September 2025: Microsoft ships updated MCT binary tied to Windows 11 (identified as 26100.6584).
  • Early October 2025: Reproductions surface showing MCT exits immediately on many Windows 10 hosts. Event logs show SetupHost.exe crashes in some cases.
  • October 10–11, 2025: Microsoft posts release‑health guidance acknowledging the issue and recommending ISO downloads / Installation Assistant as workarounds; promises an update.
  • October 14, 2025: Windows 10 reaches its official end-of-support date—heightening urgency for migrations and media creation.

Final analysis — what this episode reveals​

This MCT regression is a textbook example of how a single, consumer‑facing utility can become a bottleneck when it’s treated as a universal convenience and development/testing emphasis shifts to a newer OS base. The immediate technical impact is limited—Microsoft provides official ISOs and alternate upgrade tools—but the incident amplifies the cost of a brittle toolchain at a high‑volume migration moment.
Strengths in the response:
  • Microsoft publicly acknowledged the problem quickly and offered safe, official workarounds (ISO downloads, Installation Assistant). That reduced confusion and provided pragmatic next steps.
Weaknesses and risks:
  • Lack of a public ETA and absence of a technical post‑mortem leave administrators guessing about when they can safely rely on the consumer MCT again.
  • The regression underscores the need for robust cross‑OS validation in tooling that supports migration scenarios; putting more test coverage on older supported hosts during major release cycles could have prevented this.
Conclusion: The broken Media Creation Tool is a significant friction point at an unfortunate moment, but it is not catastrophic. Official ISOs, the Windows 11 Installation Assistant, and established third‑party utilities form reliable fallbacks. Users should proceed cautiously: verify ISOs, back up data, and for organizations, centralize media creation and imaging to avoid per‑host tool failures. Microsoft should release a corrected MCT promptly and follow up with deeper technical transparency so IT teams can close the loop on lessons learned.

End of coverage.

Source: TweakTown Microsoft messes up Windows 11's Media Creation Tool just as Windows 10 support ends
 

Windows 10 reaches its official end-of-support milestone today, October 14, 2025, and while your PC will keep running, Microsoft will stop issuing routine security and quality updates for consumer editions unless you take action to enroll in the Extended Security Updates (ESU) program or upgrade to a supported system.

A futuristic computer desk scene with a security shield, Windows logo, cloud icon, and 'Enroll now' prompt.Background / Overview​

Microsoft announced a firm lifecycle cutoff for Windows 10 months ago: consumer editions (Home, Pro, Pro Education, and Workstation) reach end of support on October 14, 2025. After that date, Microsoft will not deliver regular feature updates, most quality fixes, or standard technical support for devices that remain on Windows 10 unless those devices are enrolled in an approved ESU path.
To reduce immediate exposure for the large installed base that cannot move to Windows 11 — largely because of stricter hardware requirements such as TPM 2.0 and CPU lists — Microsoft created a time-limited consumer ESU program that delivers security-only updates for enrolled devices through October 13, 2026. That one-year bridge is intentionally narrow: ESU supplies only Critical and Important security updates and does not include feature updates, non-security quality fixes, or general technical support.
Independent reporting and community documentation tracked Microsoft’s rollout and the in-OS enrollment wizard, and they confirm the same sequence of events and the same technical gating requirements: your PC must be on Windows 10, version 22H2, have specific cumulative and servicing updates applied, and be signed in with a Microsoft Account (MSA) to use the consumer “free” path.

What exactly ends today — the facts you must know​

  • Microsoft will stop shipping free monthly security and quality updates to Windows 10 consumer editions on October 14, 2025. Machines will continue to boot and operate, but new vulnerabilities discovered after that date will not be fixed for non-enrolled PCs.
  • The consumer ESU program provides security-only updates for enrolled systems until October 13, 2026. Enrollment is possible at any time before that end date, but any time you delay enrollment leaves you unprotected for the intervening period.
  • The ESU consumer enrollment model is limited to devices running Windows 10, version 22H2; older feature-update branches are not eligible.
These are not speculative or partial claims — they are official lifecycle policy items from Microsoft and have been reproduced in independent coverage.

The three paths available to keep getting security updates​

Microsoft offers three consumer enrollment routes for the one-year ESU extension. All three grant the same security-only entitlement for enrolled devices:
  • Free (cloud-backed): Sign into the PC with a Microsoft Account and enable Windows Backup / settings sync to OneDrive. This ties the ESU entitlement to your Microsoft Account and costs nothing in most markets.
  • Rewards redemption: Redeem 1,000 Microsoft Rewards points to claim a device’s ESU entitlement (useful if you already have points).
  • Paid one-time purchase: A roughly $30 (USD) one-time fee (local currency equivalent plus tax) is available if you prefer to buy the entitlement instead of syncing with the cloud or using Rewards. One paid ESU license can be applied across multiple devices tied to the same Microsoft Account within Microsoft’s published device limits.
Note: Microsoft made a regional concession for the European Economic Area (EEA) — EEA consumers benefit from a slightly modified, less-invasive flow — but those regional differences do not automatically change enrollment mechanics worldwide. Verify the options shown in Settings on your device because Microsoft applies regional policy rules during rollout.

Who is eligible — the gating requirements (check these now)​

Before attempting to enroll, confirm these hard prerequisites on every PC you intend to keep using:
  • The device must be running Windows 10, version 22H2 (the final consumer feature update). Check with Settings → System → About or run winver.
  • Install all pending updates and servicing stack updates; in particular, ensure the August 12, 2025 cumulative (commonly referenced as KB5063709) or a later update is applied. That patch fixed issues that prevented the enrollment wizard from appearing reliably.
  • You must be signed in to Windows with a Microsoft Account (MSA) and have administrator privileges on the device. Local accounts are not eligible for consumer ESU enrollment.
  • Domain-joined, MDM-managed, kiosk, and many enterprise-managed devices must use the commercial ESU channel rather than the consumer in-Settings flow. If your PC is joined to an Active Directory domain or your organization manages updates, contact your IT team about enterprise ESU licensing.
If any of those conditions are not met, address them immediately: upgrade to 22H2, install the cumulative updates that include KB5063709 or later, and sign into an MSA with admin rights before you expect the “Enroll now” option to appear. Rollouts are staged, so sometimes the enrollment banner may arrive a few days after updates are present.

How to enroll in consumer ESU — step-by-step (short checklist)​

The following sequence is the practical checklist to follow now; perform these steps on each Windows 10 machine you plan to keep using.
  • Confirm your Windows version: Open Settings → System → About (or press Win + R, type winver, press Enter) and verify Windows 10, version 22H2.
  • Install pending updates: Settings → Update & Security → Windows Update → Check for updates. Install all offered cumulative and servicing stack updates and reboot until no important updates remain. KB5063709 (August 2025) or later must be present for reliable enrollment.
  • Sign in with a Microsoft Account: If you’re using a local account, add/sign in with an MSA that has administrator rights. The ESU entitlement will be associated with that Microsoft Account.
  • Enable Windows Backup (cloud sync) if you want the free path: Settings → Accounts → Windows backup (or Sync your settings) → Enable. This step is required for the free cloud-backed enrollment in most markets.
  • Open Settings → Update & Security → Windows Update and look for the Enroll now or Extend updates banner under the “Check for updates” button. If present, click Enroll now and follow the wizard to choose the free, Rewards, or paid route.
If the enrollment banner does not appear even after you meet prerequisites, wait a short while — Microsoft is rolling the experience out in stages. If the banner still doesn’t show after a few days, double-check that KB5063709 or a newer cumulative is installed, reboot, and sign out/in to your Microsoft Account.

What ESU gives you — and what it does not​

What you get:
  • Security updates classified as Critical or Important by Microsoft’s Security Response Center (MSRC) delivered via Windows Update during the ESU coverage window (through October 13, 2026 for consumer ESU).
What you do NOT get:
  • No feature updates or new OS capabilities.
  • No general technical support beyond ESU-related licensing issues.
  • No non-security quality updates or performance improvements.
  • No indefinite protection — the consumer ESU program is explicitly a one-year extension.
Treat ESU as a time-limited security bridge — not a substitute for migration planning. Use the year to either move eligible PCs to Windows 11, replace hardware, or migrate workloads to supported alternatives (new PC, Linux, Chromebooks/ChromeOS Flex, or Windows in the cloud).

Practical migration options and when to choose them​

  • Upgrade to Windows 11 (free where hardware compatible): Best long-term option if your device meets TPM, Secure Boot, CPU and RAM/storage requirements. Windows 11 continues to receive feature and security updates into the late 2020s and offers enhanced hardware-based protections that Windows 10 lacks.
  • Buy a new Windows 11 PC: If your existing PC fails Windows 11 compatibility checks, purchasing a new device with modern security features can be the simplest path. Consider trade-in and recycling programs to reduce cost.
  • Use ESU for one year while you plan: If your PC can’t move to Windows 11 immediately, ESU is the least disruptive short-term option. Use the year to budget, test application compatibility, and schedule replacements.
  • Consider alternative OS options: For older machines that will never meet Windows 11 hardware requirements, switching to a mainstream Linux distribution or ChromeOS Flex can extend device usefulness while maintaining security. These alternatives require testing for app compatibility and user training.
Enterprises have commercial ESU licensing with different pricing and multi-year options; small businesses, schools, and regulated entities should evaluate those commercial channels rather than the consumer flow.

Privacy and practical trade-offs — what to watch for​

The free consumer ESU route ties the entitlement to a Microsoft Account and, in most markets, requires enabling Windows Backup (cloud sync). That introduces a few trade-offs:
  • Account requirement: You must sign in with an MSA to enroll. That association ties the ESU entitlement to your account and may be a concern for privacy-conscious users who prefer local accounts.
  • Cloud dependency: The free path commonly requires enabling settings sync/Windows Backup to OneDrive, which stores encrypted backups and some settings in Microsoft cloud services. If you refuse cloud sync, you can still use the paid or Rewards options.
  • Regional nuance: Users in the EEA receive a less invasive flow by regional concession, but the exact enrollment options and reauthentication cadence may differ based on where your account is registered.
If any of those items are a concern, weigh the risk of remaining on an unsupported OS against the privacy trade-offs of cloud sync, or select the paid option to avoid enabling cloud sync where it’s required for the free route. Document-level community guides emphasize maintaining independent, local backups regardless of ESU enrollment — ESU is for security patches, not a replacement for a recovery strategy.

Common problems and troubleshooting​

  • Enrollment banner missing: Make sure version 22H2 is installed, KB5063709 (or a newer cumulative) is present, you’re signed in with an MSA, and Windows Backup is enabled if you choose the free route. The enrollment wizard rolled out in phases; some devices saw it later than others.
  • Enrollment fails or wizard crashes: Confirm servicing stack and cumulative updates are applied, reboot, then try again. In some cases, enrolling a second eligible device with the same MSA has helped community members verify account-level entitlement and then apply it to the target device.
  • Domain-joined or enterprise-managed devices: These are excluded from consumer ESU; consult your IT admin about enterprise ESU purchasing or alternate managed update channels.
If problems persist, use Microsoft’s official support pages and community Q&A guidance to check the KB prerequisite list and enrollment rollout status before opening support tickets.

Risk assessment — what happens if you do nothing​

Continuing to use Windows 10 after end of support without ESU means:
  • You will not receive fixes for newly discovered vulnerabilities; attackers will target unpatched machines. Over time, risk increases markedly for credential theft, ransomware, and browser/plug-in exploit chains.
  • Some third-party vendors (antivirus, banking services) may drop support for Windows 10 or degrade protection compatibility, creating functionality and security gaps.
  • Regulatory and compliance exposure may arise for small businesses and home offices that must maintain supported software as part of contractual or legal obligations.
In short, doing nothing is a calculated gamble with rising odds against you as time passes; ESU is explicitly designed to reduce immediate risk while you plan a permanent migration.

Checklist: What to do in the next 30–60 minutes​

  • Confirm Windows 10 edition and version (Settings → System → About) and apply updates until Windows Update reports no pending updates.
  • Verify KB5063709 or later is installed (see Update history in Settings). If missing, apply cumulative updates and reboot.
  • Sign in with a Microsoft Account that has local administrator rights on the device.
  • Enable Windows Backup / Sync if you plan to use the free path.
  • Open Settings → Update & Security → Windows Update and look for Enroll now; follow the wizard and choose the enrollment route that suits you.

Final assessment and recommendations​

Microsoft’s consumer ESU program is a pragmatic, time-limited safety valve: it gives eligible Windows 10 users a one-year window of security-only protection through October 13, 2026, and — importantly — Microsoft and third-party reporting confirm the in-OS enrollment wizard and three consumer enrollment routes described above. This is a realistic path for households and individuals who cannot immediately migrate to Windows 11 because of hardware or application compatibility limits.
However, ESU is exactly that — a bridge. It is not a permanent solution. Use the ESU year to:
  • Inventory hardware and critical applications.
  • Test Windows 11 compatibility with the PC Health Check tool on a selection of your machines.
  • Budget for hardware refresh or evaluate alternative OS routes for legacy hardware.
  • Maintain independent backups and treat ESU as a security-only stopgap.
If privacy or cloud sync concerns make the free path undesirable, the paid or Rewards routes provide alternatives without enabling cloud backup — though the MSA requirement remains. For managed or enterprise scenarios, pursue the commercial ESU channels via volume licensing.

Conclusion​

Windows 10’s official end of support on October 14, 2025 is a consequential milestone for users and IT teams alike: the OS will keep functioning but will no longer receive the routine protections that keep devices safe on the internet. Microsoft’s consumer ESU program offers a clear, limited, and verifiable option to get security-only updates for another year — provided you meet the prerequisites (Windows 10 version 22H2, required cumulative updates such as KB5063709, and a Microsoft Account for the free path). Act now to enroll eligible devices or plan an upgrade path: ESU buys time, not forever.

Source: TechWorm Windows 10 Support Ends Today - Here is How to Extend it for a Year
 

Microsoft has formally ended mainstream support for Windows 10 on October 14, 2025, but Microsoft says Microsoft Defender will continue to deliver security intelligence updates through October 2028—a limited safety net that keeps antivirus signatures and threat detection current while the operating system itself stops receiving routine security patches and feature updates.

Illustration of upgrading Windows 10 to Windows 11 with TPM, Secure Boot, and cloud protection.Background​

Microsoft launched Windows 10 in 2015 and supported it with a decade of cumulative updates, feature releases, and security fixes. On October 14, 2025 the company closed that chapter: consumer editions of Windows 10 (Home and Pro) will no longer receive regular quality and security updates unless a device is enrolled in Microsoft’s Extended Security Updates (ESU) program. That formal end-of-support milestone changes the security posture of millions of PCs worldwide, because unpatched operating-system vulnerabilities become permanent attack surfaces once vendor patches stop.
Microsoft’s public guidance emphasizes three parallel paths for users after the cutoff:
  • Upgrade eligible devices to Windows 11 for ongoing feature and security updates.
  • Enroll eligible devices in Extended Security Updates (ESU) for a time-limited stream of security-only patches.
  • Rely on Microsoft Defender and other security controls to provide detection, but not OS-level hardening.

What Microsoft actually promised — the facts​

  • End of mainstream Windows 10 support: October 14, 2025. This is the official lifecycle end date for Windows 10 consumer editions.
  • Microsoft Defender Security Intelligence updates will continue through October 2028. That means Defender will continue to receive new signatures and machine-learning model updates that help it recognize newly discovered malware and threat patterns for roughly three more years. This does not equate to operating-system security patches.
  • Consumer ESU window: Microsoft introduced a one‑year consumer ESU that covers eligible personal devices from Oct. 15, 2025 through Oct. 13, 2026, with multiple enrollment mechanisms (free or paid options depending on region and enrollment path). Commercial customers may purchase ESU for up to three additional years at per-device pricing.
  • Windows 365 and cloud/VM protections: Devices running Windows 10 inside certain cloud or virtual environments (for example Windows 11 Cloud PCs accessed through Windows 365 or supported virtual machines) automatically qualify for ESU protections at no extra cost, as Microsoft moves cloud-hosted endpoints onto a supported update path.
These are the core, verifiable mechanics that matter for risk assessment. The key point: Defender continues to get threat intelligence, but the OS will not receive the deep-level fixes that address kernel, driver, networking, or other systemic vulnerabilities after October 14, 2025.

Why continued Defender updates are helpful — and why they aren’t enough​

What Microsoft Defender will keep doing​

Microsoft Defender’s continued support through security intelligence updates gives Windows 10 systems an important defensive capability:
  • Signature and detection updates: New malware hashes, behavioral signatures, and heuristic improvements will be delivered so Defender can still recognize and block many newly discovered threats.
  • Cloud-delivered protection and ML models: Defender’s cloud-based telemetry and machine-learning models can still flag malicious files, block malicious URLs, and quarantine known bad actors that attempt to run on the machine.
These functions reduce the risk of common commodity malware, phishing payloads, and some post-infection activity — especially when Defender is paired with modern Windows security features and timely application updates.

Where Defender cannot protect you​

Despite signature updates, Defender cannot replace missing OS security fixes. Critical limitations include:
  • No kernel or OS bug patches: If attackers find a new vulnerability that allows privilege escalation, remote code execution, or bypass of security controls at the OS level, Defender can detect exploitation attempts but cannot patch or remove the underlying vulnerability. That leaves the system inherently fragile to future zero‑day exploits.
  • Dependency on other software: Even with Defender, unpatched third‑party drivers, firmware, or legacy services can be exploited. Defender’s detection may reduce successful infections, but it cannot compensate for systemic holes in the OS stack.
  • Evolving attack sophistication: Attackers increasingly use fileless techniques, living-off-the-land binaries, and bespoke exploits designed to evade signature-based defenses. While Defender’s behavioral analytics help, the protection surface shrinks without vendor patching.
In short: Defender is a strong antivirus and detection layer, but it is not a substitute for vendor-supplied OS security patches and feature updates. Relying on Defender alone increases long-term risk as the zero‑day window lengthens.

The Extended Security Updates (ESU) program explained​

Consumer ESU: a one‑year safety bridge​

For the first time Microsoft offered a consumer-targeted ESU to give personal users a one-year buffer. The consumer ESU:
  • Covers security-only updates from October 15, 2025 through October 13, 2026 for eligible Windows 10 Home and Pro devices that enroll.
  • Offers multiple enrollment routes in many regions: free enrollment tied to a Microsoft Account and Windows Backup/OneDrive sync, redemption of Microsoft Rewards points, or a paid one-time option (reported widely at around $30 for consumer enrollment). Note that regional differences — especially for EEA countries — modify enrollment rules and fees.

Commercial ESU: multi‑year, per‑device licensing​

Businesses retain the classic ESU path:
  • Paid ESU: Organizations can buy ESU on a per-device basis for one year, renewable annually for up to three years after the end of support. Pricing and renewal steps differ for volume licensing customers and cloud providers. The first-year retail figures widely cited are in the area of $61 per device for small commercial licensing, with prices varying by region and rising for every subsequent year of coverage.

ESU coverage via Microsoft cloud offerings​

Microsoft’s strategy funnels many older PCs into cloud-first remediation:
  • Windows 365 and virtual machines: Windows 10 instances running as cloud-hosted VMs (or streamed Windows 11 Cloud PCs through Windows 365) are eligible for ESU at no extra cost and will continue to receive applicable security patches. This creates a practical migration path for enterprises with older hardware that can’t be upgraded locally.

Regional caveats​

Europe’s regulatory environment led Microsoft to tweak ESU terms for the European Economic Area (EEA). For EEA consumers, Microsoft removed some prerequisites (for instance, the cloud backup requirement) and made a free option widely available; however, in many cases a Microsoft Account is still required to authenticate eligibility. Non‑EEA consumers may need to follow the backup/reward/purchase enrollment route. These regional distinctions matter for privacy-conscious users and for compliance teams.

Practical risk assessment: what to expect if you keep running Windows 10​

Short term (0–12 months)​

  • With Defender signature updates and consumer ESU enrollment, most commodity malware risks remain mitigated.
  • Browsing, email, and mainstream productivity tasks remain relatively safe when combined with cautious behavior, up-to-date browsers, and modern app updates.
  • Enterprises that pay for ESU or move legacy VMs to Windows 365 can maintain compliance for many regulatory standards during the transition.

Mid term (1–3 years)​

  • Attackers frequently target unpatched OS vulnerabilities after EOL. Over months and years the probability of exploit discovery and weaponization rises.
  • Defender’s detection will reduce some risk, but the lack of kernel and networking patches increases systemic exposure — particularly for remote code execution or lateral movement attacks inside networks.

Long term (3+ years)​

  • After Defender’s security intelligence updates end (October 2028), Windows 10 devices will be blind to many new malware variants unless third‑party security solutions remain actively updated and the environment is heavily restricted.
  • Long-term use without migration will become progressively untenable for organizations that must meet security, compliance, and cyber-insurance requirements.

Action checklist: what Windows 10 users should do now​

  • Check if your PC qualifies for a free upgrade to Windows 11 using the PC Health Check tool and Settings > Windows Update. If your hardware is compatible, upgrade is the simplest long-term security move.
  • If you cannot upgrade immediately, enroll in ESU (consumer or commercial) if you need extended official security patches. Know your regional options and prerequisites (Microsoft Account, backup options, or payment).
  • Keep Microsoft Defender enabled and ensure cloud-delivered protection and automatic sample submission are ON. These features refresh signatures and ML models that reduce immediate malware risk.
  • Keep all applications — especially browsers, Office apps, and plugins — up to date. Many attacks exploit third-party software, not just the OS.
  • Harden the device configuration: enable disk encryption (BitLocker on supported SKUs), enforce strong passwords, enable multifactor authentication for accounts, and restrict administrative rights.
  • For enterprise IT: prioritize hardware inventory, retire or migrate ineligible devices, and consider Windows 365 or managed cloud VMs as an interim strategy to maintain vendor-patched endpoints.

Migration options beyond the straightforward Windows 11 upgrade​

Upgrade in place to Windows 11​

  • Best for compatible devices. Provides continued security updates, modern hardware security features (TPM, Secure Boot, virtualization-based security), and new feature investments from Microsoft.

Move to cloud-hosted Windows (Windows 365)​

  • For hardware that fails hardware checks, cloud streaming of Windows 11 via Windows 365 allows the user to run a modern OS on older hardware while retaining central patching and compliance. This often includes ESU coverage for Windows 10 workloads running in supported cloud contexts.

Migrate to Linux or ChromeOS Flex​

  • For users willing to change the platform, modern Linux distributions or ChromeOS Flex provide secure, supported alternatives for general productivity and web-based workflows. They avoid Windows-specific vulnerabilities and vendor lifecycle constraints.

Replace hardware​

  • For many consumers the economic answer is to replace older PCs with modern Windows 11 machines that include hardware-backed security and longer vendor support windows.

Enterprise considerations: compliance, cost, and risk​

Large organizations face practical tradeoffs:
  • Cost of ESU vs. replacement: ESU per-device costs add up, and Microsoft’s commercial ESU pricing model typically increases each year. Organizations must balance ESU purchase versus accelerated hardware refresh or migration to cloud VMs.
  • Regulatory compliance: Industries governed by specific security frameworks should assess whether running unsupported OS versions—even with Defender and ESU—meets auditors’ expectations. For many regulated workloads, maintaining a vendor-supported OS version is the safer compliance posture.
  • Operational complexity: ESU is security-only and does not include feature fixes or regular technical support. That limits remediation choices when non‑security bugs or compatibility issues emerge.

Security posture analysis: Defender’s strengths mapped to realistic expectations​

  • Strength: Fast reaction to new malware and signatures. Defender benefits from Microsoft’s telemetry and cloud intelligence and will continue to receive signature updates. This keeps detection of common threats strong for a while.
  • Weakness: No patching for newly discovered OS vulnerabilities. When kernel- or service-level vulnerabilities are found, the only real mitigation is a vendor patch; Defender can only try to detect exploitation vectors and block known behavior. Over time, this gap widens.
  • Practical implication: Defender buys time and reduces exposure to commodity malware, but it does not restore the defense-in-depth provided by a fully supported OS stack.

Myth-busting and common misconceptions​

  • Myth: “If Defender keeps getting updates, my Windows 10 machine is as safe as Windows 11.”
    Fact: Defender helps but cannot substitute for missing OS patches and architectural security features available in Windows 11. Continued signatures ≠ kernel-level fixes.
  • Myth: “I can keep Windows 10 forever if I use another antivirus.”
    Fact: Third-party AV helps but faces the same constraints: it cannot fix underlying OS bugs. Combined defenses can reduce risk but won’t address unpatched system vulnerabilities. Long-term reliance on any AV alone is risky.
  • Myth: “ESU covers everything, so I don’t need to upgrade.”
    Fact: ESU provides security-only updates for a limited period. It’s a bridge, not a permanent solution. Organizations should plan migration during ESU coverage rather than treating ESU as an indefinite lifeline.

What this means for different user groups​

Home users​

  • If hardware allows, upgrade to Windows 11 for the simplest, most future-proof option.
  • If you must stay on Windows 10 temporarily, enroll in the consumer ESU options and keep Defender and apps updated. Harden your device and use MFA for accounts.

Small businesses​

  • Evaluate ESU costs versus hardware refresh. For mixed fleets, plan staged upgrades and consider Windows 365 for legacy hardware. Prioritize endpoints that store sensitive data for immediate upgrades.

Large enterprises​

  • Use ESU selectively for systems that cannot be upgraded quickly while accelerating migration plans. Leverage cloud VM options to bring endpoints under managed, patched images. Ensure asset inventory and risk scoring guide ESU purchases.

Final assessment and recommendation​

Microsoft’s decision to continue Security Intelligence updates for Microsoft Defender through October 2028 is a pragmatic attempt to reduce commodity malware risk for Windows 10 users during and shortly after the transition, and the introduction of consumer ESU gives households a limited bridge to upgrade. Those commitments are helpful and meaningful in the near term.
Nevertheless, Defender’s continuing updates do not replace the long-term security advantages of a supported, modern OS. The safest path remains to upgrade eligible PCs to Windows 11 or to migrate workloads to cloud-hosted modern instances where vendor patches and architectural mitigations are available. For users who cannot transition immediately, ESU and Defender together reduce exposure — but they are temporary tools, not permanent fixes.
The practical bottom line: Defender’s extended life is a valuable safety net, but it is not a full substitute for ongoing platform support. Plan upgrades, use ESU only as a bridge, and harden devices now — because as the patch window closes, attackers will methodically probe the widening gaps.

Source: Windows Report Microsoft Says Defender Keeps Windows 10 Protected Despite End of Support
 

Back
Top