Windows 10 ESU Enrollment Fix: KB5071959 Restores Updates for 22H2

  • Thread Author
Microsoft has issued an out‑of‑band Windows 10 update, KB5071959, to repair a bug that was preventing eligible consumer PCs from enrolling in the Extended Security Updates (ESU) program — a timely fix that restores the update path for machines that otherwise could not receive November’s critical security rollups, including a confirmed kernel zero‑day that was being exploited in the wild.

Windows Update screen showing Enrollment Restored and November 2025 security update.Background​

Windows 10 reached its official end of mainstream support on October 14, 2025. Microsoft offered a one‑year Consumer Extended Security Updates (ESU) program to give eligible devices running Windows 10, version 22H2, a safety net through October 13, 2026. ESU enrollment is required for consumer devices that want to continue receiving security-only updates after the end‑of‑support date; enrollment options include syncing settings with a Microsoft account, redeeming Microsoft Rewards points, or a modest one‑time purchase to activate ESU coverage for up to ten devices.
Because ESU acts as the gating mechanism for post‑EOL security fixes, any problem that interrupts enrollment also interrupts the delivery of critical and urgent updates. That is exactly what happened for a subset of consumer devices: the built‑in ESU enrollment wizard either never appeared or failed at runtime with opaque errors, effectively blocking those PCs from receiving security fixes — including updates that addressed actively exploited vulnerabilities. Microsoft addressed the enrollment failure by shipping KB5071959 as an emergency, out‑of‑band cumulative update on November 11, 2025.

What KB5071959 actually fixes​

KB5071959 is a targeted, out‑of‑band (OOB) cumulative update for Windows 10, version 22H2, that advances affected consumers to OS Build 19045.6466. The package was published specifically for consumer devices that were unable to enroll in the ESU program, and it includes the following elements:
  • A fix for the ESU enrollment wizard that could fail during registration, producing unhelpful error dialogs such as “Something went wrong” or a region‑gating message like “Enrollment for Windows 10 Extended Security Updates is temporarily unavailable in your region.”
  • The October rollup LCU (previous cumulative updates) bundled so devices that were blocked do not miss prior security fixes.
  • A servicing stack update (SSU) packaged alongside the LCU (listed as KB5071982, OS Build 19045.6465) to improve update reliability.
In practice, KB5071959 restores the enrollment UI and logic so eligible consumer PCs can sign into a Microsoft account, validate prerequisites, and receive Extended Security Updates via Windows Update. Microsoft’s update notes make it explicit: the OOB package is offered only to devices that do not yet have an active ESU registration — if you’re already enrolled, you won’t see the KB5071959 offer and you don’t need it.

Why this mattered: timing, risk and the zero‑day​

The timing of KB5071959 was not incidental. Microsoft’s November security release addressed a number of vulnerabilities across Windows and related components, including an actively exploited Windows kernel elevation‑of‑privilege vulnerability that required rapid patching. Because consumer devices that could not enroll in ESU were blocked from receiving ESU security rollups, the enrollment bug left at‑risk systems unable to receive fixes for vulnerabilities that attackers were already exploiting.
Key implications:
  • The enrollment failure left eligible consumer devices in a precarious state: functionally supported but no longer able to receive security patches unless enrollment completed.
  • With at least one kernel zero‑day being exploited in the wild at the time of the November release, the blocked enrollment was an immediate operational security problem for those consumers.
  • Microsoft’s decision to ship KB5071959 as an out‑of‑band fix — rather than waiting for the regular monthly cycle — underscores the severity of the delivery failure and the urgency of restoring the update path.
It’s important to note that public technical details about exploit chains and threat actor attribution are often limited; while the kernel flaw was confirmed as being exploited, public reporting did not attribute exploitation to a specific adversary in a manner that is verifiable for attribution purposes. That uncertainty does not reduce the urgency of applying patches: privilege escalation bugs in the kernel can be combined with other techniques to achieve full system compromise.

How the ESU enrollment bug presented in the wild​

Reports and community troubleshooting showed two distinct failure modes that prevented successful ESU enrollment:
  • The ESU enrollment option did not appear at all in Settings → Update & Security → Windows Update, leaving users without any clear path to enroll.
  • The enrollment wizard launched but terminated with non‑diagnostic errors such as “Something went wrong” or displayed a regional gating banner along the lines of “Enrollment for Windows 10 Extended Security Updates is temporarily unavailable in your region.”
These symptoms were observed across multiple geographies. In some cases, the regional message reflected Microsoft’s staged rollout behavior (some locales were gated or had additional regional checks). In other cases the wizard failed even when devices met the documented prerequisites (Windows 10 22H2, latest servicing stack and cumulative updates, and administrator sign‑in with a Microsoft account). Devices that were domain‑joined or managed by an organization also displayed different behavior: corporate ESU paths (volume licensing or partner channels) are distinct from the consumer wizard, and that complexity sometimes clouded diagnostics for individual users.

Who should get KB5071959 — and how it’s delivered​

KB5071959 is targeted at consumer devices running Windows 10, version 22H2 that are eligible for the Consumer ESU program but have not successfully enrolled. The update is delivered via Windows Update and will only appear on systems that Microsoft’s delivery logic determines are blocked from enrollment.
If KB5071959 appears on your machine, install it; it’s effectively required to restore ESU enrollment and access to subsequent security rollups. If you are already enrolled in ESU or you’ve already started receiving ESU rollups, the KB5071959 OOB package is not necessary and will not be offered.

Step‑by‑step: check enrollment status and install KB5071959​

Below is a practical checklist to determine whether you need KB5071959 and how to install it safely.
  • Check your Windows version and build
  • Open Settings → System → About and confirm you’re on Windows 10, version 22H2 (OS build in the 19045 family).
  • Verify ESU enrollment status
  • Open Settings → Update & Security → Windows Update.
  • Look for an “Enroll now” link or a status that indicates ESU is active. If you see ESU already enrolled and updates downloading, you don’t need KB5071959.
  • If ESU enrollment is missing or fails
  • Click Check for updates and let Windows Update search for offers. The out‑of‑band update KB5071959 will be surfaced automatically on devices that are blocked.
  • Install the update
  • Follow the normal Windows Update workflow: download, install, and restart when prompted. The update includes a servicing stack that may require a restart to complete installation.
  • Retry ESU enrollment
  • After the reboot, return to Settings → Update & Security → Windows Update and select the Enroll option. Follow the wizard and sign in with a Microsoft account that has the required privileges.
  • Confirm ESU and install ESU rollups
  • Once enrolled, Windows Update should begin offering Extended Security Updates (ESU rollups). Check for updates again and install the ESU LCU that corresponds to the latest month.
Notes and caveats:
  • The update will not appear on machines already enrolled in ESU; it’s intentionally targeted.
  • Ensure you are signed in as a local administrator and, if prompted, sign in to a Microsoft account during the ESU enrollment flow.
  • If automatic Windows Update does not offer KB5071959, a manual install via the Microsoft Update Catalog can be an option — but manual installs require correct ordering (SSU before LCU) and are riskier for typical consumers.

Troubleshooting: when KB5071959 doesn’t resolve the problem​

KB5071959 fixes the enrollment wizard failure itself, but it will not magically bypass other factors that can prevent enrollment. If the problem persists, try the following steps:
  • Confirm prerequisites: ensure the latest servicing stack update (SSU) and the most recent monthly cumulative update (LCU) that apply to your build are installed. Windows Update’s “Check for updates” will usually handle this automatically, but managed or offline systems may need manual intervention.
  • Check account type: consumer ESU enrollment requires signing into a Microsoft account; local accounts or certain AD‑joined profiles may not be eligible for the consumer wizard and might require an organization‑level enrollment path.
  • Review device classification: devices flagged as enterprise‑managed or under certain policies may not show the consumer enrollment UI. In those cases, contact your IT admin or review any group policy settings that could block consumer enrollment.
  • Network and telemetry services: ensure the Windows Update service and related telemetry/diagnostic services are running. Some privacy‑focused configurations that disable telemetry may inadvertently block the enrollment flow.
  • Regional gating: if you see a message saying enrollment is temporarily unavailable in your region, the rollout may still be staged for your locality. Waiting a short period and retrying or ensuring all prerequisites are met is recommended.
  • Manual catalog install: if Windows Update refuses to offer the OOB update and you are confident the device is eligible, a carefully ordered manual install from the Update Catalog is possible — but this is best handled by experienced users or support technicians because mismatched SSUs can prevent future updates from installing correctly.
If you are not comfortable performing these steps, seek help from a trusted support channel rather than experimenting with Registry edits or uninstalling critical updates.

Analysis: strengths and shortcomings of Microsoft’s response​

The rapid release of KB5071959 demonstrates several positive aspects of Microsoft’s response model — but it also exposes friction points in how post‑EOL protections are delivered to consumers.
Strengths
  • Fast, targeted response: Microsoft recognized the enrollment failure was preventing the delivery of critical security updates and shipped an out‑of‑band cumulative update rather than waiting for the monthly cycle.
  • Bundled remediation: the OOB update includes prior rollups and a servicing stack update, reducing the chance that previously missed updates remain on the device after enrollment.
  • Targeted delivery: the update is offered only to devices that need it, minimizing churn for already compliant machines.
Shortcomings and risks
  • Opaque error messages: the enrollment wizard returned ambiguous messages that gave users no clear path to correct the issue; “Something went wrong” is poor UX for a security gating flow and increased support demand.
  • Regional rollout complexity: staged and region‑gated enrollment led to confusion and inconsistent experiences, particularly where the UI displayed “temporarily unavailable in your region” without a clear timeline.
  • Dependence on cloud‑linked accounts: consumer ESU enrollment requires a Microsoft account sign‑in or synchronization of settings in many cases; privacy‑minded users who prefer local accounts are left with a more complicated path to stay secure.
  • Manual recovery risk: users who attempted unsupported workarounds (registry hacks, resets) to force enrollment risked system instability and may still have been blocked from receiving ESUs until the OOB fix arrived.
Taken together, the fix was necessary and effective for the enrollment bug itself — but the incident highlights the usability and communication gaps that can make end‑of‑support transitions hazardous for everyday users.

Practical advice for home users and small organizations​

  • Install KB5071959 if offered. If your device is eligible for consumer ESU and you see KB5071959 in Windows Update, install it immediately and follow the enrollment wizard instructions.
  • Prioritize the ESU rollups once enrolled. After ESU enrollment completes, run Windows Update again and install the ESU cumulative packages — they contain fixes for actively exploited vulnerabilities and high‑severity issues.
  • Use a Microsoft account for ESU enrollment. Consumer ESU enrollment expects a Microsoft account for the sign‑in path. If you have no Microsoft account, create one and ensure you use an administrative sign‑in when enrolling.
  • Don’t ignore prerequisites. Make sure your device is on Windows 10, version 22H2 and has the latest servicing stack and cumulative updates installed before attempting enrollment.
  • Consider upgrading where possible. ESU is a stopgap. If your device can run Windows 11, evaluate upgrading to remain on a fully supported platform beyond ESU’s one‑year window.
  • Backup before making big changes. If you plan to perform manual update installations or major system changes, ensure you have a current system backup and a recovery plan.

What administrators and power users should do differently​

  • Verify fleet eligibility: for organizations supporting employees or customers on Windows 10 consumer builds, identify which devices are running 22H2 and are candidates for consumer ESU versus those that should be handled via volume licensing.
  • Automate checks and notifications: configure monitoring that alerts when a device is not reporting ESU enrollment or is missing required servicing stack updates.
  • Test update sequences: where manual installs are required, validate the correct SSU → LCU ordering in a test environment to avoid servicing failures.
  • Communicate with users: if you manage consumer machines or assist customers, make it clear which account types and settings are required for consumer ESU enrollment and provide step‑by‑step assistance for the wizard.
  • Maintain incident readiness: because zero‑day exploits may be part of the update mix, have procedures to expedite patch deployment and fallback containment measures (network segmentation, least privilege, user education).

What remains uncertain and what to watch for​

While KB5071959 addresses the enrollment wizard failure, a few open items deserve attention:
  • Regional availability: some regions experienced staged rollout behavior; users seeing “temporarily unavailable in your region” should confirm prerequisites and check back later if the OOB update did not appear.
  • Attribution and exploit details: public reporting confirmed in‑the‑wild exploitation of a kernel vulnerability around the November updates, but detailed public attribution and complete exploit mechanics remained limited. Organizations should assume motivated adversaries may combine this flaw with other techniques and prioritize mitigations accordingly.
  • Boot/secure boot certificate timing: Microsoft’s update notices also reminded users that Secure Boot certificates used by many Windows devices have upcoming expirations (noted for mid‑2026 in vendor advisories). Administrators should review those notices to prepare for certificate updates and avoid unintended boot failures.
  • User experience changes: the ESU enrollment workflow exposed friction that Microsoft may improve in future rollouts (clearer diagnostics, an eligibility checker, or a dedicated enrollment website). Watch for future guidance or tooling that makes enrollment diagnostics easier.
If a device still cannot enroll after KB5071959, the issue could be due to device classification, policy settings, or regional gating rather than the enrollment wizard bug alone.

Final assessment​

KB5071959 was a pragmatic, necessary fix: Microsoft closed a delivery hole that, if left open, would have left a swath of consumer Windows 10 devices unable to receive urgent security updates. The out‑of‑band release — bundled with the servicing stack — both repaired enrollment flow failures and ensured blocked machines could catch up on previously issued patches.
At the same time, the episode exposes ongoing tensions in how legacy platform support is handled for consumers. Relying on cloud‑driven enrollment, staged rollouts, and non‑transparent error messaging created a fragile experience for users who simply wanted to remain protected after Windows 10 left mainstream support. The technical fix is now in place for eligible devices, but the broader lessons are about improving diagnostics, clarifying regional rules, and smoothing the path for consumers who must choose between upgrading, paying for ESU, or accepting increased risk.
For anyone who still runs Windows 10 22H2 and needs continued protection, the practical takeaway is simple: check Windows Update, install KB5071959 if offered, enroll in ESU, and then install the ESU rollups without delay. That sequence restores the security posture for affected machines and closes the window attackers were exploiting.

Source: PCWorld Microsoft releases emergency Windows 10 fix for blocked ESU updates
 

Microsoft has quietly issued an emergency, out‑of‑band update (KB5071959) for Windows 10, version 22H2 to repair a broken Extended Security Updates (ESU) enrollment path that was preventing eligible consumer PCs from signing up for post‑end‑of‑support security patches. The package not only restores the in‑OS “Enroll now” wizard but also bundles prior October security fixes and a servicing‑stack update to make sure affected machines can install and continue receiving ESU rollups.

Hand holds a card as an 'Enroll now' security prompt appears on a Windows 10 settings screen.Background​

What happened and why it matters​

Windows 10 reached its formal end of mainstream support in mid‑October 2025, and Microsoft offered a time‑boxed consumer Extended Security Updates (ESU) program as a safety net for devices that cannot upgrade to Windows 11 immediately. The consumer ESU program is delivered via an in‑OS enrollment wizard (Settings → Windows Update → “Enroll now”) that validates eligibility, binds the entitlement to a Microsoft Account, and enables the device to receive security‑only updates through Windows Update. Shortly after rollout, a subset of consumer devices reported a failure in the enrollment wizard — vague errors such as “Something went wrong” or “Enrollment temporarily unavailable” blocked the workflow. Because enrollment is the gatekeeper for ESU updates, the failure effectively prevented eligible machines from receiving crucial fixes issued after the end‑of‑support milestone. Microsoft’s response was to publish KB5071959 as an out‑of‑band cumulative update on November 11, 2025 to repair the enrollment failure and to ensure those devices are not left without essential security patches.

Who is affected​

  • Target: consumer Windows 10 devices running version 22H2 that are not already enrolled in the Windows 10 consumer ESU program but that attempted enrollment and experienced failures.
  • Not target: devices already enrolled in ESU will generally not receive this out‑of‑band package because they are already entitled to updates.
The targeted nature of delivery means KB5071959 only appears on machines that the update delivery logic identifies as unable to enroll — it is not a broad‑public cumulative for every 22H2 system. If Windows Update does not offer the fix automatically, Microsoft makes the package available via the Microsoft Update Catalog for manual installation.

Overview of the KB5071959 package​

What KB5071959 contains​

  • An out‑of‑band cumulative update that advances Windows 10, version 22H2 to OS Build 19045.6466.
  • The package includes the October 14, 2025 security cumulative (the prior LCU) so affected devices won’t miss earlier fixes.
  • It specifically “addresses an issue in the Windows 10 Consumer Extended Security Update (ESU) enrollment process, where the enrollment wizard may fail during enrollment.”

Servicing‑stack update (SSU) pairing​

Microsoft explicitly bundles or sequences a Servicing Stack Update (SSU)KB5071982 (OS Build 19045.6465) — with the cumulative. SSUs improve the reliability of the update process and are frequently included to reduce installation failures caused by outdated servicing components. Installing the SSU before or alongside the cumulative mitigates a common class of update problems that otherwise block LCUs from applying correctly.

Why Microsoft marked it as a security update​

Microsoft classifies KB5071959 as a security update for devices not enrolled in consumer ESU because the enrollment failure prevented those customers from receiving essential security updates. In practical terms, the package is a repair that restores the ability to obtain security fixes — a security‑critical service — and therefore it is treated with the urgency of a security release.

The security context: why timing was urgent​

The October Patch Tuesday backdrop​

October’s Patch Tuesday (the final public patch cadence for unenrolled Windows 10) was unusually large and included multiple zero‑day vulnerabilities and a broad set of critical fixes. Industry trackers and security vendors described October’s release as one of the most consequential cycles of the year, with dozens (by some counts over a hundred) of CVEs and several zero‑day issues that warranted immediate remediation. Devices unable to enroll in ESU risked missing those fixes and any subsequent monthly rollups that would be gated by ESU enrollment.

Practical risk to users​

A broken enrollment path is more than a UX bug — it severs the delivery mechanism for patches that protect against actively exploited vulnerabilities. For consumer PCs that cannot or will not upgrade to Windows 11, ESU is the only Microsoft‑sanctioned path to get critical platform fixes. By issuing an out‑of‑band update, Microsoft reduced the window of exposure for affected devices and made sure the October fixes are applied where they had been missed.

How to check, install, and validate​

Quick, safe steps (concise)​

  • Open Settings → Update & Security → Windows Update and select Check for updates.
  • If KB5071959 appears, install it and reboot when prompted.
  • After reboot, open Settings → Windows Update → Enroll now and complete the ESU enrollment wizard.
  • Confirm you begin receiving ESU rollups (check Windows Update history). If Windows Update does not offer the OOB package, download it and the SSU (KB5071982) from the Microsoft Update Catalog and install manually, installing the SSU first if required.

Manual installation caveats​

  • If the automatic offer is absent, obtain the .msu/.cab files from Microsoft Update Catalog. Confirm you choose the package matching your CPU architecture.
  • Install the SSU (KB5071982) before the LCU if the catalog delivers them separately; modern Windows Update usually sequences this automatically but manual installs require attention to ordering.
  • Back up important data before applying manual servicing‑stack or cumulative updates on critical machines, particularly those with unusual third‑party security software.

Troubleshooting enrollment failures that persist​

Community troubleshooting and early diagnostics pointed to several common causes that can masquerade as the wizard bug:
  • Devices improperly classified as corporate/education (leftover work/school account artifacts).
  • Disabled or misconfigured services needed for enrollment (for example, wlidsvc, VaultSvc, LicenseManager).
  • Regional rollout gating or delays in the entitlement service.
    If the enrollment wizard still fails after KB5071959, try removing stale work/school accounts, ensuring required services are running, signing into Windows with a personal Microsoft Account, and then reattempting enrollment. If those steps fail, use the Microsoft Update Catalog manual install path or contact Microsoft support for account/entitlement issues.

Technical analysis: what went wrong and why​

Root causes (what reporting suggests)​

Early reporting and community triage point to a mixture of implementation fragility and rollout complexity:
  • The consumer ESU enrollment was implemented as a small in‑OS wizard that depends on recent servicing components and cloud‑side entitlement services. That coupling made the experience fragile when either the servicing stack or entitlement APIs were out of sync.
  • Microsoft used a staged, region‑aware rollout. In some regions the UI reported “temporarily unavailable” due to gating rules, while other errors were genuine software failures in the enrollment flow. The mixture of regional gating, account classification issues, and a core enrollment bug produced a confusing, heterogeneous set of failure modes for users.

Why bundling SSU + LCU is sensible (and complicated)​

Bundling the servicing stack (SSU) with the cumulative (LCU) is a pragmatic engineering choice: an outdated servicing stack is a frequent cause of LCU install failures. By packaging or sequencing the SSU with KB5071959, Microsoft reduced the risk that the enrollment‑repair cumulative would itself fail to install. On the flip side, bundling these components increases the size and complexity of the package and may surprise users who expect a simple enrollment patch. Overall, the approach is defensible from reliability and security perspectives.

Engineering and product management lessons​

  • Tightly coupling UI‑driven enrollment flows to servicing‑stack mechanics increases attack surface for operational failures.
  • Staged/regional rollouts must include clearer telemetry and in‑product diagnostics; vague messages like “Something went wrong” are insufficient for troubleshooting and create support overhead.
  • For end‑of‑life or legacy OS pathways, the friction of manual enrollment plus account linkage is a support burden that can easily turn into a high‑risk barrier. The fix is narrow and effective, but the broader design tradeoffs around telemetry, diagnostics, and entitlement UX remain unresolved.

Risks, caveats, and open questions​

Known unknowns and unverifiable claims​

  • Public reporting differs on the exact count of zero‑day vulnerabilities patched in the October update; vendor counts range and some trackers include related product CVEs in aggregated totals. Any single “total” number should be treated as an approximate snapshot rather than canonical until Microsoft’s Security Update Guide is consulted. The central fact remains: the October cycle patched multiple high‑risk vulnerabilities and at least some zero‑days were actively exploited in the wild. Treat specific totals with caution.

Potential post‑install problems to watch for​

  • As with any servicing‑stack or cumulative installation, third‑party security products have historically interfered with updates. Users applying manual installs should be wary of security‑stack interactions and follow vendor guidance for compatibility.
  • Some legacy drivers (for example, the Agere modem driver highlighted by multiple trackers) were actively changed or removed in October’s fixes; devices relying on obsolete hardware may experience degraded functionality post‑patch unless vendors provide updated drivers. Admins should inventory unusual legacy hardware before wide deployment.

The long view on Windows 10 security posture​

KB5071959 restores a stopgap for consumers who must remain on Windows 10, but it is not a substitute for migration to a supported OS. ESU is a limited, time‑bound bridge that covers security fixes only and is intended to buy breathing room — not to be a long‑term strategy. Organizations and users should treat ESU as a tactical relief while planning migration or a longer‑term security posture.

Practical recommendations for Windows 10 users and admins​

For individual users (straightforward)​

  • Check Windows Update now. If KB5071959 is offered, install it, reboot, and run the Enroll now wizard. Your device should begin receiving ESU rollups after enrollment completes.
  • If the update does not appear, manually download KB5071959 and SSU KB5071982 from the Microsoft Update Catalog and apply them (SSU first when required). Keep a current backup before manual servicing.
  • Ensure you sign in with a Microsoft Account (MSA) if using the free enrollment path or to bind a purchased/redeemed ESU token. Remove leftover work/school accounts if they are interfering with classification.

For IT administrators and power users​

  • Inventory devices: identify remaining Windows 10 22H2 devices and confirm whether they are enrolled in ESU or require enrollment.
  • Test: pilot KB5071959 + SSU on representative hardware, especially if endpoint detection/response (EDR) or legacy device drivers are present.
  • Communications: inform users about the enrollment process and the need to sign in with an MSA (or use Microsoft Rewards/paid token options) to avoid helpdesk surges.
  • Contingency: plan to migrate critical endpoints off Windows 10 sooner rather than later — ESU is short‑term.

Final assessment​

KB5071959 is a surgical, necessary fix that closed an operational hole which could have left a large number of consumer Windows 10 devices unable to receive urgent security updates. Microsoft’s decision to ship an out‑of‑band cumulative that both repaired the enrollment wizard and included the October LCU — plus an updated servicing stack — was the correct, pragmatic choice to limit exposure for affected systems. The technical remedy is now available and, when applied, restores the ESU pathway for eligible machines. At the same time, the episode underscores ongoing tensions in legacy platform support: staged rollouts, cloud‑backed entitlement flows, and non‑diagnostic error messages create fragile user experiences for consumers who simply want to remain protected. The lesson for product teams is clear — in end‑of‑life scenarios, reliability, diagnostic clarity, and straightforward recovery paths matter as much as the underlying security fixes. Administrators and home users should treat KB5071959 as an urgent installation if it appears for their devices, verify ESU enrollment, and continue with migration planning as the durable long‑term solution.
KB5071959 is available now through Windows Update for affected devices and via the Microsoft Update Catalog for manual installation; users should apply it, complete ESU enrollment, and confirm they begin receiving the ESU rollups without delay.
Source: Ars Technica Microsoft releases update-fixing update for update-eligible Windows 10 PCs
 

Back
Top