Microsoft has shipped the August 12, 2025 cumulative security update for Windows 11, version 24H2 (KB5063878, OS Build 26100.4946), a routine Patch Tuesday release that combines the latest servicing stack update with the monthly cumulative update, patches a range of security issues, and contains targeted fixes and AI-component refreshes — while also reiterating a high-priority warning about Secure Boot certificate expiry that every IT team should treat as a near-term operational imperative.
This August update is a combined package: it ships the latest LCU (Latest Cumulative Update) with the latest SSU (Servicing Stack Update) to reduce installation failures and simplify deployment. Microsoft notes that security fixes and quality improvements included here build on the earlier July preview fixes (notably KB5062660), and that devices which already installed prior updates will only download the delta contained in this release. The combined package model is the same release strategy used in recent Windows servicing, intended to make monthly patching more reliable for both consumer and enterprise environments.
Key technical identifiers for administrators:
Why this matters:
Practical implications:
Operational note:
Source: Microsoft - Message Center August 12, 2025—KB5063878 (OS Build 26100.4946) - Microsoft Support
Background / Overview
This August update is a combined package: it ships the latest LCU (Latest Cumulative Update) with the latest SSU (Servicing Stack Update) to reduce installation failures and simplify deployment. Microsoft notes that security fixes and quality improvements included here build on the earlier July preview fixes (notably KB5062660), and that devices which already installed prior updates will only download the delta contained in this release. The combined package model is the same release strategy used in recent Windows servicing, intended to make monthly patching more reliable for both consumer and enterprise environments.Key technical identifiers for administrators:
- KB: KB5063878
- OS Build: 26100.4946
- Applies to: Windows 11, version 24H2 (all editions)
- Release date: August 12, 2025
- Included SSU: KB5065381 (OS Build 26100.4933) — the SSU is bundled to ensure the servicing stack used to apply updates is up to date.
What’s in KB5063878 — high-level summary
Microsoft’s summary for the August package emphasizes three broad areas:- Security fixes across the OS to remediate vulnerabilities discovered or reported since the previous monthly update. The official KB lists the security work as the primary reason to deploy.
- Quality and reliability improvements that continue to address stability regressions reported in prior updates — examples include sign-in delays tied to preinstalled packages and various reliability tweaks rolled forward from the July preview (KB5062660).
- AI component updates packaged with the LCU for components such as Image Search, Content Extraction, Semantic Analysis, and Settings Model (version 1.2507.793.0 in this release). These component updates are included in the cumulative package but are only applicable to Copilot+ PCs and will not install on general Windows PC or Windows Server SKUs. Administrators should note the conditional applicability when auditing update deployments.
The Secure Boot certificate expiration — what’s changing and why it matters
Arguably the most consequential advisory bundled with this release is the urgent reminder about the Secure Boot certificate expiration tied to certificates issued in 2011 that will begin expiring in June 2026. Microsoft has been publishing guidance and a coordinated rollout plan to replace 2011-era certificates with 2023 certificates (KEK and DB updates). Without the new certificates installed, affected devices could lose the ability to receive Secure Boot pre-boot fixes and, in some cases, could fail to boot securely. Microsoft’s advisory explains the scope, recommended actions, and the potential consequences if organizations do nothing. (support.microsoft.com, techcommunity.microsoft.com)Why this matters:
- Secure Boot is a firmware-level trust mechanism that prevents unauthorized low-level code (bootkits, unsigned bootloaders) from loading during the platform startup sequence.
- The signing certificates that underpin Secure Boot trust chains have finite lifetimes; several core Microsoft CA certificates created in 2011 are reaching end-of-life starting in mid‑2026.
- If new 2023 certificates are not present in the platform KEK/DB, devices may be unable to apply pre-boot security updates or may stop trusting new, legitimately signed boot components — a situation with potential availability and security impacts. (support.microsoft.com, techcommunity.microsoft.com)
What Microsoft recommends — practical steps
Microsoft’s published guidance for Secure Boot certificate transition outlines multiple practical options depending on your device management model:- For most consumer devices and many MDM-managed systems, Microsoft will deliver the new 2023 certificates through regular Windows Update channels. No manual action is required for most users if devices are kept current.
- Enterprise administrators who manage updates themselves via WSUS, SCCM, or other on-prem tools should review Microsoft’s guidance and ensure their update pipelines will include the certificate updates. OEM firmware updates should be applied before certificate changes where required. (techcommunity.microsoft.com, support.microsoft.com)
- Microsoft published an optional registry-based approach to opt into Microsoft-managed Secure Boot updates for organizations that need it (registry value: MicrosoftUpdateManagedOptIn). IT teams should weigh privacy and telemetry implications before toggling this key and follow the official guidance step-by-step.
AI components and Copilot+ exclusivity — what admins should know
KB5063878 updates several AI component binaries (Image Search, Content Extraction, Semantic Analysis, Settings Model) to build 1.2507.793.0. These files are distributed with the cumulative update but Microsoft makes it explicit: the AI component updates only install on Windows Copilot+ PCs and will not install on standard Windows PC or Windows Server images. That distinction matters for inventorying update applicability and for any compliance or auditing processes that track installed components across a device estate.Practical implications:
- If your environment includes Copilot+ hardware (selected OEM devices with specific silicon and feature enablement), ensure drivers and OEM-provided firmware are current to receive the full AI feature set.
- Non-Copilot devices will receive the security and quality fixes in the LCU but will not receive the AI component payload. Do not interpret missing AI binaries as an update failure in standard Windows images.
Servicing Stack Update (SSU) — why it matters and how it’s packaged
This release bundles KB5065381 (SSU) at build 26100.4933 with the LCU. SSUs are small but important: they update the component responsible for applying updates and can prevent installation failures, broken rollbacks, and servicing corruption. Microsoft’s best practice is to install SSUs before LCUs where a manual sequence is required; when they’re bundled as a combined package (as in this release), that complexity is handled for you — but administrators still need to be aware that the combined package cannot be rolled back by wusa.exe (because the SSU cannot be removed after installation).Operational note:
- If you need to remove the LCU after installing the combined package, you must use DISM with the LCU package name (DISM /online /get-packages to identify the package, then DISM /online /Remove-Package /PackageName:<name>). Running wusa.exe /uninstall on the combined package will not remove the SSU.
How to get and install KB5063878 — methods and commands
Microsoft documents multiple installation methods for administrators and end users. Core options:- Windows Update and Windows Update for Business: automatic distribution according to policy.
- WSUS: the update will sync automatically if Products = "Windows 11" and Classification = "Security Updates".
- Microsoft Update Catalog: download MSU files for manual or offline installations.
- DISM / Add-WindowsPackage or Add-WindowsPackage for offline images.
- Using DISM:
DISM /Online /Add-Package /PackagePath:c:\packages\Windows11.0-KB5063878-x64.msu - Using PowerShell:
Add-WindowsPackage -Online -PackagePath "c:\packages\Windows11.0-KB5063878-x64.msu" - For offline images:
DISM /Image:mountdir /Add-Package /PackagePath:"Windows11.0-KB5063878-x64.msu"
Add-WindowsPackage -Path "c:\offline" -PackagePath "Windows11.0-KB5063878-x64.msu" -PreventPending
Enterprise deployment considerations and checklist
Deploying this August update at scale should follow disciplined change-control steps. Recommended checklist:- Inventory and classify endpoints by Secure Boot status, firmware age, and Copilot+ capability.
- Validate OEM firmware availability and apply necessary UEFI updates to devices that require updated KEK/DB handling before certificate rollout.
- Stage KB5063878 in a controlled pilot ring; monitor Event Viewer, Windows Update logs, and application compatibility telemetry for 72–120 hours.
- Confirm SSU presence (KB5065381) in test images and understand rollback constraints (SSU cannot be uninstalled).
- For WSUS/SCCM environments, ensure Products and Classifications are set correctly to sync the update automatically.
- Document and script DISM-based offline servicing practices for gold images and WinRE updates where necessary.
- If you manage policy-driven Secure Boot transitions, review Microsoft guidance for Group Policy or registry approaches (for opt-in flows) and test thoroughly.
Risks, edge cases, and known unknowns
This update appears to be a standard cumulative release, but real-world deployments always reveal edge cases. Key concerns:- Firmware lag: OEMs that do not publish timely firmware updates to accommodate the new 2023 certificates may leave devices in a partially compatible state. This can cause Secure Boot issues or unexpected boot-time behavior on affected devices. (techcommunity.microsoft.com, tomshardware.com)
- Dual-boot and Linux users: reliance on Microsoft-signed shims and bootloaders means Linux compatibility could be affected if firmware does not accept the 2023 certs. Plan for distribution-specific mitigations.
- Telemetry/regulatory considerations: enabling Microsoft-managed Secure Boot updates (opt-in registry key) implies a diagnostic data configuration that enterprises may need to reconcile with internal privacy or regulatory policies.
- Unclear consumer guidance: while Microsoft intends to manage much of the rollout automatically for Home/Pro devices, some consumer devices with nonstandard firmware may require manual intervention — and public-facing step-by-step instructions can be dense and technical for average users.
Recommended immediate actions (concise)
- Apply KB5063878 to test devices within 24–72 hours and expand to pilot rings if no regressions appear.
- Inventory firmware versions and coordinate with OEMs to ensure UEFI updates are available where required prior to the Secure Boot certificate transition.
- For mixed-OS environments, validate dual-boot and Linux boot workflows on representative hardware.
- For managed fleets, confirm WSUS/SCCM sync settings (Product = Windows 11; Classification = Security Updates) and ensure the SSU/LCU combined package is tested.
- Document rollback and incident response steps, and prioritize critical assets for immediate patching.
Final assessment — strengths and cautions
Strengths:- The combined SSU + LCU delivery reduces a common class of update failures and simplifies deployment workflows for administrators.
- Microsoft’s proactive and public timetable for the Secure Boot certificate transition gives organizations the lead time (June 2026 deadline) needed to plan remediation and avoid service-impacting surprises. (support.microsoft.com, techcommunity.microsoft.com)
- Including AI component updates for Copilot+ devices reflects Microsoft’s staged approach to feature rollouts while keeping core security fixes universal.
- The certificate rollout introduces nontrivial operational complexity that reaches beyond Windows Update: it intersects with OEM firmware, group policy, and system provisioning workflows. Failure to coordinate those elements can produce availability risks, especially at scale. (techcommunity.microsoft.com, tomshardware.com)
- For heterogeneous estates running alternative OSes or custom boot chains, the certificate change will likely require targeted testing and, in some cases, bespoke remediation steps.
Conclusion
KB5063878 (OS Build 26100.4946) is a routine but important August cumulative update that bundles security fixes, quality improvements, and AI component updates while reiterating an urgent, broader ecosystem advisory about Secure Boot certificate expiration beginning in June 2026. For home users who keep automatic updates enabled, this patch will install via Windows Update with minimal action required; for IT professionals and enterprises, the month’s real work is preparation — inventory firmware, coordinate with OEMs, stage the combined SSU+LCU in controlled rings, and validate Secure Boot behavior across diverse device types. The technical window before June 2026 is finite; organizations that treat the Secure Boot certificate transition as an item on their patch-and-firmware roadmap today will avoid urgent, disruptive remediation later.Source: Microsoft - Message Center August 12, 2025—KB5063878 (OS Build 26100.4946) - Microsoft Support
- Joined
- Mar 14, 2023
- Messages
- 97,395
- Thread Author
-
- #2
Microsoft has released the August 12, 2025 cumulative update for Windows 11, version 24H2 — KB5063878 (OS Build 26100.4946) — delivered as a combined Servicing Stack Update (SSU) plus Latest Cumulative Update (LCU). The package bundles security and quality fixes, small AI component updates targeted to Copilot+ hardware, and an SSU refresh intended to improve update reliability, while renewing Microsoft’s public warning about an imminent Secure Boot certificate lifecycle change that begins in June 2026.
Windows cumulative updates continue to follow Microsoft’s combined SSU+LCU model, where the servicing stack (the component that installs updates) is included with the monthly cumulative package to reduce failed installations and make rollouts simpler for administrators. The August 12 package identifies as KB5063878 and advances Windows 11, version 24H2 devices to OS Build 26100.4946; it also packages a servicing stack refresh identified as KB5065381 (OS Build 26100.4933).
Microsoft’s public KB entry and associated guidance position this release as a routine monthly security and quality rollup, but one with operationally consequential reminders — most notably the Secure Boot certificate replacement timeline that organizations must treat as a multi‑quarter program of work. The Secure Boot advisory is not new: Microsoft published its lifecycle guidance and technical rollout plan earlier in 2025 and has reiterated the June/October 2026 certificate expiration windows that will affect devices that do not acquire the replacement 2023 CA chain. (techcommunity.microsoft.com, support.microsoft.com)
Why this matters now: the update itself does not change the certificate rollout schedule, but the August KB repeats Microsoft’s readiness guidance and reinforces the need for firmware coordination and testing before the first expiration deadline. For most consumer PCs that receive updates directly from Microsoft and OEMs, the process will be largely automatic; for managed or air‑gapped fleets, the work is explicitly operational and requires inventory, OEM coordination, and sometimes manual firmware or variable updates.
Deployment note: if you manually remove only the LCU after installing a combined SSU+LCU package, the SSU remains applied; removing the LCU in that situation may require DISM operations and image rework rather than a simple wusa.exe uninstall. Plan rollback and recovery steps accordingly.
Why this is not a pure software update problem
Third‑party OSes and Linux distributions that rely on Microsoft-signed components (shim) may face compatibility problems if firmware lacks the updated CA entries. Coverage from multiple outlets has already warned that Linux users and dual‑boot systems may need manual workarounds if OEM firmware updates are not available for their hardware. That reality increases the operational burden for mixed‑OS shops and for enthusiasts using older equipment. (techradar.com, tomshardware.com)
Immediate (first 72 hours)
Practical truth: for the majority of consumers who allow automatic updates, the August package will arrive and install with minimal action required. For IT administrators, the real work for 2025–2026 is not a single patch — it’s inventorying firmware, coordinating with OEMs, testing in representative rings, and applying disciplined rollout procedures so that certificate updates do not cascade into a fleet‑wide availability incident. Start that program now; the deadlines are fixed, and the remediation work is operationally nontrivial.
KB5063878 is available now through Windows Update, Windows Update for Business, WSUS, and the Microsoft Update Catalog; administrators should stage the update in test rings this week and fold Secure Boot readiness checks into their Q4 patch cycles.
Source: Microsoft Support August 12, 2025—KB5063878 (OS Build 26100.4946) - Microsoft Support
Background / Overview
Windows cumulative updates continue to follow Microsoft’s combined SSU+LCU model, where the servicing stack (the component that installs updates) is included with the monthly cumulative package to reduce failed installations and make rollouts simpler for administrators. The August 12 package identifies as KB5063878 and advances Windows 11, version 24H2 devices to OS Build 26100.4946; it also packages a servicing stack refresh identified as KB5065381 (OS Build 26100.4933).Microsoft’s public KB entry and associated guidance position this release as a routine monthly security and quality rollup, but one with operationally consequential reminders — most notably the Secure Boot certificate replacement timeline that organizations must treat as a multi‑quarter program of work. The Secure Boot advisory is not new: Microsoft published its lifecycle guidance and technical rollout plan earlier in 2025 and has reiterated the June/October 2026 certificate expiration windows that will affect devices that do not acquire the replacement 2023 CA chain. (techcommunity.microsoft.com, support.microsoft.com)
Why this matters now: the update itself does not change the certificate rollout schedule, but the August KB repeats Microsoft’s readiness guidance and reinforces the need for firmware coordination and testing before the first expiration deadline. For most consumer PCs that receive updates directly from Microsoft and OEMs, the process will be largely automatic; for managed or air‑gapped fleets, the work is explicitly operational and requires inventory, OEM coordination, and sometimes manual firmware or variable updates.
What’s in KB5063878 (OS Build 26100.4946)
High-level summary
- Target: Windows 11, version 24H2 (all editions).
- Release date: August 12, 2025.
- Combined package: LCU + SSU (includes KB5065381).
- Build after install: 26100.4946.
Security and quality fixes
The release contains the usual set of monthly security mitigations for Windows internals and platform components. In addition to generalized vulnerability mitigation, Microsoft specifically calls out functional reliability fixes — for example, a sign‑in delay experienced on newly provisioned devices caused by certain preinstalled packages. The KB notes that devices which already installed recent July preview fixes will only download the delta presented in this cumulative package.AI component updates (Copilot+ devices only)
KB5063878 packages updated AI component binaries (listed in the release) to version 1.2507.793.0 for multiple subsystems such as:- Image Search
- Content Extraction
- Semantic Analysis
- Settings Model
Servicing Stack Update (SSU)
Bundled SSU: KB5065381 (OS Build 26100.4933). SSUs are critical to the update pipeline — they address the component responsible for applying updates and reduce a class of installation failures. When SSUs are bundled with an LCU, Microsoft handles ordering during install, but administrators should remember that SSUs are effectively non‑removable once applied and that rollback options for combined packages are limited.Known issues and troubleshooting
At publication Microsoft stated it was “not currently aware of any issues” with KB5063878. That initial status is encouraging but not dispositive; the Windows update ecosystem often surfaces edge cases after broad rollouts, particularly on heterogeneous fleets with older firmware or niche drivers. Administrators should still stage testing and pilot rings before mass deployment.How to get and install KB5063878
Microsoft documents multiple installation vectors; choose the path appropriate to your environment:- Windows Update / Windows Update for Business — automatic distribution.
- Microsoft Update Catalog — download MSU files for offline or manual installs.
- WSUS/SCCM — ensure Products = "Windows 11" and Classification = "Security Updates" to synchronise the update.
- DISM / Add‑WindowsPackage or Add‑Package for offline images.
- Using DISM (online):
DISM /Online /Add-Package /PackagePath:C:\packages\Windows11.0-KB5063878-x64.msu - Using PowerShell:
Add-WindowsPackage -Online -PackagePath "C:\packages\Windows11.0-KB5063878-x64.msu"
Deployment note: if you manually remove only the LCU after installing a combined SSU+LCU package, the SSU remains applied; removing the LCU in that situation may require DISM operations and image rework rather than a simple wusa.exe uninstall. Plan rollback and recovery steps accordingly.
Deep dive: Secure Boot certificate rollover — the operational imperative
The most consequential non‑bug item associated with this release is Microsoft’s repeated reminder about Secure Boot certificate expirations. Several Microsoft certificates that underpin UEFI Secure Boot — originally issued in 2011 — will begin expiring in June 2026, with additional expirations in October 2026. Without replacement certificates installed in the device KEK/DB, affected Windows devices could lose the ability to receive security fixes for pre‑boot components and could, in certain cases, fail to trust legitimately signed boot components. (support.microsoft.com, techcommunity.microsoft.com)Why this is not a pure software update problem
- Secure Boot trust anchors live partly in firmware (UEFI variables) and partly in OS‑managed update flows. The rollout therefore depends on both Microsoft and OEM firmware support.
- Some existing firmware implementations contain subtle bugs that can prevent DB/KEK updates from applying safely; Microsoft is coordinating phased rollouts and will suspend updates on devices with known firmware issues to avoid bricking scenarios.
- Microsoft Corporation KEK CA 2011 — expiration: June 2026 — replacement: Microsoft Corporation KEK CA 2023.
- Microsoft UEFI CA 2011 / Option ROM CA 2011 — June 2026 — replacements: Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023.
- Microsoft Windows Production PCA 2011 — October 2026 — replacement: Windows UEFI CA 2023.
- Registry path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot
- Key name: MicrosoftUpdateManagedOptIn
- Type: DWORD
- DWORD value: 0x5944 (opt in to Windows Secure Boot updates managed by Microsoft)
Third‑party OSes and Linux distributions that rely on Microsoft-signed components (shim) may face compatibility problems if firmware lacks the updated CA entries. Coverage from multiple outlets has already warned that Linux users and dual‑boot systems may need manual workarounds if OEM firmware updates are not available for their hardware. That reality increases the operational burden for mixed‑OS shops and for enthusiasts using older equipment. (techradar.com, tomshardware.com)
Deployment guidance — practical checklist
Whether you manage a single laptop or tens of thousands of endpoints, approach this month’s release—and the certificate program—methodically.Immediate (first 72 hours)
- Apply KB5063878 to a small representative test ring (one to several devices covering major OEMs, chipsets, and peripheral drivers). Validate boot, sign‑in, and critical LOB applications.
- Confirm SSU presence (KB5065381) in test images and understand roll‑forward behavior; document rollback constraints.
- For WSUS/SCCM-managed environments, ensure products/classifications are set to sync Windows 11 security updates.
- Conduct a firmware inventory: catalog BIOS/UEFI versions and check OEM sites for firmware that supports DB/KEK updates. Prioritise devices that are business critical.
- Engage OEMs for a firmware roadmap; where updates are unavailable, document compensating controls or replacement plans.
- For dual‑boot and Linux hosts, validate shims and bootloaders on representative hardware to avoid unbootable configurations after the certificate rollout.
- Ensure remaining devices either have the updated certificates or are scheduled for replacement/retirement. Maintain an exception register for devices that cannot be updated and plan compensating controls (network isolation, restricted physical access).
- Monitor Windows Health Dashboard and Microsoft’s Secure Boot certificate rollout landing pages for updates and OEM compatibility signals.
- Use telemetry and pilot feedback to verify that devices receive both the OS patch and the DB/KEK updates, and track any rejections or firmware rejections for remediation.
Risk analysis — strengths, gaps, and real‑world hazards
Strengths- The combined SSU+LCU model reduces a common class of update installation failures and simplifies operational sequencing for administrators. KB5063878 follows that model.
- Microsoft’s public timeline for Secure Boot certificates gives organizations lead time to plan and execute firmware coordination, which is preferable to a last‑minute scramble.
- OEM firmware readiness remains the single largest unknown. Even with clear Microsoft guidance, devices that lack firmware updates or that have buggy implementations may be unable to accept new DB/KEK entries. Those devices will require special remediation or replacement.
- For mixed‑OS/dual‑boot environments, the replacement CA chain could disrupt Linux shim trust and cause boot failures unless the firmware is updated or alternative trust arrangements are implemented. Tech press has already flagged this as a real risk for Linux users. (techradar.com, tomshardware.com)
- Telemetry and privacy tradeoffs: allowing Microsoft to manage Secure Boot updates in production requires enabling certain diagnostic data. Organizations must weigh privacy regulations and internal policy against the operational advantage of Microsoft-managed rollout.
- Any claim about per‑device OEM readiness or whether a given firmware image will accept DB/KEK updates cannot be universally verified through a KB — it must be validated per device model and firmware revision with OEM-provided guidance. Treat such vendor‑specific assertions as environment‑specific and verify locally.
Recommendations — concise, actionable steps
For enterprise IT teams- Inventory Secure Boot‑enabled devices and categorize by OEM/BIOS version. Prioritize business‑critical systems for firmware testing.
- Pilot KB5063878 plus the firmware update process on a cross‑section of devices. Validate the update path for both OS install and the DB/KEK change.
- Coordinate a firmware release calendar with major OEM vendors and set expectations for devices that will need replacement.
- Keep automatic updates enabled and apply OEM firmware updates when offered. Microsoft plans to manage the update for most consumer devices, but older or rare devices may require manual firmware intervention. Back up important data before major updates.
- Monitor distribution guidance and OEM firmware announcements. Test boot media and, if necessary, prepare fallback plans (manual shim updates, creation of signed shims, or controlled disabling of Secure Boot where acceptable and safe). Recognize that some fixes may be technical and not accessible to casual users. (techradar.com, tomshardware.com)
Final assessment
KB5063878 is a routine‑appearing August cumulative update in form — it bundles security patches, quality fixes, and targeted AI component updates into a combined SSU+LCU package that should install cleanly for most devices. What elevates its operational priority is the continued emphasis on the Secure Boot certificate lifecycle: the June and October 2026 expirations create an ecosystem problem that stretches beyond operating system updates into firmware, OEM support channels, and mixed‑OS considerations. Microsoft’s documentation and the staged rollout approach reduce the risk, but they do not eliminate the dependency on OEM firmware readiness or on organizational change management.Practical truth: for the majority of consumers who allow automatic updates, the August package will arrive and install with minimal action required. For IT administrators, the real work for 2025–2026 is not a single patch — it’s inventorying firmware, coordinating with OEMs, testing in representative rings, and applying disciplined rollout procedures so that certificate updates do not cascade into a fleet‑wide availability incident. Start that program now; the deadlines are fixed, and the remediation work is operationally nontrivial.
KB5063878 is available now through Windows Update, Windows Update for Business, WSUS, and the Microsoft Update Catalog; administrators should stage the update in test rings this week and fold Secure Boot readiness checks into their Q4 patch cycles.
Source: Microsoft Support August 12, 2025—KB5063878 (OS Build 26100.4946) - Microsoft Support
Similar threads
- Article
- Replies
- 0
- Views
- 573
- Article
- Replies
- 2
- Views
- 757
- Article
- Replies
- 0
- Views
- 1K
- Article
- Replies
- 0
- Views
- 817
- Replies
- 0
- Views
- 539