Microsoft’s March 2026 Patch Tuesday brings a sizeable cumulative update for Windows 11 that folds a handful of user-facing conveniences and several enterprise-grade capabilities into the monthly security rollup — and, importantly, it introduces Sysmon as an optional, in‑box feature for the first time. The package shipping as KB5079473 advances Windows 11 25H2 to Build 26200.8037 (and 24H2 to Build 26100.8037), adds Emoji 16.0 glyphs to the emoji panel, surfaces a taskbar network speed test, enables WebP wallpapers, expands first‑sign‑in restore for managed devices, alters Quick Machine Recovery behavior for certain Pro PCs, and delivers a number of small but practical File Explorer, Widgets and search improvements.
Microsoft’s servicing model for Windows has continued to evolve away from once‑a‑year monolithic feature drops toward smaller, more frequent updates where security fixes and lightweight feature enablements are delivered through monthly cumulative updates. The March 2026 Patch Tuesday release follows that pattern: it is a mandatory security cumulative update and is being distributed through Windows Update, Windows Update for Business, WSUS, and the Microsoft Update Catalog — the same channels administrators have used for years. Microsoft’s guidance and the industry’s coverage make clear these monthly security updates are designed to install automatically on machines using default update settings.
For home users the headline items are the visible quality‑of‑life additions — emoji support, wallpaper format flexibility, and a one‑click speed test. For IT and security teams, the arrival of Sysmon as a supported, optional Windows feature and the expansion of backup/restore and recovery behaviors are the most consequential changes. This article breaks down the features, highlights the operational implications, explains how to obtain and install the offline packages, and offers practical recommendations and risk mitigations for administrators.
Why it matters: emoji updates are largely cosmetic, but they matter for communications tools, accessibility, and a consistent user experience across platforms. Administrators who provide keyboards or input tool documentation may want to update internal guidance for teams that rely on specific glyph availability.
Caveat: Insider channels have previously seen Emoji 16 toggled on and off during testing; Microsoft may adjust the set that ships to production if rendering, accessibility, or localization issues are discovered.
Why it matters: Sysmon is a staple of advanced threat detection, incident response and forensic pipelines. Having Sysmon accessible as a supported Windows feature removes a deployment and maintenance burden: admins can now ship, update and—crucially—receive fixes for Sysmon through Windows Update rather than maintain a separate Sysinternals distribution and push pipeline. That improves parity across fleets and reduces operational friction.
Operational considerations and best practices:
Why it matters: QMR provides an additional recovery path for serious boot failures. For small businesses or unmanaged Pro devices, this improves the likelihood of successful remediation without complex offline media. For enterprise environments, the default remains unchanged — domain‑joined and managed devices will keep the existing configuration unless administrators explicitly alter the setting.
Admin guidance:
User impact: this is handy for quick triage, but it relies on an internet‑hosted tester — so it will be affected by browser defaults, captive portals, corporate proxy restrictions and any browser‑managed privacy protections. It should not be considered a replacement for more controlled network telemetry in corporate diagnostics.
Operational guidance:
What third‑party reporting shows about package sizes (reported figures; verify before large deployments):
How to install the offline .msu
If your environment uses imaging or custom drivers, prioritize pilot machines that represent those configurations. Keep recovery media and a tested fallback plan readily available.
Immediate actionable steps
KB5079473 is a practical, security‑forward update with a string of visible improvements and a strategically important enterprise integration. Plan carefully, test widely, and leverage the optional Sysmon capability to improve your detection posture — but do so with an eye to configuration hygiene, retention policy and ingestion capacity.
Source: Windows Latest Windows 11 KB5079473 released with features, direct download links for offline installers (.msu)
Background / Overview
Microsoft’s servicing model for Windows has continued to evolve away from once‑a‑year monolithic feature drops toward smaller, more frequent updates where security fixes and lightweight feature enablements are delivered through monthly cumulative updates. The March 2026 Patch Tuesday release follows that pattern: it is a mandatory security cumulative update and is being distributed through Windows Update, Windows Update for Business, WSUS, and the Microsoft Update Catalog — the same channels administrators have used for years. Microsoft’s guidance and the industry’s coverage make clear these monthly security updates are designed to install automatically on machines using default update settings.For home users the headline items are the visible quality‑of‑life additions — emoji support, wallpaper format flexibility, and a one‑click speed test. For IT and security teams, the arrival of Sysmon as a supported, optional Windows feature and the expansion of backup/restore and recovery behaviors are the most consequential changes. This article breaks down the features, highlights the operational implications, explains how to obtain and install the offline packages, and offers practical recommendations and risk mitigations for administrators.
What’s in KB5079473 (Build 26200.8037 / 26100.8037)
Emoji 16.0 arrives in the Windows emoji panel
After a period of Insider testing, Microsoft has started exposing a curated subset of Emoji 16.0 glyphs in the Windows emoji panel. The update focuses on a small set of representative characters — one from each major category — aimed at improving everyday expressiveness in chat, composition and text entry areas across the OS. Expect to see those new glyphs appear in places that consume the system emoji set (emoji panel, touch keyboard, and inputs that surface the OS picker), though Microsoft’s rollout model means the change could be phased.Why it matters: emoji updates are largely cosmetic, but they matter for communications tools, accessibility, and a consistent user experience across platforms. Administrators who provide keyboards or input tool documentation may want to update internal guidance for teams that rely on specific glyph availability.
Caveat: Insider channels have previously seen Emoji 16 toggled on and off during testing; Microsoft may adjust the set that ships to production if rendering, accessibility, or localization issues are discovered.
Built‑in Sysmon: an enterprise change with broad operational impact
Perhaps the single biggest platform-level change in this update is that Sysmon (System Monitor) — the long‑standing Sysinternals tool used for high‑fidelity process, network and file activity telemetry — is now available as an optional, in‑box Windows feature. It is disabled by default and must be explicitly enabled either from Settings (Settings > System > Optional features > More Windows features > Sysmon) or via DISM/PowerShell. After enabling, administrators still need to configure Sysmon with an appropriate sysmonconfig.xml and initialize it (for example, run sysmon -i). Microsoft’s documentation describes the install/configure workflow and warns that the built‑in Sysmon does not support coexistence with a previously installed standalone Sysmon from Sysinternals — you should remove the older install first to avoid conflicts.Why it matters: Sysmon is a staple of advanced threat detection, incident response and forensic pipelines. Having Sysmon accessible as a supported Windows feature removes a deployment and maintenance burden: admins can now ship, update and—crucially—receive fixes for Sysmon through Windows Update rather than maintain a separate Sysinternals distribution and push pipeline. That improves parity across fleets and reduces operational friction.
Operational considerations and best practices:
- Treat Sysmon like any security agent: plan configuration, event volume, retention and forwarding before you enable it at scale.
- Use a baseline Sysmon config tuned for your environment to avoid generating excessive noisy events.
- Forward Sysmon events to a SIEM (for example Microsoft Sentinel, Splunk, or a centralized Windows Event Collector) to gain value and avoid local log bloat.
- Test enabling/disabling and configuration changes on a pilot group first; enabling Sysmon will immediately start populating event channels such as Applications and Services Logs > Microsoft > Windows > Sysmon > Operational.
Quick Machine Recovery (QMR) behavior expands to unmanaged Pro devices
KB5079473 changes Quick Machine Recovery enablement: QMR will automatically turn on for Windows 11 Pro devices that are not domain‑joined and are not managed by enterprise endpoint tooling. Previously this behavior was limited and more commonly applied to Home devices.Why it matters: QMR provides an additional recovery path for serious boot failures. For small businesses or unmanaged Pro devices, this improves the likelihood of successful remediation without complex offline media. For enterprise environments, the default remains unchanged — domain‑joined and managed devices will keep the existing configuration unless administrators explicitly alter the setting.
Admin guidance:
- If your organization centrally manages recovery behavior (Intune, OEM imaging, SCCM), test how QMR interacts with existing provisioning and imaging workflows.
- Document expectations for helpdesk staff on how QMR presents and when to rely on it versus reimaging.
Taskbar network speed test (browser‑launched)
Windows now surfaces a one‑click network speed test directly from the network system tray and Quick Settings (Wi‑Fi and Cellular quick settings), and via a right‑click on the network icon. The test does not run in a native OS dialog — it launches the default browser and opens Microsoft’s online speed test (Bing/Ookla integration) to measure latency, download and upload throughput. It’s a convenient discovery affordance; think of it as a streamlined shortcut to a browser‑based diagnostic.User impact: this is handy for quick triage, but it relies on an internet‑hosted tester — so it will be affected by browser defaults, captive portals, corporate proxy restrictions and any browser‑managed privacy protections. It should not be considered a replacement for more controlled network telemetry in corporate diagnostics.
Windows Backup for Organizations: first‑sign‑in restore broadens
The update expands the Windows Backup for Organizations restore experience so that a device can restore a user’s settings and Microsoft Store apps at first interactive sign‑in — including for Microsoft Entra hybrid‑joined devices, Cloud PCs, and multi‑user environments. This streamlines device refresh and migration scenarios by rehydrating a familiar workspace after imaging or provisioning.Operational guidance:
- Verify that the organization’s Intune/Entra policies and Windows Backup settings are correctly configured before relying on automatic restore behaviors.
- Pilot restores with representative profiles to confirm app and setting rehydration results match expectations.
WebP wallpapers, Widgets settings and small UI polish
KB5079473 expands wallpaper format support to include WebP files, allows Widget settings to open as a full‑page interface inside the Widgets app (instead of a mini dialog), and makes small refinements to taskbar search results (group headers that show counts and hover preview options). File Explorer receives minor improvements such as an Extract all option being exposed for additional archive types, and Task Manager now shows a magnifying‑glass icon for the Search process. These are incremental but practical refinements targeted at daily usability.Downloading and installing KB5079473 — offline (.msu) installers
Microsoft distributes monthly cumulative security updates through Windows Update and via the Microsoft Update Catalog as one or more offline .msu packages for each architecture and servicing baseline. If you prefer to obtain an offline installer for staging, imaging, or troubleshooting, search for the KB number on the Microsoft Update Catalog and download the package that matches your OS version and architecture.What third‑party reporting shows about package sizes (reported figures; verify before large deployments):
- Build 26200.8037 (Windows 11 25H2) — x64: ~4523.6 MB; arm64: ~4308.8 MB
- Build 26100.8037 (Windows 11 24H2) — x64: ~4523.6 MB; arm64: ~4308.8 MB
How to install the offline .msu
- Download the appropriate .msu from the Microsoft Update Catalog for the OS version and architecture that matches your target device.
- Install with elevated rights using one of:
- Windows Update Standalone Installer (double‑click the .msu), or
- DISM: dism /online /add-package /packagepath:<path to cab> (if the .msu contains multiple CABs), or
- wusa.exe <package>.msu /quiet /norestart
- Reboot if required.
- Servicing stack updates (SSUs) or prior monthly rollups may be prerequisites. If a manual install reports “not applicable” or returns 0x800f0838 / 0x800f0993 style errors, check Microsoft’s documented guidance on ordering MSU packages and prerequisites before forcing an install. Microsoft’s support pages outline ordering rules for MSU/CAB application and how to use DISM vs. wusa.
- For large deployments prefer to import the cataloged update into WSUS/Configuration Manager/Intune and let your management system handle sequencing, detection and restart scheduling.
- If you rely on offline installers to recover a machine that’s failing to update via Windows Update, use the Update Catalog .msu but ensure you have the matching servicing stack and that you follow Microsoft’s “install in order” guidance.
Enterprise deployment guidance and testing checklist
Rolling a mandatory security rollup into production requires a careful playbook. Here’s a practical checklist for admins:- Review the update contents and identify high‑impact changes — Sysmon is optional, but can be a policy driver; QMR changes may alter support flows.
- Lab test: deploy the update to a pilot ring covering typical device SKUs, image types and management states (domain‑joined, hybrid‑joined, unmanaged Pro). Validate imaging, provisioning, WSUS detection, and device restart behavior.
- Validate prerequisites: ensure SSUs and earlier cumulative updates required by Microsoft are present.
- Test policy interplay: check Intune/MDM, Group Policy and endpoint protection tooling for any interactions with QMR or the Sysmon optional feature.
- Logging and telemetry: ensure centralized log collection is ready if you’ll enable Sysmon on test or production devices. Tune Sysmon configuration to minimize noisy events and to keep event volumes within SIEM ingest budgets.
- Rollout strategy: staged rings are essential. Use a small pilot, expand to broader rings, and hold off on mass rollouts until telemetry confirms no regressions.
- Backout plan: have a documented rollback procedure (uninstall the MSU if needed, or use system restore / image reapply) and communicate helpdesk playbooks for common post‑update issues.
Security and privacy analysis — benefits and risks
KB5079473’s most impactful security/monitoring change is the inclusion of Sysmon as a supported Windows capability. That is a clear win for defenders because:- It standardizes deployment of enterprise‑grade telemetry across fleets and can reduce operational friction.
- It enables centralized management and updates via standard Windows servicing channels.
- It improves defenders’ ability to detect suspicious process, network, DLL and file activity using a consistent, documented telemetry source.
- Event Volume: Sysmon can generate high event volumes. Poorly tuned rules cause storage pressure on endpoints and SIEM ingestion spikes. Plan filters and whitelists before mass enablement.
- Configuration Drift: Organizations that previously used custom Sysmon binaries and rules must reconcile differences between their historical configuration and the built‑in variant. Microsoft explicitly warns that built‑in Sysmon does not coexist with the standalone Sysinternals edition. Migration steps will be needed.
- Privacy & Compliance: More telemetry means additional data in logs. Ensure legal, privacy and compliance teams sign off on the data retention and forwarding policies before broadly enabling Sysmon.
- Attack Surface: While Sysmon is a passive logging tool and does not block behavior, packaging telemetry and management into the OS increases the set of privileged components administrators must monitor and patch — but it also consolidates patching, which is a net security improvement if well‑managed.
- Adopt a central Sysmon config and test it on a pilot group; iterate to balance coverage and noise.
- Forward events to a SIEM with compression and ingestion thresholds; use storage lifecycle policies.
- Coordinate with privacy and legal teams regarding retention and access controls.
Practical tips, commands and verification
Enable the built‑in Sysmon manually (local admin required):- Enable the feature:
- DISM: Dism /Online /Enable-Feature /FeatureName:Sysmon
- or via Settings: System > Optional features > More Windows features > check “Sysmon”
- Initialize/configure:
- sysmon -i C:\Sysmon\sysmonconfig.xml (replace path with your chosen config)
- Verify events:
- Open Event Viewer > Applications and Services Logs > Microsoft > Windows > Sysmon > Operational and confirm events are appearing.
- wusa.exe windows11.0-kb5079473-x64.msu /quiet /norestart
- Reboot when ready.
Known issues, watch‑outs and community reporting
Historically, monthly cumulative rollups occasionally trigger device‑specific regressions (drivers, gaming performance and OEM firmware interactions are common culprits). Community forums and early adopters sometimes report install failures or performance regressions after installing large cumulative updates; that’s why staging and telemetry are essential. Several community threads and independent outlets covered the March rollup in preview channels and highlighted that Microsoft stages these changes via controlled feature rollouts, so not all devices will see the new experiences at exactly the same time.If your environment uses imaging or custom drivers, prioritize pilot machines that represent those configurations. Keep recovery media and a tested fallback plan readily available.
Conclusion — what administrators and power users should do next
KB5079473 is a strong example of the modern Windows servicing approach: monthly cumulative updates that fuse important security fixes with a small set of practical platform enhancements. The addition of in‑box Sysmon is the headline change for defenders and will materially simplify telemetry deployment if you plan for it. The taskbar speed test, WebP wallpapers, Emoji 16 and Widgets polish are useful for end users and unlikely to require organizational policy changes, but they are welcome refinements.Immediate actionable steps
- For all users: check Settings > Windows Update and install the March 2026 security update (KB5079473) once it reaches your device, or obtain the matching .msu from the Microsoft Update Catalog for offline installs or imaging use.
- For security teams: pilot the built‑in Sysmon on a controlled set of devices, craft and test a tuned sysmon configuration, and ensure logs are forwarded to your SIEM before scaling up.
- For IT admins: stage the update via your usual rings (pilot → broad validation → production), validate image and driver compatibility, and confirm your WSUS/ConfigMgr/Intune pipelines will deploy the update with your desired restart policies.
KB5079473 is a practical, security‑forward update with a string of visible improvements and a strategically important enterprise integration. Plan carefully, test widely, and leverage the optional Sysmon capability to improve your detection posture — but do so with an eye to configuration hygiene, retention policy and ingestion capacity.
Source: Windows Latest Windows 11 KB5079473 released with features, direct download links for offline installers (.msu)
