Microsoft has published an advisory acknowledging a provisioning regression in Windows 11 that can leave the Start menu, Taskbar, File Explorer, System Settings, and other XAML-dependent components unusable on a limited set of enterprise and non-persistent/virtualized environments, and Microsoft has provided manual workarounds while it works on a permanent fix.
On December 2, 2025 Microsoft updated its support guidance for Windows 11 (applicable to Windows 11, version 24H2 and Windows 11, version 25H2) describing a regression that first began appearing after servicing updates released in July 2025. The company identifies a provisioning race condition: built-in XAML dependency packages sometimes do not register in time after cumulative updates are applied, and as a result shell and XAML-hosted apps that start at logon fail to initialize or crash. The advisory explicitly names affected packages and typical failure signatures, and it offers administrative workarounds intended for enterprise, VDI and other managed environments while Microsoft resolves the underlying servicing issue.
The most visible symptoms reported in the advisory and seen by organizations are severe: Explorer.exe may run but no taskbar appears; the Start menu may display a “critical error” or refuse to open; System Settings pages may silently fail to launch; ShellHost.exe can crash; and UAC’s Consent.exe (the elevation dialog) may fail to start. These are not minor cosmetic bugs — they degrade the basic desktop shell and user workflows and can make a machine effectively unusable until mitigated.
In plain terms: servicing changed the dependency libraries; the shell starts faster than those new dependencies are registered; shell processes can't find or activate the XAML views they expect; and the UI fails. This is fundamentally an ordering/latency problem in the servicing + provisioning sequence, not in the UI code itself.
powershell.exe -ExecutionPolicy Bypass -Command "Add-AppxPackage -Register -Path 'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\appxmanifest.xml' -DisableDevelopmentMode"
powershell.exe -ExecutionPolicy Bypass -Command "Add-AppxPackage -Register -Path 'C:\Windows\SystemApps\Microsoft.UI.Xaml.CBS_8wekyb3d8bbwe\appxmanifest.xml' -DisableDevelopmentMode"
powershell.exe -ExecutionPolicy Bypass -Command "Add-AppxPackage -Register -Path 'C:\Windows\SystemApps\MicrosoftWindows.Client.Core_cw5n1h2txyewy\appxmanifest.xml' -DisableDevelopmentMode"
(Then optionally trigger a SiHost restart or signal that the shell can proceed.
Caveat: Running Add-AppxPackage in a user session typically requires appropriate privileges and the correct user context. Implementers should test to ensure the registration persisted and the Immersive Shell reads the newly registered packages without creating side effects.
Because Microsoft’s advisory dates the problem to servicing operations starting in July 2025 and the KB entry was updated December 2, 2025, the exposure window spans months. That indicates the fix may land in a future servicing release rather than an immediate hotfix in all cases. Until that permanent remediation is published, the operational mitigations described here are the appropriate course for affected enterprises.
This regression is a reminder that Windows servicing touches many interdependent components and that provisioning sequences are a distinct test surface that enterprises run every day. The advisory provides a path forward for administrators, but it also underscores a need for robust pre-deployment validation, cautious update rollout policies, and rapid-response automation for enterprises that rely on pooled or automated provisioning. Until Microsoft publishes the permanent fix, the combination of targeted detection, phased rollouts, and the documented Add-AppxPackage / synchronous logon mitigations will be the pragmatic approach to avoid or contain desktop outages.
Source: gHacks Technology News Microsoft says Windows 11 updates could break the Taskbar, Start Menu, Explorer and more on Enterprise PCs - gHacks Tech News
Background / Overview
On December 2, 2025 Microsoft updated its support guidance for Windows 11 (applicable to Windows 11, version 24H2 and Windows 11, version 25H2) describing a regression that first began appearing after servicing updates released in July 2025. The company identifies a provisioning race condition: built-in XAML dependency packages sometimes do not register in time after cumulative updates are applied, and as a result shell and XAML-hosted apps that start at logon fail to initialize or crash. The advisory explicitly names affected packages and typical failure signatures, and it offers administrative workarounds intended for enterprise, VDI and other managed environments while Microsoft resolves the underlying servicing issue.The most visible symptoms reported in the advisory and seen by organizations are severe: Explorer.exe may run but no taskbar appears; the Start menu may display a “critical error” or refuse to open; System Settings pages may silently fail to launch; ShellHost.exe can crash; and UAC’s Consent.exe (the elevation dialog) may fail to start. These are not minor cosmetic bugs — they degrade the basic desktop shell and user workflows and can make a machine effectively unusable until mitigated.
What Microsoft says — technical summary
Microsoft’s guidance pinpoints a timing/registration problem that happens after installing monthly cumulative updates released on or after July 2025 (the company lists example KBs used in its advisory). The core facts Microsoft presents are:- The issue affects XAML-dependent components because AppX/XAML packages are updated during servicing but may not be registered in the user session soon enough for dependent shell processes that start during first logon or in non-persistent sessions.
- The regression is primarily observed in enterprise, managed, or virtualized (non‑persistent) environments and is very unlikely to impact individual personal devices.
- Microsoft provides three Add-AppxPackage -Register commands to re-register the missing packages in a user session, and recommends restarting the Shell Infrastructure Host (SiHost) or signing out/in (or rebooting) to let the Immersive Shell pick up the newly-registered packages.
- For non-persistent environments (VDI, pooled cloud PCs), Microsoft recommends a synchronous logon script (batch wrapper that invokes PowerShell registration commands) which blocks Explorer from launching until the packages are registered.
- MicrosoftWindows.Client.CBS_cw5n1h2txyewy
- Microsoft.UI.Xaml.CBS_8wekyb3d8bbwe
- MicrosoftWindows.Client.Core_cw5n1h2txyewy
Why this matters to enterprises and managed environments
- High user-impact: The Start menu, Taskbar and File Explorer are core to daily productivity. Failure of those components is not a degraded experience — it is a blocking issue for many workflows.
- UAC / security: The advisory lists Consent.exe as a failing XAML-dependent app. If the User Account Control (UAC) elevation UI fails to initialize reliably, admins can face complications for privileged operations, software deployments, and scripted automation that depends on elevation. That introduces operational friction and potential security workarounds if admins try to bypass UAC to restore functionality.
- Non-persistent/VDI pools particularly exposed: The problem is most likely when updates are applied during provisioning — before users log on — or on non-persistent systems where app packages must be installed at each logon. That includes Azure Virtual Desktop, pooled VDI, Citrix and similar desktop-as-a-service environments which are common in enterprise rollouts.
- Patch exposure window: Because the breakage occurs after installing otherwise legitimate cumulative updates, it can be quickly introduced at scale if organizations apply July-or-later updates to images or during automated provisioning. Rolling updates into gold images or provisioning pipelines without targeted validation increases the risk of widespread outages.
Root cause explained — what went wrong
The advisory describes a classic race condition in servicing: servicing updates replace or update system AppX packages that provide XAML runtime or app shells. When the OS boots or when users log in, critical shell processes (Explorer, ShellHost, StartMenuExperienceHost, etc. are started immediately. If the updated AppX packages have not completed registration into the user session before those shell processes initialize, the processes will attempt to bind to XAML components that aren’t registered yet. The result is failure modes ranging from silent UI omissions to immediate crashes.In plain terms: servicing changed the dependency libraries; the shell starts faster than those new dependencies are registered; shell processes can't find or activate the XAML views they expect; and the UI fails. This is fundamentally an ordering/latency problem in the servicing + provisioning sequence, not in the UI code itself.
Microsoft’s recommended mitigations (practical guide)
Microsoft provides actionable workarounds intended for IT administrators. These are operational remediations — not code fixes — which re-register the updated packages for the current user session and force the Immersive Shell to reload its dependencies.- Manual registration (for persistent machines / helpdesk)
- Open PowerShell in the user session (administrative context where required) and run:
- Add-AppxPackage -Register -Path 'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\appxmanifest.xml' -DisableDevelopmentMode
- Add-AppxPackage -Register -Path 'C:\Windows\SystemApps\Microsoft.UI.Xaml.CBS_8wekyb3d8bbwe\appxmanifest.xml' -DisableDevelopmentMode
- Add-AppxPackage -Register -Path 'C:\Windows\SystemApps\MicrosoftWindows.Client.Core_cw5n1h2txyewy\appxmanifest.xml' -DisableDevelopmentMode
- After running those commands, restart the Shell Infrastructure Host (SiHost) and sign out/in or reboot. Restarting SiHost can be done by signing out, rebooting, or by terminating and letting Windows restart the process (for example taskkill /f /im sihost.exe or Stop-Process -Name sihost in PowerShell). Because SiHost is central to the shell, terminating it causes a brief UI hiccup — test in a lab first.
- Synchronous logon script (for non-persistent / pooled VDI)
- Microsoft supplies a sample batch wrapper to run the three Add-AppxPackage commands synchronously at logon, so the packages are installed before explorer.exe launches. The batch approach calls powershell.exe -ExecutionPolicy Bypass -Command "Add-AppxPackage -Register -Path '<manifest>' -DisableDevelopmentMode" for each package and ensures completion prior to shell start.
- The logon script approach is the recommended operational mitigation for persistent connection pools, Horizon or Azure Virtual Desktop environments, cloud PC images, and other non-persistent deployments.
- These workarounds should be tested in a lab and validated during off-hours before wide deployment.
- Manual re-registration is session-scoped. Rebooting or re-provisioning can change registration state; non-persistent environments need the synchronous script approach so the registration occurs every logon.
- The commands modify AppX registrations. Administrators should ensure they are applied in the correct user context and be cautious if using SYSTEM-level deployment tools — for some AppX registration operations the user session context matters.
How to detect and monitor affected systems
There’s no single magic event ID for this regression, but a pragmatic monitoring approach includes:- Watch for the symptoms Microsoft enumerated: Explorer.exe crashes at start, Taskbar fails to appear, Start menu reports “critical error,” ShellHost.exe crashes, System Settings fails to launch, or UAC elevation dialogs fail.
- Monitor process crash logs in Windows Event Viewer (Application and System) for repeated crashes of Explorer.exe, ShellHost.exe, StartMenuExperienceHost.exe or Sihost.exe.
- Track post-provisioning image update workflows and automated provisioning logs. If a known update was applied during provisioning (updates released in or after July 2025), flag freshly provisioned VM or desktop pools for validation.
- Implement health checks that run at first logon that assert presence of the AppX manifest files and attempt a lightweight test launch of StartMenuExperienceHost or a XAML view (in a safe, controlled way). For instance, a script can confirm the existence of these manifest files under C:\Windows\SystemApps and that the registration commands succeed without errors.
Recommended enterprise response plan
- Immediate triage
- If you see symptoms after provisioning or applying updates, follow Microsoft’s workaround to re-register packages and restart SiHost, then sign out/in or reboot.
- Communicate to end users and helpdesk staff about the issue and provide scripted remediation for affected devices.
- Short-term containment
- For non-persistent pools (VDI/cloud PCs), deploy the synchronous logon script and ensure it runs before explorer.exe starts. Test on canary pools.
- For image pipelines: hold updates from July 2025 onwards from being added to gold images until the permanent fix is released, or provision images and run the logon script as part of the provisioning workflow.
- Update policy adjustments
- Use phased rollout controls (WSUS, Intune, SCCM rings) to prevent mass exposure while the fix is pending.
- Pause automated forced updates for image builds or modify the provisioning scripts to include the Microsoft-provided registration steps.
- Long-term validation and hardening
- Add provisioning validation checks in build pipelines: after installing cumulative updates, verify shell startup works and perform a basic set of UI smoke tests under the same conditions used in production.
- For VDI, ensure logon scripts and provisioning sequences are robust and synchronous where necessary.
- Backup and rollback
- Snapshot gold images before installing July-2025-or-later updates. Maintain rollback playbooks. If large-scale failures occur, revert to known-good images while the permanent fix is awaited.
Deployment scripts — implementation patterns
A safe pattern for pooled/non-persistent environments is a synchronous logon wrapper similar to Microsoft’s sample:- Create a batch wrapper that runs at user logon (logon trigger), which invokes PowerShell sequentially for each Add-AppxPackage registration.
- Ensure the wrapper runs synchronously and blocks Explorer from launching until complete. That can be achieved by running the wrapper as the logon script in Group Policy (for domain-joined machines) or as a scheduled task that triggers at logon and runs interactively in the user session.
- Example pattern (conceptual):
powershell.exe -ExecutionPolicy Bypass -Command "Add-AppxPackage -Register -Path 'C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\appxmanifest.xml' -DisableDevelopmentMode"
powershell.exe -ExecutionPolicy Bypass -Command "Add-AppxPackage -Register -Path 'C:\Windows\SystemApps\Microsoft.UI.Xaml.CBS_8wekyb3d8bbwe\appxmanifest.xml' -DisableDevelopmentMode"
powershell.exe -ExecutionPolicy Bypass -Command "Add-AppxPackage -Register -Path 'C:\Windows\SystemApps\MicrosoftWindows.Client.Core_cw5n1h2txyewy\appxmanifest.xml' -DisableDevelopmentMode"
(Then optionally trigger a SiHost restart or signal that the shell can proceed.
Caveat: Running Add-AppxPackage in a user session typically requires appropriate privileges and the correct user context. Implementers should test to ensure the registration persisted and the Immersive Shell reads the newly registered packages without creating side effects.
Security, compliance and risk considerations
- Running Add-AppxPackage modifies package registration. Any mass-deployment of such commands across an estate must be treated like a configuration change: test, document, audit, and provide rollback.
- The need to run elevation or to alter package registration has security implications. Avoid solutions that bypass UAC or reduce the platform security posture just to regain desktop functionality.
- Because Consent.exe (UAC) may be affected, organizations relying on UAC for endpoint protection and least-privilege workflows should prioritize mitigations that restore the UAC dialog rather than working around UAC entirely.
- Ensure any automation that runs Add-AppxPackage is distributed via approved management channels and is signed/approved internally. Avoid delivering on-the-fly scripts to end users that require manual execution unless necessary.
Why did this slip through testing? A critical look
This regression exposes the gap between servicing validation and real-world provisioning scenarios:- Feature testing and Insider previews often focus on persistent consumer-grade installs running on developer/test machines. Provisioning-specific sequences — updating a gold image, sealing it, and deploying to pooled or non-persistent desktops — represent a narrower but operationally critical surface that may receive less coverage in public betas.
- The race condition is timing-sensitive and is most likely to surface in automated provisioning and image-processing workflows, where updates are applied and then the machine is allowed to boot or be handed off quickly. These specific sequences are more common in enterprise image pipelines and cloud-pool provisioning than in an end-user’s laptop.
- Insufficient or incomplete telemetry in those provisioning flows could blind Microsoft to a small but impactful class of failures until customers hit them at scale. Microsoft’s advisory explicitly notes July 2025 as the starting window for the affected updates, which means affected organizations may have been exposed for months before the advisory and mitigations were published.
Practical recommendations for IT leaders
- Treat recent July-2025-or-later cumulative updates as requiring provisioning validation before they are baked into images or non-persistent pools.
- Implement a canary ring: test updates in a small, representative sample of pooled VDI and physical device images before broad rollout.
- Add a short post-update smoke test to image-build pipelines that validates Start menu, Taskbar and Explorer startup under the same user session sequencing used in production.
- Communicate proactively with helpdesk staff and end users about potential symptoms and provide scripted remediation for rapid triage.
- Hold off on broad forced update deployment to gold images or provisioning libraries until Microsoft issues a permanent fix. If not feasible, plan the synchronous logon script mitigation as part of your provisioning pipeline.
What to expect next
Microsoft has stated it is working on a permanent resolution and has published the advisory and workarounds while the fix is developed. Organizations should monitor Microsoft’s support updates for a patch addressing the servicing/registration ordering, and be prepared to remove the temporary logon scripting once the underlying bug is corrected.Because Microsoft’s advisory dates the problem to servicing operations starting in July 2025 and the KB entry was updated December 2, 2025, the exposure window spans months. That indicates the fix may land in a future servicing release rather than an immediate hotfix in all cases. Until that permanent remediation is published, the operational mitigations described here are the appropriate course for affected enterprises.
Final analysis — strengths and risks
Strengths of Microsoft’s response:- The company published a clear advisory that names the root cause (XAML package registration timing) and enumerates exact failure signatures and the affected package names.
- Microsoft supplied concrete, repeatable mitigation steps (Add-AppxPackage commands) and a synchronous logon script pattern for non-persistent environments, which are actionable for administrators today.
- The workarounds are operational and require careful testing, privileged execution, and possible changes to provisioning pipelines — they are not a permanent code-level fix.
- The need to run AppX registration commands per user session in some scenarios complicates large-scale automation and may increase helpdesk load.
- UAC-related failures (Consent.exe) raise security and operational concerns; any mitigation must preserve UAC and not weaken endpoint protections.
- The regression highlights coverage gaps in pre-release testing for certain enterprise provisioning scenarios; unless Microsoft expands automated validation for image/provisioning sequences, similar edge-case regressions can recur.
This regression is a reminder that Windows servicing touches many interdependent components and that provisioning sequences are a distinct test surface that enterprises run every day. The advisory provides a path forward for administrators, but it also underscores a need for robust pre-deployment validation, cautious update rollout policies, and rapid-response automation for enterprises that rely on pooled or automated provisioning. Until Microsoft publishes the permanent fix, the combination of targeted detection, phased rollouts, and the documented Add-AppxPackage / synchronous logon mitigations will be the pragmatic approach to avoid or contain desktop outages.
Source: gHacks Technology News Microsoft says Windows 11 updates could break the Taskbar, Start Menu, Explorer and more on Enterprise PCs - gHacks Tech News
Similar threads
- Replies
- 0
- Views
- 32
- Replies
- 0
- Views
- 28
- Article
- Replies
- 0
- Views
- 30
- Article
- Replies
- 0
- Views
- 39
- Replies
- 0
- Views
- 31