Windows 11 Release Preview KB5067112: Touch Keyboard fix, Hyper-V vSwitch fix, Personalized Offers

  • Thread Author
A Windows sign-in tablet connects to a server rack via glowing blue network cables.
Microsoft is rolling Windows 11 Build 22631.6132 (KB5067112) to Insiders in the Release Preview channel — a small, targeted cumulative update that addresses several real‑world reliability issues (touch keyboard, Hyper‑V networking, storage communication for Azure Stack/Azure Local upgrades) and enables a new Personalized Offers experience in OOBE and Settings for devices on the 23H2 (Build 22631) servicing baseline.

Background / Overview​

Microsoft’s Release Preview channel is the final public staging ring where near‑final cumulative updates and enablement changes are validated before broader distribution. Updates published here are typically conservative: they focus on reliability, compatibility, and small feature activations rather than sweeping new platform changes. This latest package — identified on Insiders feeds as Build 22631.6132 and distributed as KB5067112 — follows that pattern. The package surfaces a mix of fixes for input and networking regressions, a storage reliability fix relevant to Azure Stack/Azure Local cluster upgrades, and an OOBE/Settings change that turns on Personalized Offers during device setup and after sign‑in for eligible Insiders.
This update appears as an optional/preview cumulative update for devices already on the Windows 11, version 23H2 servicing line (Build 22631). Release Preview deliveries are useful for pilots and early validation, but IT teams should treat them as test payloads rather than production release candidates until they are folded into a monthly cumulative update. Independent community reporting confirms that Microsoft continues to use this staged servicing model and that build suffixes and minor revisions can differ by device baseline and channel gating.

What’s in KB5067112 (Build 22631.6132) — itemized​

The Windows Insider announcement for this release lists a compact set of fixes and enablements. The important items called out are:
  • [Input] — Fix for a touch keyboard regression where key presses don’t register after resuming from sleep (touch keyboard animations appear correctly but input isn’t delivered, including at the sign‑in/password prompt).
  • [Networking / Hyper‑V] — Fix for an issue where external virtual switches lose their physical NIC bindings and become internal switches after a host restart. Root cause: incorrect detection of orphaned virtual switch objects during Host Network Service startup. This could cause VMs dependent on external bindings to lose connectivity.
  • [Shell / OOBE] — Enables the Personalized Offers (aka Tailored Experiences/Personalized offers) feature during Out‑of‑Box Experience (OOBE) and makes it visible in Settings after the user reaches the desktop. This activates Microsoft’s recommendations/offers surface during setup for some users, controlled by feature flags and regional gating.
  • [Storage] — Fix for an issue affecting disk communication that caused connectivity errors during Azure Stack Hub or Azure Local cluster upgrades — a concern for environments that perform in‑place cluster upgrades and depend on consistent storage connectivity.
Each of these items is small in scope but can be high impact for affected workflows — for example, the touch‑keyboard bug blocks sign‑in scenarios on tablets and 2‑in‑1s, while the external vSwitch bug can disrupt virtualized workloads after host restarts.

Why these fixes matter — practical implications​

Input — touch keyboard not entering characters after sleep​

  • Symptom: Touch keyboard shows animations and visual key press feedback, but typed characters do not appear in text fields after resume from sleep; notable example: entering the password on the sign‑in screen fails to register input.
  • Impact: On tablet or convertible devices where on‑screen keyboard is primary (or where physical keyboard is absent or locked), the bug can block sign‑in and prevent access to the device. For IT support teams, this can translate into help‑desk tickets and field calls.
  • Why it’s high priority: Sign‑in blockers are user‑facing and affect productivity immediately; they also complicate remote support if the device cannot be unlocked without alternate credentials or remote management tooling. The update specifically addresses this input path and the sign‑in scenario described by Insiders.

Networking — external virtual switches losing NIC bindings​

  • Symptom: After host restarts, Hyper‑V external switches can lose their association to the underlying physical NIC and fall back to internal switches, severing VM external network access.
  • Impact: Virtual machines that require external network connectivity (web, domain, management, or production workloads) can be isolated until the switch is corrected or host is reconfigured. This is particularly problematic for server hosts that are expected to restart during maintenance windows.
  • Why it’s high priority: The issue is a configuration/servicing regression that risks operational availability for VM workloads. The change in this update targets Host Network Service detection logic that mistakenly considered some switches as orphaned. Administrators running Hyper‑V hosts should prioritize testing in lab or pilot rings if they’ve seen this behavior.

Storage — Azure Stack Hub / Azure Local cluster upgrade connectivity errors​

  • Symptom: Disk communication errors during cluster upgrade flows in Azure Stack Hub or Azure Local, potentially interrupting upgrade sequences or causing transient failures.
  • Impact: For organizations using Azure Stack Hub or Azure Local clusters for offline or edge cloud scenarios, reliability in storage stacks during upgrades is critical to preserve data integrity and minimize downtime. Even brief connectivity problems during an upgrade can cascade into longer remediation tasks.
  • Why it’s high priority: Cluster upgrade flows must be deterministic. Fixing storage communication edge cases prevents upgrade rollbacks and service interruptions for on‑prem parity with Azure experiences.

Shell / OOBE — Personalized Offers enabled in setup​

  • What it does: Activates the Personalized Offers (previously described as Tailored Experiences in earlier previews) surface in the Out‑of‑Box Experience and exposes an option in Settings to manage the feature after setup.
  • Why it matters: This change affects user privacy and the initial setup UX. Personalized Offers may present recommendations or promotional content during OOBE; Microsoft’s rollout has historically been gated and user‑optable, but enterprise imaging and automation workflows that depend on an unobstructed OOBE may need to validate the experience and opt users out where required. Community reports and independent outlets had previously noted similar toggles and rollout behavior for related builds.

Verification and cross‑checks​

To ensure accuracy, the update summary in the Insider announcement and community reporting were cross‑checked against independent industry coverage and community posts. The Windows Insider feed and community summaries confirm the itemized fixes for the Release Preview delivery and the general character of Release Preview packages. Independent tech coverage (community sites and local press covering optional preview packages) also lists KB5067112 and the same general set of fixes and enablements, reinforcing the reported scope of the release. While Microsoft remains the authoritative source for precise package composition and file manifests, the combination of Insider blog notes and independent reporting provides consistent corroboration for the claims above.
Caveat: Microsoft sometimes issues minor revisions to cumulative packages (different build suffixes) and may update KB pages after initial publication. If exact file lists, binary versions, or uninstall guidance matter for production rollouts, validate the package details on the Microsoft Update Catalog and the official Support KB (when available) before broad deployment. Independent community summaries are useful but can lag or show minor differences in build suffixes.

Deployment guidance — practical checklist for IT teams​

  1. Confirm eligibility: Verify target machines are on Windows 11, version 23H2 (Build 22631.x). Use winver or Settings → System → About to confirm build family.
  2. Pilot on representative hardware: Include tablet/2‑in‑1 models (touch input), Hyper‑V hosts with external vSwitch usage, and any Azure Stack/Azure Local clusters used in your environment. Validate sign‑in, VM networking, and storage upgrade scenarios.
  3. Backup and rollback plan: Create system images or restore points for pilot devices when testing optional Preview updates. If the package includes a Servicing Stack Update (SSU) combined with the LCU, note that SSUs are not removable — plan accordingly.
  4. Test OOBE and imaging workflows: If you deploy devices via Autopilot or image captures, validate whether Personalized Offers appears and whether your automation scripts or unattended flows are affected by any new OOBE pages. Consider MDM policies or provisioning CSPs to control the feature for managed fleets.
  5. Monitor telemetry and logs: For Hyper‑V hosts, watch event logs for Host Network Service and vSwitch bindings post‑restart. For storage clusters, monitor cluster health and disk communication during an upgrade test. Capture repro logs and Feedback Hub reports if regressions appear.

Risks, side effects, and things to watch​

  • Preview semantics: Release Preview updates are meant for validation. They are optional and may include server-side feature flags; the behavior you see can vary by device and tenant. Do not assume parity with public cumulative updates until the changes are included in a monthly patch.
  • Feature gating: The Personalized Offers rollout may be gated by region, account type, or server‑side flags. Users in different locales or with different tenant policies may see different experiences; plan communications and privacy disclosures accordingly.
  • Minor build suffix variance: Multiple outlets sometimes report slightly different minor build suffixes for the same KB package depending on baseline family (22621 vs 22631). Confirm the exact build reported on each test device before basing deployment scripts on a particular suffix.
  • Third‑party driver interactions: As with all cumulative updates, driver stack incompatibilities can surface. Hyper‑V network behavior changes and storage stack fixes interact strongly with NIC drivers, SD card/RAID firmware, and vendor storage drivers; keep vendor drivers and firmware current in pilot rings.
  • Unverifiable low‑level claims: The insider announcement summarises fixes at a behavioral level; it does not publish low‑level code paths, file manifests, or driver deltas. Any claims about which specific DLL or driver was changed should be treated as unverified until Microsoft publishes the full Support KB or file manifest (or the Update Catalog lists the exact package composition). Flag these details as cautionary in your deployment notes.

Recommendations — how to handle this update in three common scenarios​

  • For enterprise critical systems (production Hyper‑V hosts, Azure Stack/Azure Local clusters):
    • Do not deploy to production immediately. Run controlled pilots on representative hosts, capture pre/post health checks, and coordinate maintenance windows if the fix is needed urgently. Validate NIC/firmware/driver compatibility with vendor support.
  • For tablet and consumer device fleets where touch/pen input is essential:
    • Prioritize deployment in pilot rings if users reported the touch keyboard sign‑in issue. The touch input fix addresses a high‑friction, user‑blocking problem and may justify a faster rollout in affected populations.
  • For general deployment and enthusiasts:
    • Install on non‑critical devices or Insiders in a ringed pilot group first. Expect the Personalized Offers experience to appear for some devices; test the OOBE flow and, if required, prepare documentation and opt‑out policy guidance.

Critical analysis — strengths and limitations​

Strengths:
  • The update targets concrete, high‑impact regressions rather than speculative or experimental features. Fixing sign‑in input and Hyper‑V networking regressions improves real‑world reliability.
  • Enabling Personalized Offers in OOBE provides Microsoft a controlled way to validate user flows and opt‑in surfaces in a lab‑ready ring before broader exposure. This follows the company’s trend of gradual, feature‑flagged rollouts.
Limitations / risks:
  • The OOBE personalization change is sensitive for privacy‑conscious organizations and imaging pipelines; even when opt‑out options exist, the presence of additional pages in setup complicates unattended deployments and Autopilot flows.
  • Release Preview packages can differ by baseline and region; minor build suffix discrepancies and server‑side gating mean behaviors are not identical across identical devices in different rings or tenants.
  • There is not yet a publicly published, granular file manifest in the initial announcement — meaning low‑level validation (exact DLL/driver versions changed) may require waiting for the official Microsoft Support KB or Update Catalog entry. Treat such low‑level details as unverified until the KB is posted.

How to report regressions and collect evidence​

  • Use the Feedback Hub (WIN + F) and attach repro steps, screenshots, and failure logs. For Hyper‑V vSwitch issues, capture Host Network Service logs and Hyper‑V event entries.
  • Collect Windows event logs, network trace captures (netsh trace), and Hyper‑V switch configuration dumps before and after applying the update.
  • For storage cluster issues, capture cluster logs, disk controller event records, and Panther/Setup logs if the problem happens during an upgrade flow.
  • When escalating to Microsoft or vendor support, include exact OS build from winver, full Update history (Settings → Update history), and the .msu/.cab/KB identifier (KB5067112) to help vendors correlate telemetry.

Conclusion​

KB5067112 (Build 22631.6132) is a focused Release Preview package that patches several practical, high‑value reliability issues — notably the touch keyboard sign‑in regression and a Hyper‑V external vSwitch NIC binding problem — while enabling the Personalized Offers experience in OOBE and Settings for some Insiders. These fixes are small in number but meaningful in impact; they reflect Microsoft’s conservative, servicing‑first approach for Release Preview updates. Administrators should pilot carefully on representative hardware, pay attention to NIC/driver and storage interactions, and treat the OOBE change as a user‑privacy and imaging consideration. Confirm package details against the official Support KB and the Microsoft Update Catalog when those resources are published, and be ready to roll back or isolate early if device‑specific regressions appear.

Source: Microsoft - Windows Insiders Blog Releasing Windows 11 Build 22631.6132 to the Release Preview Channel
 

Microsoft has begun seeding a focused Release Preview update for Windows 11 version 23H2 — Build 22631.6132 (delivered as KB5067112) — that targets a handful of reliability problems across input, networking, shell/OOBE, and storage subsystems, while also enabling the Personalized Offers experience during setup and in Settings for affected devices. This small, targeted package is being distributed through the Release Preview Channel as an optional preview cumulative and is intended for validation before fixes are folded into broader monthly rollups.

Glowing Windows logo amid a blue high-tech dashboard with VM, cloud, and server icons.Background / Overview​

Windows Insider Release Preview builds act as the final staging ring Microsoft uses to validate fixes and small feature enablements before they move into general production servicing. These updates are typically conservative in scope: they focus on reliability and compatibility, not large new feature sets. For organizations and power users, Release Preview is a place to validate fixes against real-world hardware and software mixes before mass deployment.
Windows 11 version 23H2 (Build 22631) is an older feature update baseline that Microsoft is still servicing for certain editions — but it is approaching the end of its consumer servicing window. Microsoft’s lifecycle documentation shows that Home and Pro editions of 23H2 reach the end of updates on November 11, 2025, after which those editions will no longer receive monthly security updates. That deadline changes the calculus for whether to apply optional preview fixes on 23H2 versus upgrading to a newer supported baseline (24H2 or 25H2).
Why this matters now
  • The Release Preview delivery gives admins a short window to validate fixes that address real blockers (for example, sign-in blockers, virtualization networking issues, or storage connectivity errors) before they are folded into mainstream rollups.
  • Because 23H2 consumer servicing ends soon, organizations must weigh the immediate benefit of preview fixes against the longer-term need to upgrade to a supported build to stay protected.

What’s in Build 22631.6132 (KB5067112)​

The announced changelog for Build 22631.6132 is compact and focused. The items flagged by the Release Preview notes and community reporting are:
  • Input
  • Fixed: a regression where the touch keyboard shows animations after a device wakes from sleep but does not deliver characters into text fields (including blocked input on the sign‑in/password entry screen).
  • Networking
  • Fixed: a Hyper‑V external virtual switch issue where, after a host restart, the external switch could lose its binding to the physical NIC and convert to an internal switch — effectively isolating VMs from external network access. The root cause is described as incorrect detection of orphaned virtual switch objects during Host Network Service startup.
  • Shell / OOBE
  • Enabled: Personalized Offers are turned on during the Out‑of‑Box Experience (OOBE) and become visible in Settings after the user reaches the desktop. This is an enablement of Microsoft’s personalized recommendations/offers surface for eligible devices.
  • Storage
  • Fixed: an issue that affected disk communication and resulted in connectivity errors during Azure Stack Hub or Azure Local cluster upgrades; the update improves storage reliability during those upgrade paths.
Multiple community trackers and Windows-focused sites recapped the same list of fixes in their coverage of the Release Preview release, confirming the narrow, reliability-focused intent of the package.

Deep dive: why each fix matters (practical impact)​

Input — touch keyboard failing to enter characters after resume​

On tablets and convertible PCs that rely on the on-screen keyboard, a post-sleep condition where the system’s touch keyboard appears to work visually but does not deliver characters is a critical usability bug. The most obvious failure mode is hitting the sign-in screen and finding that typing a password produces no characters — a sign-in blocker. For field workers, kiosks, or BYOD devices without a functioning physical keyboard, this stops productivity and increases support calls.
What to expect from this fix
  • Restored input delivery after sleep/resume in affected scenarios.
  • Reduced help-desk tickets for sign-in and unlock failures on touch-first devices.

Networking — Hyper‑V external switch losing NIC bindings​

Hyper‑V external virtual switches are expected to map to a host’s physical NICs so guest VMs can reach the local network and internet. If a host restart causes the external switch to revert to an internal switch, affected VMs lose external connectivity. In datacenter or virtualization host scenarios, this can stop management, replication, or tenant traffic until an administrator rebinds the switch.
Risk profile and mitigation
  • This bug can impact production VMs after scheduled maintenance restarts.
  • Until the fix is validated in your environment, include vSwitch binding checks in post-restart validation scripts and have a rollback or manual remediation playbook ready.

Shell / OOBE — Personalized Offers in setup and Settings​

Enabling Personalized Offers in OOBE and in Settings is primarily a user-experience/marketing change: during initial device setup Microsoft may surface tailored content, offers, or recommendations. For enterprises, this is a discoverability and privacy consideration — IT administrators should be aware personal recommendations may surface during imaging or initial signup flows unless disabled by provisioning or policy.
Points to consider
  • Enterprises using automated OOBE provisioning (Windows Autopilot, provisioning packages) should validate whether the Personalized Offers experience appears for end users and whether it can be suppressed via policy for managed devices.

Storage — Azure Stack Hub and Azure Local cluster upgrade connectivity errors​

Storage connectivity issues during cluster upgrades can corrupt upgrade tasks or cause rolling upgrade failures in Azure Stack Hub and similar localized Azure cluster deployments. This fix targets disk communication reliability during those specific upgrade operations — an important fix for operators who maintain on-prem Azure Stack Hub clusters.
Operational note
  • Administrators performing in-place cluster upgrades should pilot this preview in a non-production ring before attempting a large-scale upgrade. Confirm storage health and connectivity during and after the upgrade process.

How to get the update and deployment guidance​

  • Channel and availability
  • Build 22631.6132 (KB5067112) is appearing in the Release Preview Channel for Insiders on Windows 11, version 23H2. This means it’s available to devices enrolled in that channel or to environments that explicitly pull optional preview updates via Windows Update for Business or the Microsoft Update Catalog.
  • Ways to install
  • Windows Update (if device is in Release Preview).
  • Managed pipelines: WSUS, Windows Update for Business / Intune rings that allow preview/optional updates.
  • Manual install: download the .msu from the Microsoft Update Catalog (when published) and install with WUSA or DISM. Use file-hash verification if you perform offline installs.
  • Recommended rollout steps
  • Pilot: apply to a small, representative pilot cohort (devices that exercise the touch keyboard, Hyper‑V hosts, Azure Stack Hub cluster nodes).
  • Monitor: event logs, sign-in telemetry, virtualization connectivity, and storage I/O behavior for 48–72 hours.
  • Expand: if pilot is successful, extend the rollout to broader production rings.
  • Coordinate: match OS patches with vendor firmware/drivers (NIC, WWAN, GPU, docking firmware) as needed, since OS fixes may surface driver-level incompatibilities.

Interpreting the Release Preview pattern and risk considerations​

Microsoft’s pattern of shipping compact, optional "C‑release" preview packages through Release Preview is deliberate: it lets fixes collect telemetry at scale while providing administrators an opportunity to validate and catch new regressions before mainstream monthly cumulative updates. However, preview updates are not the same as final monthly cumulative security rollups and can carry a slightly higher risk profile if used in production without testing.
Key risks to weigh
  • Kernel- or driver-facing fixes carry more risk because hardware diversity can surface edge-case regressions.
  • Enabling user-facing features (like Personalized Offers) can have privacy or user-experience implications if not controlled for managed deployments.
  • With 23H2 consumer servicing ending on November 11, 2025, reliance on a quickly closing servicing window means organizations should be planning upgrades to a supported baseline rather than indefinitely depending on optional previews.

Cross-check: what independent sources confirm​

At the time of reporting, multiple community trackers and Windows-focused outlets summarize the same set of fixes for KB5067112 / Build 22631.6132. Coverage appears across Release Preview summaries and specialty sites; those independent write-ups confirm the package’s narrow reliability focus and the specific subsystems addressed (input, networking, storage, and shell/OOBE). Community forums and Release Preview thread extractions also reflect the same details that Microsoft’s Insider release notes circulated to Insiders.
Caveat: an official Microsoft Support knowledge base page for KB5067112 had not been widely linked or indexed in the mainstream Microsoft Support catalog at the time the Release Preview notes and third‑party coverage appeared. That pattern is common for preview/insider releases — the Windows Insider announcement and Release Preview notes are the canonical public detail for these packages until Microsoft folds fixes into regular monthly cumulative updates and publishes full KB articles. Readers should therefore treat early changelogs as authoritative for the preview but continue to check Microsoft Support and the Windows Insider blog for the finalized KB article.

Where this fits in the larger lifecycle: 23H2 → 24H2 → 25H2​

  • End of servicing for 23H2 (Home & Pro): November 11, 2025. After that date, Microsoft will stop issuing monthly security updates to Home and Pro devices on 23H2. Upgrading to 24H2 or later is the recommended long-term path for security compliance.
  • Windows 24H2 and 25H2 are the next baselines many devices will land on. Microsoft began wider distribution of Windows 11 version 25H2 in late September 2025; 25H2 is delivered primarily as an enablement package on top of 24H2, resetting the servicing clock for Home/Pro. If you want a longer supported baseline, upgrading to 24H2 and then moving to 25H2 (or directly accepting 25H2 when offered) is the pragmatic route.
Operational guidance
  • For unmanaged consumer devices on 23H2: plan to upgrade to 24H2 (or 25H2) before the November 11, 2025 end-of-updates date to continue receiving security patches.
  • For managed enterprise fleets: confirm support timelines by edition (Enterprise/Education have different Modern Lifecycle windows) and coordinate feature updates with app compatibility testing.

Recommendations for IT teams and power users​

  • Inventory and prioritization
  • Identify devices that match the affected scenarios: touch-first convertibles/tablets, Hyper‑V hosts, Azure Stack Hub/Local cluster nodes, and devices that run OOBE provisioning at scale. Prioritize those for pilot testing.
  • Pilot before broad deployment
  • Use a small cohort for 48–72 hour soak testing. Validate user sign-in flows, virtual switch bindings after reboots, and storage health during cluster upgrade simulations. Document observed behavior and any new errors.
  • Guardrails for managed images
  • If your organization uses imaging or Autopilot flows, confirm whether Personalized Offers appear during OOBE and whether your provisioning policies suppress or allow that behavior. Adjust provisioning scripts or CSP/MDM policies where needed.
  • Upgrade planning
  • With 23H2 consumer servicing ending soon, plan a staged upgrade to 24H2/25H2 for endpoints. Use the Release Preview package for temporary relief in targeted scenarios, but do not treat optional preview fixes as a substitute for a proper feature-update plan.
  • Maintain rollback and monitoring
  • Keep an image/restore plan and monitor support channels for any out-of-band hotfixes or subsequent cumulative updates that may follow this preview. If issues arise after applying the preview, record the exact .msu installed and OS/build reported by winver for troubleshooting.

Final assessment — strengths and potential pitfalls​

Strengths
  • The update addresses high-impact user-facing regressions (sign-in touch keyboard failure, Hyper‑V NIC binding loss) that can produce immediate operational pain.
  • Delivering fixes through Release Preview gives administrators a controlled validation path before fixes land in broad production servicing.
  • Fixing storage connectivity during Azure Stack Hub/Local cluster upgrades reduces the risk of disruptive upgrade failures for those environments.
Potential pitfalls and cautions
  • Preview updates are, by design, less hardened than final cumulative rollups; they should be piloted before enterprise-scale deployment.
  • The Personalized Offers enablement is a change in setup behavior that may not be welcomed in locked-down enterprise provisioning without explicit suppression controls.
  • Because 23H2’s consumer servicing window is closing on November 11, 2025, organizations should not rely on repeated optional previews as a long-term strategy; upgrading to a supported baseline is the secure and sustainable course.

Closing summary​

Build 22631.6132 (KB5067112) is a compact Release Preview package for Windows 11 version 23H2 that fixes several acute reliability problems (touch keyboard input after resume, Hyper‑V vSwitch NIC bindings after restart, storage connectivity during Azure Stack/Azure Local upgrades) and flips on the Personalized Offers experience during OOBE and in Settings. It is being distributed as an optional preview to the Release Preview Channel and serves as an early validation step ahead of eventual promotion into mainstream monthly rollups. For administrators, the sensible path is to pilot the update on representative devices that exercise the affected subsystems, validate the results, and — with the November 11, 2025 end-of-updates milestone for 23H2 Home/Pro looming — accelerate upgrade plans to a supported 24H2/25H2 baseline rather than depending on optional fixes as a long-term solution.


Source: Neowin Windows 11 23H2 gets fixes for input, networking, and storage in the latest preview build
 

Microsoft has pushed a focused preview cumulative update—Build 22631.6132 (delivered as KB5067112)—to the Release Preview Channel for Windows 11 version 23H2, delivering a compact set of reliability fixes that address an irritating touch‑keyboard regression, a disruptive Hyper‑V networking bug, a cluster storage hiccup impacting Azure Stack Hub/Azure Local upgrades, and the controlled enablement of a Personalized Offers experience during OOBE and in Settings.

Blue-toned laptop screen shows a sign-in UI beside a holographic diagram of Hyper-V and Azure Stack.Background​

Windows Insider releases to the Release Preview Channel are the last public staging ring before broader distribution; they’re typically conservative, focused on quality and targeted fixes rather than sweeping platform changes. The new Build 22631.6132 is a classic example: a small package designed to resolve measurable customer pain points that were reported from field telemetry and Insider feedback.
This update is identified by its servicing label (KB5067112) and targets the 23H2 servicing baseline (Build 22631). It is being offered as an optional/preview cumulative update to Release Preview Insiders and is intended for testing and early validation ahead of any inclusion in a public Monthly Cumulative Update (LCU).

What’s in KB5067112 (Build 22631.6132) — quick summary​

  • Touch keyboard input fix: Corrects a regression where the touch keyboard displayed normal animations but failed to deliver characters after the device woke from sleep—blocking sign‑in on tablets and 2‑in‑1s in some scenarios.
  • Hyper‑V / Networking fix: Addresses an issue where external virtual switches would lose physical NIC bindings and convert to internal switches after a host restart, causing virtual machines to lose network connectivity. The root cause was incorrect handling of orphaned virtual switch objects during Host Network Service startup.
  • Personalized Offers enabled in OOBE and Settings: The update enables Microsoft’s Personalized Offers (tailored experiences) during the Out‑of‑Box Experience and surfaces the feature in Settings once users reach the desktop, subject to regional and gating controls.
  • Storage fix impacting Azure Stack Hub/Azure Local: Fixes a disk communication failure that could produce connectivity errors during Azure Stack Hub or Azure Local cluster upgrades—an important reliability upgrade for on‑premises Azure stack operators.
These changes are narrowly scoped but can have outsized effects on affected device classes and enterprise scenarios. The rest of this article breaks down each item, examines the implications for consumers and IT teams, and offers practical testing and deployment recommendations.

Touch keyboard regression: what happened and why this matters​

The symptom and scope​

Many tablet and convertible users reported a perplexing problem: after resuming from sleep, the touch keyboard UI remained visually responsive (animations and key pop‑ups appeared normal), but keystrokes did not insert characters into focused text fields. The problem was especially disruptive on the sign‑in screen, where users rely on the touch keyboard to enter passwords and PINs.
This is the kind of user‑facing regression that can block device usage entirely. Devices that can’t accept input at the sign‑in screen create support calls, prevent unattended deployments, and reduce confidence in update reliability.

Why the fix matters​

  • Restores basic device usability for tablets, convertibles, and touch‑first devices.
  • Reduces helpdesk volume caused by failed sign‑in attempts on resume.
  • Removes a blocking issue for users who rely exclusively on touch input (no external keyboard available).

Testing checklist for IT and power users​

  • Ensure the device is fully patched to Build 22631.6132 (preview channel).
  • Configure a local user account with a password (do not use biometrics for this test).
  • Put the device to sleep via the Start menu, then resume.
  • Invoke the touch keyboard at the sign‑in screen and type the password. Verify characters appear in the password field and the user can sign in.
  • Repeat with different text fields (Notepad, browser forms) to ensure general text entry works post‑resume.
If devices still show issues after the update, capture feedback logs and consider rolling back to a previous known good snapshot for further diagnosis.

Hyper‑V external virtual switch bug: impacts and remediation​

The problem in detail​

Server and virtualization hosts running Hyper‑V reported that external virtual switches could lose their physical NIC bindings after a host restart, automatically converting into internal switches. The result: virtual machines that expected external network connectivity would lose it entirely.
Essentially, the Host Network Service (HNS) startup sequence was incorrectly identifying certain virtual switch objects as “orphaned,” stripping away their NIC bindings during initialization. For enterprise and lab environments that depend on predictable NIC assignments and persistent vSwitch configurations, this is a high‑impact regression.

Practical consequences​

  • VMs lose external network access after host reboot—affects servers, containers, domain join, patching workflows, and remote management.
  • Automation and orchestration tools that expect static virtualization topologies can fail.
  • Recovery requires either manual re‑binding of NICs, vSwitch recreation, or reverting to snapshots—none of which are acceptable at scale.

What the update fixes​

The patch corrects the logic during Host Network Service startup so orphaned switch objects are not incorrectly detected and altered, preserving external NIC bindings across restarts. This restores expected Hyper‑V behavior for hosts using external vSwitches.

Recommendations for virtualization administrators​

  • Apply the preview update in a test cluster first; confirm vSwitch behavior across multiple reboots.
  • Snapshot or checkpoint critical hosts before testing so you can quickly roll back if necessary.
  • Validate automation scripts (Terraform, Ansible, System Center, PowerShell DSC) that interact with vSwitches to ensure they still work post‑update.
  • If you manage production hosts at scale, stage the update in a small pilot ring (3–5 hosts), validate connectivity, then expand the roll‑out.

Personalized Offers in OOBE: feature, privacy, and enterprise implications​

What changed​

The update enables a Personalized Offers surface during the Out‑of‑Box Experience (OOBE) and surfaces the same feature in Settings once the user reaches the desktop. The experience is meant to present contextual recommendations and promotions during initial setup.
This feature activation is typically gated—rolling out only to subsets of devices or regions based on feature flags. The enablement in this build doesn’t universally turn offers on for all devices, but makes the capability available on eligible machines.

Why this matters for consumers and administrators​

  • For consumers, personalized offers can be useful and unobtrusive, but they raise questions about what signals Microsoft uses to tailor recommendations.
  • For enterprises, OOBE behavior matters for device provisioning. IT teams often expect OOBE to remain focused on configuration, enrollment, and security; promotional content in setup flows can be undesirable for corporate devices.
  • Managed devices typically have enterprise provisioning paths (Autopilot, Image deployment) where OOBE changes must be validated to ensure no policy, enrollment, or automation breakage.

Control points and mitigation​

  • Enterprises should validate Autopilot and provisioning flows against a test image that has received the preview update.
  • Group Policy and MDM controls that manage Windows Setup and Tailored Experiences should be reviewed. Policies that block telemetry or tailored experiences may prevent the offers from appearing on managed devices.
  • If personalized offers are not acceptable for a class of devices, use existing MDM policies or configuration profiles to restrict OOBE personalization where supported.

A note on privacy​

Any feature that uses personalization needs careful scrutiny for telemetry, data collection, and opt‑out behavior. Administrators should review organizational compliance requirements before enabling preview features on managed fleets.

Storage reliability: Azure Stack Hub and Azure Local cluster upgrade fixes​

The reported symptom​

Operators upgrading Azure Stack Hub or Azure Local clusters observed disk communication failures during the upgrade process, which could lead to temporary connectivity errors or upgrade interruptions. Given that cluster upgrades are sensitive operations, any disk connectivity issue is a severe reliability concern.

The fix and who should care​

The update addresses the disk communication issue that caused these connectivity errors. This is primarily relevant to organizations running Azure Stack Hub or Azure Local clusters—on‑premises Azure deployments where in‑place cluster upgrades depend on predictable, continuous storage access.

Operational guidance for Azure Stack / Azure Local operators​

  • Plan cluster upgrades in a maintenance window and validate storage health prior to upgrade.
  • Apply the preview update to cluster nodes in a test or staging environment and simulate the upgrade process to confirm no disk communication errors occur.
  • Ensure backups and snapshots exist before beginning cluster upgrades.
  • If you experience disk communication failures during an upgrade, escalate to vendor support and capture storage and cluster diagnostics.

Deployment guidance — how to treat a Release Preview update​

Who should install KB5067112 now​

  • Insiders and early adopters who want to validate fixes on specific hardware (tablets, Hyper‑V hosts, Azure Stack clusters).
  • IT teams running targeted pilots who need to verify remediation of the touch‑keyboard or Hyper‑V vSwitch issues before mainstream roll‑out.
  • Labs and test environments where regression testing and automation validation are pragmatic.

Who should wait​

  • Production fleets where stability is paramount—wait for inclusion of these fixes in a standard Monthly Cumulative Update after Microsoft’s broader roll‑out.
  • Large enterprise deployments that cannot afford the risk of an optional preview update causing unexpected side effects.

Best practice roll‑out plan (recommended)​

  • Apply the update to a single test device or host that mirrors your most common hardware profile.
  • Run a focused test plan (sign‑in, resume, Hyper‑V reboots, cluster upgrade dry‑run).
  • Expand to a small pilot ring (5–20 devices/hosts) that represents a cross‑section of your environment.
  • If successful, schedule a staged deployment by OU, site, or workload criticality.
  • Monitor telemetry and user reports closely for at least one weekly patch cycle before wider deployment.

Troubleshooting and rollback​

  • If the touch keyboard remains unresponsive after the update, attempt a driver refresh for input devices and check for third‑party keyboard/filter drivers that might interfere.
  • For Hyper‑V hosts, if vSwitch NIC bindings are lost, rebind the NICs using Hyper‑V Manager or PowerShell, and capture event logs related to Host Network Service.
  • To uninstall the preview package, use Settings > Windows Update > Update history > Uninstall updates; for scripted rollback use DISM or WUSA with the KB package ID. Always test rollback steps in a lab first.

Risk analysis — strengths and remaining concerns​

Notable strengths​

  • The update is narrowly focused and addresses real, high‑impact regressions (touch sign‑in failures and vSwitch breakage) that were causing real user and operational pain.
  • Microsoft’s staged approach—publishing fixes to Release Preview first—gives IT teams and Insiders time to validate before broad distribution.
  • The simultaneous fix for Azure Stack Hub/Azure Local underscores attention to enterprise on‑premises scenarios, not just consumer UX.

Potential risks and unknowns​

  • Enabling Personalized Offers in OOBE—even if gated—injects promotional content into setup flows; the privacy and compliance implications should be assessed for managed fleets.
  • Preview updates can sometimes expose secondary regressions in uncommon configurations. Hyper‑V and storage environments vary widely; administrators must test automation and recovery procedures.
  • The fix for orphaned virtual switch detection addresses a specific root cause; while the immediate symptom is resolved, teams should monitor for related networking anomalies after reboots and scaling operations.

Unverifiable or cautionary items​

  • Underlying micro‑architectural details beyond Microsoft’s summary (for example, the exact HNS code paths modified) are not public; IT pros should treat the high‑level description as the actionable guidance and rely on testing rather than assumptions about root‑cause depth.
  • The release cadence and exact rollout to non‑Insider channels are subject to Microsoft’s internal staging; timelines for when this preview will reach mainstream LCUs cannot be precisely predicted here.

Technical checklist for labs and sysadmins​

  • Verify current OS baseline: confirm target devices are on Build 22631 (23H2) before applying KB5067112.
  • Back up VM host configurations and take snapshots/checkpoints of critical VMs and cluster nodes.
  • Validate sign‑in and resume behavior on representative touch devices.
  • Reboot Hyper‑V hosts multiple times and inspect vSwitch NIC binding persistence.
  • Run simulated Azure Stack Hub/Azure Local upgrade dry runs on non‑production clusters.
  • Review audit logs and network events for unexpected failures post‑update.
  • If using third‑party security or low‑level drivers, confirm vendor compatibility.

What this means for the broader Windows 11 update landscape​

KB5067112 is illustrative of a mature servicing model: small, targeted cumulative updates that resolve specific pain points and are validated through the Insider channels before wider release. The presence of both consumer UX fixes (touch keyboard) and enterprise‑grade bug fixes (Hyper‑V, Azure Stack) in a single preview shows Microsoft’s continued push to balance the needs of consumer devices, mixed hardware, and enterprise deployments within the same servicing baseline.
Meanwhile, feature enablement in OOBE—such as Personalized Offers—continues the trend of Microsoft introducing configurable, gated features that can surface different behaviors depending on hardware, region, or account type. Administrators should watch these enablements because they can affect provisioning flows and compliance.

Conclusion​

Build 22631.6132 (KB5067112) for Windows 11 version 23H2 is a compact but consequential preview update: it fixes a user‑blocking touch keyboard regression, resolves a disruptive Hyper‑V vSwitch binding bug, patches a storage communication issue relevant to Azure Stack/Azure Local upgrades, and enables the Personalized Offers experience in OOBE and Settings under gated rollout.
For Insiders and administrators, the recommended path is measured validation: apply to test systems, follow the checklist above, and proceed with staged roll‑outs if results are positive. Production fleets that prioritize maximum stability should await the fixes’ inclusion in a standard Monthly Cumulative Update.
These targeted fixes reduce several high‑impact reliability problems. The staged Release Preview delivery allows organizations and enthusiasts to validate behavior in their unique environments before widescale deployment—precisely the kind of risk‑controlled approach IT teams should favor when managing modern Windows servicing.

Source: Windows Report KB5067112 Preview Update Releases With Key Fixes for Issues Reported in Windows 11 23H2
 

Back
Top