Patch Review Recommendations

Flexis April 2026 Patch Recommendation

Patches Microsoft released in April 2026

 

  • KB5082142 – 2026-04 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems  
  • KB5082123 – 2026-04 Cumulative Update for Windows Server 2019 for x64-based Systems 
  • KB5082198 – 2026-04 Cumulative Update for Windows Server 2016 for x64-based Systems (KB5082198) 
  • KB5083769 – 2026-04 Cumulative Update for Windows 11, version 25H2 for x64-based Systems 

Get Help With Patching, Talk to a Patching Expert.

Impacted Products:

Microsoft-Windows

Microsoft Windows

Microsoft-Edge

Microsoft Edge

(HTML-based)

Microsoft-Edge

Microsoft Edge

 (Chromium-based)

Internet-Explorer

Internet Explorer

Microsoft-Office

Microsoft Office and Microsoft Office Services and Web Apps

Windows-Defenser

Windows Defender

Visual-Studio

Visual Studio

6

ASP.NET Core

Untitled design (1)

Chakra Core

Microsoft-Dynamics

Microsoft Dynamics

NET-Framework

.NET Framework

NET-Core

.NET Core

Please note the following information regarding the security updates:

Windows 10 Enterprise and Education and Windows 10 Home and Pro Lifecycle pages, Windows 10 was ended on October 14, 2025. The current version, 22H2, will be the final version of Windows 10. The following editions will remain in support with monthly security update releases through that date: 

Home

Pro

Pro Education

Pro for Workstations

Education

Enterprise

Enterprise multi-session

KB5082142: Windows Server 2022

Improvements 

This security update contains fixes and quality improvements from KB5078766 ​​​​​​​(released March 10, 2026). The following summary outlines key issues addressed by this update. Also, included are available new features. The bold text within the brackets indicates the item or area of the change. 

  • [Connectivity] This update improves the reliability of audio features in Windows, helping reduce system unresponsiveness related to sound or audio activity. 
  • [Kernel] This update improves system stability during large file operations. Users should experience fewer unexpected interruptions while working with or transferring large files. 
  • [Networking] This update improves reliability when Windows uses SMB compression over QUIC. After you install this update, SMB compression requests over QUIC complete more consistently, reducing the likelihood of timeouts and supporting smoother, more dependable performance. 
  • [Remote Desktop] This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see Understanding security warnings when opening Remote Desktop (RDP) files.  
  • [Secure Boot]
  • With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout.
  • This update addresses an issue where the device might enter BitLocker Recovery after the Secure Boot updates. 
  • [Texts and Fonts] This update improves Windows fonts by adding the new Saudi Riyal currency symbol. This change helps keep text clear, accurate, and visually consistent across your Windows apps and experiences. 
  • [Windows Deployment Services (WDS)] This update disables the “Hands-Free Deployment” feature in WDS by default and is no longer a supported feature. For more information about this change, see Windows Deployment Services (WDS) Hands-Free Deployment Hardening Guidance related to CVE-2026-0386.


Known issues in this update
  

Domain Controllers might restart repeatedly after installing this update 

Symptom 

After installing this update, domain controllers in environments with multiple domains in the forest that use Privileged Access Management (PAM), might experience LSASS crashes during startup. As a result, affected domain controllers might restart repeatedly, preventing authentication and directory services from functioning, and potentially rendering the domain unavailable. 

 

Resolution 
This issue is addressed in out-of-band update KB5091575.

 

Devices with an unrecommended BitLocker Group Policy configuration might be required to enter their BitLocker recovery key 

Symptom 

Some devices with an unrecommended BitLocker Group Policy configuration might be required to enter their BitLocker recovery key on the first restart after installing this update. 

This issue only affects a limited number of systems in which ALL of the following conditions are true. These conditions are unlikely to be found on personal devices not managed by IT departments. 

  1. BitLocker is enabled on the OS drive. 
  2. The Group Policy “Configure TPM platform validation profile for native UEFI firmware configurations” is configured, and PCR7 is included in the validation profile (or the equivalent registry key is set manually). 
  3. System Information (msinfo32.exe) reports Secure Boot State PCR7 Binding as “Not Possible“. 
  4. The Windows UEFI CA 2023 certificate is present in the device’s Secure Boot Signature Database (DB), making the device eligible for the 2023signed Windows Boot Manager to be made the default. 
  5. The device is not already running the 2023-signed Windows Boot Manager. 

In this scenario, the BitLocker recovery key only needs to be entered once — subsequent restarts will not trigger a BitLocker recovery screen, as long as the group policy configuration remains unchanged. For help finding your BitLocker recovery key, see the article, Find your BitLocker recovery key. 

Enterprises are recommended to audit their BitLocker group policies for explicit PCR7 inclusion and check msinfo32.exe for their PCR7 binding status before installing this update. (See Option 1 below.) 

 

Workaround 

 

Option 1: Remove the Group Policy configuration before installing the update (Recommended)  

  1. Open Group Policy Editor (gpedit.msc) or your Group Policy Management Console. 
  2. Navigate to: Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives. 
  3. Set “Configure TPM platform validation profile for native UEFI firmware configurations” to “Not Configured“. 
  4. Run the following command on affected devices to propagate the policy change: gpupdate /force 
  5. Run the following command to suspend BitLocker (where BitLocker is enabled on the C: drive): manage-bde -protectors -disable C:  
  6. Run the following command to resume BitLocker (where BitLocker is enabled on the C: drive): manage-bde -protectors -enable C:  
  7. ​​​​​​​This updates the BitLocker bindings to use the Windows-selected default PCR profile. 

 

Option 2: Apply the Known Issue Rollback (KIR) before installing the update 

A Known Issue Rollback (KIR) is available for customers who cannot remove the PCR7 group policy before deploying this update. The KIR prevents the automatic switch to the 2023 Boot Manager, avoiding the BitLocker recovery trigger. The KIR should be deployed before installing the update on affected devices. Contact Microsoft’s Support for business to obtain this KIR.

 

Next steps 

A permanent resolution for this issue is planned in a future Windows update. More information will be provided when it is available. 

 

Windows Server Update Services WSUS does not display error details 

After installing KB5070884 or later updates, Windows Server Update Services (WSUS) does not display synchronization error details within its error reporting. This functionality is temporarily removed to address the Remote Code Execution Vulnerability, CVE-2025-59287.  

KB5082123- Windows Server 2019 Win 10 Ent LTSC 2019

Applies to: Windows Server 2019 

This security update includes fixes and quality improvements that are part of the following update: 

he following is a summary of the issues that this update addresses when you install this update. The bold text within the brackets indicates the item or area of the change we are documenting. 

  • [PowerShell (known issue)] Fixed: After installing Windows updates released on or after January 13, 2026, Japanese language installations of Windows Server 2019 might not correctly display Japanese characters in the PowerShell console. 
  • [Remote Desktop] This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see Understanding security warnings when opening Remote Desktop (RDP) files. 
  • [Secure Boot]  
  • ​​​​​​​This update enables dynamic status reporting for Secure Boot states in the Windows Security App (Settings > Update & Security > Windows Security). Learn more about the status alerts via badges and notifications. Note that these enhancements are disabled by default on commercial devices and servers. 
  • This update fixes an issue that could cause a device to enter BitLocker Recovery after Secure Boot updates. 
  • With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout. 

 

Applies to: Windows 10 Enterprise LTSC 2019 

This security update includes fixes and quality improvements that are part of the following update: 

The following is a summary of the issues that this update addresses when you install this update. The bold text within the brackets indicates the item or area of the change we are documenting. 

  • [Remote Desktop] This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see Understanding security warnings when opening Remote Desktop (RDP) files. 
  • [Secure Boot]  
  • ​​​​​​​This update enables dynamic status reporting for Secure Boot states in the Windows Security App (Settings > Update & Security > Windows Security). Learn more about the status alerts via badges and notifications. Note that these enhancements are disabled by default on commercial devices and servers. 
  • This update fixes an issue that could cause a device to enter BitLocker Recovery after Secure Boot updates. 
  • With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout. 

KB5082198: - Windows Server 2016, all editions Win 10 Ent LTSB 2016 Win 10 IoT Ent LTSB 2016

Windows Secure Boot certificate expiration  

Important: Secure Boot certificates used by most Windows devices are set to expire starting in June 2026. This might affect the ability of certain personal and business devices to boot securely if not updated in time. To avoid disruption, we recommend reviewing the guidance and taking action to update certificates in advance.   

For details and preparation steps for Windows devices, see Windows Secure Boot certificate expiration and CA updates. 

For details and preparation steps for Windows servers, see the following resources: 

 

Applies to: Windows Server 2016 

 

This security update includes fixes and improvements that are a part of the following update: 

The following is a summary of the issues that this update addresses. The bold text within the brackets indicates the item or area of the change we are documenting. 

  • [Windows Component Services (WinCS)] This update addresses an issue that affects Windows Component Services (WinCS) on Windows 10, version 1607 and Windows Server 2016. Some WinCS components were missing. Because of this, you could not turn on Secure Boot using WinCS. 
  • [Remote Desktop] This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see Understanding security warnings when opening Remote Desktop (RDP) files. 
  • [Secure Boot] With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout.

Applies to: Windows 10 Enterprise LTSB 2016 and Windows 10 IoT Enterprise 2016 LTSB 

 

This security update includes fixes and improvements that are a part of the following update: 

The following is a summary of the issues that this update addresses. The bold text within the brackets indicates the item or area of the change we are documenting. 

  • [Windows Component Services (WinCS)] This update addresses an issue that affects Windows Component Services (WinCS) on Windows 10, version 1607 and Windows Server 2016. Some WinCS components were missing. Because of this, you could not turn on Secure Boot using WinCS. 
  • [Remote Desktop] This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see Understanding security warnings when opening Remote Desktop (RDP) files. 
  • [Secure Boot] With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout.
     

Domain controllers might restart repeatedly after installing this update 

Symptom 

After installing this update, domain controllers in environments with multiple domains in the forest that use Privileged Access Management (PAM), might experience LSASS crashes during startup. As a result, affected DCs might restart repeatedly, preventing authentication and directory services from functioning, and potentially rendering the domain unavailable. 

Resolution 

This issue is addressed in out-of-band update KB5091572.​​​​​​​ 

KB5083769: Windows 11 version 25H2, all editions Windows 11 version 24H2, all editions

This cumulative update for Windows 11, version 25H2 and 24H2 (KB5083769), includes the latest security fixes and improvements, along with non-security updates from last month’s optional preview release. To learn more about differences between security updates, optional non-security preview updates, out-of-band (OOB) updates, and continuous innovation, see Windows monthly updates explained. For information on Windows update terminology, see the different types of Windows software updates. 

To view the latest updates about this release, visit the Windows release health dashboard or the update history page for Windows 11, version 25H2 and 24H2. 

 

Improvements 

This security update contains fixes and quality improvements from KB5079473 (released March 10, 2026), KB5085516 (released March 21, 2026), KB5079391 (released March 26, 2026 – no longer offered), and KB5086672 (released March 31, 2026). The following summary outlines key issues addressed by this update. Also, included are available new features. The bold text within the brackets indicates the item or area of the change. 

  • [Secure Boot] 
  • New!The status of Secure Boot certificate updates on your device may be displayed in the Windows Security app (Settings > Privacy & security > Windows Security). Learn more about the status alerts via badges and notifications. These enhancements are disabled by default on commercial devices. 
  • With this update, Windows quality updates include additional high confidence device targeting data, increasing coverage of devices eligible to automatically receive new Secure Boot certificates. Devices receive the new certificates only after demonstrating sufficient successful update signals, maintaining a controlled and phased rollout. 
  • This update addresses an issue where the device might enter BitLocker Recovery after the Secure Boot updates.  
  • [Networking] This update improves reliability when Windows uses SMB compression over QUIC. After you install this update, SMB compression requests over QUIC complete more consistently, reducing the likelihood of timeouts and supporting smoother, more dependable performance.  ​​​​​​​ 
  • [Remote Desktop] This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see Understanding security warnings when opening Remote Desktop (RDP) files.  
  • [Reset this PC (known issue)] Fixed: This update addresses an issue that might cause device reset to fail when using the “Keep my files” or “Remove everything” options. This might occur after installing the March 2026 (KB5079420) Hotpatch security update. 

Known issues in this update  

Devices with an unrecommended BitLocker Group Policy configuration might be required to enter their BitLocker recovery key 

Symptoms 

Some devices with an unrecommended BitLocker Group Policy configuration might be required to enter their BitLocker recovery key on the first restart after installing this update. 

This issue only affects a limited number of systems in which ALL of the following conditions are true. These conditions are unlikely to be found on personal devices not managed by IT departments. 

  1. BitLocker is enabled on the OS drive. 
  2. The Group Policy “Configure TPM platform validation profile for native UEFI firmware configurations” is configured, and PCR7 is included in the validation profile (or the equivalent registry key is set manually). 
  3. System Information (msinfo32.exe) reports Secure Boot State PCR7 Binding as “Not Possible“. 
  4. The Windows UEFI CA 2023 certificate is present in the device’s Secure Boot Signature Database (DB), making the device eligible for the 2023signed Windows Boot Manager to be made the default. 
  5. The device is not already running the 2023-signed Windows Boot Manager. 

In this scenario, the BitLocker recovery key only needs to be entered once — subsequent restarts will not trigger a BitLocker recovery screen, as long as the group policy configuration remains unchanged. For help finding your BitLocker recovery key, see the article, Find your BitLocker recovery key. 

Enterprises are recommended to audit their BitLocker group policies for explicit PCR7 inclusion and check msinfo32.exe for their PCR7 binding status before installing this update. (See Option 1 below.) 

Workaround  

Option 1: Remove the Group Policy configuration before installing the update (Recommended)  

  1. Open Group Policy Editor (gpedit.msc) or your Group Policy Management Console. 
  2. Navigate to: Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives. 
  3. Set “Configure TPM platform validation profile for native UEFI firmware configurations” to “Not Configured“. 
  4. Run the following command on affected devices to propagate the policy change: gpupdate /force 
  5. Run the following command to suspend BitLocker (where BitLocker is enabled on the C: drive): manage-bde -protectors -disable C:  
  6. Run the following command to resume BitLocker (where BitLocker is enabled on the C: drive): manage-bde -protectors -enable C:  
  7. ​​​​​​​These updates the BitLocker bindings to use the Windows-selected default PCR profile. 

 

Option 2: Apply the Known Issue Rollback (KIR) before installing the update 

A Known Issue Rollback (KIR) is available for customers who cannot remove the PCR7 group policy before deploying this update. The KIR prevents the automatic switch to the 2023 Boot Manager, avoiding the BitLocker recovery trigger. The KIR should be deployed before installing the update on affected devices. Contact Microsoft’s Support for business to obtain this KIR. 

Next steps 

A permanent resolution for this issue is planned in a future Windows update. More information will be provided when it is available.