Category Archives: Insider stuff

Windows 10 Build 19043.1165 Install Button

Here’s an interesting departure from the usual. Today, August 10, is Patch Tuesday. That means it’s the second Tuesday of the month, and normally when Microsoft pushes updates out on its normal monthly cycle. But when I checked for updates, after they downloaded, the process paused. As you can see in the lead-in graphic, I had to push a Windows 10 Build 19043.1165 install button to make the install continue. What’s up with that?

When Is a Windows 10 Build 19043.1165 Install Button Typical?

Normally, one doesn’t see such things unless there’s some kind of preview element in the update mix (and rarely, if ever, does that hit as part of Patch Tuesday offers). That said, there is a KB5003791 Enablement Package update out today to take 2004, 20H1 or 21H1 to 19044 (21H2) build levels. Perhaps the button shows up because of that item? Interestingly, it was not offered to my PC (nor should it have been, as it is an Insider Preview element).

Even more interesting, I saw the update process cycle around for the KB5005033 item on my production desktop PC. That is, it counted up to 100%, stayed there for a while, then dropped back into the 60s and counted back up to 100% a second time before showing the usual “Restart now” button upon completion. That’s not exactly unheard of, but it is a little unusual. Thus, Patch Tuesday brings me a little unexpected excitement today.

Here’s what came through today, as part of the update package:
1. KB5005417 .NET Core 3.1.18 Security Update
2. Windows Malicious Software Removal Tool KB890930
3. KB6005033 Cumulative Update for 19043.1165
I don’t see anything in there that would normally induce the “Install now” button to appear. But as the lead-in graphic shows, I got one anyway.

And that’s the way things go here in Windows-World sometimes. Go figure! I’m clueless…

Facebooklinkedin
Facebooklinkedin

New Antimalware Exe Causes Regular Win11 APPCRASH

In watching a new Windows OS, I tend to check in on Reliability Monitor regularly to look for errors. After my intense efforts to get my Windows 11 PCs upgraded to Defender’s latest Antimalware engine recently, I have to laugh. My Lenovo ThinkPad X380 Yoga in the Beta Channel has thrown 14 critical events since its July 29 upgrade. Half of those events originated from the Antimalware Service Executable, version 4.18.2107.4. Hence my assertion: New Antimalware Exe Causes Regular Win11 APPCRASH.

I have to chuckle, because getting to this version also fixed a documented problem with Windows 11. It did prevent the “Automatic sample submisssion” from resetting to off after each reboot. But apparently, something else in that executable is itself problematic. Such gotchas are pretty normal for Insider Preview code. I imagine MS is working hard to fix it, too.

New Antimalware Exe Causes Regular Win11 APPCRASH: What of It?

Looking at all 14 “Critical Events” in Relimon since July 29, 3 come from Lenovo Firmware Update checks (fwdetectcmd1911.exe). All the rest — including the 7 from the antimalware engine — come from Windows internal components and elements. To me this is just the normal working out of a new OS release as it morphs from Insider Preview to nearly production-ready status. In other words, it simply shows that the development process is proceeding as it usually does.

Over time, the frequency of such errors will drop off. As Insider Preview users report specific items, MS dev teams will investigate. They’ll invariably fix those in need of fixing (as I expect will happen with this MsMpEng.exe issue). When only a few random or minor issues remain unsolved, the developers will start moving more aggressively to create production target builds for Windows 11. That’s usually when it would show up as a Release Preview channel item, and would signal that production release is immanent.

This time around, we already know MS will move heaven and earth to get Windows 11 ready by late October. That’s as far as they can push things, and still have PCs or devices with Windows 11 pre-installed ready for the holiday shopping season. Stay tuned, and we’ll see how it all unfolds.

Facebooklinkedin
Facebooklinkedin

Remote Desktop App Holds Cloud PC Keys

OK, then. I’ve finally had a chance to read and learn a bit more about Microsoft’s Cloud PC offering. Indeed, it’s now finally available for subscription and use. I did not luck out and land a free trial (the offer was swamped beyond capacity within minutes of opening). Over at ZDNet, however, Ed Bott ponied up for a subscription. He reports on his experiences working with the Windows 365 Service, built around Cloud PC. His “Hands-on” story appeared yesterday and includes lots of useful info. Not least amongst its nuggets of wisdom and observation is the notion that the Remote Desktop App holds Cloud PC keys.

Why Say: Remote Desktop App Holds Cloud PC Keys?

Bott describes the “Open in Browser” button for Cloud PC as  “the simplest way to begin working with” its capabilities. His story shows useful screenshots and example. In fact, it’s well worth reading from end to end.

In that story, Bott further opines as follows:

“The browser is fine for casual connections, but you’ll have a better experience using Microsoft’s Remote Desktop client, which is available for download from a separate page on the Windows 365 dashboard. Apps are available for Windows, Mac, iOS, and Android.”

I wrote a story for ComputerWorld earlier this year called “Windows 10’s Remote Desktop options explained.” Its conclusion starts with the heading “The future of Remote Desktop.” In that section I put forward the guess that “URDC [the store app for Remote Desktop depicted as the lead graphic here] and MSRDC [an enterprise version of the same tool] will become much more important and capable clients than they are right now.” I also expressed the idea that this might spell the waning days for the old Remote Desktop application (mstsc.exe). I believe Mr. Bott’s story just proved me right, to my great relief.

What Remote Desktop Brings to Cloud PC

In short, it makes interacting with Cloud PC just like any other remote PC session. It permits full-screen (and even all displays in multi-monitor set-ups) operation and works just like desktop access over the network. Of course, that’s what it is, so this is no surprise.

What is surprising is what Bott report about Cloud PC performance. Not much lag, with only “momentary display glitches” for graphics-heavy apps, and “general productivity apps like Office perform just fine.” His only compatibility issue came when trying to connect to a Gmail account with Cloud PC (the server didn’t accept Outlook authentication dialog boxes, but Bott did access the account using the built-in Mail app and via MS Edge).

Bott’s economic analysis of Cloud PC is also interesting. At a minimum of US$20 per month (single vCPU, 2 GB RAM, 64 GB storage) — useful for what he describes as “only the most lightweight tasks” — it offers no significant value-add for home or small business users. For larger businesses, though, I think he observes correctly that the simplicity of Cloud PC (operable from any Internet-attached device including PCs, tablets and smartphones) could appeal to and might even cost less than deploying a managed and secured company-owned PC to employees at home (and other remote locations). It also lets remote users work from familiar local platforms already to hand and might even boost productivity.

So far, I very much like what I’m seeing and reading about Cloud PC. But that’s not the same as trying it out for oneself.

From Reading About to Hands-On

Next, my goal is to figure out how to get involved with Cloud PC myself. I’ve already floated the question with the Windows Insider MVP program if they can’t make  such subscriptions available as part of the award benefit.

But just because I think they should, doesn’t mean they will. In that case, I’ll have to carefully examine the family exchequer to see if it can float the $492 a 1-year subscription for a suitably equipped Cloud PC would cost. By hook or by crook, though, I want in! Stay tuned: I’ll keep you posted…

Facebooklinkedin
Facebooklinkedin

Dev Channel Downgrade Raises Flightsigning Mystery

OK, then. Yesterday I posted here about the conditions under which Insiders can downgrade from Dev Channel to Beta or Release Preview channels. Today, there are reports that Insider Preview stuff may go missing in SettingsUpdateWindows Insider Program if you follow that advice. At the same time MS Insider Team member Eddie Leonard has posted a fix for same at Answers.Microsoft.com. As you’ll see in his step-by-step fix advice below, the Dev Channel downgrade raises Flightsigning mystery because it’s key to that fix. Here are those details, quoted verbatim (I changed the text color to red on the key term to make it stand out):

 

1. Click on Start
2. In the search box, type cmd
3. In the lower right of the search results, under Command Prompt, click Run as Administrator
4. On the UAC prompt, click OK
5. At the elevated command prompt, type: bcdedit /set flightsigning on
6. Press Enter
7. At the elevated command prompt, type: bcdedit /set {bootmgr} flightsigning on
8. Press Enter
9. Reboot the device

How do you know if you’ve got this problem? You’ll see a screen that looks like the one from the lead-in graphic (also cribbed from Eddie’s Answers Fix info). Notice that only the “Stop getting preview builds” choice appears, when you should also see choices for “Choose your Insider settings” and “Windows Insider account.” The preceding fix explains how to get those items back, and restore Windows Insider Program capabilities along the way.

Researching Dev Channel Downgrade Raises Flightsigning Mystery

Of course that raises more questions — namely:
“What is flightsigning?”
“Why must it be turned on (twice)?”
I have no answers for these questions just yet, but I’m digging in. There’s a 2014 TechNet article “What is flightsigning?” It raises the question and provides the glimmer of an answer from bcdedit tool help “Allows flight-signed code signing certificates.” It also says “These are certificates used during the Windows development process and chain to an internal root.” Documentation simply says:

“…this command will enable the system to trust Windows Insider Preview builds that are signed with certificates that are not trusted by default:”

I’m guessing that downgrading from Dev Channel may somehow alter these certificate checks. Further, I believe Beta and Release Preview channels must have them turned on by default. Switching from Dev to lower channels requires them to get turned back on and enabled in the boot manager before Insider Program info can show up.

But details are sparse and documentation terse and limited. The BCDEdit command-line options at MS Docs mentions flightsigning only in passing (see “Changing entry options”). Even the GitHub info from MS Docs doesn’t say much about flightsigning. There’s also a tantalizing post at OSR.com about “New test signing options.” But not a lot of hard or explanatory info.

I’ll keep digging. But if anybody has other sources or info, please comment or use the website’s Contact form to send me an email. All input gratefully received.

 

Facebooklinkedin
Facebooklinkedin

Downgrading Dev Channel Is Now Sometimes Possible

Here’s an interesting tidbit from the July 29 version of Microsoft Docs “Deeper look at flighting.” And of course, as the lead sentence reads “Flighting is the process of running Windows Insider Preview Builds on your device.” In an amendment to prior policy, downgrading Dev Channel is now sometimes possible for test PCs or VMs. Let me explain…

What Downgrading Dev Channel Is Now Sometimes Possible Means

The key to switching without requiring a clean re-install (the prior policy in all cases) is that the Dev Channel must have the same or lower Build number than the target channel. That means switching from Dev Channel to another channel requires users “to find your current build number and compare it to the current build number in the channel you wish to switch to.” Build numbers appear in the output from winver.exe, and in Start → Settings → System → About.

I quote the step-by-step process verbatim from the previously linked flighting document:

  1. Open Settings > Windows Update > Windows Insider Program.
  2. Select Choose your Insider settings.
  3. Select the desired channel, either Beta Channel (Recommended), or Release Preview Channel.
  4. The next time you receive an update, it will be for your new channel.

This will make the process of downgrading channels simpler. It also provides an “exit strategy” for Dev Channel PCs. Prior policy insisted that the only escape from Dev Channel could be a clean re-install of some other Windows version. The other channels have always offered the option to drop back to production/RTM versions when they become available. This extends that out to Dev Channel, but requires two steps to get there: first drop back to Beta or Insider Preview, then drop back to production/RTM. Good stuff!

Why Am I Telling You This … Now?

As you look at the WinVer output from Dev Channel (left) and Beta Channel (right) in the lead graphic, right now the Build numbers are the same. That means that you can downgrade Dev Channel PCs as I write this story. Given that MS hasn’t released a Dev Channel build in a while this can’t last forever. If you want to try it out, act fast — or wait for the next synch-up. Your call…

Facebooklinkedin
Facebooklinkedin

Beta Channel Insiders Get Windows 11 Offer

On July 22, I noted that my Insider Preview test machine hadn’t yet received a Windows 11 upgrade offer. This, despite assertions that such an offer was “coming soon” raised my curiosity, if not my ire. “Where’s mine?” I asked in the covering tweet for that story. Turns out it was where everybody else’s was, too: nowhere (not here yet). But yesterday, July 29, MS opened the Windows 11 floodgates to the Beta Channel. Thus, like many others, I witnessed and participated as Beta Channel Insiders get Windows 11 offer.

If you check the lead graphic for this story above, you’ll see the Beta Channel status window at right. It appears alongside Winver.exe output left, that shows this PC running Windows 11.

When Beta Channel Insiders Get Windows 11 Offer, What Next?

Just for grins, I timed the download and install processes for the new OS. I’m guessing server demand was high, because both took some time to complete. Download took 14:42, and Install took another 28 minutes and a bit more. Normally, OS download occurs in 5 minutes or less. Of course, the installation time is all on the local PC, so the servers have nothing to do with that.

Reliability Monitor also shows 3 “Stopped working” errors just after installation completed, while post-install updates and clean-up were underway. These included:

  • FwdUpdateCmd: a Lenovo System Update Plug-in, which probably hasn’t been updated and/or vetted for Windows 11 yet.
  • UsoClient: shows a BEX64 error, which usually indicates some kind of issue with Outlook. Interesting, because I don’t have MS Office installed on that PC. Might be related to the built-in Office trial.
  • Audio device graph isolation (audiodg.exe) shows an APPCRASH error, with CX64APO.dll as the faulting module. I recognize this as related to the Conexant audio driver present on the X380 Yoga. This is probably a driver hiccup incident to installation. From what I can see in Driver Store Explorer (RAPR.exe), all the current drivers are now stable and correct.

As I’ve been doing with Windows 11 on Dev Channel PCs, I’ll continue to explore, play and learn. I remain favorably impressed with this new OS, and look forward to learning and doing more with it in the weeks and months ahead. And yes, I’m glad to finally have another upgrade show up through “official channels.”

Facebooklinkedin
Facebooklinkedin

21H2 Preview Experiences After Two Weeks

I’ve got one lone test machine running the “other path” for older Windows hardware — namely the 21H2 Feature Update released on 7/16/2021. Here, I recite my 21H2 Preview Experiences after two weeks. While I’ve not encountered any show-stoppers, the Reliability Monitor report that appears above says it all. As is not untypical for new release forks, this one’s got some minor gotchas.

Summarizing 21H2 Preview Experiences After Two Weeks

I’ll start with a list of all errors reported in the foregoing Reliability Monitor screencap.

Date Source Summary
16-Jul Windows Hardware error
17-Jul Windows Update Medic Service Stopped working
Search application Stopped working and was closed
Search application Stopped working
18-Jul Windows Desktop Gadgets Stopped working
21-Jul PWA Identity Proxy Host Stopped responding and was closed
Windows Desktop Gadgets Stopped working

Upon examination, the error sources mostly originate from Windows itself. Only Windows Desktop Gadgets (which occurs twice) is a third-party app. The rest of the stuff is OS components, hardware, or built-in Windows apps.

IMHO, this kind of behavior is typical for a new release fork. It indicates a shakeout from current preview status on the way to something more stable. It’s only July and the release probably won’t happen until October, so there’s still plenty of time to get things right. If what I’m seeing right now is any indication, what needs fixing is mostly minor stuff.

I would say this augurs well for those who plan to upgrade to 21H2 on production PCs. If your PCs won’t meet Windows 11 upgrade requirements, they should be able to run Windows 10 until EOL in October 2025 without too much fuss or bother. Good stuff!

Facebooklinkedin
Facebooklinkedin

Vexing Windows 11 Antimalware Platform Update Issues

Right now, I have two PC dedicated to Windows 11 testing and learning. Just recently, I discovered some vexing Windows 11 Antimalware platform update issues. The short version is: one of my PCs is up-to-date. It’s no longer subject to Automatic Sample Submission reset to off following each restart. Alas, the other remains stubbornly stuck on an earlier Antimalware platform release. None of the update options available work, so I can’t get no relief. Let me explain…

Fighting Vexing Windows 11 Antimalware Platform Update Issues

First, let me be clear. This is a known and documented Windows 11 issue. It’s been around since the initial release hit. Indeed, a fix exists: when the Antimalware Platform version gets to 4.18.2107.4 or higher, the problem disappears. For the record that problem is depicted in this story’s lead-in graphic. After every reboot, the Automatic Sample Submission feature for virus uploads in Defender is turned off. The feature is easy to turn back on, until the next reboot. OCD OS maintainer that I am, the workaround isn’t enough for me. I want it fixed, for good, now.

Here’s the vexing part. WU hasn’t yet deigned to update the antimalware engine behind the scenes. Ditto for the Protection updates option in Windows Security. There’s a registry hack documented on a related ElevenForum thread. There’s even a manual Defender update download that’s supposed to take the Antimalware engine release to 1.2.2107.02. It comes in a file named defender-update-kit-x64.zip. Alas, inspection of said update file shows the Antimalware engine to be 4.18.2015.5. It’s too old to fix the issue, in other words. Thus, no relief just yet, shy of a permanent registry hack.

The Perils of Perfectionism

Yes, I could hack the registry to turn this off. But I’d have to unhack it again when the fix finally shows up on the X380 Yoga that’s affected. I’m going to have to wait for WU to get around to providing me the latest antimalware engine on its own, or find a newer manual update. Alas, that’s the way things go sometimes, here in Windows-World. Oddly, I find myself hoping for a new Windows 11 build, in hopes the latest antimalware engine will be part of its contents. Stay tuned: I’ll let you know how all this shakes out.

Note Added August 4: Update Came!

Thanks to long-time and active TenForums and ElevenForum user @Cliff S, I learned this morning that Antimalware Client Version 4.18.2107.4 arrived via WU. Checking my own previously stuck test machine, I saw it too, had gotten this update. And now, my PC no longer reverts to Automatic Sample Submission=Off after each reboot. Fixed!

I’ve also determined this version is available through the Microsoft Update Catalog. Search for KB4052623, and grab the correct version, if WU doesn’t come through for you.

 

 

Facebooklinkedin
Facebooklinkedin

Beta Channel Update Has Uncertain Timing

I always have troubles with patience. That goes double when I know a PC will run Windows 11, but hasn’t gotten the upgrade offer just yet. I’m talking about my second Lenovo ThinkPad X380 Yoga unit. It had been on the Release Preview Channel. But two days ago, I bumped it up to the Beta Channel in hopes of getting the Windows 11 upgrade. Because this Beta Channel update has uncertain timing, I’m not sure when this PC will get the offer. Here’s the irony: I have a second, nearly identical X380 unit (they differ only in the SSD installed) that’s been running Windows 11 since Day 1 on the Dev Channel.

Does Trickle-out Mean Beta Channel Update Has Uncertain Timing?

As you can see in this story’s lead graphic, Beta Channel PCs should be getting “these Windows 11 builds…” So far, this particular X380 Yoga is hanging back on Windows 10, Build 19043.1149. I’m eager to get the machine onto the new OS, but I want to see how long this is going to take to happen.

My track record on such things is far from stellar. I’ve forcibly upgraded many machines to new Windows 10 versions when upgrade offers were slow to appear. That raises the question: Can I wait long enough for WU to do its thing? Or will I succumb to the fatal allure of instant upgrade and do it manually?

I do want to understand how things will work in the Beta Channel. But I’m having trouble waiting on the system to catch up with me. Let me try another reboot and see if that will help … goes off to make that happen … Nothing doing.

Stay tuned. I’ll be back (soon, I hope) to tell you that WU has come through, or to confess that my patience wore out and I used an ISO to perform an in-place upgrade to Windows 11. One way or the other, I’ll get there, I promise!

Facebooklinkedin
Facebooklinkedin

Confusing Windows 11 Scissors and Trashcan

Sometimes, I have to laugh at myself. Yesterday, in cleaning out my Downloads folder on a Windows 11 test PC, I noticed that clicking the Scissors icon didn’t delete selected files. Duh! That’s the job of the Trashcan icon, as I figured out a little later using mouseover tactics. By confusing Windows 11 scissors and trashcan icons, I showed myself that minor mistakes can stymie routine file handling tasks. Sigh.

If Confusing Windows 11 Scissors and Trashcan, What Next?

Before I figured out my category/identification error, I found another quick workaround to delete files. By clicking “More options” at the bottom of the first right-click menu, another more familiar menu appears. It’s more or less the Windows 10 menu transplanted into Windows 11, like so:

Confusing Windows 11 Scissors and Trashcan.more-options

A second menu has the familiar text entry to make my choice more obvious: Delete appears three up from the bottom.
[Click image for full-sized view.]

As is nearly always the case in Windows (including 11), there’s more than one way to get things done. When one fails (or operator error leads to unwanted outcomes), another way can lead to success. My next step would be to turn to the command line, had this alternate path not led to the desired results. It’s always good to keep working at things until they get solved. That goes double when my silly mixup led to an initial lack of success.

As I learn new UIs and tools, this kind of thing happens from time to time. Call them Windows follies or funnies if you like. For me, it’s just another day, and another lesson learned, here in Windows-World!

Facebooklinkedin
Facebooklinkedin