Skip to content

Windows Hotpatch Goes Default in May 2026

Starting with the May 2026 Windows security update, Microsoft is enabling hotpatch updates by default for all eligible Intune-managed Windows devices. This is a significant shift in how enterprise patch management works – previously, hotpatch was an opt-in feature. Now it becomes the standard behavior unless administrators actively opt out.

The core promise is compelling, security fixes applied without waiting for a device restart. Microsoft’s own data shows this approach can cut the time to reach 90% patch compliance across a fleet by half. For organizations managing hundreds or thousands of endpoints, that is a meaningful reduction in the exposure window between vulnerability disclosure and remediation.

But this is not a seamless, zero-risk change. Hotpatch operates differently from traditional monthly cumulative updates, and understanding those differences is essential before May 11, 2026 – the date the first default hotpatch deployment begins.

Hotpatch is not a replacement for Windows monthly updates – it is a layered delivery mechanism that operates within a structured quarterly cadence. Understanding this cadence is critical to understanding what hotpatch does and does not do:

Month TypeUpdate TypeWhat Happens
Jan / Apr / Jul / OctBASELINEFull cumulative update – RESTART REQUIRED. This establishes the new baseline from which hotpatches are layered. All devices must be on the current baseline to receive hotpatch in subsequent months.
Feb / Mar / May / Jun / Aug / Sep / Nov / DecHOTPATCHSecurity-only update applied in memory on top of the running baseline. NO RESTART required. Takes effect immediately after installation on eligible devices.

This means that every quarter, devices still require one restart to install the new baseline. Hotpatch then allows the following two months to receive security fixes without interrupting users. It is not a world with zero reboots – it is a world with fewer reboots, strategically scheduled.

Hotpatch works by patching code that is already loaded into memory on a running system. When a hotpatch is applied, Windows loads the patched code as a memory overlay without touching the binary files on disk. The original files on disk remain unchanged – only the in-memory execution paths are updated.

This is why a restart is eventually required after the quarterly baseline: the on-disk binaries need to be synchronized with the patched state. Until that baseline restart happens, there is a known divergence between what is running in memory and what exists on disk – a detail that has real implications for recovery scenarios (covered in Section 5).

Hotpatch is not universal. Devices must meet all of the following prerequisites to receive hotpatch updates. Devices that do not meet these requirements continue on the traditional cumulative update cadence – no restart-free patching, no change in behavior:

PrerequisiteDetails
Windows EditionWindows 11 Enterprise, Education, or Enterprise LTSC 2024. NOT available on Windows 11 Pro, Home, or Windows 10.
OS VersionWindows 11 24H2 or 25H2 for full hotpatch support on client devices. Earlier versions have limited or no support.
Virtualization-Based Security (VBS)Must be enabled. VBS is required for the memory patching mechanism hotpatch relies on. Devices with VBS disabled receive traditional LCU updates.
ManagementDevice must be managed via Microsoft Intune or Windows Autopatch (via Microsoft Graph API). On-premises WSUS or ConfigMgr alone do not support hotpatch.
Current BaselineDevice must have the current quarterly baseline installed. For May 2026 hotpatch, the April 2026 baseline (restart required) must be installed first.
LicensingRequires Microsoft 365 E3/E5, Windows Enterprise E3/E5, or equivalent. Previously this was tied to higher-tier licensing; Windows Pro devices are excluded.

The hotpatch setting is configured through a Windows quality update policy in Intune. As shown in the screenshots, the policy is straightforward – a single toggle under Automatic update deployment settings:

Intune Admin Center > Devices > Manage updates > Windows updates > Quality updates tab

Create > Windows quality update policy

Setting: ‘When available, apply without restarting the device (hotpatch)’ = Allow

The policy we created and tested (shown in screenshots) has the following configuration:

Created: December 17, 2024 – proactively deployed ahead of the May 2026 default rollout

Policy Name: Hotpatch

Setting — Apply latest cumulative quality updates for security: Allow

Setting — When available, apply without restarting the device (hotpatch): Allow

Scope Tags: Default

Why We Created This Policy Early Microsoft announced the May 2026 default enablement of hotpatch in March 2026 and made tenant-level controls available April 1, 2026. By creating and testing a quality update policy before this date, devices assigned to our policy honour our explicit configuration rather than falling back to the tenant default. This is the recommended approach – policy-level settings always override the tenant default in Windows Autopatch.

The May 2026 change introduces a two-tier configuration model that administrators must understand:

LevelWhere to ConfigureScope / Behavior
Tenant Default (NEW)Intune > Tenant administration > Windows Autopatch > Tenant management > Tenant settingsApplies to all eligible devices NOT already assigned to a quality update policy. Defaults to Allow from May 2026.
Quality Update Policy (Override)Intune > Devices > Manage updates > Windows updates > Quality updatesApplies to specific Entra ID device groups. OVERRIDES the tenant default for those devices. Can be Allow or Block per group.

The practical implication: devices with no quality update policy assigned will start receiving hotpatch updates in May 2026 automatically. Devices assigned to a quality update policy with hotpatch explicitly set to Block will not – regardless of the tenant default.

For organizations not ready for the May 2026 default, Microsoft provides clear opt-out paths. The tenant-level toggle went live April 1, 2026:

Tenant-Wide Opt-Out

  1. Open the Intune Admin Center (intune.microsoft.com)
  2. Navigate to: Tenant administration > Windows Autopatch > Tenant management
  3. Select the Tenant settings tab
  4. Toggle ‘When available, apply updates without restarting the device (hotpatch)’ to Block

  Per-Group Opt-Out (Policy Level)

  1. Navigate to: Devices > Manage updates > Windows updates > Quality updates tab
  2. Create or edit a quality update policy
  3. Set ‘When available, apply without restarting the device (hotpatch)’ to Block
  4. Assign the policy to the specific Entra ID device group(s) requiring the opt-out

Recommendation: Use Policy-Level Control Over Tenant Default Even if you plan to allow hotpatch across your fleet, creating explicit quality update policies for your device groups is better practice than relying on the tenant default. It gives you per-group control, makes your configuration auditable, and means future default changes by Microsoft will not silently alter your managed devices’ behaviour.

Monitoring Hotpatch Deployment Status

The primary monitoring tool for hotpatch in Intune is the Hotpatch quality updates report. Review this before the May 11 deployment date:

Intune Admin Center > Reports > Windows quality updates > Hotpatch quality updates report

  • Hotpatch ready column: Shows which devices have hotpatch enabled AND meet all prerequisites. These will receive the May update without a restart.
  • Hotpatched column: Devices that have already successfully received a hotpatch update.
  • Hotpatch Readiness (in Quality update status report): Per-device indicator of whether prerequisites are met.
  • Hotpatch enabled column (new): Added to show the per-device hotpatch enablement status – check this after May 12.

Device side – Hotpatch Status

Intune Admin Reports

Before the first default hotpatch deployment runs, validate the following for your fleet:

  • Inventory devices by OS version and edition – confirm which are on W11 Enterprise 24H2/25H2 (hotpatch-eligible) vs. everything else.
  • Check VBS status – devices with VBS disabled will fall back to traditional LCU. If VBS is disabled for a reason (hardware compatibility, performance), ensure those devices are in a policy set to Block.
  • Confirm April 2026 baseline is installed on pilot devices – the April LCU is the baseline for May hotpatch. Devices not on the April baseline will receive it first (with restart) before hotpatch can apply.
  • Review quality update policy assignments – any device not assigned to a policy is governed by the tenant default. Audit for ungrouped devices.

Known Issues – Read This Before Enabling Fleet-Wide

Microsoft’s default-on approach for hotpatch is operationally significant precisely because it is no longer something only sophisticated early adopters configure. When an update mechanism becomes the default, its failure modes affect everyone. Two specific issues are worth detailed attention.

What Happens

When a user or IT admin initiates a device reset on an affected system, the reset process launches Windows Recovery Environment (WinRE) but does not complete. The device reboots back to the desktop displaying, ‘There was a problem resetting your PC. No changes were made.’ No data is lost, but the reset fails entirely.

The root cause is the divergence between the in-memory patched state and the on-disk binary files that WinRE references during the reset process. Hotpatch updates the running kernel in memory without updating the files on disk. When WinRE tries to rebuild the OS from the on-disk files, it encounters a mismatch that causes the failure.

Why This Matters for Enterprises

Push Button Reset is not just a user convenience feature. For enterprise IT teams, it is a critical recovery mechanism used in the following scenarios:

  • Remote wipe via Intune (Fresh Start / RemoteWipe CSP) when a device is lost, stolen, or being repurposed.
  • Autopilot reset – re-enrolling a device without physical access.
  • Helpdesk-initiated factory reset when troubleshooting persistent issues.
  • End-user self-service reset when a device is non-functional.

If reset fails silently, the device remains enrolled in Intune, BitLocker keys and LAPS passwords may have already been rotated or deleted, and the device is left in an unmanaged or partially wiped state – creating both a security and operational problem.

The Fix – KB5079471

Microsoft has provided a resolution via the March Safe OS Dynamic Update (KB5079471). This update patches WinRE to align with the hotpatched system state, restoring reset functionality. Key details:

  • The fix is a one-time application: KB5079471 only needs to be installed once per device.
  • It targets the recovery environment, not the OS: This is a Safe OS Dynamic Update – it updates WinRE, not Windows itself.
  • Delivery: IT administrators can deploy KB5079471 to managed devices via Intune (as a Windows Update for Business supplement or via PowerShell/SCCM).
  • April 2026 cumulative update: The April 14, 2026 cumulative update (KB5083769) also addresses this reset issue directly – devices that have installed the April baseline are remediated.

Issue 2 – Secure Boot Certificate Updates and Hotpatch

There is an important and often overlooked intersection between the hotpatch update cadence and the Secure Boot CA 2023 certificate deployment that all organizations are also managing ahead of the June 2026 certificate expiry.

The Problem

Hotpatch months are security-only updates built on top of the current baseline. They do not include the same breadth of servicing data as a full monthly cumulative update. Specifically, the February 2026 hotpatch release notes do NOT include the Secure Boot device targeting changes that the regular February 2026 cumulative update carried. This means that a device that received February’s security fix via hotpatch may not have received the Secure Boot certificate rollout eligibility data that month.

The Secure Boot certificate update process relies on specific cumulative updates to identify which devices are ready (high confidence devices) for automatic certificate enrollment. If a device skips those full LCU months due to hotpatching, the Secure Boot rollout may progress more slowly or not at all on those devices.

Why This Matters Right Now

This convergence of timelines is not trivial:

  • The June 2026 Windows UEFI CA 2011 certificate expiry creates a hard deadline for all managed devices to receive the Windows UEFI CA 2023 update.
  • The April 2026 baseline is the key Secure Boot checkpoint month – Microsoft has identified April as a critical baseline moment for Secure Boot certificate targeting.
  • Devices that receive the April 2026 baseline (restart required) are well-positioned for Secure Boot certificate enrollment.
  • Devices that then switch to hotpatch-only months (May, June) may miss further Secure Boot targeting updates if those are bundled in full LCUs only.

Issue 3 – BitLocker Recovery Trigger After April Baseline + Secure Boot

The April 14, 2026 cumulative update (KB5083769) introduced a specific scenario where some devices may enter BitLocker recovery mode after installation, related to the Secure Boot boot manager update. This occurs on devices where:

  • msinfo32.exe shows Secure Boot State PCR7 Binding as ‘Not Possible’
  • The Windows UEFI CA 2023 certificate is present in the device’s Secure Boot DB

The device has not yet updated to the 2023-signed Windows Boot Manager

When Windows updates the Boot Manager to the 2023-signed version (part of the Secure Boot certificate deployment), BitLocker’s PCR7 measurement changes, triggering recovery mode. This is a one-time event – subsequent reboots after entering the recovery key will not re-trigger it, provided group policy configuration remains unchanged.

  • Mitigation before deployment: Audit BitLocker group policies for explicit PCR7 inclusion and check msinfo32.exe for PCR7 binding status on test devices before broad deployment.
  • Available KIR: A Known Issue Rollback is available from Microsoft Support for organizations that cannot audit group policies before the update – this prevents the automatic Boot Manager switch, avoiding the BitLocker trigger.

Recommended Deployment Strategy

  Phase 1 – Prepare (Now, Before May 11)

  • Audit your fleet: identify all devices on W11 Enterprise 24H2/25H2 – these are hotpatch-eligible.
  • Check VBS status across the fleet using Intune device reports or PowerShell.
  • Verify all eligible devices have the April 2026 baseline installed (or will have it before May 11).
  • Deploy KB5079471 (Safe OS Dynamic Update) to all hotpatch-eligible devices to pre-remediate the Reset This PC issue.
  • Review Secure Boot certificate deployment status – ensure UEFICA2023Status is progressing.
  • Audit for devices with PCR7 binding issues if deploying Secure Boot + hotpatch simultaneously.
  • Create explicit quality update policies for your device groups – do not rely solely on the tenant default.

  Phase 2 – Pilot (First Two Weeks of May)

  • Assign a pilot group to your hotpatch quality update policy (Allow). Include varied hardware, apps, and user profiles.
  • Monitor the Hotpatch quality updates report daily. Check Hotpatch ready and Hotpatched columns.
  • Test Push Button Reset on at least one pilot device after hotpatch installs.
  • Verify no unexpected application compatibility issues or boot failures.
  • Check UEFICA2023Status has not stalled on hotpatch devices.

  Phase 3 – Broad Rollout

  • After pilot validation, expand quality update policy assignment to the full eligible fleet.
  • Maintain a Block policy for devices where reset functionality cannot be validated (e.g., imaging-critical devices).
  • Update helpdesk documentation with hotpatch-specific troubleshooting steps.
  • Set calendar reminder for July 2026 baseline month – devices will require a restart again.

Quick Reference – Hotpatch Eligibility and Behaviour

ScenarioHotpatch?What Happens
W11 Enterprise 24H2, VBS on, April baseline installedYESReceives May security update in memory. No restart. Most users never notice.
W11 Enterprise 24H2, VBS offNOFalls back to traditional LCU. Restart required as normal.
W11 Pro (any version)NOPro edition is not eligible. Traditional LCU path only.
W11 Enterprise, NOT on April 2026 baselineBASELINE FIRSTWindows installs April baseline first (restart required), then hotpatch on top.
Device assigned to Block policyNORespects policy override. Traditional LCU path. Restart required.
Device not in any quality update policy (tenant default)YES (from May 2026)Receives hotpatch per tenant default. No explicit opt-in required after May 2026.
Quarterly baseline month (Jan/Apr/Jul/Oct)RESTARTAll devices, including hotpatch-enabled, require a restart for the quarterly baseline.

References

ResourceURL
Hotpatch Default Enablement Announcement (Tech Community)https://techcommunity.microsoft.com/blog/windows-itpro-blog/securing-devices-faster-with-hotpatch-updates-on-by-default/4500066
Known Issues: Hotpatch Reset This PC Problemhttps://support.microsoft.com/en-us/topic/february-10-2026-hotpatch-kb5077212-os-builds-26200-7781-and-26100-7781-722c74c5-ea30-4622-8436-6b8dcb975b2b
Microsoft Confirms Reset Failure KB5077212/KB5079420https://support.microsoft.com/en-us/topic/february-10-2026-hotpatch-kb5077212-os-builds-26200-7781-and-26100-7781-722c74c5-ea30-4622-8436-6b8dcb975b2b
April 2026 CU — Fixes Reset Issue (KB5083769)https://support.microsoft.com/kb/5083769
Intune Hotpatch Quality Updates Reporthttps://learn.microsoft.com/intune/intune-service/protect/windows-update-reports#hotpatch-quality-updates-report
Message Center MC1248388 — Hotpatch Default Changehttps://techcommunity.microsoft.com/blog/windows-itpro-blog/securing-devices-faster-with-hotpatch-updates-on-by-default/4500066__
Secure Boot CA 2023 Deployment Guide (our blog)See our Secure Boot Intune Deployment Guide – internal reference

Leave a Reply

Your email address will not be published. Required fields are marked *