automatic update

Winsage
March 25, 2026
Microsoft is changing its update management policy for the Windows operating system to give users more control over when and how updates are installed. This shift comes after years of user dissatisfaction with the automatic update model implemented in 2015, which often led to unexpected system restarts and disruptions. The new policy allows users to pause updates indefinitely and choose when to install them, improving predictability and convenience. Additionally, Microsoft plans to enhance transparency by providing detailed notifications about updates before installation. While users generally welcome these changes, experts warn that delaying updates could increase vulnerability to cyber threats. Microsoft is also refining Windows 11 to improve speed and user interface, including updates to the integration of Copilot and restoring taskbar customization options.
AppWizard
March 2, 2026
Google has released its standalone Now Playing app, previously a feature for Pixel phone users, now available on the Google Play Store. The app identifies music playing nearby and displays the information on the lock screen, featuring a user-friendly interface. It includes a Now Playing history section for managing previously identified songs and integrates with various music services. Some users experienced a prompt for an automatic update before accessing the app, while others successfully accessed the settings page. The app also offers Day and Time filters for history searches.
Tech Optimizer
February 1, 2026
eScan, an antivirus solution, has become a conduit for a supply chain attack that may have affected millions of users through a compromised software update mechanism. The attack exploited eScan’s automatic update system, distributing malware via official channels that appeared legitimate, thus bypassing traditional security measures. Reports indicate that supply chain attacks have increased by over 300% in the past three years, with software update mechanisms being prime targets. The exact number of affected users is still under investigation, but the breach occurred over a limited period before detection. Enterprises using eScan now face vulnerabilities in their security infrastructure, prompting IT departments to conduct forensic analyses to determine if their networks were compromised. The breach raises concerns about digital security as users typically rely on antivirus solutions for protection. Researchers found that the malware used advanced techniques, including multi-stage deployment and polymorphic behavior to evade detection, indicating significant resources behind the attack. In response, eScan has initiated an incident response protocol, revoked compromised digital certificates, and added verification layers to its update system. However, restoring user trust will require transparency about the breach and preventive measures. The incident has led to widespread security audits across the antivirus sector and may accelerate the adoption of zero-trust security models. Regulatory inquiries are underway regarding eScan's data protection practices, and legal experts anticipate class-action lawsuits from affected users and enterprises. The breach highlights a trend where attackers target security infrastructure itself, making software distribution security a critical focus for cybersecurity professionals. Proposed solutions include blockchain-based verification systems and industry-wide standards for supply chain security. The eScan breach underscores that no organization is immune to sophisticated supply chain attacks, as compromising a security vendor can provide access to its entire customer base. Increased information sharing about supply chain threats is advocated to enhance collaboration within the security industry. Moving forward, eScan must balance technical remediation with transparent communication to rebuild trust, while users are advised to implement defense-in-depth strategies rather than relying solely on one security tool.
Tech Optimizer
January 30, 2026
Avast's automatic update system was compromised, allowing malicious code to be distributed through its official channels, affecting potentially millions of users. This breach is characterized as a sophisticated supply chain attack, which exploited the software update mechanism, making it difficult to detect as the malware appeared legitimate. Security analysts noted a 300% increase in supply chain attacks over the past three years, with this incident highlighting vulnerabilities in security solutions. Avast has initiated an incident response, revoked compromised digital certificates, and is collaborating with cybersecurity firms to address the breach. European regulators have begun inquiries into Avast's data protection measures, and legal experts anticipate class-action lawsuits from affected users. The incident underscores a trend of attackers targeting security infrastructure itself, prompting calls for improved software distribution security and industry-wide standards.
Winsage
January 13, 2026
Microsoft is enhancing security for Windows 11 24H2 and 25H2 users by automatically replacing expiring Secure Boot certificates on eligible devices. Secure Boot protects against malicious software by ensuring only trusted bootloaders are executed during startup. Many Secure Boot certificates are set to expire starting in June 2026, which could jeopardize secure booting capabilities if not updated. The update includes a mechanism to identify devices eligible for automatic receipt of new Secure Boot certificates. IT administrators are advised to install the new certificates to maintain Secure Boot functionality and prevent loss of security updates. Organizations can also deploy Secure Boot certificates through various methods. IT administrators should inventory their devices, verify Secure Boot status, and apply necessary firmware updates before installing Microsoft's certificate updates.
Winsage
January 9, 2026
Many users are frustrated with Microsoft's management of Windows updates, which can disrupt workflows during critical tasks. While completely disabling updates poses security risks, users can modify the Windows Registry to regain control. To prevent automatic downloading and installation of updates, users can create a key in the Registry at HKEYLOCALMACHINESOFTWAREPoliciesMicrosoftWindows, naming it WindowsUpdate, and then create another key named AU. A DWORD value named AUOptions can be set to 2 to prompt for permission before updates. To stop automatic restarts during logged-in sessions, users can navigate to HKEYLOCALMACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdateAU and create a DWORD value named NoAutoRebootWithLoggedOnUsers, setting its value to 1. To lock Windows to a specific version and avoid feature upgrades, users can access HKEYLOCALMACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdate and create a DWORD value named TargetReleaseVersion set to 1, along with two String values: ProductVersion for the current version and TargetReleaseVersionInfo for the desired version. To prevent automatic driver updates, users can go to HKEYLOCALMACHINESOFTWAREPoliciesMicrosoftWindowsWindowsUpdate and create a DWORD value named ExcludeWUDriversInQualityUpdate, setting its value to 1. To extend the pause limit for updates beyond five weeks, users can access HKEYLOCALMACHINESOFTWAREMicrosoftWindowsUpdateUXSettings and create a DWORD value named FlightSettingsMaxPauseDays, setting its value to 365 or any preferred duration. These modifications allow for greater control over Windows updates, although emergency updates may still occur.
Winsage
November 19, 2025
Microsoft is enhancing the recovery capabilities of Windows 11 with a suite of tools aimed at simplifying device restoration for IT administrators. The Point-in-Time Restore feature allows administrators to revert a device to a previous state, currently available in preview mode in Windows Insider builds. The Quick Machine Recovery (QMR) system, refined since its August launch, helps restore functionality to multiple devices experiencing boot failures and will soon include direct networking support and Autopatch QMR management for automatic update handling. The Intune remote recovery feature provides insights into when a managed PC enters recovery mode, allowing for remote script deployment and fixes, and has been expanded to include Windows Server virtual machines via the Azure Portal. The Cloud Rebuild function enables administrators to rebuild devices that cannot be repaired conventionally by downloading fresh installation media and restoring settings and data using OneDrive and Windows Backup for Organizations, with Autopilot applying necessary enrollment and policies.
Winsage
October 22, 2025
Windows 11 users are now required to have applications from the Microsoft Store update automatically, with the option to postpone updates for a limited time. Microsoft has removed the ability for users to opt-out of these automatic updates to enhance security and ensure timely application of patches and improvements. This change has been noted in discussions on platforms like Reddit and aims to protect users from vulnerabilities. While this decision may streamline security, it raises concerns about user autonomy, particularly for those on mobile connections or who prefer older app versions. The automatic update policy only applies to Microsoft Store apps; other applications still require manual updates.
Winsage
October 15, 2025
Free support for Windows 10 ended at midnight on Wednesday, affecting around 400 million computers that cannot upgrade to Windows 11. This has raised environmental concerns about increased electronic waste, as many unsupported devices may end up in landfills. Microsoft will no longer provide free software updates, technical assistance, or security fixes for Windows 10, prompting concerns for businesses and institutions that rely on these systems. Over 42 percent of Windows users still use Windows 10, and the decision to discontinue support has been criticized as perplexing. Microsoft continues to offer security updates for a fee, raising questions about corporate responsibility. Consumer rights group PIRG has initiated a campaign urging Microsoft to reconsider its decision, citing a precedent where Google extended support for Chromebooks after advocacy efforts.
Winsage
July 26, 2025
Microsoft has indicated that the release of Windows 11 25H2 is expected between October and November, although an official announcement has not yet been made. The company has lifted an update block that previously prevented the Windows 11 24H2 update from appearing for certain PCs, allowing more devices to become eligible for the update. The Windows 11 24H2 update was made accessible to all users in May, except for those under a "Compatibility hold" due to performance instability issues, particularly affecting PCs with Intel's Alder Lake processors or those using Easy Anti-Cheat software. The recent removal of the compatibility hold allows Alder Lake+ PCs to download and install the 24H2 update, but some devices may still face other compatibility holds. Users are advised to wait for Microsoft to remove these blocks instead of attempting manual installations. Additionally, some Alder Lake+ PCs may need to update Easy Anti-Cheat to install the 24H2 update, which can be triggered by launching a frequently played game. While progress has been made in resolving these issues, not all update blocks have been lifted, and the timeline for removing the remaining compatibility holds is uncertain.
Search