Category Archives: Insider stuff

Might Wonky WU Presage Hardware Obsolescence

OK, then. Here’s an interesting story. After updating my 2012 vintage Lenovo X220 Tablet to Build 21327.1010 the Windows Update (WU) UI starting misbehaving. I’ve reported it to the Feedback Hub, with a screen recording to show what happens. This experience has me asking myself: might wonky WU presage hardware obsolescence?

Why Might Wonky WU Presage Hardware Obsolescence?

Built in 2012 and purchased in 2013 for a book on Windows 8, this system runs a Sandy Bridge CPU. It’s so old, it doesn’t support USB 3.0 natively (though I do have a plug-in Express Card that adds such capability). Simply put, the whole situation has me wondering if this old laptop is finally aging out of usefulness. I retired the companion system — a same vintage, same CPU T420 laptop — late last year because it was flaking out too often for everyday testing. Until this happened, the X220 Tablet remained a paragon of Windows support.

Here’s a short video (24 seconds) that shows very little, but enough for me to describe what’s wonky.

Normally, when you click the “Check for updates” button, the display changes to “Checking for updates” while the activity balls flow from left to right (and repeat until the check is complete). Next, if updates are available, the display reads “Updates available” while it installs them. When it’s done the display changes to “You’re up to date” with a timestamp to match. That final status info serves as the lead-in graphic for this story, in fact.

What Did Wonky WU Do Instead?

As you can see by playing the video, none of those display changes occur. I know the update is working because it grabbed and installed a Defender update when I tried it for the first time and that update shows under “Definition Updates” in Update History. That said, the usual animations (or status changes) that show WU is working are invisible on this PC. All that stuff works fine on my 2018 vintage Lenovo ThinkPad X380 Yoga (which has a Kaby Lake/7th Gen CPU).

Having reported the issue to MS via Feedback Hub, all I can do now is wait to see if it gets fixed. If it becomes a “new normal,” I may need to start retirement planning for my hitherto unflappable and unshakeable X220 Tablet. Sigh. That’s the way things go sometimes, here in Windows-World.

Note Added March 11, 2021

With the upgrade to Dev Channel Build 21332.1000, WU returned to “normal behavior.” But I did have to return to Advanced Sharing Settings/All Networks in the Network and Sharing Center. There, I had to turn off password protected sharing and turn on Public folder sharing. After a reboot,  RDP into the X220 Tablet worked again. This has been an on-again/off-again issue on this laptop for years. (A) it’s easily fixed locally, and (B) it seems to be a low-priority item for MS.

Finalley here’s a shout-out to Eddie Leonard (@DJ+EddieL). He told me the WU item was a known problem and would be fixed with the next build. He was spot-on, and I’m grateful.

Facebooklinkedin
Facebooklinkedin

Key Terms EKB 21h1 Reveal Next Win10 Release Coming Closer

I have to hand it to the team at Bleeping Computer, especially Lawrence Abrams. He’s done a neat and convincing bit of filesystem forensics. It shows that recent Beta Channel updates set the stage for the upcoming 21H1 Windows 10 release. In fact, he shows that key terms EKB 21h1 reveal next Win10 release coming closer to fruition. That inspired the File Explorer screencap for this story’s lead-in graphic.

Finding Key Terms EKB 21h1 Reveal Next Win10 Release Coming Closer

The string “21H1” (or “21h1” as it mostly appears in filenames) stands for the next upcoming Windows 10 release. EKB, as I learned, is the MS abbreviation for enablement package. This is a pre-staging technique for minor Windows 10 upgrades. It actually relies on updates installed prior to the official enablement of the “next upgrade” (21H1 in this case) that simply get turned on. And indeed, it’s the enablement package (EKB) that does the turning on bit.

The names of the files shown in the lead-in graphic reside in the
C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}
folder on Windows PCs running the Insider Preview Beta Channel release. To find these files, the Beta Channel image must be at Build 1904*.789 or higher. As it happens, I took the lead-in screencap on a PC running Build 19042.844

Terms of interest in the list involve:

  • Windows UpdateTargeting
  • Windows Product Data
  • EKB Package
  • EKB Wrapper Package

All of these terms identify current and upcoming versions of Windows 10, including the current version and build and its status, and the contents and handling of any current or upcoming enablement package (EKB). Most discussion I read about dates for 21H1 still suggest “May or June” as the GA date for this upcoming and minor Windows 10 feature upgrade. I see no reason to disagree with those assessments. And indeed Microsoft’s own 21H1 announcement post  doesn’t say much more than only minor changes to Windows 10 will show up when the release goes public.

We’ll just have to wait and see when 21H1 gets the nod from the Insider Team, and makes a public debut through Windows Update. Whenever that happens, though, it’s pretty clear that 21H2 is when the big changes for this year will hit Windows 10. Stay tuned!

 

 

Facebooklinkedin
Facebooklinkedin

New Windows Admin Center Makes Ignite Debut

The always-popular Windows Server management tool gets an update to version 2103 just in time for Ignite 2021. In fact, you can download yourself a new copy right away from Akamai: https://aka.ms/downloadWAC. But why should you care that a new Windows Admin Center makes Ignite debut? Keep reading, and I’ll give some reasons…

Who Cares if New Windows Admin Center Makes Ignite Debut

If you work in or around Windows environments as an admin, you should! Happily, the list of updates and enhancements to WAC (Windows Admin Center) underscores this:

  • The tool now supports IoT Edge for Linux on Windows.
  • WAC is available in preview as an Azure-based portal application.
  • Indeed, the tool itself now handles in-app updates, so it can update itself automatically, and do likewise add-ins and third-party extensions
  • Gateway proxy support is now enabled in the tool’s Proxy tab
  • Privacy settings are now easily accessible in the Diagnostic & Feedback tab (users can limit what is sent to MS)
  • Different tools within WAC can appear in individual pop-out windows.
  • Events have been substantially reworked and shows that MS is spending some development cycles on the Event Viewer. (Currently, an incomplete, preview version is available: curious users must enable/disable this facility using a UI toggle in WAC).
  • The VM tool is expanded and enhanced to boost integration services, provide editable columns and groups, and gets a new ability to edit virtual switches when making VM moves.
  • The Azure Stack HCI gets some updates, too.  Most notably,  for cluster deployment and for OEM snap-ins to let IT pros deploy and use 3rd-party extensions more quickly and easily.
  • Partners are jumping on the WAC bandwagon. These include Dell EMC OpenManager (v2.0), Lenovo XClarity Integrator, and Data ON Must Pro, among others. Indeed, this promises to be an active aftermarket.

In other words, there’s a lot of new stuff showing up in WAC. Those who already use the tool will find a lot to like. Those just getting to know the tool will find a lot to learn and understand.

WAC Resources

Video: What’s New in WAC 2103 (from Ignite)
Announcement: WAC 2103 Now Generally Available (the announcement is laden with links to more video, documentation, and training materials).
MS Docs: Windows Admin Center Overview

Actually, there’s plenty of helpful stuff on WAC online for admins. To be sure, it’s an embarrassment of riches. Still need convincing? Run this Google Search: site:docs.microsoft.com Windows Admin Center.

Facebooklinkedin
Facebooklinkedin

MS Ignite 2021 Sparks Changes Galore

There’s all kinds of incredible news and information flowing like a river from the ongoing Microsoft Ignite 2021 virtual conference. In fact, it’s underway right now. Even better,  online registration is free. Use the URL myignite.microsoft.com, where you can register or view a complete list of sessions. If you can’t attend real-time, many/most sessions will be recorded. Thus, you can  view them later on.  That said, registration is required to attend.

How Is It That MS Ignite 2021 Sparks Changes Galore?

A quick view of the Ignite Session catalog shows 384 sessions spread over its planned three-day schedule. To begin: today, March 2, is day 1. Next, tomorrow, March 3, and Thursday, March 4, are days 2 and 3.

As I write this, Satya Nadella and Alex Kipman are delivering the keynote. Also, today’s session topics include “the hybrid workplace,” in which WFH combines with access to cloud-based services and resources. Further on today’s docket: security, edge AI solutions, Azure-based enterprise solutions, and more.

For sure, those who who dig through the session catalog will find something for every interest. IMO, Ignite has spread its net widely this year. It should appeal to professionals of all kinds. Certainly, Ignite is well-known as a developer conference. But in 2021, Ignite appeals to IT across the board, including architects, operations types, and service and support pros. Shoot! Business stakeholders with interests in ROI technology boosts will also find plenty of interest here, too.

What’s at Ignite 2021 for YOU?

You can’t know until you take a look. That means opening up the session catalog, and browsing its contents. To spur your interest, here’s a peek at the top of page 2:

MS Ignite 2021 Sparks Changes Galore

A quick peek at Page 2 of the Session catalog shows sessions on Azure at work, developer innovation, speculations on mixed reality, and a wide-ranging Q&A with security experts.
[Click image for full-sized view.]

As the old saying about the lottery goes: “You can’t win if you don’t play.” For Ignite 2021, that means you can’t appreciate its wealth of offerings and learning opportunities unless you register, and dig in. Enjoy!

 

Facebooklinkedin
Facebooklinkedin

Post Dev Channel Upgrade Drill

As somebody who’s been in the Insider Program for Windows 10 since October, 2014, I’ve been through hundreds of Insider Preview installations and upgrades. That means I have a pretty well-defined drill through which I take my test PCs once an upgrade is in place. In today’s item, I’ll take you through my Post Dev Channel Upgrade drill as an illustration. That’s because I just finished upgrading to Build 21318.1000, released Friday February 19.

High-level View: Post Dev Channel Upgrade Drill

Viewed at a high level, those post Dev Channel upgrade steps might be described as follows:

    1. Check the environment, restore tweaks, make repairs
    2. Clean up post-upgrade leftovers, esp. Windows.old
    3. Perform other routine cleanups
    4. Check for and install software updates (non-Windows)
    5. Use Macrium Reflect to make a pristine image backup

In general, the idea is to make sure things are working, clean up anything left behind, catch apps and applications up with Windows, and make a snapshot to restore as this release baseline, if needed.

Step 1: Check & Restore or Repair Anything Out of Whack

YMMV tremendously during this activity. After many upgrades, I’ve jumped into File Explorer Options (Control Panel) to make file extensions visible again, show hidden files, and so forth. MS is doing a better job with this lately, and I don’t usually have to do this with Insider Preview upgrades (though it does still happen for standard feature upgrades).

For a long, long time I had to go into Advanced File Sharing to loosen “Guest or Public” and “All Network” network profiles on the Lenovo X220 Tablet to get RDP to work. Because I use RDP from my production desktop to access and work on my arsenal of test PCs, this is pretty important — to me, anyway. The last few Dev Channel releases have NOT had this problem, I’m happy to say.

I run Helmut Buhler’s excellent 8 Gadget Pack on my Windows 10 PCs. That’s because its CPU Usage and Network Meter gadgets provide helpful dashboards. The former is good for CPU and memory usage and system temps; the latter is great at showing network activity and base addressing info. Very handy. But each time an upgrade is installed, Windows 10 boots it off the desktop. Buhler has written a handy “Repair” utility that I run after each upgrade to put everything back the way it was.

Step 2: Clean up post-upgrade leftovers

You can use the built-in Disk Cleanup utility, run as admin, to take care of most of this. I personally prefer Albacore/TheBookIsClosed’s Managed Disk Cleanup (available free from GitHub). Why? Because he tweaked the UI so you can see all active controls in a single display window, and select all the stuff you want gone in a single pass. Here’s what that looks like to make it visually obvious why I prefer this tool:

Post Dev Channel Upgrade Drill.mdiskclean.exe

Notice you can see ALL options eligible for selective clean-up in a single display area in Managed Disk Cleanup. I like it!

Step 3: Perform other routine cleanups

I still use Josh Cell’s Uncleaner utility to clean up temp files and other leftovers after an upgrade. If I’m feeling ambitious I’ll run the DriverStore Explorer (RAPR.exe) to identify and remove duplicate device drivers, too. Once upon a time I would run Piriform’s CCleaner as well, but I’m less than happy with that software now that the maker has started including bundleware in the installer. I haven’t found another tool I like as much as the old version.

Step 4: Update Third-Party Software

You can use a tool like KC Softwares SuMO or Patch My PC Updater to suss out most of the items in need of update on Windows PCs. SuMO is a little better at its job but costs about US$35 for the PRO version (does automatic updates for most programs, but sometimes vexing to use). PMP Updater is free, fast, and entirely automatic but doesn’t update everything. Sigh. I use PMP Update on my test machines, and SuMO PRO on my production PC myself. I’m doing this on the theory that it’s best to have everything updated before making a pristine image backup, as I do in the next step.

Step 5: Make a Pristine Backup

With everything upgraded and updated, and all the dross cleaned up, it’s the perfect time to make a fresh image backup. I like Macrium Reflect, mostly because it’s faster and more reliable than the built-in Windows 7 Backup and Restore utility (which MS itself has recommended against since 2016). And indeed, it’s faster at backing up and restoring than most other utilities I’ve used, and also includes a bootable rescue flash drive utility you can use for bare metal and “dead boot/system” drive repair/restore scenarios.

Please note: Macrium Reflect is MUCH faster than using the rollback utility to return to a lower-level OS image from a higher-level one. That’s why I feel safe getting rid of the Windows.old folder as part of my cleanup efforts. I know I’m not going to use those files anyway…

OK then, that’s my drill. I’m sticking to it. Hopefully, you’ll find something in there to like for yourself. Cheers!

Facebooklinkedin
Facebooklinkedin

Windows 10 LTSC Lifetime Gets Halved

OK, then. It must be something in the air. I blogged here about the Long Term Servicing Channel (LTSC) version of Windows 10 about two weeks ago. And today, I just saw — courtesy of the always vigilant Mary Jo Foley (MJF) at ZDNet — that MS is cutting LTSC support life from 10 to 5 years. This starts with the next release as explained in a Windows IT Pro blog post. (See below for a key snippet.) Fore sure, the big takeway is that Windows 10 LTSC lifetime gets halved, as of 21H2.

Why Windows 10 LTSC Lifetime Gets Halved?

The best answers for inevitable follow-on questions appear in a quote from the aforementioned blog post. Here ’tis:

Today we are announcing that the next version of Windows 10 Enterprise LTSC and Windows 10 IoT Enterprise LTSC will be released in the second half (H2) of calendar year 2021. Windows 10 Client LTSC will change to a 5-year lifecycle, aligning with the changes to the next perpetual version of Office. This change addresses the needs of the same regulated and restricted scenarios and devices. Note that Windows 10 IoT Enterprise LTSC is maintaining the 10-year support lifecycle; this change is only being announced for Office LTSC and Windows 10 Enterprise LTSC. You can read more about the Windows 10 IoT Enterprise LTSC announcement on the Windows IoT blog.

Two important take-aways:

1. Happily, this change synchronizes Windows 10 Enterprise LTSC and Office LTSC release timing.

2. Even better, Windows 10 IoT Enterprise LTSC is NOT affected. It stays on a 10-year schedule.

Apparently MS understands full well that, once deployed, IoT devices are best left alone as long as possible. Happily, Windows 10 Enterprise LTSC and Office LTSC are synching up, because they’re likely used in tandem. Thus, both benefit from the same release cycle. In most cases, five years is in keeping with typical technology refresh cycles (which usually run 5-7 years).

Plus çe change…

The complete French aphorism translates “The more things change, the more they stay the same.” Indeed, it seems that MS isn’t afraid to tweak long-term servicing options, to better meet customer needs. My guess: making customers upgrade LTSC Office without upgrading the OS  simultaneously could be less than helpful. Therefore, it makes sense that MS would synch things up where the two are likely used together.

On another front, MJF and I both see a bit of ‘suasion possibly at work in this change. Here’s what she says on this in her story:

Microsoft execs have tried to dissuade customers from using LTSC versions of Windows 10 as a way to avoid regular feature updates. (More than a few customers do this.) They’ve emphasized that the intent of LTSC releases is to support mission-critical systems that can’t or shouldn’t get regular updates.

In today’s blog post, officials said they also found that many customers who installed LTSC versions for their information worker desktops “found that they do not require the full 10-year lifecycle.”

Given that the typical refresh cycle is less than 10 years, I’d have so say “No kidding!” to her final observation. I concur!

Facebooklinkedin
Facebooklinkedin

21H1 Hits Beta Preview Channel

The lead-in graphic for this story shows some big news. That is, the Feature update to Windows 10, Version 21H1 is now available. This applies to Windows Insiders in the Beta Insider Preview channel, I hasten to add. And indeed, the foregoing item showed up on my Beta Channel test machine this morning. Hence the proclamation that 21H1 hits Beta Preview channel.

When 21H1 Hits Beta Preview Channel, Then What?

There are two kinds of implications for this occurrence. One is technical, and the other is a matter of historical analysis and implication. On the technical front, this means that the upcoming 21H1 is more or less locked down. That is, what we see in this preview release is also pretty much everything we’ll see in any upcoming public release. On the historical front, public releases typically have followed previews somewhere from 4 to 6 weeks after the preview appears. That puts initial public release of 21H1 somewhere between March 18 and April 1, by my reckoning.

Upon reflection, I kind of like an April 1 date (April Fool’s Day).

The Beta Channel Upgrade Experience

The screencap you see at the head of this story is the one that appeared on my Beta Channel test PC. For up-to-date Beta Channel PCs, this update is undoubtedly an enablement package that simply turns on features already present in the Insider Preview OS.

Why say “enablement package?” I say that because it completed the pre-reboot portion of the install in under two minutes on a Surface Pro 3 (vintage 2014) machine. The “Working on Updates” portion was pretty speedy, too (less than a minute). And the post-reboot drill took about 30 seconds (just a hair slower than a normal rebooot, in other words).  You won’t have to spend much time twiddling your thumbs while waiting for this “feature upgrade” to install!

I’m jazzed to understand that 21H1 is in the offing, and should be making its way into public release somewhat sooner than I’d expected. My congrats and thanks to the #WindowsInsiders team in general. Take a read of Brandon Leblanc’s Announcement post for more Insider info.

Facebooklinkedin
Facebooklinkedin

SetupDiag.exe Unveils Upgrade Gotchas

If you read this blog, you already know I finally got my Lenovo X380 Yoga upgraded to 21313 earlier this week. I’d been fighting a bugcheck error for the two prior Dev Channel upgrades before that. Along the way, I found myself  looking for diagnositic info about the failed upgrade.  A Microsoft tool SetupDiag.exe unveils upgrade gotchas, so I started using it. With this post, I want to shed more light on this nice little tool, based on recent experience.

How SetupDiag.exe Unveils Upgrade Gotchas

The program is a log analysis tool that focuses on Windows Setup log files. As the MS Docs page for SetupDiag says:

It attempts to parse these log files to determine the root cause of a failure to update or upgrade the computer to Windows 10. SetupDiag can be run on the computer that failed to update, or you can export logs from the computer to another location and run SetupDiag in offline mode.

That latter offline capability is nice, because it means you can boot an otherwise unbootable machine using rescue media. Once booted, you can then suck the files you need from the problem PC and analyze them on a working machine instead.

Note 1: consider bookmarking the already-quoted MS Docs page. It includes an always-current download link to the latest SetupDiag.exe version. (V160 is current as of Feb 17, 2021 only.)

Note 2: SetupDiag.exe requires .NET Framework 4.6 (or newer). See this WindowsCentral story for multiple .NETversion check methods  in PowerShell (3) or Cmd.exe (1).

Working with SetupDiag.exe

Starting with Windows 10 2004, SetupDiag.exe is included with Windows Setup on Windows 10 ISOs and other install images. Paraphrasing the MS Docs item, it says:

During the upgrade process, Windows Setup extracts its sources files to a directory named %SystemDrive%$Windows.~bt\Sources . With Windows 10, version 2004 and later, setupdiag.exe is also installed to this directory. If there is an issue with the upgrade, SetupDiag will automatically run to determine the cause of the failure.

Thus, so long as you don’t clean up after an attempted upgrade, you’ll find SetupDiag.exe in the afore-cited directory. Grab a copy and put it somewhere else, if you’d like.

Simply search your PC for SetupDiag.exe. Once found, you can run the program from Explorer, in PowerShell, at the Command Prompt, or via the run command.

Reading the Results

SetupDiag.exe writes its results in a file named SetupDiagResults.log. By default, it appeared in my download folder
(C:\Users\<uname>\Downloads).
I found it easily, because I use Voidtools Everything to locate files on my behalf. It’s how I got the details on my bugcheck error code. It reads 0X0000000A therein, but may appear as 0XA in discussions online. When I got the GSOD the error identified itself in the report window as IRQ_NOT_LESS_OR_EQUAL…

The lead-in graphic for this story shows the log file. The area of interest starts mid-way down in a line that reads: “Found crash information in rollback log.” That’s where the bugcheck code appears. Also, “nt” appears as the responsible driver. This, alas, is a built-in OS driver. Mere users cannot uninstall or update it. (That’s a Microsoft internal thing dontcha know?) It’s what convinced me that waiting for an upgrade from MS was the ultimate (and only) fix avaialble.

 

Facebooklinkedin
Facebooklinkedin

Dev Channel Build 21313 Fixes Bugcheck Error

On February 2, I posted a tale of woe here. It explained that I wasn’t able to update my Lenovo X380 Yoga past 21296. Each attempt to upgrade to 21301 failed at around 50% complete after the first reboot. And although error messsages did vary once or twice most of the time it threw an IRQL_NOT_LESS_OR_EQUAL bugcheck error. None of my usual troubleshooting techniques afforded any relief, either. Then I got the word from a contact on the Insider Team: this was a known bug, and a fix should be coming “soon.” That’s why I’m pleased to report that Dev Channel Build 21313 fixes bugcheck error just described. It appears number one in the list of fixes shown in lead-in graphic, in fact.

Proof That Dev Channel Build 21313 Fixes Bugcheck Error

I tackled the upgrade on Friday afternoon, February 12. I could only hope for the best. But soon enough, my hopes were rewarded with a complete and successful installation. I always fret when I have to hang back from the leading edge of releases on any of my PCs. That’s because, as a Windows Insider, I take my commitment to keep up with new releases seriously. So again, I’m happy to be back in the high life again (with apologies to Stevie Winwood).

Proof Positive That Feedback Hub Is Working

When the Insider Team contacted me, they made it clear that (a) I was not alone in reporting this problem, and (b) that ongoing repair efforts were underway with a fix in their sights. My benefactor was very clear about asserting that a fix was coming, but might or might not make its way into the next Dev Channel update.

In fact, the Insider Team skipped its usual Wednesday Dev Channel flight on February 3. Then, it didn’t get a flight out last week until Friday, February 12. This is reportedly in the interests of quality and providing needed fixes. All I can say is that, as far as I’m concerned, those reports are on the money. They fixed what ailed my X380 and I’m glad to say “Thanks, Insider Team! Good work.”

Facebooklinkedin
Facebooklinkedin

19043 aka 20H1 Early Tryout How-to

Here’s an interesting experiment for those with a spare test machine handy.  Note that this machine must run Insider Preview Beta or Release Preview Channel Build 19042.782 with KB4598291 installed. I found a handy collection of DISM commands from poster “moinmoin” at DeskModder.de. If run in an administrative Command Prompt or PowerShell session, the PC will advance to 21H1, as shown in the lead-in graphic for this story. It serves, therefore, as a 19043 aka 20H1 early tryout how-to for adventurous insiders.

Working Through 19043 aka 20H1 Early Tryout How-to

Essentially, the following sequence of commands does piecemeal what a full-blown enablement package does behind the scenes. In fact, DISM runs a series of .mum files, which are XML files that provide instructions to the Windows Update Installer for performing specific updates. Honestly, I’m not sure how “moinmoin” figured this sequence out. I’m guesssing he worked from analysis of other, earlier enablement packages. But that sequence worked on my Lenovo X380 Yoga test machine, which had been running 19042.782 for a few days.

Please, look below for the sequence of commands. Warning: Those using German versions of Windows should get them from the original post. I’ll provide instructions on how to modify the command text for other languages afterward. It’s safe to assemble, then cut’n’paste these commands one at a time in PowerShell. That’s how I “upgraded” my Lenovo test PC, in fact.

Putting DISM Commands together

In fact, all these commands start with same master prefix string. Simply append the other sub-strings and fire them off at the command line to do your thing.

That master prefix string is:

Dism /Online /Add-package:C:\Windows\servicing\Packages\

The 8 suffix strings are (do not grab the numbers and the period that follows them — they’re to help you find stuff, not for command-line use):

1.microsoft-windows-product-data-21h1-ekb-package~31bf3856ad364e35~amd64~~10.0.19041.782.mum
2.microsoft-windows-product-data-21h1-ekb-package~31bf3856ad364e35~amd64~en-US~10.0.19041.782.mum
3.microsoft-windows-product-data-21h1-ekb-wrapper-package~31bf3856ad364e35~amd64~~10.0.19041.782.mum
4.microsoft-windows-product-data-21h1-ekb-wrapper-package~31bf3856ad364e35~amd64~en-US~10.0.19041.782.mum
5.microsoft-windows-updatetargeting-clientos-21h1-ekb-package~31bf3856ad364e35~amd64~~10.0.19041.782.mum
6.microsoft-windows-updatetargeting-clientos-21h1-ekb-package~31bf3856ad364e35~amd64~en-US~10.0.19041.782.mum
7.microsoft-windows-updatetargeting-clientos-21h1-ekb-wrapper-package~31bf3856ad364e35~amd64~~10.0.19041.782.mum
8.microsoft-windows-updatetargeting-clientos-21h1-ekb-wrapper-package~31bf3856ad364e35~amd64~en-US~10.0.19041.782.mum

Even for German (and other languages) the first command above stays the same. The German version of the second command above reads

Dism /Online /Add-package:C:\Windows\servicing\Packages\microsoft-windows-product-data-21h1-ekb-package~31bf3856ad364e35~amd64~de-DE~10.0.19041.782.mum

Note that the bolded language code for German German de-DE is embedded near the end of the string. To invoke the proper files for other languages substitute your language code where it appears. For example, a French speaker in France would use fr-FR, and a French speaker in Belgium fr-BE, and so forth. This applies to elements 2-8 for all languages, and is performed using string substitution on the German language version of the commands.

Necessary Precautions Beforehand

It’s probably wise to make a backup of your test PC’s OS image before you try this sequence of commands out. Also, make sure you have a working, bootable USB flash drive from which you can restore that backup. That way, should the worst happen, and your PC get bricked by the updates, you can boot to the UFD and restore the backup without too much muss, fuss, or lost time. Just because it worked on my Lenovo X380 Yoga doesn’t mean it will also work on your test PC. Better to have the backup and restore tools and not need them, than to not have them and suffer from their absence. Enjoy!

Facebooklinkedin
Facebooklinkedin