{"id":16499,"date":"2020-10-30T00:12:00","date_gmt":"2020-10-29T23:12:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=16499"},"modified":"2020-10-29T19:39:17","modified_gmt":"2020-10-29T18:39:17","slug":"windows-10-upgrade-sperre-deaktivieren","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/10\/30\/windows-10-upgrade-sperre-deaktivieren\/","title":{"rendered":"Windows 10: Deactivate Safeguard holds (blocked Upgrades)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/win102.jpg\" width=\"58\" align=\"left\" height=\"58\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=237065\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]In Windows 10, Group Policy can be used to disable upgrade blocks (safeguard holds) set by Microsoft in Windows Update due to known compatibility issues. Here is some information about this.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/47d7f30f48c14da8a5b934d31c00d011\" width=\"1\" height=\"1\">I've had this topic on my radar for about a month now because someone on Facebook had given me the hint 'you know the registry keys to remove an upgrade blocker rule'. I wrote down the value of <em>DisableWUfBSafeguards<\/em>, but did not pursue the topic any further. Then on October 22, 2020, Microsoft published the article <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/deployment\/update\/safeguard-opt-out#how-can-i-opt-out-of-safeguard-holds\" target=\"_blank\" rel=\"noopener noreferrer\">Opt out of safeguard holds<\/a> on the topic, so I'll bring it up now.<\/p>\n<h2>Some Background<\/h2>\n<p>When installing feature updates, there are always machines that Microsoft knows have hardware or software compatibility issues with the new Windows 10 version. In such cases, the feature update will be blocked in Windows Update (known as Safeguard holds) for these machines. The user then receives the following notification in Windows Update.&nbsp; <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Feature update message reading &quot;The Windows 10 May 2020 Update is on its way. Once it's ready for your device, you'll see the update available on this page\" src=\"https:\/\/docs.microsoft.com\/en-us\/windows\/deployment\/update\/images\/safeguard-hold-notification.png\" width=\"652\" height=\"167\">  <\/p>\n<p>These safeguard holds prevent a device with a known compatibility issue from being offered a new Windows 10 feature update using Windows Update. Microsoft uses these locks to protect the device and the user from a failed or poor update experience. Microsoft removes these locks once a fix for the compatibility issue is released and verified on an affected device. More information about such locks can be found <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/deployment\/update\/safeguard-holds\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<h2>Removing the upgrade lock (safeguard hold)<\/h2>\n<p>However, administrators in enterprise environments can deactivate this upgrade lock in Windows 10 via Group Policy. There are several ways to do this, which Microsoft describes in the article <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/deployment\/update\/safeguard-opt-out#how-can-i-opt-out-of-safeguard-holds\" target=\"_blank\" rel=\"noopener noreferrer\">Opt out of safeguard holds<\/a>. The easiest way in Windows 10 Pro, Enterprise and Education is to enable the relevant Group Policy.<\/p>\n<p>1. Start <em>gpedit.msc <\/em>with administrative permissions and navigate in the Group Policy Editor's left pane to the branch: <\/p>\n<p>Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; Windows Update &gt; Windows Update for Business<\/p>\n<p>2. Then activated the Group Policy <em>Disable safeguards for Feature Updates <\/em>and have the policy updated (for example, by rebooting or by running the <em>gpupdate \/force <\/em>command from an administrative command prompt)<\/p>\n<p><img decoding=\"async\" title=\"Group Policy Disable safeguards for Feature Updates \" alt=\"Group Policy Disable safeguards for Feature Updates \" src=\"https:\/\/i.imgur.com\/NaRv6rU.jpg\"><\/p>\n<p>This policy is available for Windows Update for Business (WUfB) with Windows 10 version 1809 or higher, provided the security update from October 2020 has been installed.<\/p>\n<p>Bleeping Computer had taken up the topic promptly in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-now-lets-you-bypass-windows-10-update-blocks\/\" target=\"_blank\" rel=\"noopener noreferrer\">this article<\/a> and points out that you can also access the following registry branch via the registry editor:<\/p>\n<p>HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate<\/p>\n<p> If you add a DWORD 32-bit value <em>DisableWUfBSafeguards<\/em> and set it to 1, the upgrade locks of Windows Update are bypassed.<\/p>\n<blockquote>\n<p>But note the risk of unlocking the upgrade lock set by Microsoft. There is no guarantee that the upgrade will work and there is a risk that hardware and software problems will occur afterwards. Microsoft has implemented this policy only to allow IT administrators to perform compatibility validation testing. <\/p>\n<p>After a device installs a new version of Windows 10, Disabling Feature Update Security Policy is reset to \"not configured\" even if it was previously enabled. Microsoft does this to ensure that the administrator deliberately disables Microsoft's default protection against known issues for each new feature update.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>[German]In Windows 10, Group Policy can be used to disable upgrade blocks (safeguard holds) set by Microsoft in Windows Update due to known compatibility issues. Here is some information about this.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,2],"tags":[30,41,76],"class_list":["post-16499","post","type-post","status-publish","format-standard","hentry","category-update","category-windows","tag-tip","tag-upgrade","tag-windows-10"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=16499"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16499\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=16499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=16499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=16499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}