This question already has an answer here:
- Forcefully update to new windows 2 answers
I'm on a
Semi-Annual Channel (Targeted)
update channel. It's been a while after Microsoft released an update to fix issues in the initial Windows 10 1809 update. But a page where we can download the updates as standalone packages still has a hole instead of download link to the 1809.17763.1 version package:Windows 10 Update Assistant page is useless as well, since it offers to download April 2018 Update, lol.
So, I can't update my 1803.17134.376 to 1809 even after more than a month since it's initially was released.
(Of course, 'drastically improved' Windows Update doesn't suggest the 1809 update, too. Actually, it has been never working on this Win 10 copy, so I used to download all the updates manually via the first link in this post.)
Has anybody figured out a way of how to manually update from 1803 to 1809?
Without hardcore stuff, please, like making bootable media which potentially would have a great chance of destroying the currently installed Win 10 copy.
(I was completely confused by that 'Microsoft recommends' wording near the 1809 update on that page and some top articles in Google saying that it was released and ready for production with that quick patch. So, this question is from this confusion.)
random♦13.1k88 gold badges4848 silver badges5757 bronze badges
Alexander AbakumovAlexander Abakumov23511 gold badge44 silver badges1515 bronze badges
marked as duplicate by Ramhound, bertieb, fixer1234, Run5k, random♦Dec 5 '18 at 17:16
This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.
2 Answers
The thing is Microsoft has NOT re-released 1809 yet. So long as you are sticking to the full release versions you do not yet have the option to install 1809.
Windows 7 chrome not starting. Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers.
There has been little in the way of news regarding when the OS will be ready, but I'm hoping and assuming Microsoft is putting this time to good use and identifying and fixing many bugs.
The only way to get builds later than 1803 at this time (2018/11/05) is to use the various Insider Preview options.
UPDATE Effective 2018/11/13
On November 13th 2018 Microsoft re-released 1809 and began a slow and targeted roll-out.
If you wish to install the update manually after this date follow the instructions at the linked question: Forcefully update to new windows
music2myearmusic2myear33.1k1111 gold badges6060 silver badges105105 bronze badges
Finally, Microsoft officially released Windows 10 1809 update:
So, now we can update to it the usual way, for instance, via Windows Update or manually downloading the update package from the page above.
Another way that've also started working now is Windows Update Assistant Tool.
I'd like to mention that at the moment this update is pushed to
Alexander AbakumovAlexander AbakumovSemi-Annual Channel (Targeted)
only. I discourage you from changing your update channel, if you're currently on purpose on another one.23511 gold badge44 silver badges1515 bronze badges
Not the answer you're looking for? Browse other questions tagged windowswindows-10windows-update or ask your own question.
-->Applies To: Windows 10, version 1809
In this article we describe new and updated features of interest to IT Pros for Windows 10, version 1809. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 1803.
The following 3-minute video summarizes some of the new features that are available for IT Pros in this release.
Deployment
Windows Autopilot self-deploying mode
Windows Autopilot self-deploying mode enables a zero touch device provisioning experience. Simply power on the device, plug it into the Ethernet, and the device is fully configured automatically by Windows Autopilot.
This self-deploying capability removes the current need to have an end user interact by pressing the “Next” button during the deployment process.
You can utilize Windows Autopilot self-deploying mode to register the device to an AAD tenant, enroll in your organization’s MDM provider, and provision policies and applications, all with no user authentication or user interaction required.
To learn more about Autopilot self-deploying mode and to see step-by-step instructions to perform such a deployment, Windows Autopilot self-deploying mode.
SetupDiag
SetupDiag version 1.4 is released. SetupDiag is a standalone diagnostic tool that can be used to troubleshoot issues when a Windows 10 upgrade is unsuccessful.
Security
We’ve continued to work on the Current threats area in Virus & threat protection, which now displays all threats that need action. You can quickly take action on threats from this screen:
With controlled folder access you can help prevent ransomware and other destructive malware from changing your personal files. In some cases, apps that you normally use might be blocked from making changes to common folders like Documents and Pictures. We’ve made it easier for you to add apps that were recently blocked so you can keep using your device without turning off the feature altogether.
When an app is blocked, it will appear in a recently blocked apps list, which you can get to by clicking Manage settings under the Ransomware protection heading. Click Allow an app through Controlled folder access. After the prompt, click the + button and choose Recently blocked apps. Select any of the apps to add them to the allowed list. You can also browse for an app from this page.
We added a new assessment for the Windows time service to the Device performance & health section. If we detect that your device’s time is not properly synced with our time servers and the time-syncing service is disabled, we’ll provide the option for you to turn it back on.
We’re continuing to work on how other security apps you’ve installed show up in the Windows Security app. There’s a new page called Security providers that you can find in the Settings section of the app. Click Manage providers to see a list of all the other security providers (including antivirus, firewall, and web protection) that are running on your device. Here you can easily open the providers’ apps or get more information on how to resolve issues reported to you through Windows Security.
This also means you’ll see more links to other security apps within Windows Security. For example, if you open the Firewall & network protection section, you’ll see the firewall apps that are running on your device under each firewall type, which includes domain, private, and public networks).
BitLocker
Silent enforcement on fixed drives
Windows 10 1809 Update
Through a Modern Device Management (MDM) policy, BitLocker can be enabled silently for standard Azure Active Directory (AAD) joined users. In Windows 10, version 1803 automatic BitLocker encryption was enabled for standard AAD users, but this still required modern hardware that passed the Hardware Security Test Interface (HSTI). Net framework 4.5 windows 10 64 bit. This new functionality enables BitLocker via policy even on devices that don’t pass the HSTI.
This is an update to the BitLocker CSP, which was introduced in Windows 10, version 1703, and leveraged by Intune and others.
This feature will soon be enabled on Olympia Corp as an optional feature.
Delivering BitLocker policy to AutoPilot devices during OOBE
You can choose which encryption algorithm to apply to BitLocker encryption capable devices, rather than automatically having those devices encrypt themselves with the default algorithm. This allows the encryption algorithm (and other BitLocker policies that must be applied prior to encryption), to be delivered before BitLocker encryption begins.
For example, you can choose the XTS-AES 256 encryption algorithm, and have it applied to devices that would normally encrypt themselves automatically with the default XTS-AES 128 algorithm during OOBE.
To achieve this:
- Configure the encryption method settings in the Windows 10 Endpoint Protection profile to the desired encryption algorithm.
- Assign the policy to your Autopilot device group.
- IMPORTANT: The encryption policy must be assigned to devices in the group, not users.
- Enable the Autopilot Enrollment Status Page (ESP) for these devices.
- IMPORTANT: If the ESP is not enabled, the policy will not apply before encryption starts.
For more information, see Setting the BitLocker encryption algorithm for Autopilot devices.
Windows Defender Application Guard Improvements
Windows Defender Application Guard (WDAG) introduced a new user interface inside Windows Security in this release. Standalone users can now install and configure their Windows Defender Application Guard settings in Windows Security without needing to change registry key settings.
Additionally, users who are managed by enterprise policies will be able to check their settings to see what their administrators have configured for their machines to better understand the behavior of Windows Defender Application Guard. This new UI improves the overall experience for users while managing and checking their Windows Defender Application Guard settings. As long as devices meet the minimum requirements, these settings will appear in Windows Security. For more information, see Windows Defender Application Guard inside Windows Security App.
To try this:
- Go toWindows Security and select App & browser control.
- Under Isolated browsing, select Install Windows Defender Application Guard, then install and restart the device.
- Select Change Application Guard settings.
- Configure or check Application Guard settings.
See the following example:
Windows Security Center
Windows Defender Security Center is now called Windows Security Center.
You can still get to the app in all the usual ways – simply ask Cortana to open Windows Security Center(WSC) or interact with the taskbar icon. WSC lets you manage all your security needs, including Windows Defender Antivirus and Windows Defender Firewall.
The WSC service now requires antivirus products to run as a protected process to register. Products that have not yet implemented this will not appear in the Windows Security Center user interface, and Windows Defender Antivirus will remain enabled side-by-side with these products.
WSC now includes the Fluent Design System elements you know and love. You’ll also notice we’ve adjusted the spacing and padding around the app. It will now dynamically size the categories on the main page if more room is needed for extra info. We also updated the title bar so that it will use your accent color if you have enabled that option in Color Settings.
Windows Defender Firewall now supports Windows Subsystem for Linux (WSL) processes
You can add specific rules for a WSL process in Windows Defender Firewall, just as you would for any Windows process. Also, Windows Defender Firewall now supports notifications for WSL processes. For example, when a Linux tool wants to allow access to a port from the outside (like SSH or a web server like nginx), Windows Defender Firewall will prompt to allow access just like it would for a Windows process when the port starts accepting connections. This was first introduced in Build 17627.
Microsoft Edge Group Policies
We introduced new group policies and Modern Device Management settings to manage Microsoft Edge. The new policies include enabling and disabling full-screen mode, printing, favorites bar, and saving history; preventing certificate error overrides; configuring the Home button and startup options; setting the New Tab page and Home button URL, and managing extensions. Learn more about the new Microsoft Edge policies.
Windows Defender Credential Guard is supported by default on 10S devices that are AAD Joined
Windows Defender Credential Guard is a security service in Windows 10 built to protect Active Directory (AD) domain credentials so that they can't be stolen or misused by malware on a user's machine. It is designed to protect against well-known threats such as Pass-the-Hash and credential harvesting.
Windows Defender Credential Guard has always been an optional feature, but Windows 10-S turns this functionality on by default when the machine has been Azure Active Directory joined. This provides an added level of security when connecting to domain resources not normally present on 10-S devices. Please note that Windows Defender Credential Guard is available only to S-Mode devices or Enterprise and Education Editions.
Windows 10 Pro S Mode requires a network connection
A network connection is now required to set up a new device. As a result, we removed the “skip for now” option in the network setup page in Out Of Box Experience (OOBE).
![Manually Manually](/uploads/1/2/3/7/123714556/326329239.jpg)
Windows Defender ATP
Windows Defender ATP has been enhanced with many new capabilities. For more information, see the following topics:
- Threat analytics
Threat Analytics is a set of interactive reports published by the Windows Defender ATP research team as soon as emerging threats and outbreaks are identified. The reports help security operations teams assess impact on their environment and provides recommended actions to contain, increase organizational resilience, and prevent specific threats. - Custom detection
With custom detections, you can create custom queries to monitor events for any kind of behavior such as suspicious or emerging threats. This can be done by leveraging the power of Advanced hunting through the creation of custom detection rules. - Managed security service provider (MSSP) support
Windows Defender ATP adds support for this scenario by providing MSSP integration.The integration will allow MSSPs to take the following actions:Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools. - Integration with Azure Security Center
Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers. - Integration with Microsoft Cloud App Security
Microsoft Cloud App Security leverages Windows Defender ATP endpoint signals to allow direct visibility into cloud application usage including the use of unsupported cloud services (shadow IT) from all Windows Defender ATP monitored machines. - Onboard Windows Server 2019
Windows Defender ATP now adds support for Windows Server 2019. You'll be able to onboard Windows Server 2019 in the same method available for Windows 10 client machines. - Onboard previous versions of Windows
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor
Kiosk setup experience
We introduced a simplified assigned access configuration experience in Settings that allows device administrators to easily set up a PC as a kiosk or digital sign. A wizard experience walks you through kiosk setup including creating a kiosk account that will automatically sign in when a device starts.
To use this feature, go to Settings, search for assigned access, and open the Set up a kiosk page.
Microsoft Edge kiosk mode running in single-app assigned access has two kiosk types.
- Digital / Interactive signage that displays a specific website full-screen and runs InPrivate mode.
- Public browsing supports multi-tab browsing and runs InPrivate mode with minimal features available. Users cannot minimize, close, or open new Microsoft Edge windows or customize them using Microsoft Edge Settings. Users can clear browsing data and downloads, and restart Microsoft Edge by clicking End session. Administrators can configure Microsoft Edge to restart after a period of inactivity.
Microsoft Edge kiosk mode running in multi-app assigned access has two kiosk types.
Note
The following Microsoft Edge kiosk mode types cannot be set up using the new simplified assigned access configuration wizard in Windows 10 Settings.
Public browsing supports multi-tab browsing and runs InPrivate mode with minimal features available. In this configuration, Microsoft Edge can be one of many apps available. Users can close and open multiple InPrivate mode windows.
Normal mode runs a full version of Microsoft Edge, although some features may not work depending on what apps are configured in assigned access. For example, if the Microsoft Store is not set up, users cannot get books.
Learn more about Microsoft Edge kiosk mode.
Registry editor improvements
We added a dropdown that displays as you type to help complete the next part of the path. You can also press Ctrl + Backspace to delete the last word, and Ctrl + Delete to delete the next word.
Faster sign-in to a Windows 10 shared pc
Do you have shared devices deployed in your work place? Fast sign-in enables users to sign in to a shared Windows 10 PC in a flash!
To enable fast sign-in:
- Set up a shared or guest device with Windows 10, version 1809.
- Set the Policy CSP, and the Authentication and EnableFastFirstSignIn policies to enable fast sign-in.
- Sign-in to a shared PC with your account. You'll notice the difference!
Note
This is a preview feature and therefore not meant or recommended for production purposes.
Web sign-in to Windows 10
Until now, Windows logon only supported the use of identities federated to ADFS or other providers that support the WS-Fed protocol. We are introducing “web sign-in,” a new way of signing into your Windows PC. Web Sign-in enables Windows logon support for non-ADFS federated providers (e.g.SAML).
To try out web sign-in:
- Azure AD Join your Windows 10 PC. (Web sign-in is only supported on Azure AD Joined PCs).
- Set the Policy CSP, and the Authentication and EnableWebSignIn polices to enable web sign-in.
- On the lock screen, select web sign-in under sign-in options.
- Click the “Sign in” button to continue.
Note
This is a preview feature and therefore not meant or recommended for production purposes.
Your Phone app
Android phone users, you can finally stop emailing yourself photos. With Your Phone you get instant access to your Android’s most recent photos on your PC. Drag and drop a photo from your phone onto your PC, then you can copy, edit, or ink on the photo. Try it out by opening the Your Phone app. You’ll receive a text with a link to download an app from Microsoft to your phone. Android 7.0+ devices with ethernet or Wi-Fi on unmetered networks are compatible with the Your Phone app. For PCs tied to the China region, Your Phone app services will be enabled in the future.
For iPhone users, Your Phone app also helps you to link your phone to your PC. Surf the web on your phone, then send the webpage instantly to your computer to continue what you’re doing–-read, watch, or browse-- with all the benefits of a bigger screen.
The desktop pin takes you directly to the Your Phone app for quicker access to your phone’s content. You can also go through the all apps list in Start, or use the Windows key and search for Your Phone.
Wireless projection experience
One of the things we’ve heard from you is that it’s hard to know when you’re wirelessly projecting and how to disconnect your session when started from file explorer or from an app. In Windows 10, version 1809, you’ll see a control banner at the top of your screen when you’re in a session (just like you see when using remote desktop). The banner keeps you informed of the state of your connection, allows you to quickly disconnect or reconnect to the same sink, and allows you to tune the connection based on what you are doing. This tuning is done via Settings, which optimizes the screen-to-screen latency based on one of the three modes:
- Game mode minimizes the screen-to-screen latency to make gaming over a wireless connection possible
- Video mode increases the screen-to-screen latency to ensure the video on the big screen plays back smoothly
- Productivity modes strikes a balance between game mode and video mode; the screen-to screen-latency is responsive enough that typing feels natural, while ensuring videos don’t glitch as often.
Remote Desktop with Biometrics
Azure Active Directory and Active Directory users using Windows Hello for Business can use biometrics to authenticate to a remote desktop session.
To get started, sign into your device using Windows Hello for Business. Bring up Remote Desktop Connection (mstsc.exe), type the name of the computer you want to connect to, and click Connect. Windows remembers that you signed using Windows Hello for Business, and automatically selects Windows Hello for Business to authenticate you to your RDP session. You can also click More choices to choose alternate credentials. Windows uses facial recognition to authenticate the RDP session to the Windows Server 2016 Hyper-V server. You can continue to use Windows Hello for Business in the remote session, but you must use your PIN.
See the following example:
Microsoft makes available updates for Windows 10 in the regular basis to patch any security hole and to improve the functionality of the operating system. However, even now that updates are mandatory to keep devices always up to date, sometimes updates may not appear for download on your computer for a long time.
Although Windows Update is the preferred method to get updates, Microsoft also allows users to manually download new patches as they become available through the 'Microsoft Update Catalog' website. While mainly a resource for IT administrators who need to test updates before pushing them to devices in their network, you can use the Update Catalog to quickly download a new update if it's not showing for you in Windows Update as an alternative option.
In this Windows 10 guide, we'll walk you through the steps to find, download, and install updates manually on your device.
How to download cumulative updates
It's important to note that the Microsoft Update Catalog doesn't list anything, instead it's a search page, where you must know exactly the update you want to download.
The easiest way to find an update is knowing its Knowledge Base reference number. For example, on October 11th, Microsoft released Windows 10 build 14393.321, which Knowledge Base reference was KB3194798. You can find the references when we publish a new article about a new update, or when you visit the Windows 10 Update History website. Then do the following:
- Visit the Microsoft Update Catalog website.Quick Tip: If you can't access the site using Microsoft Edge, you can also try opening a new InPrivate window, which should let you get through.
- Do a search for the update using the KB number for the update you want. For example, KB3194798.
- Click the Download button for the 64-bit or 32-bit version of the update. If you don't know your system type, do the following:
- Open Settings.
- Click on System.
- Click on About.
- See System type.
- A pop-up window will appear with a direct download link, click it to download the .msu file.
How to install cumulative updates
While you can simply double-click the .msu file to install a new update for Windows 10, you may prefer to include options, such as to prevent the operating system from restarting to finish applying the update, which is something you can do using Command Prompt.
- Use the Windows key + I keyboard shortcut to open the Power User menu and select Command Prompt (admin).
- Type the following command and press Enter:
wusa C:PATH-TO-UPDATENAME-OF-UPDATE.msu /quiet /norestart
Note: We're adding the /quiet /norestart switches to prevent the operating system from restarting your computer after installing the update, but later on, you must manually reboot your device to finish applying the update.Quick Tip: If the name of the update turns to be very long, simply begin typing 'Windows10.0-kb' and the hit the Tab key to autocomplete the name.
Wrapping things up
Manual Download Windows 10 1809 Update
The Microsoft Update Catalog website works best using Internet Explorer, but recent changes that removes ActiveX requirement now allows users to access the site using Chrome and Microsoft Edge. Additionally, alongside cumulative updates, you can also download the latest updates for certain device drivers, and Surface updates.
It's worth pointing out that even though sometimes updates won't get through because of a problem on your computer, there will be other times when an update won't show up because it's not compatible with your system. If you install a patch that is not working correctly, you can always use our guide to uninstall a problematic update.
While we're focusing this guide on Windows 10, the same concept shown here works to download and install updates on previous versions of the operating system, including Windows 8.1 and Windows 7.
More Windows 10 resources
For more help articles, coverage, and answers on Windows 10, you can visit the following resources:
Windows 10 Media Creation Tool
This post may contain affiliate links. See our disclosure policy for more details.