Windows Enterprise Desktop

March 28, 2018  11:49 AM

Macrium Reflect Upgrade Cancels Backup Schedules

Ed Tittel Ed Tittel Profile: Ed Tittel
Windows 10, Windows Backup

Whoa! I got an unexpected shock in checking over my production desktop this weekend. Turns out that my recent upgrade from version 6 to 7 for Macrium Reflect Free came with certain consequences. That’s right: that Macrium Reflect upgrade apparently canceled my regular backup schedules. It left my primary machine, which I back up daily, without coverage for several weeks before I noticed that change. In fact, I only figured out updates weren’t happening by inference. I clean out backups every two weeks or so to keep the target drive from filling up. This time, I noticed the drive space hadn’t decreased much, if at all. And indeed, that’s how I learned that Macrium Reflect upgrade cancels backup schedules. Ouch!

Macrium Reflect Upgrade Cancels Backup Schedules

Disabled is the last thing you want to see when checking Reflect backup schedules’ status. Sigh.

Fixing Macrium Reflect Upgrade Cancels Backup Schedules

Of course, the fix is absolutely trivial.  I could have simply re-enabled my existing backup schedules, and they would have resumed that night on their regular schedules. But while I was at it, I created a new backup definition and lumped the imaging of my boot/system drive together with my primary data drive. That way my target drive won’t fill up as quickly and I’ll have ready access to my two most important storage assets. I also set up a weekly cloud backup so I can capture my entire production system off-site with less frequency.

The old saying goes: The only good backup is the one that restores successfully. I’m somewhat embarassed that it took me a couple of weeks to realize that a software change had disabled my backup environment. I offer my experience as a cautionary reminder to all IT professionals that regular checks on backups may be as important as making those backups. I am profoundly grateful, in fact, that I didn’t learn that my backups were disabled by needing one, and not having it at my disposal. Sigh.

March 26, 2018  10:24 AM

KB4089848 Poses Widely Reported Win10 Problems

Ed Tittel Ed Tittel Profile: Ed Tittel
Windows 10, Windows Update

On 3/22/18 Microsoft unleashed KB4089848. It upgrades build 1709 to 16299.334 and addresses a list of some 25 issues. This is documented in its MS Support KB article. But numerous sources indicate that KB4089848 poses widely reported Win10 problems, too. These cover a wide litany of woes that include the following (source:

  • Failed installs (either the download or the install processing for KB4089848 doesn’t complete successfully).
  • Post-installation, printing problems occur. HP printers seem particularly prone to such issues.
  • With KB4089848, some users report PC freeze-ups or performance hiccups.
  • Other issues also show up less frequently. Some users report issues with Outlook search, taskbar troubles, or homegroup failures.

KB4089848 Poses Widely Reported Win10 Problems

WU reports my production desktop Win10 is current, with confirmation from WUMT checks. Even so, here’s how KB4089848 shows up in my Update History. Sigh.

On one of my machines, despite a successful install of the update and multiple subsequent reboots, the update history still reports that a restart is needed. Reading through and social and answers forums at Microsoft this weekend, I saw these items pop up dozens, if not hundreds, of times from users around the globe.

If KB4089848 Poses Widely Reported Win10 Problems, What to Do?

This is a case where waiting before installing appears to have strong merits. How one might go about this is the subject of numerous tutorials including these items:

Turn On or Off Pause Updates for Windows Update in Windows 10

Enable or Disable Windows Update Automatic Updates in Windows 10

The Windows Update MiniTool (WUMT) along with a “wrapper script”  can also disable Windows Updates unless and and until this alternative access tool is used. It lets users pick only the updates they want to install, and provides complete control over Windows Update access and activity. I provided a pointer to this tool in a 2/26/18 post to entitled “Stop Windows 10 Updates Properly and Completely.” Subsequent discussion items in that thread makes mention of a MyDigitalLife item that covers this script in more detail “WUMT Wrapper Script — controls Windows Update Service.” It’s definitely worth reading — and for many users, it’s worth using, too.

March 23, 2018  5:15 PM

Script Out Your Win10 Build History Using PowerShell

Ed Tittel Ed Tittel Profile: Ed Tittel
history, Windows 10

I just came across a fascinating pair of PowerShell commands. Run in an administrative PowerShell session, they’ll tell you every build your system has had installed on it since the last clean install was performed. That’s why I say you can use these items to script out your Win10 Build History using PowerShell.

These commands come to you through an interestingly circuitous route around the Northern Hemisphere of Planet Earth. I got them from Russian blogger Sergey Tkachenko at He got them from somebody named (whose domain name, at least is in Germany and post was in German). Originally they came from user sizzlr at Reddit (location unknown, but who writes American English like a native speaker).

How to Script Out Your Win10 Build History Using PowerShell

All you need to do is cut and paste the content for each line item below from this blog post into an administrative PowerShell session. Copy Line 1 first, then paste it, then hit enter (only the monospaced text, please). Repeat that same process for Line 2 (ditto).

Line 1:cls

$AllBuilds = $(gci "HKLM:\System\Setup" | ? {$_.Name -match "\\Source\s"}) | % { $_ | Select @{n="UpdateTime";e={if ($_.Name -match "Updated\son\s(\d{1,2}\/\d{1,2}\/\d{4}\s\d{2}:\d{2}:\d{2})\)$") {[dateTime]::Parse($Matches[1],([Globalization.CultureInfo]::CreateSpecificCulture('en-US')))}}}, @{n="ReleaseID";e={$_.GetValue("ReleaseID")}},@{n="Branch";e={$_.GetValue("BuildBranch")}},@{n="Build";e={$_.GetValue("CurrentBuild")}},@{n="ProductName";e={$_.GetValue("ProductName")}},@{n="InstallTime";e={[datetime]::FromFileTime($_.GetValue("InstallTime"))}} };

Line 2:
$AllBuilds | Sort UpdateTime | ft UpdateTime, ReleaseID, Branch, Build, ProductName

Sampling a Win10 Build History

Here’s what the output from my production desktop looks like in PowerShell:

Script Out Your Win10 Build History Using PowerShell

The sequence captures my journey from Win 10 Pro to Enterprise Insider to Enterprise current branch.
[Click image to see full-sized view.]

I’m not sure that anybody really NEEDS this capability. But it is very interesting to look at the sequence of builds that have come and gone on most PCs. My fast ring PCs produce listings with 93(!) entries in that list, starting with Build 10547 on 10/17/2015 and ending with Build 17123 on 3/20/2018 (and that’s because I haven’t rebooted that machine to upgrade it 17128 just released this afternoon). Great stuff!

Here’s that lengthy list in all its glory:

March 21, 2018  11:14 AM

Reducing Win10 Upgrade Offline Time

Ed Tittel Ed Tittel Profile: Ed Tittel
Windows 10, Windows Update

Last week, the Windows Insider blog featured a notable bit of information. Under the somewhat bland heading of “feature update improvements” Joseph Conway (Sr. Program Manager, Windows Fundamentals (Deployment)) dropped some fascinating information. Talking about feature update installation, he reported that a new and improved model comes built-in when 1803 goes public in the near future. In fact, reducing Win10 upgrade offline time remains a major design goal for that release.

What’s Up with Reducing Win10 Upgrade Offline Time?

FYI, offline time means that a PC is unavailable/unusable. Simply put, reducing offline time during an upgrade means more time for the user do something while the upgrade is underway. The blog post includes a peachy table that shows old vs. new feature update models, so I reproduce it here:

Reducing Win10 Upgrade Offline Time

Items on upper right in dark black moved from offline into online processing explain a huge time difference.
[Click on image to see full-sized view; Source: Windows Insider Blog 3/16]

Offline Time Savings?

The numbers are pretty interesting. Under the old model offline time averaged 82 minutes for a Windows feature upgrade. The post explains that this number is based on telemetry during the millions of upgrades to version 1709 (aka the Fall Creators Update) late last year. For the upcoming 1803 release, which uses the new model, average offline time has dropped to 30 minutes. As the blog post proclaims: “That’s a reduction of 63% from the Creator’s Update!” I notice that the blog post fails to address whether or not the overall install time has changed, either for the worse or the better. Having been through dozens of such Insider installs for the forthcoming 1803 release, my personal impression is “Not much.” I don’t mean to diminish this accomplishment, but I must observe that for corporate/enterprise users, they probably won’t be using their PCs while they’re upgrading anyway.

The Real Value of These Process Models

To me, the real value of these process models comes from the details about what goes on during the feature upgrade installation process. By extension, in fact, this provides a pretty good model for Windows installation in general. Thus, either list of steps is a good one. I reproduce the NEW list verbatim, in numered form because it’s what Windows users face looking foward. For this list, I don’t much care which parts are online and which parts offline, either.

  1. PC checks for available feature updates (manually or automatically)
  2. Feature update payload is downloaded
  3. User content is prepared for migration
  4. New operating system is placed into a temporary working directory
  5. PC waits for a required reboot to begin update installation
  6. PC reboots to begin update installation process
  7. Drivers and other required operating system files are migrated
  8. User content is migrated
  9. PC reboots and completes the update
  10. OOBE begins

This new model gives us a nice timeline against which to plot errors. It also means when errors occur, one can make a good guess about the issue involved based on the current active phase. I’ll make ongoing, detailed observations over the next few months. Then, I’ll build and populate that map as best I can. Stay tuned: I’ll write this up when I have enough data to make it worth sharing.

March 21, 2018  8:11 AM

VMware Workspace One gets intelligent

Colin Steele Colin Steele Profile: Colin Steele
AirWatch, VMware, VMworld

Details have emerged about several new VMware Workspace One capabilities that IT pros got a preview of last year.

VMware Workspace One Intelligence, Mobile Flows and support for the Microsoft Graph API for Intune are now all generally available, VMware said today. The company originally announced the features at its VMworld conference last August.

Let’s take a look at the three components:

Workspace One Intelligence monitors and analyzes data from users’ devices and applications and enables IT to automate responses to security threats, application crashes and other issues. It uses technologies from VMware’s AirWatch compliance engine and Apteligent, an app analytics vendor VMware acquired last year. Applications must integrate with Apteligent’s APIs to provide performance and user behavior data to VMware Workspace One Intelligence, but the product can provide insights around user adoption, software licenses and more natively, VMware said.

Mobile Flows build common business processes directly into VMware’s mobile email app, Boxer. If a sales rep receives a request for a quote from a new customer, for example, he can create a new contact in Salesforce by pressing just one button in Boxer — instead of having to open the Salesforce app, sign in and then create a new contact. VMware plans to expand Mobile Flows into other apps besides Boxer, but those capabilities are not available at this time.

Support for the Microsoft Graph API for Intune enables IT to manage Office 365 mobile apps directly through AirWatch. But organizations must have both AirWatch and Intune licenses to use this feature.

Coming soon in VMware Workspace One

VMware also announced some additional capabilities that will be available later this year. The Workspace One Trust Network will allow third-party security vendors to feed data into Workspace One Intelligence, providing IT with even more insights into their users’ devices and applications to detect threats. Participating vendors today include Carbon Black, CrowdStrike, Cylance, Lookout, McAfee, Netskope and Symantec.

Another upcoming offering, AirLift aims to help IT more easily manage Windows 10 devices with VMware Workspace One and Microsoft System Center Configuration Manager (SCCM). Those co-management capabilities already exist, but AirLift will provide a console for administrators to select which tasks to perform with Workspace One and which tasks to leave to SCCM. The console will be available in April, VMware said.

March 19, 2018  3:28 PM

Logon times play key role in virtual desktop UX monitoring

Eddie Lockhart Eddie Lockhart Profile: Eddie Lockhart
published applications, VDI

Almost everyone who’s ever used a computer has sat, head in hand, frustratingly waiting for the desktop to start up. If this productivity loss runs rampant in a VDI deployment, it can have a real cost, so it’s important for IT to get a handle on logon times.

If users detect a decline in virtual desktop performance from what they were used to with physical desktops, they are likely to revolt against the technology. To quantify the effect bloated logon times can have, ControlUp, a monitoring software provider in San Jose, Calif., conducted a study on logon performance for virtual desktops and published applications. The results showed the importance of shorter logon times and consistency.

Gone in 31.9 seconds

The average logon time for virtual desktops was 31.9 seconds with a median of 23 seconds, according to the ControlUp study, presented in a webinar last week. The study, which tracked logons over almost two years across 876 organizations, defined desktop logons as the length of time from the instant a user enters his correct credentials to the moment the Start button becomes clickable.

The median indicates that half of the logons took 23 seconds or less, while the much higher average shows that there are significant outliers pulling the mean up — suggesting that many organizations have problems with logon consistency.

If logon times fluctuate significantly, users may be unhappy because they cannot rely on their desktops to start the same way every time. Time of day can be a key factor, as logons may take longer when more users within an organization are active at once. IT must allocate resources correctly throughout the VDI deployment to deal with peak usage times.

The discrepancy between the average and the median was not as significant for published apps, because they are less complex. The average time was 16.44 seconds, and the median was 12. Published app monitoring is important, because apps are the lifeblood of most users’ productivity.

Longer logon times for desktops and apps can be caused by oversized user profiles, resource contention issues, or misconfigurations after a storage array or network drive relocation. One way to reduce logon times is to use monitoring tools that can help pinpoint the source of slowdowns. In addition to ControlUp, products include VMware vRealize Operations for Horizon, Login PI from Login VSI, Goliath Technologies’ Logon Simulator and the Comtrade management packs for Citrix.

Quantifying the results

Organizations can get time and cost savings by reducing logon times.

OneWorld Community Health Centers in Omaha, Neb., used ControlUp’s monitoring tool to gather and analyze logon data, which revealed that the infrastructure had a VM sizing issue, said IT director Steve Elgan, in the webinar. His team added more processors with more RAM and changed the ratio of virtual CPU to physical CPU to one-to-one — reducing desktop logon times by 14 seconds. The company calculated that it saves about $10,000 per year because of time saved, and allows each doctor to see about seven extra patients each year.

March 19, 2018  3:26 PM

Understanding NTUser.dat in Windows 10

Ed Tittel Ed Tittel Profile: Ed Tittel
Registry, User Profile, Windows 10, Windows Registry

Saw a fascinating question on TenForums this morning, as I was making my “morning run” though the new threads there. It appeared in a thread named “ntuser.dat” and read “Why do I have so many ntuser.dat files?” Being one to look for evidence any time Windows quirks or behaviors are described, I immediately fired up voidtools’ (Search) Everything to look for that string in my file system. Right now, it turns up 60 objects, of which many are logs or pending registry transmissions (files of type .regtrans-ms). But there is also one file named ntuser.dat and eight more files named NTUSER.DAT. Obviously, there’s something interesting and useful going on with all these copies. And, as it turns out understanding NTUser.dat in Windows 10 hinges on understanding user profiles and typical accounts on a Win10 systems.

Understanding NTUser.dat in Windows 10

Of the 60 items with “ntuser.dat” in their names, these nine items shown take that name precisely on my production PC. What gives?

Why Bother Understanding NTUser.dat in Windows 10?

As it happens, each and every user profile created on a particular running instance of Windows 10 has its own NTUser.dat file. This file contains personal files and preference settings particular to each such user. As you can tell from looking at those files on my production PC (depicted in the preceding screenshot), this includes default and “behind-the-scenes” accounts as well as user accounts. That’s why we see a system account (…System32\Config\systemprofile), various service accounts (… NetworkService and …LocalService), and dot-NET accounts (dot-NET v4.5 Classic and dot-NET v.5), plus Administrator, Default and DefaultAppPool accounts. The only real user account is C:\Users\etitt. It reflects my Microsoft Account, which starts with the 5 characters “etitt”.

As it also turns out, messing with files with this name is NOT a good idea. Deleting an NTUser.dat file destroys the associated account’s preferences and settings and may even corrupt the associated user profile. Each such file has one or more backups, which appears as a file named NTUser.dat.log. If an error occurs in the master copy of NTuser.dat, Windows can use one or more log files to correct it. NTUser.ini files describe roaming profiles used in networked environments. You can rename this file But that changes the user profile from a user-controlled profile to a locked-down profile that users can alter only temporarily (changes are not saved when the user logs out).

Writing the NTUser.dat happens during login; essentially, it’s a copy of the Windows Registry’s HKEY_CURRENT_USER hive. The contents of the user profile changes constantly over time: it reflects changes that occur while Windows is running. Windows size and position, for example, changes each time you open, move, or resize an application window. And that’s just the tip of a very large iceberg of data that goes into keeping constant track of user activity.

How NTUser.dat Changes

Though user settings, preferences, and so forth change at runtime, NTUser.dat stays static. Rather, those changes go into a raft of  .regtrans-ms files that Windows 10 creates. Windows 10 processes these files whenever a user logs out, or the system shuts down or restarts. This controls and manages Registry writes, much like a “database commit” operation. (Note: database commit is a complex and interesting concept with many wrinkles, with much thought and effort required for proper implementation. For now, this means “changes either happen completely, or they don’t happen at all”. That keeps databases — including the Registry, in this case — consistent at all times.)

Thus, even when an uncontrolled shutdown or a BSOD occurs, NTUser.dat remains OK. User settings and preferences changes from the preceding session are lost. But user profiles remain intact and consistent.

I completely agree with long-time TenForums VIP and Guru member Bree (identified in the “ntuser.dat” thread mentioned at the outset of this blog post). Here’s his take on messing with or deleting files named NTUser.dat: “Best leave them alone then.” Well said, and advice worth following!

March 16, 2018  12:50 PM

Check Current Win10 for In-place Upgrade Repair

Ed Tittel Ed Tittel Profile: Ed Tittel
Repair, Troubleshooting, Windows 10

Just yesterday, I had an article go live on ComputerWorld. Its title explains its focus: “How to fix Windows 10 with an in-place upgrade install.” I’ve already gotten a couple of emails from readers informing me they tried this, and get only a clean install as an option when they fire off setup.exe. There are many reasons why this can happen, all of which are enumerated in that selfsame story. (See the section labeled “Sounds to good to be true; what’s the catch?”) But there are ways to check current Win10 for in-place upgrade repair to make sure the ISO you use will work with the running image. I’ll enumerate them here, to help would-be repair-persons succeed in their repair attempts.

How to Check Current Win10 for In-place Upgrade Repair

The conditions that must be met include specific items for the image that’s running and the image from which repairs are made. I’ll march through most of these one at a time in the sub-sections that follow, but will dispatch a couple of them here immediately. First, to run setup.exe in Windows 10, you must be logged into an administrative account. But because you must be able to run cmd.exe or PowerShell as an administrator to execute most of  the following commands, I take that as a given for anyone who attempts an in-place upgrade for repairs. Second, to attempt an in-place upgrade for repair purposes, the OS must be running well enough for setup.exe to run to the point where the system reboots for the first time. After that, the installer takes over and the old OS is no longer in charge of the PC.

Third, the system drive (the SSD or hard disk on which Windows resides) must have enough free space for repairs to complete. How much free space is that? It’s about 9GB more than the space that Windows itself consumes on disk. According to WinDirStat for my production PC, for example, that comes to 28GB (18.9 GB for Windows 10 and another 9GB for workspace, rounded up).

Determine Win10 “Bittedness”

Windows 10 comes in 32-bit (x86) and 64-bit (x64) architectures. You can check this at the command line by typing wmic os get osarchitecture. Here’s what comes back in response on my production PC using PowerShell:

Check Current Win10 for In-place Upgrade Repair.bittedness

The output clearly states that this PC is running a 64-bit architecture. That means the chosen repair image must match. The ISO one grabs to use for repair will always include its bittedness. You’ll be asked to explicitly choose either a 32- or a 64-bit download.

Get Win10 Version/Build Info

You can use the built-in Win10 utility winver.exe to obtain this information. You can run this from the start menu or type the program name into the administrative command prompt or PowerShell window. Either way, it’s going to open in its own Window on screen, like this:

Check Current Win10 for In-place Upgrade

As you can see, the version is identified as 1709, and the build number is 16299.309. Don’t close this window just yet, it also provides information for the next sub-heading as well. When you grab an ISO for repair it will be identified primarily by its version (build) number. That means you’d have to download an ISO numbered 16299 or higher, for the build identified in the preceding screen capture. Right now the current Win10 Enterprise Insider Preview build is 17115, as I write this post.

Get Win10 Edition Info

Notice the line in the preceding window immediately following the © Copyright notice. It reads “The Windows 10 Enterprise operating system…” The fourth word in the sentence identifies the edition. Thus, a Windows 10 Home install would say “The Windows 10 Home operating system…” instead. Likewise for Pro and Education editions. You can also type wmic os get caption to produce this information as well. Here’s what that looks like from PowerShell:

Check Current Win10 for In-place Upgrade Repair.edition

As you can see, this identifies the edition as “Microsoft Windows 10 Enterprise.” This is the selfsame edition that must be used in any attempted in-place upgrade repair install. The name of the ISO usually includes this information when grabbing one to use for repairs. The edition is also identified explicitly when downloading an ISO for Windows 10, so pick one that matches what’s running.

Get Win10 Language Info

The deployment image servicing and management (DISM) command can report on language information for Windows images, on and offline. Checking the language information for the running image is easy, but the output is verbose. The DISM command to use on a running image is DISM /online /get-intl. Here’s the command and its output from PowerShell:

Check Current Win10 for In-place Upgrade Repair.lang

The value for “Default system UI language” is  “en-US.” This means the running OS’s language is English as spoken/written in the United States. Thus, the corresponding ISO to download  is labeled “English” online. Other languages (or English versions) are labeled more explicitly.

Grabbing an ISO for Repairs

To obtain Current Branch ISOs, please visit the Download Windows 10 page. For Insider Preview ISOs, please visit the Windows Insider Preview Downloads page. For older ISOs, I find and its Windows ISO Downloader  absolutely invaluable.  (It grabs only official Windows ISOs from despite its apparently dodgy appearance and Asian location). I could download and use this ISO for repairs on my production PC:


Notice it includes the edition (“Enterprise”), bittedness (“x64”), language (“en-us”), and build (“17115”) in the filename. Good stuff! It tells me enough to let me know if I have a workable match or not. Your chosen ISO’s filename should do the same for you.

March 14, 2018  12:42 PM

MS Offers New Spectre Updates

Ed Tittel Ed Tittel Profile: Ed Tittel
Firmware, Windows 10, Windows Security, Windows Update

Late yesterday, another post on the Windows Blogs for Windows 10 appeared. It offers additional news and insight, and something of a progress report, on Spectre and Meltdown issues. It’s from John Cable, MS Director of Program Management, Windows Servicing and Delivery. The title reads “March 2018 Windows security update — Expanding our efforts to protect customers.” But it isn’t until you get to the second heading that things get interesting. Labeled “Expanding … coverage … to address Spectre and Meltdown vulnerabilities” it tells us MS offers new Spectre updates. A bit of digging is required to understand what’s going on here, though.

Understanding How MS Offers New Spectre Updates

Bottom line: coverage for microcode updates through the Microsoft Catalog is expanding. For a full list of covered items, one is advised to consult KB4093836. The short list is Skylake, Kaby Lake and Coffee Lake processors. You actually must  visit KB409007 to see that list or a download link  from the Microsoft Update Catalog. All that said, I applied that update to my Skylake production desktop without difficulty. I didn’t notice any perceptible performance delays added thereby, but my day is still young!

Where does this leave the world in terms of Windows coverage for Intel processors, one might wonder? According to Wikipedia’s “List of Intel Processors,” not very far. Most of those processors came out some time after the start of 2015. The list of major CPUs by family name has the following timeline:

Sandy Bridge (2007) → Ivy Bridge (2012) → Haswell (2013) →
Broadwell (2014) → Skylake (2015) → Kaby Lake (2016) → Cannonlake\Coffee Lake (2017)

Only the items in red are covered for this vulnerability. My two Lenovo laptops have Sandy Bridge (i7-2640M) CPUs. The Surface Pro 3 has a Haswell (i7-4650U). The  Dell Venue Pro 11 7130 likewise Haswell (i5-4210Y), and my Dell XPS 2720 again Haswell (i7-4770S). My production desktop is Skylake (i7-6700). The boss’s mini-ITX has an Ivy Bridge (i7-3630QM), and the boy’s desktop has a Haswell (i7-4770K). That means that here where I live and work, only 1 in 8 machines is currently covered. Covering Haswell takes care of half the population. Lenovo promises to cover Sandy Bridge as soon as it can. But if MS doesn’t issue an Ivy Bridge update, that machine may never get coverage: Jetway, the mobo maker for that unit, shows little or no inclination to join the dance.

What’s Next?

I sincerely hope that Microsoft will dig back at least two more steps on the preceding timeline. That means providing coverage for at least Haswell and Broadwell processor families. Ideally, I’d like to see them go all the way back to Sandy Bridge. But, as always, only time we’ll tell. We’ll see!

March 12, 2018  12:30 PM

1803 Equals Spring Creators Update

Ed Tittel Ed Tittel Profile: Ed Tittel
Windows 10, Windows Update

Now we’ve got proof of the next version name and build number for Windows 10. It’s now showing up in the so-called Skip Ahead release (Build 17618). If you run the Get-VMHostSupportedVersion PowerShell cmdlet on that build, it confirms that terminology and equivalence quite visibly. Of course, that’s why I entitle this post 1803 equals Spring Creators Update. Here ’tis:

1803 Equals Spring Creators Update

The final line equates 1803 and Spring Creators Update with version 8.3.

If 1803 Equals Spring Creators Update, Does That Really Mean March 2018?

Probably not. In fact, the last few releases have gone public the month after their four-digit version identifiers. Thus, for example, 1709 appeared in October 2017, and 1703 in April of that year. Likewise, 1607 showed up in August 2016. To be fair, though, 1511 did appear in November 2015, and 1507 just barely squeaked out in late July of that same year.

All this chewed over, I’d pretty much assumed that 1803 would appear in April rather than March. But I’m hearing rumors that the actual public release date for 1803 could be as soon as March (or what the number says it should be: 3rd month of 2018) to as late as June (3 months behind). As usual when a feature upgrade is approaching “real soon now,” MS isn’t saying just yet. We will have to find out soon, though, as time marches ever forward.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: