Microsoft’s recent release of Windows Server 2025 has sparked some problems following reports that some systems running Windows Server 2019 and 2022 were unexpectedly upgraded to the new OS.
View WhitepaperMicrosoft’s recent release of Windows Server 2025 has sparked some problems amongst IT administrators and organisations, following reports that some systems running Windows Server 2019 and 2022 were unexpectedly upgraded to the new OS. Microsoft attributes this incident to misconfigurations in third-party patch management tools.
The issue first came to light when systems began reporting automatic upgrades to Windows Server 2025, despite admins not authorising the change. According to Microsoft, the update, identified as KB5044284, was marked with the "DeploymentAction=OptionalInstallation" tag. This designation, in theory, signals patch management software that the update is optional—not critical or mandatory.
However, in practice, the optional update tag didn’t prevent widespread unintended deployment. Some businesses discovered that their infrastructure had been upgraded overnight to an operating system for which they didn’t even have licenses, which causes worries and concerns over systems functioning correctly, especially due to Windows Server 2025 not having an official release yet.
Microsoft’s official response placed the responsibility on third-party patch management solutions, urging organisations to ensure their tools are configured not to deploy optional updates automatically. The company stated:
“Please verify whether third-party update software in your environment is configured not to deploy feature updates. This scenario has been mitigated.”
Yet, this response left many IT professionals dissatisfied. While Microsoft claims the bug has been addressed, it hasn’t provided a clear rollback solution for affected systems.
For enterprises, an OS upgrade is no small matter. It requires careful planning to ensure compatibility with existing applications, hardware, and network configurations. In this case, the forced upgrade introduced a host of challenges:
While Microsoft has acknowledged the issue, it has not provided detailed guidance on how businesses can revert their systems to their previous versions. Without an official rollback solution, affected organisations may face time-intensive manual interventions or even complete re-deployments.
For businesses that rely on third-party patch management tools, this incident shows the importance of rigorous testing and controls. Experts recommend reviewing update deployment policies and considering additional safeguards, such as sandbox environments for patch testing.
Rollbacks in cloud environments are essential for maintaining system reliability and minimising downtime during updates or deployments. They serve as a safety net, allowing organisations to quickly revert to a previous stable version in case of unexpected issues, such as bugs, misconfigurations, or compatibility problems.
In fast-paced cloud operations, where updates can affect critical workloads, rollbacks help minimise risks, ensure business continuity, and build trust in automated deployment pipelines. Properly implemented rollback mechanisms not only save time and resources but also enhance resilience in the face of unforeseen challenges.