Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Windows 10

Microsoft Will Remove a Significant Windows 10 Enterprise Pain Point in 2019

With the release of Windows 10 and Microsoft’s mandate that it be updated twice a year, installing major Windows 10 updates is very slowly becoming a routine activity. Even though the company is expanding the life cycle of each fall update, when are required to update your environment, it’s about to become slightly less painful.

The challenge is that after a Window 10 update is applied, when the user sits down to start working, they are greeted with the update dialog and then have to sit there and wait for Windows 10 to finish installing. With the next major update to Windows 10 that should arrive around the month of March in 2019, it will include Automatic Restart and Sign-On (ARSO) for Enterprises.

This new feature will automatically sign-in a user after an update is applied to finish the setup procedure and then re-lock the PC. The end result is that when the user returns to their machine, it will be fully updated.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

This feature will be enabled on Cloud Domain Joined devices that meet certain security requirements:

  • BitLocker is enabled and is not suspended during the upgrade
  • TPM 2.0
  • SecureBoot

This feature will need to be explicitly enabled (Settings > Accounts > Sign-in options > Privacy) and as long as your devices meet all the requirements, this should significantly reduce the friction of your next major update. Of course, you won’t be able to take advantage of this update until after you update to the next release which means you are, at least, a year away from benefiting from this functionality.

The odd thing about this addition to Windows 10 is why is it needed at all? If the OS can log in on its own, does this mean that credentials are stored and accessible to the OS at any time? I’m sure that Microsoft has thought about this and it’s part of the reason why you need three different security tools to be enabled for it to function but in 2018, it seems like there should be a better way to complete an install of Windows 10 without what feels like a rudimentary option of faking a login.

But, this is very much a welcomed addition to Windows 10 Enterprise; it’s too bad that not everyone will be able to benefit from this functionality after upgrading. That being said, Microsoft is looking at ways to reduce friction for consumers post-update and hopefully we will see similar functionality arrive in all iterations of the OS in the near future.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: