Advanced

KB5068787 for Windows Server 2022 (OS Build 20348.4405): Complete Deployment and Verification Guide

KB5068787 (OS Build 20348.4405) is a Windows Server 2022 cumulative security update. This guide walks you through a safe rollout strategy for WSUS servers and domain controllers, multiple installation methods, post-patch verification, and a rollback plan if something breaks.

13views
DifficultyAdvanced
Steps12

The Problem

KB5068787 is a cumulative update for Windows Server 2022. On production servers, the technical challenge is rarely clicking Install - it is rolling the patch out safely across critical roles (WSUS, domain controllers, IIS, application servers) while preserving service continuity, replication health, and endpoint protection telemetry.

This guide follows a controlled escalation path:

  • Confirm the OS/build and applicability
  • Prepare backups and a maintenance window
  • Patch the highest-risk roles first (WSUS, then domain controllers)
  • Verify installation and core role health (AD replication, WSUS sync, HTTP.sys/IIS behavior, Defender/MDE status)
  • Keep a rollback plan ready (DISM removal, snapshot restore)

Before you start

  • Use a staging ring if you have more than a handful of servers.
  • If you manage servers via WSUS/SCCM, validate classifications and approvals.
  • If you must do offline image servicing, ensure prerequisites for servicing stack requirements are met (per Microsoft guidance).

What success looks like

  • KB5068787 shows as installed on target servers
  • No unexpected boot loops or service failures
  • WSUS sync and client reporting still function
  • Domain controllers replicate and authenticate normally
  • Defender for Endpoint telemetry (where applicable) remains healthy
  • IIS and reverse proxies do not experience new parsing or request handling issues

Step-by-Step Guide

01

Confirm applicability: Windows Server 2022 and current build

Avoid patching the wrong OS or chasing the wrong KB.

On the target server, confirm you are running Windows Server 2022 and identify the current OS build.

  1. Open Windows Terminal or PowerShell as Administrator.
  2. Run the build check command.

If you are not on Windows Server 2022 (20348.x), stop here and identify the correct cumulative update for your OS release.

PowerShell
Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" |
  Select-Object ProductName, DisplayVersion, CurrentBuildNumber, UBR
Expected Result:You confirm the server is Windows Server 2022 and can document the pre-patch OS build number.
Warning:Do not assume the KB applies across Server versions. Windows Server 2019/2016 have different LCUs and KB numbers.
02

Decide your rollout order (WSUS first, domain controllers next)

Reduce blast radius while patching the highest-impact roles early.

Use this deployment order when you operate WSUS and domain controllers:

  1. WSUS servers (if internet-exposed, treat as highest priority)
  2. Domain controllers (staggered)
  3. Internet-facing IIS/reverse proxies
  4. Critical app servers
  5. General member servers

In large environments, patch in batches using rings (pilot, broad, then full).

Expected Result:You have a documented deployment order and a maintenance window plan per server group.
Warning:Do not patch all domain controllers at once. Preserve authentication and replication capacity.
03

Pre-patch checklist: snapshot, backup, and change control

Make rollback possible under pressure.

Before installing KB5068787:

  • Take a VM snapshot (preferred) or a full backup.
  • Record current OS build, installed updates, and key service status.
  • Confirm you have console access (iLO/iDRAC/Hypervisor) in case of boot issues.
  • Notify stakeholders for downtime (especially for WSUS and DC maintenance).

If you run offline image servicing, follow Microsoft prerequisites guidance for servicing stack requirements.

Expected Result:You can revert quickly and you have evidence (before-state) for troubleshooting if needed.
Warning:Snapshots are not long-term backups. Use both for critical servers when possible.
04

Choose the installation channel (Windows Update, WSUS/SCCM, or Update Catalog)

Use a method that fits your environment and minimizes surprises.

Pick the most appropriate channel:

  • Windows Update / Windows Update for Business: typical for standalone or cloud-managed servers
  • WSUS/SCCM: standard for enterprise rings and reporting
  • Microsoft Update Catalog: best for manual installs and break-glass scenarios

If using WSUS, confirm product/classification match your Server 2022 fleet and that the update is approved for the target group.

Expected Result:You know exactly how you will deliver the update to each server group.
Warning:Avoid mixing methods on the same server group unless you have a clear reason (reporting gaps and inconsistent baselines).
05

Patch WSUS servers (safe service stop and restart)

Reduce risk during install and stabilize WSUS after reboot.

On WSUS servers, use a controlled maintenance approach:

  1. Stop WSUS-related services.
  2. Install KB5068787 via your chosen method.
  3. Reboot.
  4. Start services and validate sync/health.

If you rely on WSUS error details in the console, be aware Microsoft documents changes in error detail reporting behavior in later updates tied to mitigation work (plan alternate monitoring).

PowerShell
Stop-Service WsusService -Force
Stop-Service W3SVC -Force

# Install KB via WSUS/SCCM or run the standalone installer from Catalog

Start-Service W3SVC
Start-Service WsusService
Expected Result:KB installs successfully, WSUS services start, and clients can still reach WSUS.
Warning:Stopping IIS can interrupt other hosted services. Verify whether the WSUS box is shared-role before stopping W3SVC.
06

Patch domain controllers in a staggered sequence

Maintain authentication and replication capacity while updating DCs.

Patch domain controllers one at a time (small environment) or in small batches (large forest):

  1. Validate replication health before patching.
  2. Install KB5068787.
  3. Reboot.
  4. Validate replication and SYSVOL/GPO processing.

If you use Microsoft Defender for Endpoint on DCs, include verification that telemetry/health indicators remain normal after the update.

PowerShell
repadmin /replsummary
repadmin /showrepl
Expected Result:No replication backlogs, logons succeed, GPO applies, and core DC services are stable post-reboot.
Warning:If you see replication failures, stop the rollout and fix replication before continuing to other DCs.
07

Patch IIS and proxy-facing servers: watch HTTP.sys behavior

Catch request parsing or compatibility issues quickly after patching.

If the server is IIS-facing or sits behind reverse proxies:

  • Patch one canary server first.
  • After reboot, test critical application routes.
  • Monitor for spikes in 400-series errors or abnormal request handling.

If strict parsing is required for security posture, implement it only after validating compatibility in staging.

Expected Result:Web apps remain reachable and error rates do not spike after the patch.
Warning:Changing HTTP parsing can break legacy clients or intermediaries. Test thoroughly before enforcing strict behavior across the fleet.
08

Verify the update is installed (and document the new baseline)

Confirm deployment success with an auditable check.

After reboot, verify KB5068787 is installed:

  • Use Get-HotFix for a quick confirmation.
  • Record the post-patch OS build.
  • Capture a short change log entry (server, time, result, any issues).
PowerShell
Get-HotFix -Id KB5068787

Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" |
  Select-Object CurrentBuildNumber, UBR
Expected Result:KB5068787 appears in the installed hotfix list and the OS build reflects the update.
Warning:If Get-HotFix is empty due to WMI issues, validate via DISM package listing or Windows Update history as a secondary check.
09

Post-patch role validation: WSUS, DC, and security telemetry

Prove the business-critical functions still work.

Use a role-based validation checklist:

WSUS

  • Confirm WSUS console loads
  • Confirm synchronization completes
  • Confirm clients can scan and download updates

Domain Controllers

  • Confirm logons succeed
  • Confirm replication health
  • Confirm SYSVOL and GPO processing

Security

  • Confirm Defender status is healthy
  • Confirm endpoint/security telemetry (where applicable) is not degraded
PowerShell
Get-MpComputerStatus | Select-Object AMServiceEnabled, AntispywareEnabled, RealTimeProtectionEnabled, NISEnabled
Expected Result:Core services are stable and expected monitoring signals remain normal.
Warning:If you operate security baselines, do not ignore small anomalies during patch week. Small anomalies can indicate incomplete installs or post-exploitation activity.
10

Troubleshoot installation failures (CBS logs, prerequisites, offline servicing)

Resolve common failure modes without random rollback loops.

If the update fails to install:

  • Check Windows Update error codes and Event Viewer.
  • Review CBS.log for missing assemblies or servicing stack related issues.
  • If servicing an offline image, ensure prerequisites are met per Microsoft documentation.

If your environment blocks Windows Update, prefer the Update Catalog package and verify that the servicing baseline is consistent across your fleet.

Expected Result:You identify a concrete failure reason (servicing baseline, component corruption, policy restriction, or dependency mismatch).
Warning:Do not repeatedly retry installs without identifying the underlying cause. You can worsen component store state.
11

Rollback plan: remove the LCU using DISM (not wusa)

Recover safely if the patch causes an outage or regression.

If you must remove the update:

  • Microsoft notes that wusa /uninstall may not work for combined SSU + LCU packages.
  • Use DISM remove-package with the LCU package name.

Preferred rollback approach in production is usually:

  1. VM snapshot restore (fastest)
  2. DISM removal (when snapshot is not available)
  3. Full backup restore (last resort)
PowerShell
DISM /Online /Get-Packages | findstr /i 5068787

# Copy the exact package identity from the output, then:
DISM /Online /Remove-Package /PackageName:<PACKAGE_ID>

Restart-Computer
Expected Result:You can revert the server to a known-good pre-patch state and restore service.
Warning:Removing security updates increases exposure. If you rollback, isolate the server and implement compensating controls until you can re-patch.
12

Do not stop at KB5068787: move to the latest Server 2022 cumulative update when possible

Stay current on security fixes beyond the November 2025 baseline.

KB5068787 is a specific baseline. In most environments, the best practice is to install the newest available cumulative update for Windows Server 2022 after validation.

  • Check Windows Update and your WSUS/SCCM approvals.
  • Update your pilot ring first.
  • Promote to broader rings after stable validation.

Document the final baseline you standardize on for the month.

Expected Result:Your fleet converges to a single, current baseline rather than a mix of older LCUs.
Warning:Avoid long patch gaps on WSUS servers and domain controllers. These roles amplify risk during active exploitation periods.

Frequently Asked Questions

KB5068787 is the Windows Server 2022 cumulative update released for the November 2025 Patch Tuesday cycle, bringing the OS to Build 20348.4405 and including security fixes plus quality improvements.

Yes. WSUS is a high-leverage role: if it is compromised or unstable, it can impact update delivery and monitoring across the entire organization. Patch WSUS early, then validate health before continuing.

Use Get-HotFix -Id KB5068787 and confirm the OS build baseline via the CurrentVersion registry values. In environments with WMI issues, validate using DISM package listing as a fallback.

Microsoft documents that WSUS error detail reporting may be temporarily removed in later updates to address mitigation needs for a WSUS remote code execution vulnerability. Plan alternate monitoring and verification workflows.

Not reliably. Microsoft notes that combined servicing packages may not uninstall via wusa. Use DISM /Remove-Package with the correct package identity, or revert via snapshot/backup when available.

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in