Skip to main content
Skip to main content

Windows 11 Version 24H2: A Deep-Dive Technical Overview for IT Professionals

Audience: IT administrators Assumed knowledge: Windows fundamentals, network basics (SMB, Kerberos), PowerShell, Group Policy, Intune Scope / Out of scope: This guide covers the key technical changes, new features, security updates, and known issues in Windows 11 Version 24H2 relevant to enterprise management and deployment. It does not cover basic end-user functionality in detail.

TL;DR
  • Critical Security Changes: Introduces Personal Data Encryption (PDE), stricter SMB signing, and Kerberos enhancements that require immediate review before deployment.
  • AI & Copilot+ PC Features: Rolls out new AI-powered tools like Windows Recall, Live Captions, and Co-Creator in Paint, some of which have significant security implications (e.g., Recall).
  • Modernized Management: Features significant updates to Windows Update with Checkpoint Cumulative Updates for faster, more reliable patching and enhanced LAPS with Azure AD integration.

Background & context

Windows 11 Version 24H2 is a significant annual update that brings a host of new features, substantial security enhancements, and performance improvements. This release resets the support lifecycle for all editions and introduces critical changes to core protocols like SMB and Kerberos, AI-driven features for new Copilot+ PCs, and more robust data protection with Personal Data Encryption (PDE). For IT professionals, understanding these changes is crucial for planning a smooth and secure deployment.

Release Timeline and Availability
  • Initial Release Date: Windows 11 Version 24H2 was first released to the Windows Insider Program (Beta and Release Preview Channels) on October 1, 2024.
  • General Availability Date: The general availability (GA) began in October 2024, with a phased rollout to eligible devices.
  • Deployment Channels: The update is available via Windows Update, the Volume Licensing Service Center (VLSC), and can be managed using WSUS, Microsoft Endpoint Configuration Manager (MECM), or Intune.

Prerequisites

RequirementMinimum / versionNotes
Eligible DevicesDevices running Windows 11, version 22H2 or 23H2.Check hardware requirements, especially for Copilot+ PC features which require specific NPUs.
Management ToolsWSUS, MECM, IntuneRequired for controlled enterprise deployment and policy management.
PermissionsLocal Administrator / Intune Administrator / Group Policy AdministratorNeeded to configure new security policies and deployment settings.
Network / Firewall-Review firewall rules for SMB Alternative Ports if used. Ensure endpoints for WSUS/Intune are accessible.

What’s new / Key changes

AI & Copilot+ PC Enhancements

AreaPrior behaviorNew / changed behavior
Windows RecallNot available.Captures system snapshots to create a browsable visual timeline. Secured via Windows Hello.
Live CaptionsBasic functionality.Provides real-time captions for any audio content on the device, enhancing accessibility.
Windows Studio EffectsBasic camera effects.AI-enhanced video and audio effects like background blur, voice clarity, and automatic framing.
Co-Creator in PaintStandard Paint tools.Integrates AI to generate or modify images based on user descriptions.

Security Enhancements

AreaPrior behaviorNew / changed behavior
Personal Data Encryption (PDE)Not available.File-level encryption tied to Windows Hello credentials, protecting user data even if the device is compromised.
SMB ProtocolSMB signing was optional. NTLM was a common fallback.SMB signing is now mandatory by default. SMB NTLM blocking is introduced to push for Kerberos adoption.
KerberosLess strict authentication policies.Stricter Kerberos policies are enforced, which may impact cross-domain authentication in one-way trust environments.
LAPSPrimarily managed via on-premises Active Directory.Deeply integrated into the OS with native support for storing passwords in Azure AD.
Windows Protected Print ModeStandard print protocols.Introduces end-to-end encryption for print jobs sent to Mopria-certified printers.

OS & Update Management

AreaPrior behaviorNew / changed behavior
Windows UpdateTraditional, monolithic cumulative updates.Introduces Checkpoint Cumulative Updates—smaller, modular updates for faster installation and component-level rollback.

Procedure / Implementation

Use these procedures to manage the new features in your environment.

Step 1 – Block 24H2 Deployment Until Validation is Complete
Admin Alert

It is highly recommended to block the Windows 11 24H2 update in your environment until you have validated that the changes outlined in this guide do not negatively impact your users or infrastructure.

  1. Open the Group Policy Management Console.
  2. Navigate to Computer Configuration > Administrative Templates > Windows Components > Windows Update > Windows Update for Business.
  3. Find the setting Select the target Feature Update version.
  4. Set the policy to Enabled.
  5. Enter Windows 11 for the target version product.
  6. Enter 23H2 for the target version. This will prevent devices from updating to a newer version like 24H2.
Step 2 – Manage and Disable Microsoft Recall
Recommendation

Disable Windows Recall immediately due to potential exposure of sensitive data until the feature can be thoroughly reviewed by your security teams.

Method 1: Group Policy

  1. Open the Group Policy Management Console.
  2. Navigate to: User Configuration > Administrative Templates > Windows Components > Windows AI.
  3. Set the policy Turn off Savings Snapshots for Windows to Enabled.
  4. Apply the policy.

Method 2: Intune Configuration Profile

  1. In the Intune admin center, navigate to Devices > Configuration Profiles.
  2. Create a new profile for Windows 10 and later with a type of Settings catalog.
  3. Search for and add the setting Turn off Savings Snapshots for Windows.
  4. Set it to Enabled and assign the profile to your target device groups.
Step 3 – Mitigate Kerberos Authentication Issues

If you encounter cross-domain authentication failures or privilege elevation issues, you may need to temporarily adjust Kerberos policies.

  1. Enable Enhanced Logging:

    • In Group Policy, go to Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Logon/Logoff.
    • Enable auditing for Audit Kerberos Authentication Service and Audit Kerberos Service Ticket Operations. This will help diagnose failures.
  2. Temporarily Disable Stricter Checks (PowerShell):

    DisableCloudKerberosTicketRetrieval.ps1
    # This disables some of the stricter validation checks until underlying issues are resolved.
    Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos" -Name "CloudKerberosTicketRetrievalEnabled" -Value 0
  3. Allow Fallback to NTLM for Legacy Systems:

    • In Group Policy, navigate to Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options.
    • Set Network security: Restrict NTLM to Disable for affected systems.

Verification: After applying changes, test cross-domain resource access and administrative privilege elevation. Check the Security event log on domain controllers for Kerberos-related error codes.

Step 4 – Optionally Disable New SMB Hardening Features

While recommended for security, you may need to temporarily disable new SMB features for compatibility with legacy systems. Perform these actions only on a temporary basis.

Disable SMB Signing

Disable-SMBSigning.ps1
# On client
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters" -Name "EnableSecuritySignature" -Value 0
# On server
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters" -Name "RequireSecuritySignature" -Value 0

Disable SMB Encryption

Disable-SMBEncryption.ps1
# On server
Set-SmbServerConfiguration -EncryptData $false
# On client
Set-SmbClientConfiguration -EnableSecuritySignature $false
Known caveat

Disabling SMB signing or encryption significantly reduces the security of your file-sharing infrastructure and exposes it to man-in-the-middle attacks. This should only be a temporary measure while legacy devices are remediated.

Rollback / Fallback Plan

  • Windows Update: The new Checkpoint Cumulative Updates allow for component-level rollback. If a monthly update causes issues, it can be uninstalled via Settings > Windows Update > Update history > Uninstall updates without removing the entire cumulative update.
  • Feature Update: To roll back from version 24H2 to your previous version, you can use the recovery option in Settings > System > Recovery > Go back. This option is available for 10 days after the upgrade.

Troubleshooting & Known Issues

Below is a summary of known issues affecting Windows 11 24H2 as of October 2025.

IssueDescriptionStatusLast Updated
DirectAccess connection issuesAfter upgrading to 24H2, devices may fail to connect via DirectAccess, remaining in a "connecting" state.ResolvedResolved in KB5044384.
OOBE Language TranslationIn the Out-of-Box-Experience, the language selection button may incorrectly display "Continue in English" regardless of the chosen language. This is a cosmetic issue.ResolvedResolved in the September 30, 2024 update (KB5043178).
sprotect.sys driver incompatibilityDevices with apps using the sprotect.sys driver (from SenseShield Technology) may become unresponsive or show a blue screen.ConfirmedA safeguard hold is in place. Microsoft is working with the vendor.
WUSA Update FailuresInstalling updates from a shared network folder using WUSA might fail if the folder contains multiple .msu files.MitigatedA Known Issue Rollback (KIR) has been issued. Workaround is to copy the .msu file locally before installing.
Protected Content PlaybackSome Blu-Ray, DVD, or Digital TV apps may fail to play DRM-protected content, causing freezing or black screens.MitigatedPartially resolved in the September 2025 preview update. A full fix is still in development.
Intel SST Driver IncompatibilityDevices with 11th Gen Intel Core processors and specific Intel Smart Sound Technology driver versions may experience a blue screen.Resolved (External)Resolved by updating Intel SST drivers to version 10.30.00.5714 / 10.29.00.5714 or later.
Wallpaper AppsSome wallpaper customization applications may not function correctly after the update.MitigatedSafeguard hold is being gradually removed as app developers release updates.

For a complete and live list of issues, refer to the official Microsoft resources:


Security & Compliance Considerations

  • Personal Data Encryption (PDE): PDE is a powerful tool for protecting user data on shared or remote devices. However, it is tied to Windows Hello credentials. Organizations must have a robust process for credential recovery. Recommendation: Disable by default until policies for deployment and recovery are established.
  • Windows Recall: This feature creates a detailed history of user activity, which could be a target for attackers if a device is compromised. Recommendation: Disable via Group Policy or Intune across the enterprise until a thorough security review is completed.
  • SMB Hardening: The mandatory signing and NTLM blocking significantly improve security against common attacks. However, they can break connectivity for legacy devices and applications. Recommendation: Conduct a thorough audit of your SMB infrastructure and test the new settings in a non-production environment before broad deployment.
  • Kerberos Enhancements: Stricter policies improve security but can disrupt authentication in complex, multi-domain environments. Recommendation: Audit all domain trust relationships, especially one-way trusts, and validate cross-domain service access.

Best Practices & Recommendations

  • Phased Rollout: Use deployment rings in Windows Update for Business, WSUS, or Intune to roll out 24H2 gradually. Start with a small group of IT professionals and pilot users before expanding.
  • Validate Line-of-Business (LOB) Apps: Thoroughly test all critical LOB applications, especially those that rely on network shares (SMB) or cross-domain authentication (Kerberos).
  • Update Drivers and Firmware: Before deploying the update, ensure that all device drivers, especially for network, storage, and audio (e.g., Intel SST), are updated to the latest versions to avoid known compatibility issues.
  • Educate Users: Inform users about new features like the enhanced security prompts and changes to the UI to reduce helpdesk calls.

References & FAQs


This article was collaboratively developed by a human subject matter expert and an AI assistant to ensure it is both comprehensive and easy to understand.