/
/

How to Block Specific Windows Updates Without Pausing Entire Patch Cycles

by Mikhail Blacer, IT Technical Writer
How to Block Specific Windows Updates Without Pausing Entire Patch Cycles blog banner image

Microsoft releases cumulative updates monthly, but not every patch is safe to deploy immediately. Some updates can break applications, disrupt workflows, or cause stability issues on client devices. MSPs and IT admins often need a way to block a specific Windows update while keeping the rest of the patch cycle on schedule. Each Windows update is identified by a unique Knowledge Base (KB) number, which makes it possible to target and block only the problematic patch.

By using tools like PowerShell, Group Policy, Registry edits, and RMM scripting, you can selectively stop problematic KBs without pausing Windows Update entirely. This keeps endpoints secure with the latest fixes while preventing known bad patches from causing downtime.

Guide to blocking a specific Windows update without pausing patch cycles

📌 Prerequisites:

  • Devices must be running Windows 10, Windows 11, or Windows Server 2016.
  • You need administrator rights on local or remote endpoints to block or defer updates.
  • PowerShell 5.1 or higher must be available to run scripts for hiding or unhiding specific KB updates.
  • Access to the Windows Registry is required if you plan to configure update blocks manually.
  • Group Policy Management Console (GPMC) should be available in domain environments for enforcing update rules at scale.
  • Optionally, an RMM platform such as NinjaOne can be used to deploy scripts, enforce policies, and report on blocked updates across client devices.

 

Click to Choose a Method

💻

Best for Individual Users

💻💻💻

Best for Enterprises

Method 1: Block a specific Windows update using PowerShell
Method 2: How to use Microsoft’s wushowhide.diagcab tool to block specific updates
Method 3: Block updates via GPO or Registry (driver example)
Method 4: Use Registry to log or tag blocked updates
Method 5: Use Windows Update for Business (WUfB) policies to delay updates (optional)

Method 1: Block a specific Windows update using PowerShell

You can use PowerShell to hide a single problematic KB so it will not install, while allowing all other updates to proceed normally.

📌 Use Cases:

  • This method lets you prevent a known bad KB from installing this month’s patch cycle without pausing updates.
  • You can use this to unhide the KB later after Microsoft issues a fix or when your testing clears it.

📌 Prerequisites:

  • Administrator rights on the endpoint or via your RMM
  • PowerShell 5.1 or higher with internet access to install the PSWindowsUpdate module
  • The exact KB number you want to block

Here are the steps to use PowerShell to block a specific Windows update:

  1. Open PowerShell and install the module using this command:

Install-Module PSWindowsUpdate -Force

  1. Next, use this command to list pending updates and confirm the KB number:

Get-WindowsUpdate -MicrosoftUpdate

  1. Subsequently, use this code to hide the specific KB (replace KB5000000 with your target) so it will not install:

Get-WindowsUpdate -KBArticleID KB5029263 | Hide-WindowsUpdate -Confirm:$false

  1. To view hidden updates, use this:

Get-WindowsUpdate -IsHidden

  1. To unhide, use this command:

Hide-WindowsUpdate -KBArticleID ‘KB5000000’ -MicrosoftUpdate -Hide:$false -Confirm:$false

Method 2: How to use Microsoft’s wushowhide.diagcab tool to block specific updates

The wushowhide.diagcab tool lets you manually block specific Windows updates without pausing the entire patch cycle. It’s good for use in individual machines, but not for automation or deployment at scale.

📌 Use Cases:

  • You can use this to manually hide a problematic update on a standalone device.
  • This is a lightweight option for technicians when an RMM tool or Group Policy is unavailable.

📌 Prerequisites:

  • You’ll need local administrator rights on the endpoint.
  • Download of the wushowhide.diagcab tool from Microsoft.

Show or Hide Updates

Use the wushowhide.diagcab tool via these steps:

  1. Download wushowhide.diagcab from Microsoft’s site.
  2. Run the tool and follow the on-screen prompts to scan for available updates.
  3. Select the problematic update and choose Hide update to block it.

Method 3: Block updates via GPO or Registry (driver example)

If a Windows update keeps pushing an unwanted driver, you can block it by targeting its hardware ID. You can do this via GPO or the Registry.

📌 Use Cases:

  • You can use this to prevent Windows from automatically reinstalling a problematic driver.
  • Apply consistent driver blocking across managed endpoints.

📌 Prerequisites:

  • Administrator rights and access to the Group Policy Management Console (for domain devices) or Registry Editor (for standalone devices)
  • The hardware ID of the driver you want to block, which can be found in Device Manager > Device Properties > Details tab > Hardware IDs

To use Group Policy to block a specific Windows update, use these steps:

  1. Open the Group Policy Editor and navigate to:

Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions.

  1. Enable Prevent installation of devices that match any of these device IDs. To remove the policy, you can set it back to Not Configured or Disabled.
  2. Add the hardware IDs of the driver you want to block.

You can perform the Registry method by running this code on PowerShell:

New-Item -Path “HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceInstall\Restrictions” -Force

Set-ItemProperty -Path “HKLM:\SOFTWARE\Policies\Microsoft\Windows\DeviceInstall\Restrictions”

-Name “DenyDeviceIDs” -Value “PCI\VEN_8086&DEV_1234”

To undo the change, follow these steps:

  1. Open Registry Editor.
  2. Go to: HKLM\SOFTWARE\Policies\Microsoft\Windows\DeviceInstall\Restrictions
  3. Delete the DenyDeviceIDs entry, or remove the entire Restrictions key.
  4. Reboot your computer so the changes can take effect.

⚠️ Warning: Be sure to use this method carefully. Blocking by hardware ID will prevent Windows from reinstalling the driver properly until the policy or registry entry is removed.

Method 4: Use Registry to log or tag blocked updates

You can log which KBs have been blocked by writing them into the Registry. This gives technicians or RMM tools a local record to validate against during audits or compliance checks.

📌 Use Cases:

  • Keep a simple local record of blocked KBs on each endpoint.
  • Provide RMMs with a reliable key to query for compliance reporting.

📌 Prerequisites:

  • Administrator rights to create or edit Registry keys under HKLM
  • Consistent naming conventions for Registry entries (e.g., KB numbers as value names)

Here’s how to use the Registry to log or tag blocked updates:

  1. To create a Registry key to hold blocked KBs, run this command:

New-Item -Path “HKLM:\SOFTWARE\Org\UpdateExclusions” -Force

  1. Next, add the KB number you want to track:

Set-ItemProperty -Path “HKLM:\SOFTWARE\Org\UpdateExclusions” -Name “KB5029263” -Value “Blocked”

  1. Here’s how to record when the block was last updated:

Set-ItemProperty -Path “HKLM:\SOFTWARE\Org\UpdateExclusions” -Name “LastUpdated” -Value (Get-Date).ToString(“u”)

  1. To validate, you can run this on the Command Prompt:

reg query HKLM\SOFTWARE\Org\UpdateExclusions

Method 5: Use Windows Update for Business (WUfB) policies to delay updates (optional)

Windows Update for Business lets you delay certain types of updates through Group Policy. This does not block an individual KB, but it allows you to pause entire categories of updates until you’ve had time to test them.

📌 Use Cases:

  • This lets you delay feature or quality updates across devices for testing before a broad rollout.
  • You can use this to add a buffer period to catch issues without disabling Windows Update.

📌 Prerequisites:

  • You will need Windows Pro, Enterprise, or Education edition (WUfB is not available on Home).
  • Access to the Group Policy Management Console (GPMC).

Here’s how you can use Windows Update for Business (WUfB) policies to prevent updates for the time being:

  1. Open the Group Policy Editor.
  2. Navigate to:

Computer Configuration > Administrative Templates > Windows Components > Windows Update > Windows Update for Business. 

  1. Configure these policies:
    1. Select when Quality Updates are received
    2. Select when Feature Updates are received
  2. Set the number of days to defer each type of update based on your patching strategy.

⚠️ Things to look out for

RisksPotential ConsequencesReversals
Blocking the wrong KBMay stop critical security fixes from being appliedUnhide the KB with PowerShell or wushowhide and allow Windows Update to install it.
Overusing WUfB or GPO delaysDevices may fall behind on cumulative updates, leaving gaps in protection.Adjust or disable the policy to resume normal update flow.
Registry entries misconfiguredCan cause updates or drivers to fail unexpectedlyRemove or correct the Registry keys and restart the device.

Additional considerations when blocking specific Windows updates

Watch for supersession

Some blocked KBs may be replaced by newer rollups. Check each month’s updates and reblock the new KB if needed.

Reporting

Use event logs and Windows Update logs with the Get-WindowsUpdateLog command to confirm that updates are being suppressed correctly.

Third-party patch tools

Be cautious of conflicts if you are also using WSUS, Intune, or third-party patch management. These tools may override or bypass manual blocks.

Dependencies

Some Windows updates require prerequisites. Blocking one update can delay others until the dependency is installed.

Troubleshooting issues related to blocking specific Windows Updates

Update still installs

Check if the KB was replaced by a newer rollup or delivered through another update bundle. If necessary, reblock the superseding KB.

Hide-WindowsUpdate not working

Confirm that the PSWindowsUpdate module is up to date and that PowerShell is running with administrator rights.

Device ID block ineffective

Validate that you are using the correct hardware ID. Run pnputil /enum-devices /connected to list IDs and confirm accuracy.

Registry not applying

Double-check the Registry path, data type, and permissions. Make sure the key is created under HKLM and not HKCU.

NinjaOne services for blocking specific Windows updates

What NinjaOne can do What it isHow it helps
KB-specific hide scriptsDeploys PowerShell hide commands via its automation policiesThis lets you block targeted KBs at scale on various endpoints without manual effort.
Registry auditChecks Registry keys for blocked update markersIt confirms which endpoints have exclusions.
Endpoint taggingTags devices with temporary exclusionsMakes it easy to track which systems are holding back a KB
Alerts on reclassified updatesTriggers alerts if an excluded update installs after supersedenceThis makes sure blocked patches don’t slip back in through rollups.
Reporting update complianceReports update status while honoring exclusionsMSPs can isolate problematic updates without disrupting organization-wide patch hygiene.

Block specific updates and maintain stability while keeping patch cycles on track

Blocking individual Windows updates is essential when stability or compatibility is at risk, especially if updates can hinder tools and workflows your technicians use. By targeting specific KBs instead of pausing patching altogether, MSPs and IT admins can keep devices secure while avoiding downtime from problematic and disruptive updates.

Related topics:

You might also like

Ready to simplify the hardest parts of IT?