Windows Server 2025 – HotPatching with ARC

Introduction

In today’s fast-paced digital world, maintaining the security and performance of your servers without disrupting operations is crucial. Enter Hotpatching, a groundbreaking feature that allows you to install OS security updates on your machines without the need for a reboot. First introduced in Windows Server 2022 Azure Edition, Hotpatching works by patching the in-memory code of running processes, ensuring that your systems remain secure and operational. This blog post will delve into the configuration of Hotpatching preview features available in Windows Server 2025 Datacenter Evaluation edition.

Steps to be completed for this update.

  • Connect to Azure Arc your Windows Server 2025 Datacenter Evaluation edition
  • Subscribe/ unsubscribe Hotpatching service via the Azure Arc Portal
  • Manage deployment of Hotpatch updates natively on Azure via Azure Update Manager

Step 1. Download the latest ISO from the evaluation center below.

Set up the VM using Windows Server 2025 Preview

  • Download the ISO image or VHDX from The Evaluation center. You may have to fill in a form and provide your email address.
  • On Hyper-V or other platform create a Gen 2 VM and use the option to create the VM using ISO.
  • This Windows version should be 24H2 build. Run WinVer to confirm from the command line.
A close-up of a computer

Description automatically generated

Step 2. Enable Virtualization Based Security

To Enable Virtualization Based Security, on the new virtual machine log in and run this command from an elevated command prompt or enable Core isolation Memory integrity from Windows Security.

Reg add "HKLM\SYSTEM\ControlSet001\Control\DeviceGuard" /v "EnableVirtualizationBasedSecurity" /t REG_DWORD /d 1 /f

**** REBOOT After this is completed *****

Prior to this change the System Information would show that the Virtualization-based security is Not Enabled

A screenshot of a computer

Description automatically generated

Step 3. Install KB5040435 (7B Security update)

Install the latest updates by running Windows update. Ensure July security update is installed.

A screenshot of a computer

Description automatically generated

*** You will need to reboot. ***

**If you are performing the experiment on or after 8/13, then install July security update directly. This is needed for you to observe that August Security update will not need a reboot. Microsoft Update Catalog

Step 4. Connect the VM to Azure ARC

You can use the existing options to add the machine to Azure ARC through the Azure Portal.

Quickstart – Connect hybrid machine with Azure Arc-enabled servers – Azure Arc | Microsoft Learn

Screenshot of Azure portal's add server page.

Step 5. Update the ARC Agent with a new version – manual download to the VM.

Update the Arc Agent on your VM by running the following PowerShell:

[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 3072;
Invoke-WebRequest -UseBasicParsing -Uri "https://aka.ms/azcmagent-windows" -TimeoutSec 30 -OutFile "$env:TEMP\install_windows_azcmagent.ps1";
& "$env:TEMP\install_windows_azcmagent.ps1";

Step 6. Admin Opt In +Hotpatch Subscription

Now go to https://portal.azure.com and enable Hotpatching.

On the top of the page click on Azure Arc or search for the ARC in the search box.

Click on Machines on the left panel

You will now see the Arc connected machine you set up in the list. Click on that

This will take you the server management page where you will see HOTPATCH card towards the bottom.

Clicking on that tile will have a fly-in page on the side that will allow you to select Hotpatching. Check the box and click the Confirm button at the bottom. Behind the scenes the Arc connected server will be configured to receive Hotpatches.

After the operation for enrollment is confirmed the Hotpatch tile shows that the service is Enabled

The Arc attached machine is now ready to receive Hotpatches.

Step 7. Scan and install 8B/9B/10B Hotpatch when released

As you now have the July security update (7B), which is also a Baseline, when August Hotpatch (8B) is released (8/13) it will be offered to this machine. That update should not reboot the machine.

Scan and install 8B/9B Hotpatch when released using Azure Update Manager

Using Azure Update Manager, you can identify machines that are Hotpatch eligible, install Hotpatches immediately upon release, choose your installation schedule, and track updates to maintain reliability of your machines. Here’s how to manage Hotpatches using Azure Update Manager:

  1. Verify that the hotpatch subscription is available or has already been enabled from the Updates tab of your Arc Server:
A screenshot of a computer

Description automatically generated

The change option above allows you to enable or cancel the hotpatch subscription on-demand.

  1. You can scan and view the 8B update offered to this machine by performing an assessment.
  2. You can choose to include the specific 8B update and when to install it on your Arc server by creating a user-defined schedule or one-time update. You can install it immediately after it is available, allowing your machine to get secure faster.
  3. Verify whether the 8B update has been installed and the reboot status of the machine by viewing history.
A screenshot of a computer

Description automatically generated

These steps provide a streamlined way to plan installation of Hotpatches on your Arc machine.

As a reference this diagram shows how hotpatching should cycle in months. Each baseline check will not require a reboot. Some items like .NET patching and other 3rd party updates may still require a reboot.

A diagram showing a Hotpatch sample schedule.

Reference Documentation: Hotpatch for Windows Server Azure Edition | Microsoft Learn

After the setup is completed, if the updates were checked within the virtual machine vs. Azure Update Manager, you could see a status showing that the update did not require a reboot.

A screenshot of a computer

Description automatically generated

VMware configuration for the virtual machine.

As many customers are using VMware for the virtualization platform there are some specific settings needed to be utilized on the machines. These settings can be configured in ESXI or vCenter, during the installation of the machine or after the machine is created. Below are some screen shots to help you with this configuration.

In VMware check these following settings on the VM otherwise Hot Patching will not be offered.

The Expose hardware assisted virtualization to the guest OS needs to be checked under the Virtual Hardware tab.

A screenshot of a computer

Description automatically generated

The Enable Virtualization Based Security checkbox needs to be checked under VM Options tab.

These settings can also be checked when creating a new virtual machine.

A screenshot of a computer

Description automatically generated

In VMware – vCenter – when creating the virtual machine the Enable Windows Virtualization Based Security needs to be checked.

A screenshot of a computer

Description automatically generated
A screenshot of a computer

Description automatically generated

To verify the setup go to System Information on the virtual machine and check the Virtualization-based security service to ensure it is running.

A screenshot of a computer

Description automatically generated

Check for updates either manually within Windows, or use Azure Update Manager to do an assessment of the machine.

If Virtualization is not set properly you will see the KB50415171 update instead of the KB5041570 update as shown below as marked in the 2 screen shots as Incorrect.

(Incorrect)

(Incorrect)

A screenshot of a computer

Description automatically generated

(Correct)

A screenshot of a computer

Description automatically generated

(Correct)

After installing the updates with Azure Update Manager it shows that a reboot was not needed.

A screenshot of a computer

Description automatically generated

Conclusion

Hotpatching represents a significant advancement in server maintenance, offering a seamless way to keep your systems secure and up-to-date without the downtime associated with traditional updates. By leveraging Hotpatching, you can ensure faster installation of security updates, reduced resource consumption, and minimal disruption to your operations. As part of the preview, you can now connect your Windows Server 2025 Datacenter Evaluation edition machines to Azure Arc and manage Hotpatching through the Azure Arc portal and Azure Update Manager. Embrace the future of server maintenance with Hotpatching and experience the benefits of a more efficient and secure IT environment.

Tags: #Hotpatching #WindowsServer2025 #AzureArc #ServerMaintenance #SecurityUpdates #NoReboot #ITManagement #AzureUpdateManager

About the author

Jeff Pigott is a Senior Cloud Solution Architect at Microsoft, specializing in Azure Infrastructure technologies including Azure Arc, Azure Update Manager, SQL DB, security, and storage. With over 29 years of experience in IT, development, and DevOps, Jeff has worked with a wide range of platforms, tools, and languages. Jeff is passionate about staying up-to-date with the latest Microsoft technologies and services, and holds multiple Azure certifications.