Microsoft says some customers are experiencing issues downloading and installing Office on their Windows 365 devices.
Windows 365 is a cloud-based service that runs on Azure Virtual Desktop and allows enterprise customers with Windows 365 Enterprise or Windows 365 Business subscriptions to stream Windows Cloud PCs to end users.
According to a service alert seen by BleepingComputer, this issue (tracked under WP1309017 and first acknowledged on Tuesday, May 12) is caused by a configuration change pushed via a recent service update.
Microsoft is currently developing a fix and anticipates that deploying it to affected environments will delay the resolution of Office installation issues, with the next update scheduled for Friday.
“We identified that a recent service update contained a configuration change that’s impacting the downloading and installation of Office on Windows 365 devices,” the company added.
“We’re developing a fix to correct the configuration and will deploy it to the affected environment. The validation and deployment of the fix will take time to complete and will closely monitor the progress.”
Microsoft has yet to provide a final timeline for full remediation and said that any Windows 365 user trying to install Office is “potentially” affected.
However, the company has also tagged this ongoing incident as an advisory, a flag commonly used to describe service issues typically involving limited scope or impact.
Until the issue is resolved, those affected trying to install Microsoft Office on their Windows 365 device can manually download the software suite from the Microsoft 365 page.
Earlier this year, in January, Microsoft also confirmed that the KB5074109 Windows security update caused connection failures during Remote Desktop connections to Azure Virtual Desktop and Windows 365 for Windows 10, Windows 11, and Windows Server customers.
Days later, the company released multiple emergency, out-of-band updates for all affected Windows platforms to fix the Windows 365 remote desktop connection issue.
AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.
At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.





