Hello,
The Known Issue Rollback (KIR) mechanism is Microsoft’s official way of mitigating regressions introduced by cumulative updates without requiring full patch removal. For KB5082063, the BitLocker issue is indeed covered by a KIR release. However, KIR does not apply automatically to domain-joined machines unless you explicitly deploy the rollback policy via Group Policy. On unmanaged consumer devices, the rollback is delivered through Windows Update, but in enterprise environments you need to push the KIR GPO so that the affected registry values under HKLM\SOFTWARE\Microsoft\PolicyManager\current\device\Update are set correctly.
If your concern is preventing the BitLocker problem across your domain, then yes, implementing the KIR through a GPO is the correct approach. Microsoft provides the ADMX/ADML templates for each rollback package, and you should import the corresponding KIR policy file into your central store. Once applied, the GPO will enforce the rollback on all targeted machines, effectively disabling the faulty code path introduced by KB5082063. This ensures compliance and avoids having to manually uninstall the update.
The important point is that LTSC or SAC channel doesn’t change the requirement: domain-joined devices will not receive KIR automatically. If you want to be proactive and prevent the BitLocker issue, you should deploy the KIR GPO across the OU containing your workstations. Make sure to test on a pilot group first, confirm that the rollback is applied by checking the event logs under Applications and Services Logs\Microsoft\Windows\Known Issue Rollback\Operational, and then expand to production.
I hope you've found something useful here. If it helps you get more insight into the issue, it's appreciated to accept the answer. Should you have more questions, feel free to leave a message. Have a nice day!
Domic Vo.