I was getting this error company wide when trying to install any app from the Windows Store on a domain joined computer. The store was fully navigational, but any app I tried to install would instantly error. Showing the details would reveal Error Code 0x8024500c.
This is a fairly standard error code and there’s a lot of reasons already posted online; but for me it was one simple Group Policy setting:
Do not connect to any Windows Update Internet locations
Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Windows Store.
Enabling this policy will disable that functionality, and may cause connection to public services such as the Windows Store to stop working.
Note: This policy applies only when this PC is configured to connect to an intranet update service using the “Specify intranet Microsoft update service location” policy.
Back in the Windows 7 days, it makes sense to disable this if you want to force clients to only use your WSUS servers and control the experience. However, it completely breaks the Windows Store!
You can find this policy under Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Update.
Note that this doesn’t seem to break the private Business Store section if you have that configured up, which can be a nice way of controlling the apps your users see.
Update 14th December 2017
A friend pointed this out to me – before changing this setting, be aware that there’s a bug with Windows 10 Pro that is fixed in KB4053580:
- Addresses issue that caused Windows Pro devices on the Current Branch for Business (CBB) to upgrade unexpectedly.
You may find your Windows 10 Pro devices being upgraded to Windows 10 1709 without you doing anything. Make sure you have this patch deployed before changing this setting.
6 thoughts on “Windows Store Error 0x8024500c”
Brilliant, thank you. So many other non working solution and this one was perfect!
Glad to hear it and appreciate you posting it :)
Thanks a ton from me, too! Very irritating issue.
Hmm this policy is activated at the customer I’m at right now and it’s for a good reason. If it is not configured or disabled users are able to self update their machine to the latest Windows 10 build. Something that is not allowed at this customer.
We had this setting as our SCCM server. After disabling this setting, it got business store working, however it stopped Windows 10 getting its defender updates from the SCCM server. Any other ideas? Thanks
I’m getting Defender Updates straight from WSUS sorry, so can’t test this. Maybe try posting this issue at https://techcommunity.microsoft.com/t5/System-Center-Configuration/bd-p/SystemCenterConfigurationManager ?