{"id":32322,"date":"2020-01-31T07:18:56","date_gmt":"2020-01-31T12:18:56","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=32322"},"modified":"2020-05-18T08:03:08","modified_gmt":"2020-05-18T12:03:08","slug":"windows7-end-of-support","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/windows7-end-of-support\/32322\/","title":{"rendered":"What to do about Windows 7&#8217;s end of life"},"content":{"rendered":"<p>As you know, January 14 saw the end of extended support for Windows 7. Just three days later, Microsoft published information about a <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV200001\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">vulnerability in the Internet Explorer browser<\/a> that an attacker can use to gain the same rights as an active user.\u00a0 The majority of companies still using Windows 7 will likely not receive a patch for this vulnerability. Sure, paid support will continue until January 10, 2023, but not all companies consider that economically viable. So now is definitely the time for some brainstorming followed by action. We decided to offer our own perspective on the problem.<\/p>\n<h2>Stocktaking<\/h2>\n<p>An IT infrastructure audit is something that every organization should carry out periodically, and the pulling of support for Windows 7 is a good reason to do one right now. Make no mistake, you will find more than a few surprises lurking on your local network. It\u2019s not all about Windows 7. Sometimes, administrators\u2019 attempts to solve problems on the cheap can have strange results.<\/p>\n<p>A typical example that our experts have come across more than once among clients is the use of an ancient computer as a kind of print server. In those cases, the administrators bought a low-cost printer without Ethernet or Wi-Fi support and hooked it up to an unused computer to provide network access. Such a contraption can sit under an office desk for years, and naturally, no one ever thinks about updating the software. Not only could the outdated Windows 7 be on it, but you might even find the antediluvian Windows XP. So instead of waiting for the next <a href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-for-b2b\/16544\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">WannaCry<\/a> to reveal the existence of such relics, it\u2019s worth doing some excavation for yourself.<\/p>\n<p>Pay particular attention to atypical equipment such as electronic dashboards, medical diagnostic devices, and embedded systems. Administrators have been known to overlook the fact that these are essentially ordinary computers, and some of them running Windows. On them is some kind of software that\u2019s controlled online and potentially teeming with unpatched vulnerabilities.<\/p>\n<p>Doing an IT inventory is quite straightforward \u2014 many free applications will locate all active hosts on your network. Our products provide that feature as well. For example, the <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business Advanced<\/a>suite has tools that not only find all devices on the network, but also retrieve detailed information about protected machines, and allow remote updating of the system and key software. Other machines need to be inventoried manually.<\/p>\n<h2>Analysis and classification<\/h2>\n<p>It\u2019s important to understand that we are not searching solely for computers running Windows 7 or XP. The client needs to know exactly what is on the network and where. We frequently work with clients who don\u2019t know what build of operating system they have or when the system was last updated, if ever.<\/p>\n<p>It\u2019s also important to know about Windows 8, and even Windows 10. After all, mainstream support for 8.1 came to an end on January 9, 2018, but thanks to extended support, security updates will continue until January 10, 2023. That might seem far off, but in terms of support, it\u2019s not. What\u2019s more, the first release of Windows 10 wasn\u2019t a whole lot more secure than the timeworn XP. Some administrators are prone to disabling updates (for reasons of performance, or because they simply don\u2019t see the need).<\/p>\n<p>Armed with comprehensive information about what machines are on your network, what operating systems they run, and what they are used for, you can classify them by two criteria: what actions need to be taken to eliminate vulnerabilities, and how critical each network node is.<\/p>\n<p>Update Windows 10 and 8 to the highest available version. You might be better off simply disconnecting some nodes. It\u2019s likely you\u2019ll have to upgrade at least one. If you find any PCs with Windows 7 or XP, make sure they\u2019re equipped with dedicated security solutions. Of course, we advocate protecting all computers on the network, but machines with outdated operating systems are an order of magnitude more vulnerable and therefore that much more important to protect now.<\/p>\n<p>Next, you need to establish how critical each PC is for your business. What would happen if cybercriminals gained access to it? If disaster would ensue, the computer should be updated at your first opportunity. If it operates in an isolated segment, the second will do. But everything needs to be protected, down to the last dashboard. After all, WannaCry was not targeted at dashboards, PoS terminals, or medical devices, yet the reputational damage suffered by companies as a result was no less harmful than the losses from the computer downtime.<\/p>\n<h2>Management plan update<\/h2>\n<p>Although categorization by itself will shed light on what and when you need to update, you still need to plan all stages of the changes while the iron is hot. In that case, your IT inventory will not simply yield a list of vulnerable computers; it will enhance the level of protection of your infrastructure for real. Critical nodes should be addressed immediately. Finally, do not forget to turn on system updates. Without them, in two weeks your network will be just as vulnerable as it is now.<\/p>\n<p>If for some reason getting rid of an outdated system, or using a fully functional security solution, proves impossible (most often this relates to embedded systems), we recommend Kaspersky Embedded Systems Security, which protects ATMs and PoS terminals but also operates just as effectively on other low-end equipment running outdated operating systems. For more details about the solution, see <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/embedded-systems?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Embedded Systems Security<\/a> page.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.<\/p>\n","protected":false},"author":2515,"featured_media":32323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[3628,131,113],"class_list":{"0":"post-32322","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-end-of-life","10":"tag-tips","11":"tag-windows"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/windows7-end-of-support\/32322\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/windows7-end-of-support\/18455\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/windows7-end-of-support\/15330\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/windows7-end-of-support\/7430\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/windows7-end-of-support\/20211\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/windows7-end-of-support\/18540\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/windows7-end-of-support\/17005\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/windows7-end-of-support\/21013\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/windows7-end-of-support\/19790\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/windows7-end-of-support\/26222\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/windows7-end-of-support\/7631\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/windows7-end-of-support\/13670\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/windows7-end-of-support\/14027\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/windows7-end-of-support\/12724\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/windows7-end-of-support\/22074\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/windows7-end-of-support\/26831\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/windows7-end-of-support\/24933\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/windows7-end-of-support\/20885\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/windows7-end-of-support\/25735\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/windows7-end-of-support\/25567\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/end-of-life\/","name":"end of life"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/32322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2515"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=32322"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/32322\/revisions"}],"predecessor-version":[{"id":35498,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/32322\/revisions\/35498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/32323"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=32322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=32322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=32322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}