SlideShare a Scribd company logo
Protecting and Migrating Legacy
Windows® OSes
Your guide to mitigating the risks of Windows XP®
and Windows Server® 2003 after end of support.
End of Support is Not the End of Business
Businesses need to be prepared for the end of support of operating systems (OSes), especially if the
OS is used enterprise-wide or runs business critical applications, such as Microsoft® Windows XP® and
Windows Server® 2003.
As you know, Microsoft ended support for Windows XP on 8 April 2014, and will similarly pull the plug
on Windows Server 2003 on 14 July 2015. Without any security patches, Microsoft has cautioned that
“PCs running Windows XP after April 8, 2014 should not be considered to be protected”1
.
However, many organisations stick with their legacy Windows systems, even after support ends.
Changing an OS across the entire organisation opens up the risk of downtime for mission critical
applications. Migrating to a new OS is also manpower-intensive, and could easily lead to time and
cost overruns.
Not surprisingly, companies see very little incentive to replace an unsupported but still functional
OS—until there is an overwhelmingly urgent need to do so. In addition, their business may be
dependent on old, proprietary applications that cannot run on newer platforms. Yet, it’s crucial for
organisations to understand the risks of running an out-of-support OS against the costs and effort of
migrating to a new one.
Challenges of Legacy Systems
1) Security threats
We learn from history that new vulnerabilities of an out-of-support OS will be discovered and new
malware will be developed to exploit the vulnerabilities. Without OS security patches, businesses
are exposed to significantly increased risk of security breaches of their unpatched systems. We can
expect an increase in range and number of exploits likely to be successful in their attacks due to the
cumulative effect of “doing nothing” across many separate vulnerabilities. This issue is intensified by
the threat from unknown (zero-day) vulnerabilities.
2) Regulatory compliance
Unpatched OS environment can render organisations liable to violation of industry compliance
regulations, perhaps resulting in hefty fines or penalties.
1
Microsoft, Enterprise Customers: Support for Windows XP has ended, Retrieved from
http://www.microsoft.com/en-us/windows/enterprise/end-of-support.aspx
1
2
Protecting and Migrating Legacy Windows® OSes
3) Reputation damage and remediation cost associated with data breach
An unprotected OS means the organisation is more susceptible to data breaches and loss of critical,
confidential data, which could lead to reputational damage. On top of that, businesses will incur
increased labour resources and other costs to remediate the environment once an attack occurs.
What Options Are There?
The first option is to do nothing. However, it will inevitably expose your organisation to attacks and
risks caused by legacy systems.
The second option is to purchase “custom support” from the software vendor to obtain
ongoing security patches for end-of-support OS and to deploy the patches when they are
available. This option does provide protection from the vulnerabilities that are actually patched,
but it has the following downsides:
•	 Leaves zero-day vulnerabilities unaddressed, opening systems to attack during instances of
patch unavailability and other windows of exposure
•	 Offers inadequate protection against security vulnerabilities with a moderate or low severity
rating as patches during the custom support period are usually designed for known critical
vulnerabilities only
•	 Incurs higher cost due to costly “custom support” and frequent testing and deployment of
patches
•	 Fails to be a long term solution as “custom support” programmes are specifically designed to
help customers bridge the support gap as they migrate to new OSes
The third option is to protect/harden your legacy systems. In this option the customer deploys
HIPS/HIDS based security agents at the endpoints to harden the operating system and applications,
mitigate vulnerabilities and stop known and unknown threats.
This option is most suitable in cases when a replacement is not feasible due to cost and control factors,
when patching or migrating is avoided to minimise downtime, or when having applications that are not
compatible with newer OSes.
Benefits of this approach:	
•	 Improves the security posture of your servers by protecting them against known and unknown
(zero-day) malware
•	 Eliminates emergency patching, and minimises downtime and IT expenses related to patching
through proactive protection that does not require continuous updates
•	 Reduces security incidents and remediation costs with continuous protection even if the server
is unable to get the latest patches in a timely fashion
3
Protecting and Migrating Legacy Windows® OSes
Option 3 clearly provides the best choice, with better and more consistent host security, lower overall
costs and more control with regards to legacy system replacement.
The following Symantec solutions can help you secure legacy systems effectively, minimise
business disruption and maintain regulatory compliance:
Security Solution Platform OS
Symantec™ Data Center
Security: Server Advanced 6.0
Server Any
Symantec™ Endpoint
Protection
Laptop / Desktop Windows, Mac, Linux
Point of Sale Device Windows
Symantec™ Critical System
Protection Client Edition
Point of Sale Device Non-Windows
ATM / Healthcare / Automotive /
Industrial Control Systems
Any
For more information, please read:
•	 White paper: Using Symantec Critical System Protection for Patch Mitigation and Securing
Legacy Out-of-Support Platforms
•	 Product overview: Data Center Security: Server Advanced 6.0 Overview Guide
•	 Solution brief: Protecting PoS Environments Against Multi-Stage Attacks
•	 Technical brief: Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of-Sale
Devices
The fourth option is to migrate from legacy systems. This option is most suitable for taking
advantage of the benefits of a new OS and its associated applications, or for minimising the
operational and management costs of IT systems by standardising its hardware and software.
Benefits of this approach:
•	 Enhances security posture by eliminating the risks and vulnerabilities associated with end-of-
life systems
•	 Enables better IT investments by freeing up resources from the maintenance of legacy systems
to focus on IT initiatives such as mobility deployments and cloud computing
•	 Improves business competitiveness by leveraging the productivity benefits of new OSes,
applications, mobile devices, cloud deployments and more
4
Protecting and Migrating Legacy Windows® OSes
Even though a migration can eventually lead to significant productivity, security and control benefits,
it can still be an intimidating task. In the past, migrations involved manually collecting inventory
and configuration data, throwing together solutions from disparate tools, writing and testing scripts
to handle endless contingencies and dependencies, plus a thousand other endless routines that
exhausted time, energy, money, motivation and executive patience.
With any migration, the challenge is to execute it in an efficient, cost-effective, and sustainable
manner, while protecting end-user productivity. Symantec can meet that challenge with migration and
deployment solutions that streamline processes to cut the expense, delay, and disruption of migration,
keeping it in control.
Symantec has migrated more than 300 million desktops and notebooks to Windows 2000®, XP,
Windows Vista®, Windows 7® and Windows 8®.
Symantec™ Client Management Suite 7.5 powered by Altiris™ technology not only automates and
simplifies migration efforts, but also helps manage IT resources long after migration is complete.
Client Management Suite 7.5 consists of the following components:
Component Name Description
Deployment Solution Mass deploys disk images of a reference system, migrates user data and
system configurations to new systems and configures each system based
on standardised criteria
Configuration
Management Database
(CMDB)
Acts as a data warehouse to provide greater insight into existing IT
assets, where they are, how they are connected and how any changes
would impact those relationships
Inventory Solution Gathers inventory data about computers, users, operating systems,
network devices and installed software applications in existing
environments
Patch Management
Solution
Assesses, prioritises and deploys updates for common operating systems
and applications to ensure that managed computers are protected on an
on-going basis
Software Management
Solutions
Distributes software and ensures that the correct software gets installed,
remains installed and runs without interference from other software
Allows users to directly download and install approved software or
request other software via a self-service portal
Endpoint Protection
Integration Component
Provides inventory client systems for common endpoint protection
products, migrates and rolls out Endpoint Protection agents,
troubleshoots agent problems and reports on status and outbreaks
5
Protecting and Migrating Legacy Windows® OSes
For more information, please read:
•	 Solution brief: Don’t eXPire – Simplify Your Windows Migration
•	 Product site: Symantec™ Deployment Solution 7.5 powered by Altiris™ technology
•	 Product site: Client Management Suite 7.5
Once the migration has been completed, Symantec security solutions mentioned in the previous
section can be used to protect the new operating systems from known and unknown threats.
Secure or migrate with Symantec today
The challenges of running unsupported legacy systems are not insignificant. But they are not
insurmountable either. Just because OS support has ended does not necessarily mean businesses are
left vulnerable to security threats or at the mercy of costly end-of-life support.
Symantec’s solutions offer simplified, comprehensive and cost-effective protection and migration of
Windows XP and Windows Server 2003, even after their end-of-support dates. Business operations
continue uninterrupted and industry compliance regulations are still met. Companies also gain control
and set the pace of system migration based on their own business needs and schedule.
Strong protection and risk management of legacy systems will help extend their lifespans and
ultimately prepare organisations to upgrade their systems to stay competitive and secure in today’s
fast-paced market.
For more information on securing your legacy systems, visit us.
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or
registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.

More Related Content

PDF
Ivanti New Pricing Model
Ivanti
 
PDF
Veritas Resiliency Platform
Symantec
 
PPTX
System Center Endpoint Protection 2012 R2
Norman Mayes
 
PDF
NIC2012 - System Center Endpoint Protection 2012
Nicolai Henriksen
 
PPTX
Ch12 safety engineering
software-engineering-book
 
PDF
Esg solution showcase considerations for protecting converged systems and ...
Fernando Alves
 
PPTX
Cyber Tech Israel 2016: Get Your Head in the Cloud
Symantec
 
PDF
NIST Definition of Cloud Computing
Scientia Groups
 
Ivanti New Pricing Model
Ivanti
 
Veritas Resiliency Platform
Symantec
 
System Center Endpoint Protection 2012 R2
Norman Mayes
 
NIC2012 - System Center Endpoint Protection 2012
Nicolai Henriksen
 
Ch12 safety engineering
software-engineering-book
 
Esg solution showcase considerations for protecting converged systems and ...
Fernando Alves
 
Cyber Tech Israel 2016: Get Your Head in the Cloud
Symantec
 
NIST Definition of Cloud Computing
Scientia Groups
 

What's hot (20)

PDF
Thinking of choosing Sophos?
Symantec
 
PDF
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Qualys
 
PDF
Effective Patch and Software Update Management
Quest
 
PPTX
Ch10 dependable systems
software-engineering-book
 
PPTX
System Center Endpoint Protection
Scientia Groups
 
PPTX
Ch14 resilience engineering
software-engineering-book
 
PDF
Engineering Software Products: 7. security and privacy
software-engineering-book
 
PPTX
Windows 10 Migration Tips, Tricks, and Strategies
Ivanti
 
PDF
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
ITCamp
 
PDF
Installation
Chuan Ha Quang
 
PDF
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Alexander Benoit
 
PPTX
Microsoft System Center Configuration Manager for Education
Herman Arnedo
 
PDF
Symantec Backup Exec 15 Administrator's Guide
Symantec
 
PDF
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Alexander Benoit
 
PDF
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Alexander Benoit
 
PDF
Bsm mw10
Olav Tvedt
 
DOCX
Ambesh
Ambesh Sharma
 
PDF
Overview of System Center 2012 R2 Configuration Manager
Digicomp Academy AG
 
PPTX
How Microsoft Technologies And Windows Vista Improve Supporting
Microsoft TechNet
 
PPTX
Windows 7 Optimized Desktop
IT Masterclasses
 
Thinking of choosing Sophos?
Symantec
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Qualys
 
Effective Patch and Software Update Management
Quest
 
Ch10 dependable systems
software-engineering-book
 
System Center Endpoint Protection
Scientia Groups
 
Ch14 resilience engineering
software-engineering-book
 
Engineering Software Products: 7. security and privacy
software-engineering-book
 
Windows 10 Migration Tips, Tricks, and Strategies
Ivanti
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
ITCamp
 
Installation
Chuan Ha Quang
 
Experts Live Europe 2017 - Windows 10 Servicing - the do’s and don'ts
Alexander Benoit
 
Microsoft System Center Configuration Manager for Education
Herman Arnedo
 
Symantec Backup Exec 15 Administrator's Guide
Symantec
 
Experts Live Europe 2017 - Windows 10 and the cloud - why the future needs hy...
Alexander Benoit
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Alexander Benoit
 
Bsm mw10
Olav Tvedt
 
Overview of System Center 2012 R2 Configuration Manager
Digicomp Academy AG
 
How Microsoft Technologies And Windows Vista Improve Supporting
Microsoft TechNet
 
Windows 7 Optimized Desktop
IT Masterclasses
 
Ad

Similar to TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes (20)

PDF
How Endpoint Security works ?
William hendric
 
PDF
Tres formas de modernizar la TI del dispositivo y mejorar la productividad
Cade Soluciones
 
PDF
Symantec Migration infographic
BHD Creative Ltd
 
PPTX
Securing with Sophos - Sophos Day Belux 2014
Sophos Benelux
 
PDF
4 Ways to Ensure a Smooth Windows 10 Migration
Citrix
 
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
padhaipadhai639
 
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
padhaipadhai639
 
PPTX
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
PDF
Maintaining Continuous Compliance with HCL BigFix
HCLSoftware
 
PDF
110006_perils_of_aging_emul_wp
Jessica Hirst
 
PPTX
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Quick Heal Technologies Ltd.
 
PDF
Ten questions to ask before choosing SCADA software
Trihedral
 
DOCX
CSEC630 individaul assign
Ronald Jackson, Jr
 
PPTX
Securing Teams with Microsoft 365 Security for Remote Work
Perficient, Inc.
 
PPTX
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
PDF
Many products-no-security (1)
SecPod Technologies
 
PDF
Microsoft operations management_suite_resources
Ehtesham Opel
 
PPTX
Azure-Casestudy.pptx
ssuser2ae8bb
 
PPT
Ppt Template
papdev
 
PPTX
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
How Endpoint Security works ?
William hendric
 
Tres formas de modernizar la TI del dispositivo y mejorar la productividad
Cade Soluciones
 
Symantec Migration infographic
BHD Creative Ltd
 
Securing with Sophos - Sophos Day Belux 2014
Sophos Benelux
 
4 Ways to Ensure a Smooth Windows 10 Migration
Citrix
 
I am sharing 'unit 4' with youuuuuu.PPTX
padhaipadhai639
 
I am sharing 'unit 4' with youuuuuu.PPTX
padhaipadhai639
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
Maintaining Continuous Compliance with HCL BigFix
HCLSoftware
 
110006_perils_of_aging_emul_wp
Jessica Hirst
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Quick Heal Technologies Ltd.
 
Ten questions to ask before choosing SCADA software
Trihedral
 
CSEC630 individaul assign
Ronald Jackson, Jr
 
Securing Teams with Microsoft 365 Security for Remote Work
Perficient, Inc.
 
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
Many products-no-security (1)
SecPod Technologies
 
Microsoft operations management_suite_resources
Ehtesham Opel
 
Azure-Casestudy.pptx
ssuser2ae8bb
 
Ppt Template
papdev
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
Ad

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
PDF
Symantec Mobile Security Webinar
Symantec
 
PDF
Symantec Webinar Cloud Security Threat Report
Symantec
 
PDF
Symantec Cloud Security Threat Report
Symantec
 
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
PDF
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
PDF
Symantec Webinar: GDPR 1 Year On
Symantec
 
PDF
Symantec ISTR 24 Webcast 2019
Symantec
 
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 
Symantec Enterprise Security Products are now part of Broadcom
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
 
Symantec Mobile Security Webinar
Symantec
 
Symantec Webinar Cloud Security Threat Report
Symantec
 
Symantec Cloud Security Threat Report
Symantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec
 
Symantec ISTR 24 Webcast 2019
Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec
 

Recently uploaded (20)

PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Software Development Methodologies in 2025
KodekX
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 

TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes

  • 1. Protecting and Migrating Legacy Windows® OSes Your guide to mitigating the risks of Windows XP® and Windows Server® 2003 after end of support. End of Support is Not the End of Business Businesses need to be prepared for the end of support of operating systems (OSes), especially if the OS is used enterprise-wide or runs business critical applications, such as Microsoft® Windows XP® and Windows Server® 2003. As you know, Microsoft ended support for Windows XP on 8 April 2014, and will similarly pull the plug on Windows Server 2003 on 14 July 2015. Without any security patches, Microsoft has cautioned that “PCs running Windows XP after April 8, 2014 should not be considered to be protected”1 . However, many organisations stick with their legacy Windows systems, even after support ends. Changing an OS across the entire organisation opens up the risk of downtime for mission critical applications. Migrating to a new OS is also manpower-intensive, and could easily lead to time and cost overruns. Not surprisingly, companies see very little incentive to replace an unsupported but still functional OS—until there is an overwhelmingly urgent need to do so. In addition, their business may be dependent on old, proprietary applications that cannot run on newer platforms. Yet, it’s crucial for organisations to understand the risks of running an out-of-support OS against the costs and effort of migrating to a new one. Challenges of Legacy Systems 1) Security threats We learn from history that new vulnerabilities of an out-of-support OS will be discovered and new malware will be developed to exploit the vulnerabilities. Without OS security patches, businesses are exposed to significantly increased risk of security breaches of their unpatched systems. We can expect an increase in range and number of exploits likely to be successful in their attacks due to the cumulative effect of “doing nothing” across many separate vulnerabilities. This issue is intensified by the threat from unknown (zero-day) vulnerabilities. 2) Regulatory compliance Unpatched OS environment can render organisations liable to violation of industry compliance regulations, perhaps resulting in hefty fines or penalties. 1 Microsoft, Enterprise Customers: Support for Windows XP has ended, Retrieved from http://www.microsoft.com/en-us/windows/enterprise/end-of-support.aspx 1
  • 2. 2 Protecting and Migrating Legacy Windows® OSes 3) Reputation damage and remediation cost associated with data breach An unprotected OS means the organisation is more susceptible to data breaches and loss of critical, confidential data, which could lead to reputational damage. On top of that, businesses will incur increased labour resources and other costs to remediate the environment once an attack occurs. What Options Are There? The first option is to do nothing. However, it will inevitably expose your organisation to attacks and risks caused by legacy systems. The second option is to purchase “custom support” from the software vendor to obtain ongoing security patches for end-of-support OS and to deploy the patches when they are available. This option does provide protection from the vulnerabilities that are actually patched, but it has the following downsides: • Leaves zero-day vulnerabilities unaddressed, opening systems to attack during instances of patch unavailability and other windows of exposure • Offers inadequate protection against security vulnerabilities with a moderate or low severity rating as patches during the custom support period are usually designed for known critical vulnerabilities only • Incurs higher cost due to costly “custom support” and frequent testing and deployment of patches • Fails to be a long term solution as “custom support” programmes are specifically designed to help customers bridge the support gap as they migrate to new OSes The third option is to protect/harden your legacy systems. In this option the customer deploys HIPS/HIDS based security agents at the endpoints to harden the operating system and applications, mitigate vulnerabilities and stop known and unknown threats. This option is most suitable in cases when a replacement is not feasible due to cost and control factors, when patching or migrating is avoided to minimise downtime, or when having applications that are not compatible with newer OSes. Benefits of this approach: • Improves the security posture of your servers by protecting them against known and unknown (zero-day) malware • Eliminates emergency patching, and minimises downtime and IT expenses related to patching through proactive protection that does not require continuous updates • Reduces security incidents and remediation costs with continuous protection even if the server is unable to get the latest patches in a timely fashion
  • 3. 3 Protecting and Migrating Legacy Windows® OSes Option 3 clearly provides the best choice, with better and more consistent host security, lower overall costs and more control with regards to legacy system replacement. The following Symantec solutions can help you secure legacy systems effectively, minimise business disruption and maintain regulatory compliance: Security Solution Platform OS Symantec™ Data Center Security: Server Advanced 6.0 Server Any Symantec™ Endpoint Protection Laptop / Desktop Windows, Mac, Linux Point of Sale Device Windows Symantec™ Critical System Protection Client Edition Point of Sale Device Non-Windows ATM / Healthcare / Automotive / Industrial Control Systems Any For more information, please read: • White paper: Using Symantec Critical System Protection for Patch Mitigation and Securing Legacy Out-of-Support Platforms • Product overview: Data Center Security: Server Advanced 6.0 Overview Guide • Solution brief: Protecting PoS Environments Against Multi-Stage Attacks • Technical brief: Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of-Sale Devices The fourth option is to migrate from legacy systems. This option is most suitable for taking advantage of the benefits of a new OS and its associated applications, or for minimising the operational and management costs of IT systems by standardising its hardware and software. Benefits of this approach: • Enhances security posture by eliminating the risks and vulnerabilities associated with end-of- life systems • Enables better IT investments by freeing up resources from the maintenance of legacy systems to focus on IT initiatives such as mobility deployments and cloud computing • Improves business competitiveness by leveraging the productivity benefits of new OSes, applications, mobile devices, cloud deployments and more
  • 4. 4 Protecting and Migrating Legacy Windows® OSes Even though a migration can eventually lead to significant productivity, security and control benefits, it can still be an intimidating task. In the past, migrations involved manually collecting inventory and configuration data, throwing together solutions from disparate tools, writing and testing scripts to handle endless contingencies and dependencies, plus a thousand other endless routines that exhausted time, energy, money, motivation and executive patience. With any migration, the challenge is to execute it in an efficient, cost-effective, and sustainable manner, while protecting end-user productivity. Symantec can meet that challenge with migration and deployment solutions that streamline processes to cut the expense, delay, and disruption of migration, keeping it in control. Symantec has migrated more than 300 million desktops and notebooks to Windows 2000®, XP, Windows Vista®, Windows 7® and Windows 8®. Symantec™ Client Management Suite 7.5 powered by Altiris™ technology not only automates and simplifies migration efforts, but also helps manage IT resources long after migration is complete. Client Management Suite 7.5 consists of the following components: Component Name Description Deployment Solution Mass deploys disk images of a reference system, migrates user data and system configurations to new systems and configures each system based on standardised criteria Configuration Management Database (CMDB) Acts as a data warehouse to provide greater insight into existing IT assets, where they are, how they are connected and how any changes would impact those relationships Inventory Solution Gathers inventory data about computers, users, operating systems, network devices and installed software applications in existing environments Patch Management Solution Assesses, prioritises and deploys updates for common operating systems and applications to ensure that managed computers are protected on an on-going basis Software Management Solutions Distributes software and ensures that the correct software gets installed, remains installed and runs without interference from other software Allows users to directly download and install approved software or request other software via a self-service portal Endpoint Protection Integration Component Provides inventory client systems for common endpoint protection products, migrates and rolls out Endpoint Protection agents, troubleshoots agent problems and reports on status and outbreaks
  • 5. 5 Protecting and Migrating Legacy Windows® OSes For more information, please read: • Solution brief: Don’t eXPire – Simplify Your Windows Migration • Product site: Symantec™ Deployment Solution 7.5 powered by Altiris™ technology • Product site: Client Management Suite 7.5 Once the migration has been completed, Symantec security solutions mentioned in the previous section can be used to protect the new operating systems from known and unknown threats. Secure or migrate with Symantec today The challenges of running unsupported legacy systems are not insignificant. But they are not insurmountable either. Just because OS support has ended does not necessarily mean businesses are left vulnerable to security threats or at the mercy of costly end-of-life support. Symantec’s solutions offer simplified, comprehensive and cost-effective protection and migration of Windows XP and Windows Server 2003, even after their end-of-support dates. Business operations continue uninterrupted and industry compliance regulations are still met. Companies also gain control and set the pace of system migration based on their own business needs and schedule. Strong protection and risk management of legacy systems will help extend their lifespans and ultimately prepare organisations to upgrade their systems to stay competitive and secure in today’s fast-paced market. For more information on securing your legacy systems, visit us. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.