{"id":2394,"date":"2006-06-15T00:00:00","date_gmt":"2006-06-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/15\/microsoft-reminds-about-ending-xp-sp1-support\/"},"modified":"2021-12-30T11:41:16","modified_gmt":"2021-12-30T11:41:16","slug":"microsoft-reminds-about-ending-xp-sp1-support","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/15\/microsoft-reminds-about-ending-xp-sp1-support\/","title":{"rendered":"Microsoft Reminds About Ending XP SP1 Support"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Customers running Windows XP SP1 must migrate to Windows XP SP2 over the next three months, or they&#8217;ll lose incident support as of Oct. 10. Microsoft also said it won&#8217;t release any more security updates for SP1 after that date.  Microsoft reminded solution providers and end users Wednesday that support for Windows XP Service Pack 1 (SP1) will end Oct. 10.<\/p>\n<p>During its monthly security briefing, Microsoft executives told customers to prepare their migrations over the summer.  Microsoft said it&#8217;s open to signing Custom Support Agreements to extend support and hot fixes for Windows XP SP1 for eligible enterprise customers that have plans to migrate to Windows XP SP2.  <\/p>\n<p>Microsoft also reiterated that extended support for Windows 98, Windows 98 SE and Windows Millennium Edition (ME) will end July 11. Microsoft&#8217;s Software Update Service 1.0 reaches the end of its lifecycle on Dec. 6. <\/p>\n<p>http:\/\/www.informationweek.com\/windows\/showArticle.jhtml?articleID=189401599<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2394","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2394"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2394\/revisions"}],"predecessor-version":[{"id":4881,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2394\/revisions\/4881"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}