Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

What kind of Microsoft products does your business use on a regular basis? If you can’t answer this question, you could be in trouble when it comes time to update your crucial applications and operating systems. This is a necessary part of working with technology; if your software can’t be considered secure, you need to upgrade to a more recent, better-functioning tool, or find yourself in a dangerous situation.

Microsoft in particular has a very specific way of handling support for their products. The software giant will provide what’s called “mainstream support,” which involves accepting requests for new features and hotfixes for key issues. Once mainstream support ends, the product enters an “extended support” period, where all warranties end, and the only support your product receives is security updates and patches.

Both of these periods last for five years, meaning that the lifespan of a piece of software is effectively ten years. Once extended support ends, the product reaches its “end of life,” in which Microsoft no longer supports the software at all.

Below, you’ll find a list of all Microsoft products that will reach their end of support date on July 12th, 2016. If your organization is currently using any of this software, you should seriously consider upgrading before it becomes a security discrepancy.

Service Packs Reaching End of Support

  • Microsoft Dynamics CRM 2013
  • Microsoft Dynamics SL 2011 Service Pack 2
  • Microsoft SQL Server 2014 Business Intelligence
  • Microsoft SQL Server 2014 Developer
  • Microsoft SQL Server 2014 Enterprise
  • Microsoft SQL Server 2014 Enterprise Core
  • Microsoft SQL Server 2014 Express
  • Microsoft SQL Server 2014 Standard
  • Microsoft SQL Server 2014 Web
  • Microsoft System Center 2012 Configuration Manager Service Pack 1
  • Microsoft System Center 2012 Endpoint Protection Service Pack 1
  • Microsoft System Center 2012 R2 Configuration Manager
  • Microsoft System Center 2012 R2 Endpoint Protection
  • Microsoft System Center 2012 R2 Endpoint Protection for Linux
  • Microsoft System Center 2012 R2 Endpoint Protection for Mac

Products Moving from Mainstream to Extended Support
Products marked with * expire on July 10th, 2016, rather than July 12th, 2016.

  • * Microsoft Dynamics Retail Management System Headquarters 2.0
  • * Microsoft Dynamics Retail Management System Store Operations 2.0
  • Microsoft Project Server 2010 July 12, 2016
  • Microsoft Dynamics SL 2011
  • Microsoft SQL Server Compact 4.0
  • Windows MultiPoint Server 2011 Premium
  • Windows MultiPoint Server 2011 Standard

Products Moving to End of Support

  • Microsoft ActiveSync 4.2
  • Microsoft BizTalk Server 2006 Developer Edition
  • Microsoft BizTalk Server 2006 Enterprise Edition
  • Microsoft BizTalk Server 2006 R2 Branch Edition
  • Microsoft BizTalk Server 2006 R2 Developer Edition
  • Microsoft BizTalk Server 2006 R2 Enterprise Edition
  • Microsoft BizTalk Server 2006 R2 Standard Edition
  • Microsoft BizTalk Server 2006 Standard Edition
  • Microsoft Commerce Server 2007 Developer Edition
  • Microsoft Commerce Server 2007 Enterprise Edition
  • Microsoft Commerce Server 2007 Standard Edition
  • Microsoft Connected Services Framework Billing Standard Business Event 3.0
  • Microsoft Connected Services Framework Order Handling Standard Business Event 3.0
  • Microsoft Connected Services Framework Server 3.0
  • Microsoft Connected Services Framework Standard Server 3.0
  • Microsoft Connected Services Framework Standard Server with Standard Business Events 3.0
  • Microsoft Visual J# Version 2.0 Redistributable Package
  • Microsoft Visual Studio 2005 Team Foundation Server

Is your organization is facing an end-of-life event for any of these technologies? If so, contact Total Tech Care. We’ll work with you to determine the best course of action for replacing your dying software. To learn more, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Windows Managed IT Services Upgrade Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Chrome Virtualization Social Media Tech Term Saving Money Holiday Gadgets Microsoft Office Automation Managed Service Managed IT Services Artificial Intelligence Facebook Computers Cybercrime Operating System Hacking Wi-Fi BYOD Mobile Device Management Health Networking Internet of Things IT Support Office 365 Telephone Systems Covid-19 Information Information Technology Remote Spam Managed Service Provider Alert Mobility Employer-Employee Relationship Recovery Router Bandwidth BDR Social Engineering Password Money App History Encryption Mobile Computing Applications Application Human Resources Law Enforcement Data Breach Remote Monitoring Big Data Blockchain Paperless Office Apps Office Tips How To Training VPN Data Storage Patch Management Government Remote Computing Private Cloud Mobile Office Managed IT Bring Your Own Device Data Management Work/Life Balance Data Security Flexibility Wireless Marketing WiFi Gmail IT solutions Google Drive Entertainment Infrastructure Voice over Internet Protocol Website Settings Budget Vulnerability Two-factor Authentication Avoiding Downtime Windows 7 Word Mouse HaaS Servers Cleaning Vendor Managed Services Risk Management Hacker Telephone System Staff Software as a Service Display Machine Learning End of Support Remote Work The Internet of Things Connectivity Physical Security Lithium-ion battery Education Employee/Employer Relationship Safety RMM HIPAA Sports Redundancy USB Keyboard Conferencing Firewall Scam Virtual Reality Apple Data Protection Social Vendor Management User Error Save Time Meetings Compliance Retail Hard Drives Access Control OneNote Computer Care Managed Services Provider Instant Messaging Robot Computing Infrastructure Excel Virtual Assistant Current Events Database Telephony Going Green Virus Authentication Samsung Biometrics Virtual Desktop Unified Threat Management Remote Workers Computer Accessories Value Processor Battery Shadow IT DDoS Update Electronic Medical Records Legal Spam Blocking Hard Drive SharePoint Internet Exlporer Google Docs Hiring/Firing Identity Theft Printer Bluetooth Customer Service PDF Computing Environment Fax Server Augmented Reality Proactive IT Fraud IT Consultant Business Intelligence Best Practice Digital Signage Remote Worker YouTube SaaS Audit Worker Black Market Humor IT Management Cryptocurrency Network Congestion Botnet IT Plan Procurement eWaste Document Management Comparison Net Neutrality Solid State Drive Workplace Strategy Wireless Technology How to Downtime Unsupported Software CES Help Desk Printing Charger Data storage Automobile Business Technology Content Management Wearable Technology Millennials Cryptomining Sync Printers Point of Sale Emails Personal Monitor Smart Office Supply Chain Management Wireless Charging Monitoring Batteries Running Cable Two Factor Authentication Workforce Memory Virtual Private Network Windows 8.1 Netflix Digitize Reputation PowerPoint Root Cause Analysis Streaming Media Windows Media Player Cables Windows Server 2008 R2 User Content HBO Customer relationships Tech Support Knowledge Music Telecommuting Manufacturing Techology Skype Project Management Email Best Practices Laptop Nanotechnology IT Assessment Customers Data loss Cortana Managing Stress Audiobook Science Outlook Computer Tips Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Biometric Security Start Menu Warranty Virtual CIO Touchpad Cameras OneDrive Screen Mirroring HVAC Peripheral Loyalty Google Apps Politics Customer Relationship Management Advertising Frequently Asked Questions Digital Security Cameras Analysis Using Data Distributed Denial of Service Books Windows 10s Devices Copiers 5G Analyitcs Mobile Administrator Cast Enterprise Content Management Quick Tip Notifications Programming Emergency Smartwatch Tip of the week MSP Ergonomics webinar Accountants Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Professional Services Microchip Printer Server Relocation Password Management PCI DSS Assessment Password Manager Virtual Machine Antivirus Multi-Factor Security Employee Windows 8 Windows Server 2008 2FA Fiber Optics Twitter Messaging Cabling IT service Video Games Tools Search Engine NIST Policy Television Business Mangement Hypervisor Worker Commute Trending Experience Tablet Dark mode Smart Tech Trend Micro Addiction SMS Amazon Default App Domains Scalability Procedure Public Computer Recycling Saving Time Business Owner IaaS Transportation Google Search Maintenance Regulations Wiring dark theme NarrowBand Practices Shopping Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Search Bloatware iPhone Safe Mode FinTech Criminal Bing Benefits Tablets Consultant GDPR Workers Hosted Computing Social Network Analytics FENG Wireless Internet Online Shopping Investment Entrepreneur Files File Sharing Employees IBM Employee/Employer Relationships Smart Technology Specifications ISP Shortcut Best Available Flash Camera Windows 365 Chromecast Inventory Wire Video Conferencing Evernote ROI Cost Management WIndows 7 Social Networking Colocation Software Tips Sales Uninterrupted Power Supply Supercomputer Bitcoin Travel Shortcuts

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code