Generally Available: Windows Server 2012 and 2012 R2 Extended Security Updates enabled by Azure Arc
We are excited to announce that Windows Server 2012 and 2012 R2 Extended Security Updates (ESUs) enabled by Azure Arc is now Generally Available. Windows Server 2012 and 2012 R2 are going End of Support on October 10, 2023. With ESUs, customers who are running Windows Server 2012 on-premises or in other clouds can get three more years of critical security updates from Microsoft to protect their End of Life infrastructure.
Why leverage Windows Server 2012 ESUs enabled by Azure Arc?
Windows Server 2012 ESU’s enabled by Azure Arc afford customers financial, management, and security benefits, beyond traditional Windows Server 2012 ESUs from Volume Licensing:
- Monthly PAYG. Customers have no upfront annual commitments and are able to pay for what they need with the flexibility to deactivate ESU licenses mid-year as they migrate and modernize workloads to Azure.
- Azure billing. As an Azure billed service, customers are able to decrement WS2012 ESUs enabled by Azure Arc from their MACC and can apply Azure Consumption Discounting (ACD) for price savings.
- Seamless delivery. Azure Arc identifies and provides an inventory of all of the customers’ Windows Server 2012 and 2012 R2 servers, and with on-time point and click enrollment eliminates the need for annual MAK key deployment.
- Licensing flexibility. Customers have the ability to mix and match Standard and Datacenter licensing, and virtual core and physical core models, eliminating the need to match SKUs with their underlying host.
- Azure management. Customers benefit from free access to Azure Update Manager, Azure Machine Configuration, and Azure Change Tracking and Inventory (AMA based) for their Azure Arc-enabled servers enrolled in WS2012 ESUs through Arc.
How can you enroll in Windows Server 2012 ESUs enabled by Azure Arc?
Taking advantage of this exciting new offer is as easy three steps: (1) onboard your servers to Azure Arc, (2) provision Windows Server 2012 Arc ESU licenses in Azure, and (3) link ESU licenses to your Azure Arc-enabled servers for access to critical security patches.
First, customers onboard their Windows Server 2012 and 2012 R2 machines to Azure Arc, deploying the Connected Machine agent onto their servers, using automation tool like Configuration Manager, PowerShell, or Group Policy. Customers can select from myriad networking options including public endpoint, proxy connectivity, and private link.
Next, customers provision Windows Server 2012 Extended Security Update licenses, specifying Standard or Datacenter edition and the number of cores (virtual or physical). Customers can modify the number of cores associated with a license and can deactivate/activate licenses. Billing for licenses will commence from End of Support on October 10, 2023. Extended Security Updates cost 100% of the full license price for Windows Server 2012 / 2012 R2. Note, this step requires attesting to meeting the Software Assurance and licensing requirements for using Extended Security Updates.
Finally, customers must link their Windows Server 2012 Extended Security Update licenses to their Azure Arc-enabled servers, to enroll the machines in ESUs. Customers do not need to re-enroll each year or manage any MAK Keys. Moreover, customers have the flexibility to use whatever first or third-party patching solution they prefer to receive the actual Windows Server 2012 ESU OS patches. Customers can utilize additional Azure services like Microsoft Defender for Cloud and Microsoft Sentinel to further secure their End of Support infrastructure.
With Windows Server 2012 and 2012 R2 End of Support days away, the time is now to onboard your server estate to Azure Arc and take advantage of this new offer. Extending Azure security, monitoring, and governance from cloud to edge, Azure Arc best positions our End-of-Life infrastructure customers as they migrate to innovate with Azure.
Get started today: Deliver Extended Security Updates for Windows Server 2012. For more information on pricing, see below and https://aka.ms/ArcESUPricing.
Published on:
Learn moreRelated posts
Azure Developer CLI (azd): Run and test AI agents locally with azd
New azd ai agent run and invoke commands let you start and test AI agents from your terminal—locally or in the cloud. The post Azure Developer...
Microsoft Purview compliance portal: Endpoint DLP classification support for Azure RMS–protected Office documents
Microsoft Purview Endpoint DLP will soon classify Azure RMS–protected Office documents, enabling consistent DLP policy enforcement on encrypte...
Introducing the Azure Cosmos DB Plugin for Cursor
We’re excited to announce the Cursor plugin for Azure Cosmos DB bringing AI-powered database expertise, best practices guidance, and liv...
Azure DevOps Remote MCP Server (public preview)
When we released the local Azure DevOps MCP Server, it gave customers a way to connect Azure DevOps data with tools like Visual Studio and Vis...
Azure Cosmos DB at FOSSASIA Summit 2026: Sessions, Conversations, and Community
The FOSSASIA Summit 2026 was an incredible gathering of developers, open-source contributors, startups, and technology enthusiasts from across...
Azure Cosmos DB at FOSSASIA Summit 2026: Sessions, Conversations, and Community
The FOSSASIA Summit 2026 was an incredible gathering of developers, open-source contributors, startups, and technology enthusiasts from across...
Dataverse: Avoid Concurrency issues by using Azure Service Bus Queue and Azure Functions
Another blog post to handle the concurrency issue. Previously, I shared how to do concurrency via a plugin in this blog post and also how to f...
March Patches for Azure DevOps Server
We are releasing patches for our self‑hosted product, Azure DevOps Server. We strongly recommend that all customers stay on the latest, most s...