Microsoft ESU for Windows 10 LTSB 2016 and Server 2016: Costs and Migration

  • Thread Author
Microsoft has confirmed a measured — and expensive — safety net for organizations that are still running Windows 10 Enterprise LTSB 2016 and Windows 10 IoT Enterprise LTSB 2016, and it has signaled more uncertainty for Windows Server 2016 customers by scheduling end-of-support dates and preparing an Extended Security Updates (ESU) program that is explicitly temporary and deliberately priced to encourage migration.

Infographic showing ESU pricing by year from Windows 10 LTSB 2016 to Windows 11 LTSC 2024.Background: the calendar you cannot ignore​

Microsoft’s official guidance puts hard, non-negotiable dates on the calendar that should be treated as board-level deadlines for IT, procurement, and security teams:
  • Windows 10 Enterprise LTSB 2016 — end of support: October 13, 2026. Devices will receive their final monthly security update on that date; after that Microsoft will stop releasing security patches, quality updates, bug fixes, technical support, and online technical content updates for that edition.
  • Windows 10 IoT Enterprise 2016 LTSB — end of support: October 13, 2026. The same end-of-support behavior applies for these IoT-focused LTSB devices.
  • Windows Server 2016 — end of support: January 12, 2027. This server OS reaches the end of its Extended Support lifecycle on that date, after which routine security and quality updates cease.
Microsoft frames these ESU offerings as a temporary bridge only — not a substitute for a migration strategy. The company recommends upgrading to newer Long-Term Servicing Channel (LTSC) releases for specialized devices and to Windows Server 2025 for server workloads. For desktop and specialized devices, Microsoft’s guidance is to move to Windows 11 Enterprise LTSC 2024 on supported hardware, or to Windows 10 Enterprise LTSC 2021 if Windows 11 hardware requirements cannot be met.

What Microsoft is offering: ESU structure and pricing (what we know)​

Microsoft has published an ESU pathway for Windows 10 Enterprise LTSB 2016 and is preparing options for the IoT LTSB edition and Server 2016, but the delivery channels and pricing differ:
  • Windows 10 Enterprise LTSB 2016 ESU
  • Availability: expected in the second quarter of 2026 through Volume Licensing and Microsoft Cloud Solution Providers (CSPs).
  • Pricing: $61 per device for Year 1, with a discounted rate of $45 per device for systems managed by Microsoft Intune or Windows Autopatch.
  • Escalation: price doubles every consecutive year, for a maximum enrollment period of three years; ESU licenses are cumulative, meaning enrolling late requires paying for previous years as well.
  • Coverage: security-only updates — no feature updates, no design changes, limited technical support (activation/installation assistance and troubleshooting update-caused issues).
  • Windows 10 IoT Enterprise 2016 LTSB ESU
  • Availability: only through device manufacturers (OEMs); organizations must work with their device makers for pricing and purchasing.
  • Same cumulative and escalating pricing model applies, though specific per-device pricing is set by OEMs.
  • Windows Server 2016 ESU
  • Microsoft noted the ESU pathway for servers but has not published detailed pricing or licensing mechanics at the time of the announcement; specifics were to follow in later communications.
These mechanics make one thing very clear: ESU is priced and structured primarily as a short-term risk-management tool, not as a long-term licensing strategy.

Why the ESU pricing is consequential (and why it’s intentionally punitive)​

The structure Microsoft chose — a modest Year 1 fee that doubles in Years 2 and 3 and cumulative liability for late enrollees — has several practical consequences:
  • Escalating total cost: A device that enrolls immediately for all three years will cost $61 + $122 + $244 = $427 in aggregate under the base price. Devices managed by Intune or Autopatch pay $45 + $90 + $180 = $315 across three years. The arithmetic is blunt: delaying migration becomes progressively more expensive.
  • Incentive to modernize: Discounting for managed devices is a clear nudge toward modern management. Organizations using Microsoft Intune or Windows Autopatch can realize a meaningful per-device discount, turning ESU into an additional ROI argument for moving to cloud-based device management.
  • Budget and procurement complications: ESU being cumulative means procurement teams must account for retroactive licensing obligations if they delay enrollment. If you join in Year 2, you owe Year 1 pricing as well; enroll in Year 3, and you owe Years 1 and 2 too.
  • Operational friction for IoT devices: Requiring OEM-mediated purchases for IoT devices introduces variability and negotiation overhead; vendors may price ESU higher for low-volume or legacy devices, or may push for device replacement programs instead.
These pricing mechanics are a policy choice: make ESU available for critical continuity, but make it costly enough that the rational path for most organizations is to invest in migration.

The practical security and compliance risk of staying on old builds​

Running unsupported software is not just an abstract policy risk — it translates to real-world security exposure and regulatory/insurance implications:
  • Unpatched vulnerabilities accumulate. Once the final patches are issued on the EOS date, new vulnerabilities discovered afterward will not be fixed unless you have ESU coverage. That increases attack surface and window of exposure.
  • Compliance exposure. Industries with regulatory requirements for timely patching (finance, healthcare, government) will find it harder to certify compliance if core systems run end-of-support software unless documented compensating controls are in place.
  • Insurance and vendor risk. Cyber insurers and third-party service providers often require supported software levels as part of policy terms. Unsupported OS instances can trigger higher premiums or declined claims following an incident.
  • Operational fragility. Legacy builds can make it difficult to adopt new security tooling, telemetry, or encryption standards — all of which can increase long-term operational costs.
ESU is a stopgap for security patches only; it does not refresh platform capabilities, drivers, or compatibility with modern security agents.

Migration pathways and the choices organizations face​

Microsoft suggests a few direct upgrade paths and these represent the practical options you should evaluate:
  • Upgrade path for desktops and specialized devices
  • Windows 11 Enterprise LTSC 2024 — the target if the hardware supports Windows 11 requirements (TPM 2.0, Secure Boot-capable UEFI, supported CPU family/generation, and other platform requirements).
  • Windows 10 Enterprise LTSC 2021 — the fallback for devices that cannot meet Windows 11 hardware requirements but still need a supported LTSC option.
  • Upgrade path for servers
  • Windows Server 2025 — Microsoft recommends planning to upgrade server workloads to the newest supported server platform.
  • Azure migration — historically, Microsoft has provided specific incentives and options for hosted workloads (including extended support or migration assistance) when servers move to Azure; this can be an attractive path for those who want to avoid on-prem ESU complexity.
  • IoT device strategy
  • OEM engagement is central: many IoT devices are appliance-like, locked down, or have firmware-dependent deployment models. Engage device manufacturers early for offered LTSC upgrades, ESU pricing, or device replacement programs.
These paths are not mutually exclusive. A phased program often combines hardware refreshes, selective replacement, and cloud migration for select workloads.

Recommended plan: a practical, time-boxed migration playbook​

If your organization is still running Windows 10 LTSB 2016 editions or Windows Server 2016, treat these dates as project delivery deadlines. Here’s a practical playbook to follow, broken into sequential phases you can act on today.
  • Inventory and classification (Weeks 0–2)
  • Build a complete inventory of devices running Windows 10 Enterprise LTSB 2016, Windows 10 IoT Enterprise LTSB 2016, and Windows Server 2016.
  • Classify devices by role: desktop, kiosk, ATMs, industrial control systems, POS, virtualization hosts, domain controllers, application servers.
  • Tag devices where upgrade is blocked by hardware, vendor constraints, or regulatory constraints.
  • Risk assessment and prioritization (Weeks 1–4)
  • Score devices by exposure risk, business criticality, and data sensitivity.
  • Prioritize for migration by high-risk/high-impact first — e.g., externally-facing servers, systems storing regulated data, and devices that can’t be isolated.
  • Cost modeling and procurement (Weeks 2–6)
  • Model ESU costs vs migration costs (replacement hardware, labor, software compatibility).
  • Include the cumulative ESU pricing in procurement models; evaluate Intune/Autopatch adoption to access discounts.
  • Engage OEMs for IoT devices early to obtain ESU quotes or upgrade offers.
  • Proof of concept and compatibility testing (Weeks 3–8)
  • Build pilot environments for Windows 11 Enterprise LTSC 2024 and Windows 10 Enterprise LTSC 2021.
  • Test application compatibility, driver support, peripheral compatibility, and management tooling.
  • For servers, validate workload compatibility, backup/restore, and high-availability scenarios on Windows Server 2025.
  • Modern management adoption (Weeks 4–12)
  • If not already using Intune or Windows Autopatch, evaluate onboarding the most critical fleets; the ESU discount may offset onboarding costs.
  • Deploy telemetry and endpoint detection to monitor modernization progress and to validate that patched systems remain compliant.
  • Migration waves and rollback plans (Months 3–18)
  • Execute migration in waves: pilot -> limited production -> full production.
  • Maintain rollback plans and snapshot/backup strategies for each migration to avoid extended outages.
  • Endgame: ESU enrollment (as needed)
  • If migration is not complete before the EOS date, enroll devices in the ESU program as a controlled, documented temporary measure.
  • Use ESU only to buy time — not as an indefinite extension. Maintain a visible timeline with budget approvals and procurement milestones.

Special considerations for IoT and embedded devices​

IoT and embedded devices are the most challenging category for EOS workstreams:
  • OEM-only ESU channels: For Windows 10 IoT Enterprise LTSB 2016, ESU must be purchased through device manufacturers, not directly from Microsoft for most customers. This creates negotiation complexity and potential long lead times.
  • Hardware-locked appliances: Many IoT devices are purpose-built with firmware and drivers that are not easily migrated to newer OS versions. Manufacturers may prefer selling replacement hardware rather than enabling in-field upgrades.
  • Regulatory and lifecycle locks: Some industries expect devices to be supported for many years; if vendors decide not to offer ESU or upgrades for particular models, organizations must budget for early replacement or re-architect replacement devices with newer platforms.
  • Security controls for legacy devices: When replacement is impossible before EOS, apply compensating controls — network segmentation, strict firewalling, jump hosts, monitoring, and strict maintenance windows — to reduce risk exposure.
Where possible, treat OEM engagement as a procurement and risk-management activity, and document vendor commitments to patching or replacement timelines.

Alternatives to paying for ESU: Azure, third-party support, and architecture changes​

ESU is not the only route to keep workloads secure; consider these alternatives as part of your migration planning:
  • Host on Azure: Historically, Microsoft has provided special pathways (including, in some cases, extended support or migration assistance) for workloads migrated to Azure. For some customers, the cost and operational benefits of migrating server workloads to cloud infrastructure outweigh ESU payments and hardware refresh costs.
  • Azure Arc and hybrid management: For hybrid environments, Azure Arc can centralize management, and Microsoft has signaled offerings that make hybrid lifecycles and management easier for legacy server families.
  • Third-party extended support: Some enterprise vendors provide custom extended support agreements beyond vendor EOS. This is typically expensive and limited to very specific fixes, but may be viable for critical, low-count systems.
  • Application replatforming: In many cases, refactoring legacy applications to cloud-native or containerized architectures can eliminate the need to maintain legacy OS images, enabling modern CI/CD and security practices.
Each alternative has trade-offs — cost, time, technical complexity — and must be evaluated against business risk and strategic priorities.

What this means for procurement, security, and executive stakeholders​

The ESU announcement should trigger cross-functional action at multiple levels:
  • Security leadership should treat EOS dates as risk thresholds for incident response, asset-criticality reviews, and compliance calendars.
  • Procurement and finance should model the cumulative ESU costs and hardware replacement budgets, explicitly accounting for the doubling-price mechanics and the Intune/Autopatch discount.
  • Operations and endpoint management should prioritize adoption of modern management tooling to both lower operational friction and reduce ESU costs.
  • Enterprise architects should revisit application platform lifecycles and migration roadmaps to align with server and desktop upgrades.
Executive leaders need concise two-line choices: authorize budget for an organized migration (hardware + labor + testing) or allocate budget for ESU as a short-term, high-cost bridge. Either way, the decision must be made deliberately and funded.

Common questions and practical answers​

  • Can we just keep running these systems after the EOS dates?
    Technically yes, but you will be running unsupported software. Without ESU, you will receive no security updates for new vulnerabilities discovered after the EOS date, which materially increases risk.
  • Can we enroll in ESU retroactively if we miss the date?
    Microsoft’s model for these LTSB ESUs is cumulative: you can enroll later, but you will be charged for prior years you missed. That means retroactive enrollment carries a financial penalty.
  • Is ESU the same as support?
    No. ESU covers security updates only. Microsoft explicitly limits technical support to activation of ESU licenses, installation assistance for monthly ESU updates, and troubleshooting update-caused issues.
  • Will ESU keep our drivers and firmware updated?
    No. ESU does not deliver new features, drivers, or firmware updates outside of security patches for the OS. Driver and firmware updates remain the responsibility of vendors and device makers.
  • What about consumer Windows 10 ESU?
    Consumer ESU programs and the enterprise LTSB ESU pathways differ: consumer ESU enrollment and pricing are separate and limited in duration. Treat the enterprise LTSB ESU as a distinct program with its own procurement channels.

Final analysis: strengths, risks, and how to decide​

Microsoft’s announcement is technically sound and operationally predictable — it sets firm dates, channels, and a pricing model that organizations can plan around. There are real strengths in its approach:
  • Predictability: Fixed EOS dates and published ESU pricing allow predictable budgeting and program planning.
  • Targeted scope: ESU’s security-only focus keeps risk visible and prevents the ESU program from becoming a vehicle for indefinite legacy maintenance.
  • Incentives for modern management: Discounts for Intune/Windows Autopatch make the business case for modern management stronger.
But the announcement also surfaces risks and friction points:
  • Costly stopgap: The cumulative and doubling pricing model can make ESU an expensive stopgap that compounds if you procrastinate.
  • IoT complexity: OEM-dependent ESU channels for IoT devices can create uneven availability and inconsistent pricing across vendors.
  • Operational debt: Relying on ESU delays necessary platform modernization, increases complexity for security tooling, and may complicate cross-platform integration later.
How to decide? Use a risk-first framework:
  • If a device is business-critical and migration is complex or risky, plan ESU only as a short-term bridge while you execute a controlled migration.
  • If a device is low-risk or easily replaceable, prioritize replacement or upgrade now — don’t pay to prolong an inevitable cost.
  • Adopt modern management (Intune/Windows Autopatch) as part of the migration plan to reduce long-term lifecycle costs and benefit from ESU discounts if you need them.

Checklist: immediate actions for IT teams (the 30-day sprint)​

  • Run a complete inventory of affected editions and versions; tag by criticality.
  • Engage procurement and finance to model ESU vs migration costs using the cumulative pricing model.
  • Contact OEMs for inventories of IoT devices and request ESU pricing and upgrade options.
  • Start compatibility testing with Windows 11 Enterprise LTSC 2024 and Windows 10 Enterprise LTSC 2021.
  • Evaluate Azure migration options for server workloads as an alternative to on-prem ESU.
  • If not managed by Intune/Windows Autopatch, evaluate enrollment to access ESU discounts.
  • Communicate a clear migration plan and funded project timeline to executive stakeholders.

The clock is real. Microsoft has given enterprise customers a bridge — but it is a bridge that grows more expensive the longer you linger on it. For security, compliance, and cost reasons, the prudent course for most organizations is to treat ESU as a tactical lever and not a strategic platform choice. Start the inventory and pilots today, choose a modern management approach that pays for itself, and convert that temporary bridge into a completed migration before the emergency price tags grow heavier.

Source: Windows Central Microsoft preps ESU program for Windows 10 LTSB releases retiring in 2026
 

Back
Top