If your PC still runs Windows 10, Microsoft hasn’t abandoned you completely: Microsoft Defender will keep delivering threat intelligence and definition updates for a limited window, but that protection is a partial safety net — not a substitute for OS security patches or a long‑term supported platform.
Windows 10 reached its formal end of standard support on October 14, 2025. On that date Microsoft stopped shipping routine monthly security and quality updates to consumer Windows 10 Home and Pro devices that aren’t enrolled in an extension program. That change does not instantly disable or brick machines — Windows 10 will keep running — but the maintenance guarantees that protect the operating system against newly discovered kernel, driver, and platform vulnerabilities have ended for unenrolled systems.
Microsoft layered a measured wind‑down to give users time to migrate rather than forcing an immediate cliff: an Extended Security Updates (ESU) program for a time‑boxed extension of OS security patches, continued security servicing for some application layers, and continued Microsoft Defender security intelligence (definition) updates through at least October 2028. Those continuations are real and useful, but they are targeted — Defender definitions and Microsoft 365 Apps patches are not the same thing as full OS servicing.
Source: ZDNET Still on Windows 10? Here's what Microsoft Defender can and can't do for you
Background / Overview
Windows 10 reached its formal end of standard support on October 14, 2025. On that date Microsoft stopped shipping routine monthly security and quality updates to consumer Windows 10 Home and Pro devices that aren’t enrolled in an extension program. That change does not instantly disable or brick machines — Windows 10 will keep running — but the maintenance guarantees that protect the operating system against newly discovered kernel, driver, and platform vulnerabilities have ended for unenrolled systems. Microsoft layered a measured wind‑down to give users time to migrate rather than forcing an immediate cliff: an Extended Security Updates (ESU) program for a time‑boxed extension of OS security patches, continued security servicing for some application layers, and continued Microsoft Defender security intelligence (definition) updates through at least October 2028. Those continuations are real and useful, but they are targeted — Defender definitions and Microsoft 365 Apps patches are not the same thing as full OS servicing.
Precisely what Microsoft announced (the facts)
- Windows 10 end of standard support: October 14, 2025.
- Microsoft Defender Antivirus (the built‑in protection) will continue to receive Security Intelligence (definition) updates through at least October 2028. These updates include new signatures, heuristics, cloud‑delivered protections, and updated ML models that help Defender detect known and emerging malware families.
- Microsoft 365 Apps (Office) security updates for Windows 10 will continue on a similar timeline through October 10, 2028.
- Consumer ESU window: Oct 15, 2025 — Oct 13, 2026 for eligible personal devices; businesses can purchase ESU for up to three additional years via commercial channels. Consumer enrollment paths include a free path tied to Windows Backup / Microsoft Account sync, redemption of Microsoft Rewards points (typically 1,000 points), or a paid purchase (reported at approximately $30 for the one‑year consumer ESU in many markets). Eligibility requires specific editions and builds (notably version 22H2 and patch prerequisites).
Microsoft Defender: what it can do
Microsoft Defender, in its various forms, remains a powerful and evolving security layer. What it continues to provide on Windows 10 during the extended window:- Security intelligence (definition) updates — new malware signatures and heuristic rules that let Defender recognize and block many newly observed malware families and commodity threats.
- Cloud‑delivered protections and machine learning updates — cloud telemetry and updated ML models help Defender catch suspicious files, URLs, and behaviors even when local features are limited by the older OS.
- Real‑time behavioral monitoring and remediation — Defender’s real‑time scanning, process monitoring, and automated remediation routines can still reduce the impact of many attacks, especially phishing payloads, drive‑by downloads, and known ransomware strains.
- Endpoint Detection & Response (EDR) and Defender for Endpoint (paid) — enterprise products like Defender for Endpoint remain supported on many legacy OS builds under commercial licensing; these paid offerings provide richer telemetry, automated investigation, and response capabilities for organizations willing to buy ESU or EDR licenses.
Microsoft Defender: what it cannot do (the hard technical limits)
This is the crucial caveat most coverage emphasizes: Defender cannot replace missing OS patches. Key limitations:- It cannot patch the OS — Defender can detect attempts to exploit kernel or driver vulnerabilities, but it cannot repair or close the underlying bug in the Windows kernel, drivers, or privileged services. That means any new exploit that targets an unpatched OS vulnerability remains a real risk.
- No guaranteed feature parity on legacy platforms — new Defender features sometimes require APIs, kernel features, or platform mitigations only present in Windows 11 or later; those features may not be back‑ported to Windows 10. Expect divergence over time.
- Fileless attacks and living‑off‑the‑land techniques — attackers increasingly use in‑memory, script‑based, or legitimate OS tools to evade signature detection; Defender’s behavioral detections help, but missing OS mitigations (for example, newer kernel hardening) increase exposure to sophisticated, bespoke attacks.
- Compounded risk for unpatched third‑party components — even if Defender is updated, unpatched drivers, firmware, or application runtimes on the system can provide attackers with footholds that Defender cannot prevent entirely.
The Extended Security Update (ESU) lifeline — who gets what and how long
ESU exists to buy time, not deliver indefinite support. The practical details:- Consumer ESU: one‑year bridge covering eligible personal devices from Oct 15, 2025 through Oct 13, 2026. Enrollment options in many markets include a free path via Windows Backup / Microsoft Account sync, redeeming 1,000 Microsoft Rewards points, or a paid option (about $30 in many regions). Devices must meet eligibility prerequisites (Windows 10 version 22H2, specific cumulative updates installed, and certain account or device configuration requirements).
- Commercial ESU: organizations can purchase ESU for up to three additional years at per‑device pricing, typically on a yearly escalating cost curve (reports and licensing disclosures indicated a rising per‑device cost year over year). Cloud/virtual Windows 10 images (for example, Cloud PCs via Windows 365 and certain Azure VMs) may receive ESU entitlements automatically under defined terms.
Practical risk assessment — scenarios and recommended stances
Every environment must balance cost, compatibility, and risk. Below are pragmatic, real‑world scenarios and recommended actions.Scenario 1 — Casual home user (low to moderate risk)
- Reasonable approach: Enroll in consumer ESU (if you want an OS patch lifeline) or ensure Defender is active and up to date and move sensitive tasks (banking, tax filing) to an up‑to‑date device. Backups and MFA are essential.
Scenario 2 — Small business (mixed hardware)
- Reasonable approach: Purchase commercial ESU for critical endpoints while accelerating migration to Windows 11 for the rest. Deploy Defender for Endpoint or EDR where budget permits, implement backups, enforce MFA, and consider virtualizing legacy apps instead of delaying the OS upgrade.
Scenario 3 — Regulated or high‑value environments
- Reasonable approach: Do not rely on Defender alone. Maintain supported OSes (Windows 11 or cloud-hosted Windows with ESU entitlement), require full patching, and consider isolating legacy systems from sensitive networks until migration completes.
- Keep Defender real‑time protection on and enable cloud‑delivered protection.
- Harden identities (MFA), update browsers and productivity apps, and maintain offline backups.
- Treat Defender updates as mitigations — not full remediation — and build a migration timeline.
Migration playbook — a practical checklist
- Inventory all Windows 10 devices and record edition, build (must be 22H2 for many ESU paths), and role (user, kiosk, server, etc.).
- Prioritize endpoints that access sensitive data, handle payments, or connect to critical networks.
- Test application compatibility on Windows 11 (use in‑place upgrade testing or pilot groups).
- Choose the migration method: in‑place upgrade (when hardware qualifies), fresh install, or migrate workloads to cloud/VDI.
- If hardware is incompatible, consider Windows 365 Cloud PC, ChromeOS Flex, or a supported Linux distribution for long‑term replacement.
- If you must delay migration, enroll eligible devices in ESU and deploy compensating controls (EDR, network segmentation, strict account controls).
Technical controls that improve security while you migrate
- Enable and verify Microsoft Defender real‑time protection, cloud protection, and tamper protection.
- Deploy EDR / Defender for Endpoint if available — it reduces dwell time and supports automated response playbooks.
- Enforce multi‑factor authentication (MFA) and least privilege.
- Harden firmware and enable Secure Boot and TPM where present (these help limit certain persistence and tampering techniques). Note: some Windows 11 security features (for example, virtualization‑based security and certain VBS integrations) are more advanced and may not be fully available on older hardware.
- Maintain robust offline and offsite backups, and test restores regularly.
Defending against misconceptions and unverifiable claims
- "Defender updates mean I’m fully protected forever" — false. Defender reduces exposure to known and commodity threats, but it cannot repair or harden unpatched OS components. Relying solely on antivirus on an unsupported OS increases risk over time.
- "ESU equals full support" — false. ESU is security‑only and time‑boxed; it does not deliver feature or general quality fixes or the same lifecycle assurances as a supported OS.
- "Defender feature roadmaps on Windows 10 are guaranteed" — unverifiable. Microsoft committed to security intelligence updates through October 2028, but explicit backports of new Defender features to Windows 10 were not promised; assume divergence over time.
Business and enterprise considerations
For IT pros managing fleets, the math is straightforward but non‑trivial:- Budget for ESU if migration cannot complete before EOL (commercial ESU pricing is a predictable, but rising, line item).
- Use the ESU period to complete testing, application compatibility, and staged rollouts — do not treat ESU as a long‑term hosting plan.
- For cloud‑first strategies, take advantage of automatic ESU entitlements in certain cloud/virtual environments (Windows 365 Cloud PCs, Azure-hosted VMs) where applicable. That can simplify compliance while hardware refreshes occur.
Bottom line — what every Windows 10 user must accept
- Yes, Microsoft Defender Antivirus will continue to receive security intelligence updates on Windows 10 through at least October 2028, which materially reduces risk from commodity malware.
- No, that does not replace missing OS‑level security patches. Unpatched kernel or driver vulnerabilities remain exploitable, and Defender cannot fix those underlying flaws.
- If you can upgrade to Windows 11, do so — that’s Microsoft’s recommended path for continued platform security and new feature support. If you cannot, enroll in ESU (consumer or commercial) and apply compensating controls while you plan a migration.
Final recommendation checklist (short, actionable)
- Verify your Windows 10 edition and build (22H2 prerequisite for many ESU paths).
- Enable/confirm Microsoft Defender real‑time + cloud protection.
- Enroll in consumer ESU if you need the one‑year security patch bridge and are eligible.
- For businesses, procure commercial ESU for critical endpoints if migration will take longer than one year.
- Harden identities (MFA), back up data offline/offsite, deploy EDR where possible, and prioritize migration for the highest‑risk devices.
Source: ZDNET Still on Windows 10? Here's what Microsoft Defender can and can't do for you