All West Virginia University–managed computers still running Windows 10 will be removed from the university network on Oct. 1, a last-resort enforcement step intended to protect WVU systems, research data and patient information ahead of the operating system’s end-of-support cycle. This hard cutoff follows a two-year campus campaign to upgrade or replace devices with Windows 11–capable hardware, and it applies to every WVU campus and Health Sciences Center location—exemptions will be rare and must be requested immediately through the university’s InfoSec channel. (enews.wvu.edu)
(End of article)
Source: West Virginia University E-News | Computers still using Windows 10 operating systems will be removed from the network Oct. 1
Background
What WVU announced and why it matters
WVU’s Information Technology Services announced that any WVU-managed machine still on Windows 10 as of Oct. 1 will be disconnected from the campus network to protect the integrity and security of WVU data and services. The message reiterates longstanding warnings and a Sept. 30 upgrade deadline for departments and units to bring managed endpoints into compliance. The directive explicitly cites Microsoft’s end-of-support for Windows 10 as the root cause of the university action. (enews.wvu.edu)The platform context: Windows 10 end-of-support and ESU options
Microsoft will stop providing free security patches and routine support for Windows 10 on Oct. 14, 2025, meaning unpatched systems become progressively more vulnerable to zero-day and known-exploit attacks once vendor fixes stop arriving. Microsoft does offer an Extended Security Updates (ESU) program that provides one extra year of selected security patches for eligible Windows 10 devices through Oct. 13, 2026, with different enrollment routes for consumers and organizations. Administrators who need breathing room to migrate workloads can consider ESU, but it is a temporary, narrowly scoped option that does not replace a full upgrade to a supported OS. (microsoft.com)Overview of the university landscape in 2025
This is not a one-off — higher education is enforcing EoS policies
WVU’s action follows a widespread pattern across higher-education IT organizations: many universities and colleges published migration plans, set departmental deadlines, and warned that unmanaged or unsupported endpoints will be isolated or blocked from network access after Microsoft’s EoS date. Institutions including major public universities have communicated that continued access by unpatched Windows 10 devices represents an unacceptable risk and will be cut off or quarantined. WVU’s Oct. 1 enforcement is aggressive relative to Microsoft’s Oct. 14 end-of-support date but aligns with the broader risk-avoidance posture adopted by campus IT teams. (its.uconn.edu)Why universities isolate unsupported OS installs
- Unsupported OSs do not receive security updates, leaving known vulnerabilities unpatched and exploitable.
- Campus networks host regulated data (financial records, student records subject to FERPA, health data subject to HIPAA) that make exposure costlier in legal and reputational terms.
- Legacy endpoints that cannot be updated often lack support for modern security primitives (TPM 2.0, Secure Boot, UEFI), limiting mitigation options and complicating compliance audits.
Timeline and the key dates to know
- Sept. 30, 2025 — WVU’s internal upgrade deadline for managed devices (deadline messaging referenced by WVU). (enews.wvu.edu)
- Oct. 1, 2025 — WVU will remove WVU-managed devices still running Windows 10 from the network. (enews.wvu.edu)
- Oct. 14, 2025 — Microsoft’s official end of support for Windows 10; free security updates and routine support end on this date. (microsoft.com)
- Oct. 13, 2026 — Last day of consumer ESU coverage for enrolled Windows 10 devices (one-year extension). (support.microsoft.com)
Technical implications for departments and end users
Windows 11 compatibility and hardware requirements
Upgrading to Windows 11 is the primary remediation path for most campus-managed Windows 10 devices. Windows 11 imposes stricter hardware requirements than Windows 10—most notably TPM 2.0, Secure Boot/UEFI, and a list of supported CPU families. Devices that do not meet the minimum spec will not be eligible for a supported in-place upgrade and typically must be replaced. Administrators should use vendor tools (PC Health Check, OEM inventory) to confirm device eligibility and to identify machines that require replacement. (microsoft.com)Extended Security Updates (ESU) — a narrow, transitional option
ESU can give organizations a one-year breathing room for Windows 10 security patches, but it is not a long-term solution. ESU enrollment requirements include version prerequisites (e.g., Windows 10 version 22H2) and administrative enrollment steps; consumer/individual enrollment paths and commercial pricing differ. ESU does not deliver feature updates or broad technical support and should be treated as a contingency for truly incompatible hardware or mission-critical legacy systems where replacement timelines cannot be compressed. (support.microsoft.com)Network access control and device isolation
Most campus IT teams use NAC or endpoint detection measures to enforce policy. When a device is flagged as noncompliant (unsupported OS, out-of-date patches, missing endpoint agent), the NAC policy can:- Place the endpoint on an isolated remediation VLAN with no internet or limited services
- Block access to sensitive internal resources while allowing access to upgrade servers and documentation
- Quarantine devices entirely pending remediation
Security, compliance and clinical-research considerations
Data protection and HIPAA-relevant systems
Health Sciences Center locations are explicitly included in WVU’s Oct. 1 action. Health care systems are subject to the HIPAA Security Rule, which requires entities to implement safeguards to protect electronic protected health information (ePHI) and to address reasonably anticipated threats. Running an OS that no longer receives vendor security patches is widely regarded as a heightened compliance risk for healthcare organizations; regulatory guidance expects covered entities to mitigate known vulnerabilities or isolate unsupported systems. The practical upshot: clinical and research systems running Windows 10 will need rapid remediation or documented compensating controls. (federalregister.gov)Research equipment and specialized lab software
Many research workflows depend on legacy software and instrumentation drivers that may not be certified on Windows 11. This creates a tension between the need for operational continuity and the security imperative to avoid unsupported OSs. Departments with specialized equipment should inventory all lab endpoints immediately, document vendor support and driver compatibility, and engage IT procurement and risk teams to prioritize replacement or find validated isolation strategies (segmented VLANs, one-way data flows, or dedicated legacy network segments) where full upgrades are impossible in the near term.Insurance and breach implications
Insurers and auditors increasingly treat unsupported software as a factor in coverage decisions and liability assessments. A breach traced to an unsupported operating system can jeopardize cyber insurance claims and amplify regulatory penalties, particularly when sensitive data such as student records or ePHI are involved. This practical insurance exposure is part of why universities are enforcing aggressive timelines. (vertilocity.com)Operational impact: what could go wrong
- Sudden loss of productivity. Faculty and staff who miss the Oct. 1 enforcement will find their machines unreachable by email, network storage and university applications—disrupting instruction, grading, research and clinic workflows.
- Research continuity risk. Legacy lab machines with specialized instrument software may be difficult to replace quickly; forcing removal without a formal mitigation plan risks lost experiments and data.
- Supply and budget constraints. Fall procurement cycles are typically busy; a wave of hardware replacement requests can strain budgets and lead times for new devices.
- Exemption bottlenecks. WVU’s message states exemptions will be rare and must be requested immediately. Departments that wait will face an uphill battle securing an exception and documenting compensating controls.
Practical checklist — what academic units and IT directors must do right now
- Inventory: Run a full inventory of WVU-managed Windows devices; identify those still on Windows 10 and capture model, serial, OS version and role (clinical, research, admin).
- Prioritize: Classify endpoints by risk and criticality — clinical systems and servers with data access first, then faculty/staff laptops, then lab devices.
- Validate compatibility: Use the PC Health Check tool or OEM tools to determine which devices can upgrade to Windows 11 and which must be replaced. (microsoft.com)
- Engage procurement: For devices that cannot be upgraded, start requisition and replacement processes now; consider bulk purchasing for improved pricing and quicker rollouts.
- Consider ESU (short-term): Where replacement is impossible within the timetable, evaluate ESU enrollment strictly as a stopgap for the narrow set of devices that are critical and incompatible with Windows 11. Document the plan and expiration timeline. (support.microsoft.com)
- Implement NAC policies: Ensure network access control rules are ready to identify and quarantine noncompliant devices and that remediation VLANs and support workflows are tested.
- Communicate early and often: Notify faculty, staff and researchers about the Oct. 1 enforcement, the Oct. 14 Microsoft EoS date, and the steps they must take. Include self-service upgrade guidance, backup requirements and data-migration support. (enews.wvu.edu)
Technical how-tos (short, essential steps)
- To check the Windows version: Settings > System > About.
- To check TPM status: Run tpm.msc (Windows + R > tpm.msc) and verify "Specification Version" is 2.0. If TPM is disabled but present, enable it in UEFI/BIOS. (support.microsoft.com)
- To verify Windows 11 eligibility: Use Microsoft’s PC Health Check or the official system requirements documentation to confirm processor, TPM, Secure Boot and RAM/storage prerequisites. (learn.microsoft.com)
- For devices not upgradeable: plan secure decommissioning or isolate the device behind a tightly controlled remediation network.
Procurement, budgeting and staffing considerations
- Bulk replacement yields leverage. Consolidating replacement requests into scheduled refresh programs helps secure better pricing, warranty coverage and predictable deployment timelines.
- Short-term staffing spike. Device imaging, data migration and help-desk tickets typically surge during campus migrations; plan for temporary staffing support or third-party services.
- Funding sources. Departments should explore recurring refresh budgets, central IT lines, research program funds (where devices are research-critical) and possible central subsidy for high-priority clinics or classrooms.
- Licensing and ESU costs. ESU has per-device costs (or redemption/reward routes for consumers); commercial ESU pricing and conditions differ from the consumer path and must be weighed against replacement costs. (support.microsoft.com)
Exemptions and exception handling — what to expect
WVU’s announcement limits exemptions and requires immediate requests via InfoSec. Typical exception processes require:- A documented business justification for continued OS use (e.g., validated instrument that cannot be upgraded).
- A risk assessment outlining compensating controls (strict network segmentation, limited account privileges, continuous monitoring).
- A time-bound mitigation plan with defined milestones and a guaranteed replacement or upgrade date.
The bigger security lesson: managing software lifecycles
WVU’s enforcement highlights a persistent programmatic gap for many institutions: lifecycle governance. Best practice security programs maintain:- A centralized inventory of hardware and software, mapped to lifecycle dates.
- Fiscal planning aligned to refresh cycles.
- Automated posture checks and asset discovery integrated with NAC and vulnerability management.
Recommendations for campus leadership (concise)
- Approve a prioritized funding tranche to accelerate replacements for clinical and research endpoints.
- Authorize overtime or temporary staff augmentation for imaging and migrations during the enforcement window.
- Direct department leaders to certify inventories and submit exemption requests immediately if needed.
- Mandate backups and data export windows for units with high operational risk to avoid irretrievable loss during surfacing and removal events.
- Exercise transparent communications to faculty, staff and students about service interruptions and escalation paths.
Conclusion
WVU’s removal of Windows 10 devices from campus networks on Oct. 1 is a decisive, risk-driven enforcement step that trades short-term disruption for long-term reduction of attack surface and compliance exposure. The university’s action fits a larger higher-education pattern: institutions are rapidly closing the window on unsupported endpoints as Microsoft sunsets Windows 10 on Oct. 14, 2025. Administrators who act now—by inventorying assets, validating Windows 11 eligibility, using ESU only as a temporary bridge, and funding targeted replacements—can limit operational damage and secure sensitive systems. Departments that delay will likely face rapid isolation of machines, constrained exemption options, and a tougher road to recovery. (enews.wvu.edu)(End of article)
Source: West Virginia University E-News | Computers still using Windows 10 operating systems will be removed from the network Oct. 1