Siemens Industry Online Support
Siemens AG
Entry type: FAQ Entry ID: 82555422, Entry date: 11/04/2013

What should you watch out for when using Windows XP / Server 2003 on IPCs?

  • Entry
  • Associated product(s)

Microsoft has announced the end of Extended Support for the operating systems list in Table 01.
After the end of the Extended Support there will be no more updates, hotfixes or patches for the operating systems in question. Newly discovered security gaps will no longer be corrected.

End of Extended Support Operating system
08.04.2014 Microsoft Windows XP
14.07.2015 Microsoft Windows Server 2003
2016 Microsoft Windows XP for Embedded Systems
Table 01

Security recommendations
To operate your application beyond the end of the Extended Support we recommend taking additional steps to make your IPCs secure:

  • Use Software Whitelisting (positive listing of trusted software)
  • Use virus scanner with recognition of exploits (code changes)
  • Use firewalls on multiple levels
  • Use intrusion reporting systems.

Our experts at Security Support will be able to help you secure your IPCs:

Alternative measures
In the case of IPCs of the "C" and "D" generations there is a possibility of having the operating system updated from Windows XP to Windows 7 by an authorized Repair Center. In this case Windows 7 is added to the Certificate of Authenticity (COA) and the End User License Agreement (EULA).

The application previously installed on the IPC then has to be re-installed and possibly tested. It might be necessary to update other SIMATIC software products like WinAC RTX 2005 / WinAC RTX 2010, for example.

Your regional contact will be glad to help you find an authorized Repair Center:

Additional Keywords
Service Pack, Bug

Security information
In order to protect technical infrastructures, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art IT security concept. Siemens’ products and solutions constitute one element of such a concept. For more information about cyber security, please visit