Bypass esu windows 7

Windows-7-ESU-Bypasser

Gives you paid Windows 7 Extended Security Updates until January 2023, for free. I have decided to compile and fix this from other sources. Those «other» sources include manually going to download and install the updates, which I am too lazy to do 😂 So this one will show up in Windows Updates.

Security

Prerequisites

Make sure you are running Windows 7 Service Pack 1.

You must download and install these Windows 7 updates before running this bypasser. Pick the appropirate updates, depending on your system architecture. I have included both x64 and x86 updates.

  • KB4490628: Servicing stack update, March 2019
    x86
    x64
  • KB4474419: SHA-2 code signing support update, August 2019
    x86
    x64
  • Latest Extended Servicing stack update, currently KB4536952 (January 2020) or later
    x86
    x64
  • KB4538483: ESU Licensing Preparation Package
    x86
    x64
  • Update Windows Update Client, at least KB3138612
    x86
    x64

If you installed any Monthly Quality Rollup, or July 2016 update rollup KB3172605, both already have updated WUC.
And if you installed January 2020 Security Only update KB4534314, or the fix update KB4539602, both already have updated WUC.

How To Use

Download ‘Windows 7 Bypasser’ that has been attached, move both .EXE and Bin file into a folder, i.e. Desktop.

Run «Windows 7 Bypasser.exe» as Admin and just follow the instructions in the software, lmao.

To uninstall, just see the options in the software.

How to get Windows 7 Updates until 2023 — Windows 7 End of Life

KB4528069 — Update to verify that eligible Windows 7 SP1 devices can get Extended Security Updates
x64 Systems
http://download.windowsupdate.com/d/msdownload/update/software/updt/2019/10/windows6.1-kb4528069-x64_b00bef3c3a13b8bc65bfaea63426386dbb54c336.msu

x86 systems
http://download.windowsupdate.com/d/msdownload/update/software/updt/2019/10/windows6.1-kb4528069-x86_82fedea7537b64f6b147070f53bb95e4bf27d3a5.msu

*UPDATED* bypass tool v7 AIO
File: BypassESU-v7-AIO.7z
7z file password: 2020

https://drive.google.com/uc?export=download&id=13KlA8ydgWlFSqU-cu0sCPUAl3Z4YoYjR

MDL Thread: https://forums.mydigitallife.net/threads/bypass-windows-7-extended-security-updates-eligibility.80606/

Source: https://adventuresinnostalgia.blogspot.com/2022/04/how-to-get-windows-7-updates-until-2023.html

Page 1 of 439

  1. @abbodi1406

    Thanks for this. i installed successfully KB4528069 after following instructions above.
    so if i understand what you said above, now that this update is installed, that means that i will get updates through WU over 2020 until 2023 on my win7 machine.
    Can you confirm ?

  2. Staff Member

    I am moving this to MDL Projects and Applications and stick it.

    Please no alternative links to different files. Only OP supports this MDL project here.


    Stop hovering to collapse…
    Click to collapse…


    Hover to expand…
    Click to expand…
  3. To be clear, this method is originally @abbodi1406 ‘s idea (he is too humble to mention it.), and mspaintmsi and others contributed to it. (mspaintmsi posted this method on nsaneforum.)


    Stop hovering to collapse…
    Click to collapse…


    Hover to expand…
    Click to expand…
  4. Pin It


    Stop hovering to collapse…
    Click to collapse…


    Hover to expand…
    Click to expand…

  5. Stop hovering to collapse…
    Click to collapse…


    Hover to expand…
    Click to expand…
  6. @the_soft45
    Apparently, the test update installs on Vista without any problems and does not need any tools to do so.
    Just in case, we have a fix ready for when Microsoft changes this.

    (It’ll most likely change in the near future as Microsoft probably just forgot that Vista still exists)


    Stop hovering to collapse…
    Click to collapse…


    Hover to expand…
    Click to expand…
  7. @paintMSI

    The ESU eligibility component (amd64_microsoft-windows-s..edsecurityupdatesai_31bf3856ad364e35_6.0.6003.20777_none_c87c6e70d53a1370.manifest) is only installed on Server editions
    Client editions only install calc.exe

    but i think you can force installing the ESU component on client
    expand.exe the update cab, then install the relevant sub-package

    start /w PkgMgr.exe /ip /m:"expanded_folder\package_2_for_kb4528081~31bf3856ad364e35~amd64~~6.0.1.2.mum" /quiet /norestart

    according to the manifest, it should work similar to Windows 7
    but the returned SKU should always be ServerStandard

    does Vista have TrustedInstaller.exe?

  8. @abbodi1406
    TrustedInstaller exists in Windows Vista and superUser should work just as good on Vista as on other versions.

    I’ll try playing around some more with the things you provided. Thanks .-.


    Stop hovering to collapse…
    Click to collapse…


    Hover to expand…
    Click to expand…
  9. @abbodi1406

    Also if i understand well, the project will also allow to receive updates on unsupported win7 editions (home premium, basic home and starter).
    Confirm this ?


  10. Stop hovering to collapse…
    Click to collapse…


    Hover to expand…
    Click to expand…
  11. ok thanks for your reply
    one thing i didn’t get , the project through the script «install.bat» is already configured by default to allow to receive updates on all win7 editions. Right ?
    So what’s the point of editing «install.bat» and set ForceHook to 1 as it is mentionned in first post ?

  12. Right

    options are good
    SlcShim loophole is safer, but can be easily patched/closed by Microsoft

  13. -deleted-

    It was just for information…

    *Lost in Translation*


    Stop hovering to collapse…
    Click to collapse…


    Hover to expand…
    Click to expand…

    Where do I even begin..

    Do not, under absolutely any circumstances…..
    This is certainly NOT the way you want your system to die.

    Replacing system libraries is a very bad idea. Everything that uses SLC functions outside of the ones implemented will either throw an error or immediately crash. (in the worst case, break existing configuration)
    The kernel will be fine as it obtains everything from the registry, but most likely after some time a BSOD will occur because of an NPE caused by more important parts of the system.
    This will entirely break half of Windows’ Licensing and half of Windows along with it.

    We’re trying to do it cleanly and (to some extent) transparently, so nothing breaks along with it.
    Take a look at how @abbodi1406 ‘s implementation works and try to build upon that.


    Stop hovering to collapse…
    Click to collapse…


    Hover to expand…
    Click to expand…

Page 1 of 439

Ограничения платного сервиса Windows 7 ESU легко обходятся

Компания Microsoft не планирует больше обновлять операционную систему Windows 7 для обычных пользователей, однако энтузиасты обнаружили способ продолжать получать апдейты бесплатно. 

Умельцы придумали, как продолжать получать обновления Windows 7 бесплатно

14 января компания прекратила официальную поддержку Windows 7 и настойчиво предупреждает пользователей о недостатках и опасностях такого статуса. 

Тем не менее, корпоративные пользователи могут продлить поддержку Windows 7 до января 2023 года за дополнительную плату и продолжать получать обновления безопасности в рамках программы Windows 7 ESU (Extended Security Updates, расширенные обновления безопасности). Стоит это удовольствие немало — 25 долларов за каждый компьютер в первый год, с последующим повышением цены до 50 и даже 100 долларов. 

Как оказалось, ограничения Windows 7 ESU  можно легко обойти. Решение, опубликованное в сети, позволяет любому пользователю Windows 7 продолжать получать обновления безопасности, выпускаемые Microsoft в рамках Windows 7 ESU.

Для этого предлагается вручную установить специальный патч BypassESU и тестовое ESU обновление KB4528069, которое и отвечает за проверку того, имеет ли пользователь право получать апдейты. Затем потребуется выполнить ещё несколько шагов. 

На данный момент лазейка работает, но Microsoft может закрыть её в любой момент. Конечно, пользоваться таким не одобренным Microsoft решением можно только на свой страх и риск. 

В принципе, лазейка была найдена уже в конце прошлого года, но тогда было не понятно, продолжит ли она работать с выпуском февральского обновления Windows 7 ESU. Февральское обновление вышло и решение осталось работоспособно. 

14 февраля 2020 в 07:27

| Теги: Windows, Microsoft

| Источник: Softpedia, Deskmodder

The end of extended support for Windows 7 is fast approaching, and Microsoft has been doing everything in its power to get users to upgrade to Windows 10. The most visible way that Microsoft has been nudging users has been to display pop-up nag screens encouraging them to abandon the 10-year-old operating system.

Officially, extended support ends on January 14th, 2020 — meaning no more OS or security updates — but Microsoft will allow enterprise customers to pay for continual updates to Windows 7. Microsoft is charging between $25 to $200 per workstation (per year) for Windows 7 Extended Security Updates (ESUs). However, community members over at My Digital Life have crafted a special software tool that in essences bypasses the key check process that Microsoft has implemented to ensure that a system is authorized to receive paid ESUs.

The software bypass, which was first noted by ZDNet, is a result of KB4528069 for Windows 7 ESU that landed back in November. Specifically, the update has one primary purpose:

This update is a test package we recommend that you deploy in your test environment. Install this update on your on-premise devices that are eligible for ESU.

Administrators are then required to provide an ESU license to ensure that systems are ready to go when the first updates arrive after the January 14th cutoff. The BypassESU tool is by no means authorized or condoned by Microsoft. In fact, we’d imagine that Microsoft is probably a bit irate about the very existence of the tool, as it would cut off an added revenue stream for customers too stubborn to upgrade to Windows 10.

With that being said, Windows 7 ESUs are not meant to be a long-term solution, and they will cease completely in 2023 — a full 14 years after Windows 7 was first released. It’s impressive that Microsoft has supported Windows 7 this long, but it’s really time for businesses to start looking towards upgrading rather than paying through the nose to support an operating system that is on life support.

Понравилась статья? Поделить с друзьями:
0 0 голоса
Рейтинг статьи
Подписаться
Уведомить о
guest

0 комментариев
Старые
Новые Популярные
Межтекстовые Отзывы
Посмотреть все комментарии
  • Как поменять аватарку на экране блокировки windows 10
  • Screenshot maker windows 10
  • Windows server 2016 nano server
  • Как установить windows на ssd накопитель
  • Драйвера для canon mf4450 windows 10