Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

When an operating system has reached its end of life, the operating system manufacturer will no longer provide additional support to the software. As a result, while Armor may still allow the use of this operating system, Armor cannot guarantee the operating system's usability in the future, especially for new installations.

...

Warning

The dates mentioned in this document may change without notice. For the latest dates, always refer to the vendor's website.

...

For Armor's private cloud, when an operating system has reached end-of-life support, users will no longer be able to purchase the operating system through the Armor Marketplace, nor will users be able to provision a new virtual machine from an existing template. You can continue to use AMP's self-service scaling feature to add / reduce the compute & memory resources on machines running EOL operating systems.

However, the Armor Agent (which Armor's private cloud utilizes) will continue to support the end-of-life operating system, unless there is a technical dependency that Armor cannot troubleshoot. In these situations, Armor will internally determine a suitable date, which will then be communicated to users as soon as possible.

...

2012 Essentials

...

Microsoft Windows

Version

End of Support Date

2012 Essentials

2012 Standard

October

,

October 10, 2023October 10,

2012 Datacenter

October 10, 2023

2012 R2 Essentials

October 10, 2023October 10, October 10,

2012 R2 Standard

October 10, 2023

2012 R2 Datacenter

October

,

October 10, 2023

2016 Essentials

January 12, 2027January 12, January 12,

2016 Standard

January 12, 2027

2016 Datacenter

January 12, 2027

January

,

2019 Essentials

January 9,

January 9, 2029

2019 Standard

January 9,

January 9, 2029January 9,

2019 Datacenter

January 9, 2029

...

Ubuntu

...

February 1, 2019

...

titleEnd-of-Life Support for Ubuntu 12
Warning

As of February 1, 2019 Armor no longer supports Ubuntu 12.X.

Also as of February 1, 2019 Ubuntu 12.X will no longer be compatible with Trend Micro. As a result, Armor no longer offers Ubuntu 12.X in the Armor Marketplace.

Armor strongly recommends that you create a new virtual machine to replace your existing Ubuntu 12 virtual machine.

At a high-level, you must:

  • Step 1: Create a new virtual machine
  • Step 2: Migrate infrastructure
  • Step 3: Delete the old virtual machine

...

There are two options:

  • Create a new virtual machine in a new workload
  • Create a new virtual machine in an existing workload

Option 1: Create a new virtual machine in a new workload

...

  • Your password must contain:
    • An upper-case letter
    • A lower-case letter
    • A number
    • A special character: ! @ # $ % ^ * ( ) { } [ ]
  • You can also click Generate Password to allow Armor to create a password.

...

When you order a virtual machine, you are also ordering Intelligence Security Model (ISM) for the virtual machine. Prices for ISM will vary based on the number of virtual machines you have ordered. IMS pricing is based on the following tiered structure:

...

Tier

...

Number of virtual machines

...

Note

After you create a virtual machine, Armor recommends that you:

  1. Create a firewall rule
    • By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
  2. Download the SSL/VPN client.
    • To access the virtual machine, you must download the SSL/VPN client. To learn more, see SSL VPN.

Option 2: Create a new virtual machine in an existing workload

Note

If you create a virtual machine with an existing workload, then your Location and Virtual Data Center will be automatically selected.

  1. In the Armor Management Portal, in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Hover over the plus ( + ) icon, and then click the virtual machine icon.
  4. Locate and select the desired operating system and operating system version.
  5. Select the desired virtual machine based on your CPU and memory needs (GB).
    • You can click High CPU or High Memory to filter the list of virtual machines. You can also click Show More Options to see every virtual machine offering.
    • Armor labels virtual machines by CPU and memory features. For instance, 2x4 indicates that the virtual machine has 2 CPU and 4 GB of memory.
  6. In Name, enter a descriptive name for your virtual machine.
  7. In Workload, select an existing workload.
  8. In In Workload Tier, select an existing tier.
    • To create and use a new tier, select New Tier, and then in New Tier Name, enter a descriptive name.
  9. Under Access Credentials, note your username to access the virtual machine.
  10. In Password, enter a secure password to use to access the virtual machine.
    • Your password must contain:
      • An upper-case letter
      • A lower-case letter
      • A number
      • A special character: ! @ # $ % ^ * ( ) { } [ ]
    • You can also click Generate Password to allow Armor to create a password.
  11. (Optional) For additional storage, under Storage Substrate and Disk Size, select your desired storage, and then click Add Disk.
  12. On the right-side menu, review the pricing information, and then click Purchase.
  13. To view the status of your newly created virtual machine, in the left-side navigation, click Infrastructure, click Virtual Machines, and then search for your newly created virtual machine.
Note

After you create a virtual machine, Armor recommends that you:

  1. Create a firewall rule
    • By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
  2. Download the SSL/VPN client.
    • To access the virtual machine, you must download the SSL/VPN client. To learn more, see SSL VPN.

...

There are two ways to delete a virtual machine. You can delete a virtual machine now or at the end of your billing cycle.

Note
You can only delete virtual machines that are offline (Power Off).
Note

If you delete a virtual machine before the end of the billing cycle, you will still be charged for the full amount; however, in the next invoice, you will receive a credit to offset the cost.

Additionally, any add-on products or add-on subscriptions associated with the deleted virtual machine must be canceled separately.

...

April 30, 2019

...

titleEnd-of-Life Support for Ubuntu 14
Warning

As of April 30, 2019 Armor no longer supports Ubuntu 14.04 LTS

Armor strongly recommends that you create a new virtual machine to replace your existing Ubuntu 14.04 virtual machine.

At a high-level, you must:

  • Step 1: Create a new virtual machine
  • Step 2: Migrate infrastructure
  • Step 3: Delete the old virtual machine

...

There are two options:

  • Create a new virtual machine in a new workload
  • Create a new virtual machine in an existing workload

Option 1: Create a new virtual machine in a new workload

...

  • Your password must contain:
    • An upper-case letter
    • A lower-case letter
    • A number
    • A special character: ! @ # $ % ^ * ( ) { } [ ]
  • You can also click Generate Password to allow Armor to create a password.

...

When you order a virtual machine, you are also ordering Intelligence Security Model (ISM) for the virtual machine. Prices for ISM will vary based on the number of virtual machines you have ordered. IMS pricing is based on the following tiered structure:

...

Tier

...

Number of virtual machines

...

Note

After you create a virtual machine, Armor recommends that you:

  1. Create a firewall rule
    • By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
  2. Download the SSL/VPN client.
    • To access the virtual machine, you must download the SSL/VPN client. To learn more, see SSL VPN.

Option 2: Create a new virtual machine in an existing workload

Note

If you create a virtual machine with an existing workload, then your Location and Virtual Data Center will be automatically selected.

  1. In the Armor Management Portal, in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Hover over the plus ( + ) icon, and then click the virtual machine icon.
  4. Locate and select the desired operating system and operating system version.
  5. Select the desired virtual machine based on your CPU and memory needs (GB).
    • You can click High CPU or High Memory to filter the list of virtual machines. You can also click Show More Options to see every virtual machine offering.
    • Armor labels virtual machines by CPU and memory features. For instance, 2x4 indicates that the virtual machine has 2 CPU and 4 GB of memory.
  6. In Name, enter a descriptive name for your virtual machine.
  7. In Workload, select an existing workload.
  8. In In Workload Tier, select an existing tier.
    • To create and use a new tier, select New Tier, and then in New Tier Name, enter a descriptive name.
  9. Under Access Credentials, note your username to access the virtual machine.
  10. In Password, enter a secure password to use to access the virtual machine.
    • Your password must contain:
      • An upper-case letter
      • A lower-case letter
      • A number
      • A special character: ! @ # $ % ^ * ( ) { } [ ]
    • You can also click Generate Password to allow Armor to create a password.
  11. (Optional) For additional storage, under Storage Substrate and Disk Size, select your desired storage, and then click Add Disk.
  12. On the right-side menu, review the pricing information, and then click Purchase.
  13. To view the status of your newly created virtual machine, in the left-side navigation, click Infrastructure, click Virtual Machines, and then search for your newly created virtual machine.
Note

After you create a virtual machine, Armor recommends that you:

  1. Create a firewall rule
    • By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
  2. Download the SSL/VPN client.
    • To access the virtual machine, you must download the SSL/VPN client. To learn more, see SSL VPN.

...

There are two ways to delete a virtual machine. You can delete a virtual machine now or at the end of your billing cycle.

Note
You can only delete virtual machines that are offline (Power Off).
Note

If you delete a virtual machine before the end of the billing cycle, you will still be charged for the full amount; however, in the next invoice, you will receive a credit to offset the cost.

Additionally, any add-on products or add-on subscriptions associated with the deleted virtual machine must be canceled separately.

...

April 2021

...

titleEnd-of-Life Support for Ubuntu 16
Warning

April 30, 2021 is the vendor End of Life for Ubuntu 16.04 LTS. For customers that required an upgrade prior to May 24, 2021, Armor provides Ubuntu 16.04 Extended Security Maintenance Package (ESM) through April 25, 2022.

Armor strongly recommends that you create a new virtual machine to replace your existing Ubuntu 16.04 virtual machine as your earliest convenience.

At a high-level, you must:

  • Step 1: Create a new virtual machine
  • Step 2: Migrate infrastructure
  • Step 3: Delete the old virtual machine

...

There are two options:

  • Create a new virtual machine in a new workload
  • Create a new virtual machine in an existing workload

Option 1: Create a new virtual machine in a new workload

...

  • Your password must contain:
    • An upper-case letter
    • A lower-case letter
    • A number
    • A special character: ! @ # $ % ^ * ( ) { } [ ]
  • You can also click Generate Password to allow Armor to create a password.

...

When you order a virtual machine, you are also ordering Intelligence Security Model (ISM) for the virtual machine. Prices for ISM will vary based on the number of virtual machines you have ordered. IMS pricing is based on the following tiered structure:

...

Tier

...

Number of virtual machines

...

Note

After you create a virtual machine, Armor recommends that you:

  1. Create a firewall rule
    • By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
  2. Download the SSL/VPN client.
    • To access the virtual machine, you must download the SSL/VPN client. To learn more, see SSL VPN.

Option 2: Create a new virtual machine in an existing workload

Note

If you create a virtual machine with an existing workload, then your Location and Virtual Data Center will be automatically selected.

  1. In the Armor Management Portal, in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Hover over the plus ( + ) icon, and then click the virtual machine icon.
  4. Locate and select the desired operating system and operating system version.
  5. Select the desired virtual machine based on your CPU and memory needs (GB).
    • You can click High CPU or High Memory to filter the list of virtual machines. You can also click Show More Options to see every virtual machine offering.
    • Armor labels virtual machines by CPU and memory features. For instance, 2x4 indicates that the virtual machine has 2 CPU and 4 GB of memory.
  6. In Name, enter a descriptive name for your virtual machine.
  7. In Workload, select an existing workload.
  8. In In Workload Tier, select an existing tier.
    • To create and use a new tier, select New Tier, and then in New Tier Name, enter a descriptive name.
  9. Under Access Credentials, note your username to access the virtual machine.
  10. In Password, enter a secure password to use to access the virtual machine.
    • Your password must contain:
      • An upper-case letter
      • A lower-case letter
      • A number
      • A special character: ! @ # $ % ^ * ( ) { } [ ]
    • You can also click Generate Password to allow Armor to create a password.
  11. (Optional) For additional storage, under Storage Substrate and Disk Size, select your desired storage, and then click Add Disk.
  12. On the right-side menu, review the pricing information, and then click Purchase.
  13. To view the status of your newly created virtual machine, in the left-side navigation, click Infrastructure, click Virtual Machines, and then search for your newly created virtual machine.
Note

After you create a virtual machine, Armor recommends that you:

  1. Create a firewall rule
    • By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
  2. Download the SSL/VPN client.
    • To access the virtual machine, you must download the SSL/VPN client. To learn more, see SSL VPN.

...

There are two ways to delete a virtual machine. You can delete a virtual machine now or at the end of your billing cycle.

Note
You can only delete virtual machines that are offline (Power Off).
Note

If you delete a virtual machine before the end of the billing cycle, you will still be charged for the full amount; however, in the next invoice, you will receive a credit to offset the cost.

Additionally, any add-on products or add-on subscriptions associated with the deleted virtual machine must be canceled separately.

...

April 2023

...

titleEnd-of-Life Support for Ubuntu 18
Warning

April 30, 2023 is the vendor End of Life for Ubuntu 18.04 LTS. For customers that required an upgrade prior to May 24, 2023, Armor provides Ubuntu 16.04 Extended Security Maintenance Package (ESM) through April 25, 2023.

Armor strongly recommends that you create a new virtual machine to replace your existing Ubuntu 18.04 virtual machine as your earliest convenience.

At a high-level, you must:

  • Step 1: Create a new virtual machine
  • Step 2: Migrate infrastructure
  • Step 3: Delete the old virtual machine

...

There are two options:

  • Create a new virtual machine in a new workload
  • Create a new virtual machine in an existing workload

Option 1: Create a new virtual machine in a new workload

...

  • Your password must contain:
    • An upper-case letter
    • A lower-case letter
    • A number
    • A special character: ! @ # $ % ^ * ( ) { } [ ]
  • You can also click Generate Password to allow Armor to create a password.

...

When you order a virtual machine, you are also ordering Intelligence Security Model (ISM) for the virtual machine. Prices for ISM will vary based on the number of virtual machines you have ordered. IMS pricing is based on the following tiered structure:

...

Tier

...

Number of virtual machines

...

Note

After you create a virtual machine, Armor recommends that you:

  1. Create a firewall rule
    • By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
  2. Download the SSL/VPN client.
    • To access the virtual machine, you must download the SSL/VPN client. To learn more, see SSL VPN.

Option 2: Create a new virtual machine in an existing workload

Note

If you create a virtual machine with an existing workload, then your Location and Virtual Data Center will be automatically selected.

  1. In the Armor Management Portal, in the left-side navigation, click Infrastructure.
  2. Click Virtual Machines.
  3. Hover over the plus ( + ) icon, and then click the virtual machine icon.
  4. Locate and select the desired operating system and operating system version.
  5. Select the desired virtual machine based on your CPU and memory needs (GB).
    • You can click High CPU or High Memory to filter the list of virtual machines. You can also click Show More Options to see every virtual machine offering.
    • Armor labels virtual machines by CPU and memory features. For instance, 2x4 indicates that the virtual machine has 2 CPU and 4 GB of memory.
  6. In Name, enter a descriptive name for your virtual machine.
  7. In Workload, select an existing workload.
  8. In In Workload Tier, select an existing tier.
    • To create and use a new tier, select New Tier, and then in New Tier Name, enter a descriptive name.
  9. Under Access Credentials, note your username to access the virtual machine.
  10. In Password, enter a secure password to use to access the virtual machine.
    • Your password must contain:
      • An upper-case letter
      • A lower-case letter
      • A number
      • A special character: ! @ # $ % ^ * ( ) { } [ ]
    • You can also click Generate Password to allow Armor to create a password.
  11. (Optional) For additional storage, under Storage Substrate and Disk Size, select your desired storage, and then click Add Disk.
  12. On the right-side menu, review the pricing information, and then click Purchase.
  13. To view the status of your newly created virtual machine, in the left-side navigation, click Infrastructure, click Virtual Machines, and then search for your newly created virtual machine.
Note

After you create a virtual machine, Armor recommends that you:

  1. Create a firewall rule
    • By default, outbound and inbound traffic are blocked from virtual machines. To allow traffic, you must create a firewall rule. To learn more, see Firewall Rules.
  2. Download the SSL/VPN client.
    • To access the virtual machine, you must download the SSL/VPN client. To learn more, see SSL VPN.

...

There are two ways to delete a virtual machine. You can delete a virtual machine now or at the end of your billing cycle.

Note
You can only delete virtual machines that are offline (Power Off).
Note

If you delete a virtual machine before the end of the billing cycle, you will still be charged for the full amount; however, in the next invoice, you will receive a credit to offset the cost.

Additionally, any add-on products or add-on subscriptions associated with the deleted virtual machine must be canceled separately.

...

April 2024

...

18.04 LTS

...

April 2023

...

April 2028

...

Red Hat Enterprise Linux

...

June 30, 2024

...

CentOS

...

  • Full updates will end on May 10, 2017.
  • Maintenance updates will end on November 30, 2020.

...

November 30th, 2020

...

  • Full updates will end in late 2020.
  • Maintenance updates will end on June 30, 2024.

...

June 30th, 2024

...

The Armor Agent (which Armor Anywhere utilizes) will continue to support the end-of-life operating system, unless there is a technical dependency that Armor cannot troubleshoot. In these situations, Armor will internally determine a suitable date, which will then be communicated to users as soon as possible

...

April 2024

...

April 2028

Red Hat Enterprise Linux

...

November 30, 2020

...

June 30, 2024

...

June 30, 2024

...

CentOS

...

Full updates end on May 10, 2017.

Maintenance updates end on November 30, 2020.

...

November 30th, 2020

...

Full updates end in late 2020.

Maintenance updates end on June 30, 2024.

...

June 30th, 2024

...

Full updates end December 31, 2021

Maintenance updates end December 31, 2021

...

Oracle Linux

...

Amazon Linux

Note

Amazon Linux follows a rolling release cycle to update their operating systems. To learn more, see Amazon Linux AMI FAQs.

...

hiddentrue

Armor Anywhere

...

CentOSFull UpdatesMaintenance Updates
6.XMay 10, 2017November 30, 2020
7.XQ4 2020June 30, 2024

...

Red Hat Enterprise LinuxEnd of Life
6.X11/30/2020
7.X 6/30/2024

https://access.redhat.com/support/policy/updates/errata

https://access.redhat.com/discussions/2399461

UbuntuEnd of Life
14.04 LTSApril 2019
16.04 LTSApril 2021
18.04 LTSApril 2023

...

AmazonĀ® Linux uses a rolling release cycle to continuously update between major and minor versions. For more information, read the Amazon Linux AMI documentation.

g https://aws.amazon.com/amazon-linux-ami/faqs/

Oracle LinuxPremier SupportExtended SupportSustaining Support
6.XMarch 2021 for 6.X

Not available for any version

Indefinite

7.XJuly 2024 for 7.X

Not available for any version

Indefinite

...

WindowsMainstream SupportExtended SupportService Pack Support
201210/9/2018
10/10/2023Nothing scheduled yet
2012 R210/9/2018
10/10/2023Nothing scheduled yet
2016 Standard01/11/202201/11/2027Nothing scheduled yet
2016 Datacenter01/11/202201/11/2027Nothing scheduled yet
2016 Essentials01/11/202201/11/2027Nothing scheduled yet

https://support.microsoft.com/en-us/lifecycle/search/1163

https://support.microsoft.com/en-us/lifecycle/selectindex

Armor's private cloud

...

WindowsMainstream SupportExtended SupportService Pack Support

2012 Datacenter

10/9/201810/10/2023Nothing scheduled yet

2012 R2 Standard

10/9/201810/10/2023Nothing scheduled yet

2012 Standard

10/9/201810/10/2023Nothing scheduled yet

2016 Standard

01/11/202201/11/2027Nothing scheduled yet
CentOSFull UpdatesMaintenance Updates
6.XMay 10, 2017November 30, 2020
7.XQ4 2020June 30, 2024
Red Hat Enterprise LinuxEnd of Life
6.X11/30/2020
7.X 6/30/2024

...

Version

End of Support Date

12.04 LTS

14.04 LTS

16.04 LTS

18.04 LTS

20.04 LTS

22.04 LTS

...

Red Hat Enterprise Linux

Version

End of Support Date

6.X

7.X

8.X

9.X

...

CentOS Linux

Version

End of Support Date

6.X

7.X

8.X

(This version is unsupported)

...

Oracle Linux

Version

End of Support Date

6.X

7.X

8.X

9.X

...

Amazon Linux

Version

End of Support Date

(All AMI Versions)

Amazon Linux 2

Amazon Linux 2023

...

Topics Discussed

Table of Contents
maxLevel3
minLevel3