On September 30, 2009, in Security, by

a.    Use. You may install and use any number of copies of the software on your devices in your household for use by people who reside there or for use in your home-based small business.

Holy cow the EULA allows for use in a home based small business.  Wow, didn’t expect that.

Tinfoil and paranoids.. please see MU is enabled, may contain Silverlight (is that like may contain peanuts for those that have peanut allergies?)

These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the software named above, which includes the media on which you received it, if any. The terms also apply to any Microsoft
·    updates,
·    supplements,
·    Internet-based services, and
·    support services
for this software, unless other terms accompany those items. If so, those terms apply.
By using the software, you accept these terms. If you do not accept them, do not use the software.
As described below, installation or use of the software also operates as your consent to the transmission of certain standard computer information during validation, automatic download and installation of certain updates, and for Internet-based services.
If you comply with these license terms, you have the rights below for each license you acquire.
a.    Use. You may install and use any number of copies of the software on your devices in your household for use by people who reside there or for use in your home-based small business.
b.    Separation of Components. The components of the software are licensed as a single unit. You may not separate the components and install them on different devices.
c.    Included Microsoft Programs. The software may contain other Microsoft programs. The license terms with those programs apply to your use of them.
a.    The software may cause the operating system software to conduct validation checks of your operating system software from time to time, depending upon your specific operating system.
b.    Validation verifies that your computer’s operating system has been activated and is properly licensed. Validation also permits you to use certain features of the operating system software or to obtain additional benefits.
c.    If a validation check is performed, the operating system software will send information about the software and your operating system software to Microsoft. This information includes the versions of the software and operating system software. Microsoft does not use the information to identify or contact you. By using the software, you consent to the transmission of this information. For more information, see
d.    If, after a validation check, your operating system software is found not to be properly licensed, the software you are installing may be disabled, or the functionality of the operating system software may be affected, depending upon your specific operating system and applicable laws. For example, you may need to reactivate the operating system software or you may receive reminders to obtain a properly licensed copy of the operating system software, or you may not be able to use or continue to use some of the features of the operating system software or obtain certain updates, upgrades or services from Microsoft.
e.    You may only obtain updates or upgrades for the operating system software from Microsoft or authorized sources. For more information on obtaining updates from authorized sources, see
3.    INTERNET-BASED SERVICES. Microsoft provides Internet-based services with the software. Except as otherwise noted in materials accompanying a service, it may change or cancel them at any time.
a.    Consent for Internet-Based Services. The software features described below connect to Microsoft or service provider computer systems over the Internet. In some cases, you will not receive a separate notice when they connect. Unless otherwise noted, you may switch off these features or not use them. For more information about these features, see By using these features, you consent to the transmission of this information. Microsoft does not use the information to identify or contact you.
Computer Information. The following features use Internet protocols, which send to the appropriate systems computer information, such as your Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the device where you installed the software. Microsoft uses this information to make the Internet-based services available to you.
·    Microsoft Update Feature. By installing the software on your device, you also agree to receive updates using the Microsoft Update center. This feature provides you with the latest updates against malware threats and can update your device with the latest updates as needed. If you do not enlist in the Microsoft Update center, you will not be able to install and operate the software. For more information about the Microsoft Update feature, see

·    Microsoft Digital Rights Management. If you use the software to access content that has been protected with Microsoft Digital Rights Management (DRM), in order to let you play the content, the software may automatically request media usage rights from a rights server on the Internet and download and install available DRM Updates. For more information, see

·    Malicious Software Removal. The software will check for and remove certain high severity malicious software (“Malware”) from your device automatically during scheduled scans and after discovery. When the software checks your device for Malware, a report will be sent to Microsoft about any Malware detected or errors that occur while the software is checking for Malware, specific information relating to the detection, errors that occurred while the software was checking for Malware, and other information about your device that will help us improve this and other Microsoft products and services. No information that can be used to identify you is included in the report.

·    Error Reports. This software automatically sends error reports to Microsoft that describe which software components had errors. No files or memory dumps will be sent unless you choose to send them. From time-to-time, we will also download a small file to your computer that permits us to collect information about specific errors you have while using the software. For more information about Error Reports, see
·    Potentially Unwanted Software. The software will search your computer for low to medium severity Malware, including but not limited to, spyware, and other potentially unwanted software (“Potentially Unwanted Software”). The software will only remove or disable low to medium severity Potentially Unwanted Software if you agree. Removing or disabling this Potentially Unwanted Software may cause other software on your computer to stop working, and it may cause you to breach a license to use other software on your computer, if the other software installed this Potentially Unwanted Software on your computer as a condition of your use of the other software. You should read the license agreements for other software before authorizing the removal of this Potentially Unwanted Software. By using this software, it is possible that you or the system will also remove or disable software that is not Potentially Unwanted Software.
·    Microsoft SpyNet Participation. When you install the software, Microsoft SpyNet allows users to become part of a network community of users that report spyware and other forms of Potentially Unwanted Software to Microsoft. Upon initial installation, users will be opted-in by default to participate in Microsoft SpyNet under a “basic” membership, which allows the software to report potential threats identified in the software that have not yet been analyzed for risks. The reports include information about the files or programs in question. For more information about Microsoft SpyNet and the information collected for reports, see the privacy statement at

·    Automatic Updates. This software may contain Silverlight technology. If it does, Silverlight contains an Automatic Update feature that is on by default. Microsoft may change or cancel it at any time. For more information about this feature, see You may turn off this feature while the software is running (“opt-out”). Unless you expressly opt out of this feature, this feature will (a) connect to Microsoft or service provider computer systems over the Internet, (b) use Internet protocols to send to the appropriate systems your computer information, such as your Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the device where you installed the software, and (c) automatically download and install, or prompt you to download and/or install, current Updates to a previous version of the software. By installing the software and not opting out of this feature, you consent to the transmission of your computer information and the automatic downloading and installation of Updates.
4.    SCOPE OF LICENSE. The software is licensed, not sold. This agreement only gives you some rights to use the software. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the software only as expressly permitted in this agreement. In doing so, you must comply with any technical limitations in the software that only allow you to use it in certain ways. You may not
·    disclose the results of any benchmark tests of the software to any third party without Microsoft’s prior written approval;
·    work around any technical limitations in the software;
·    reverse engineer, decompile or disassemble the software, except and only to the extent that applicable law expressly permits, despite this limitation;
·    make more copies of the software than specified in this agreement or allowed by applicable law, despite this limitation;
·    publish the software for others to copy;
·    rent, lease or lend the software; or
·    use the software for commercial software hosting services.
5.    BACKUP COPY. You may make one backup copy of the software. You may use it only to reinstall the software.
6.    DOCUMENTATION. Any person that has valid access to your computer or internal network may copy and use the documentation for your internal, reference purposes.
7.    NOTICE ABOUT VC-1 VISUAL STANDARDS. This software may include VC-1 visual decoding technology. MPEG LA, L.L.C. requires this notice:
If you have questions about the VC-1 visual standard, please contact MPEG LA, L.L.C., 250 Steele Street, Suite 300, Denver Colorado 80206;
8.    EXPORT RESTRICTIONS. The software is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the software. These laws include restrictions on destinations, end users and end use. For additional information, see
9.    SUPPORT SERVICES. Because this software is “as is,” we may not provide support services for it. For more information on support provided for the software, go to
10.    ENTIRE AGREEMENT. This agreement (including the warranty below), any addendum or amendment included with the software, and the terms for supplements, updates, Internet-based services and support services that you use, are the entire agreement for the software and support services.
a.    United States. If you acquired the software in the United States, Washington state law governs the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws principles. The laws of the state where you live govern all other claims, including claims under state consumer protection laws, unfair competition laws, and in tort.
b.    Outside the United States. If you acquired the software in any other country, the laws of that country apply.
12.    LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the laws of your state or country. You may also have rights with respect to the party from whom you acquired the software. This agreement does not change your rights under the laws of your state or country if the laws of your state or country do not permit it to do so.
13.    Disclaimer of Warranty.  The software is licensed “as-is.” You bear the risk of using it. Microsoft gives no express warranties, guarantees or conditions. You may have additional consumer rights under your local laws which this agreement cannot change. To the extent permitted under your local laws, Microsoft excludes the implied warranties of merchantability, fitness for a particular purpose and non-infringement.
14.    Limitation on and Exclusion of Remedies and Damages.  You can recover from Microsoft and its suppliers only direct damages up to U.S. $5.00. You cannot recover any other damages, including consequential, lost profits, special, indirect or incidental damages.
This limitation applies to
·    anything related to the software, services, content (including code) on third party Internet sites, or third party programs; and
·    claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence, or other tort to the extent permitted by applicable law.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages.



  1. David Moisan says:

    Re the question on the list about WSUS and SE:

    Susan, despite my home machine being backed by WSUS, Security Essentials did update itself, so I’m not expecting any problems with it updating. Patch Tuesday’s in a few weeks so we’ll see.

  2. Joe Raby says:

    What’s the deal with the VC-1 line in the EULA?

    Is this to detect metatag malware in video files?

  3. Joe Raby says:

    FCS runs well, but to make central management possible for SMB’s, they have to reduce the workload of the management server. It needs to be able to run on SBS Standard without requiring such high-end server hardware requirements and software isolation. It’s hard to recommend FCS to clients with managed systems because of this exact reason. Ideally, it should be workable on something like SQL Express, and shouldn’t tie up huge server resources for data collection. The next version is called Forefront Endpoint Protection 2010 and it will offer the management console for free, but you still need SQL Standard for server information collection. That’s just not good enough for normal small businesses. Without management, it can get into a support nightmare pretty fast, especially if the IT is provided by out-of-house managed services.

  4. That really handy for small businesses as sometime laptops and more than one PC is used especially for back ups. Allowing this will means you are not penilised for being small in terms of your set up.