Kevin Remde's IT Pro Weblog

April-June 2006 - TechNet Event Resources

April-June 2006 - TechNet Event Resources

  • Comments 1
  • Likes

Kevin’s TechNet “Fuel”
Event Resources – April-June, 2006

 

Don’t forget to register and USE your Event DVD! 

 

E-mail Technical Questions: Kevin Remde – Kevin.Remde@microsoft.com

 

Kevin’s Blog “Full of I.T.” – Additional Resources and Discussion

http://blogs.technet.com/kevinremde

 

Feedback E-mail to my boss: Melanie Brunnermbrunne@microsoft.com

 

Future Live, In-Person Event Information

TechNet (for IT Pros): http://www.technetevents.com/kevinremde

MSDN (for Software Developers): http://www.MSDNEvents.com

Microsoft Across America: http://www.microsoft.com/acrossamerica

 

TechNet Events Bloggers - http://techneteventsbloggers.net

(Add your blog, or subscribe to IT Pro focused blog postings)

 

Microsoft Learning - Training Resources

http://www.microsoft.com/learning

http://www.microsoft.com/learning/books/ITPro

 

Microsoft TechNet

http://www.microsoft.com/technet

 

TechNet Community Site

http://www.microsoft.com/technet/community

 

Session I – Implementing Security for Wireless Networks

 

Wireless Network
Solution

Typical
Environment

Additional Infrastructure
Components Required?

Certificates Used
for Client Authentication

Passwords Used
for Client Authentication

Typical Data
Encryption Method

Wi-Fi Protected Access with Pre-Shared Keys (WPA-PSK)

 

Small Office/Home Office (SOHO)

 

Small Office/Home Office (SOHO)

 

NO

 

YES

Uses WPA encryption key to authenticate to network

 

WPA

 

Password-based wireless network security

 

Small to medium organization

 

Internet Authentication Services (IAS)

Certificate required for the IAS server

 

NO

However, a certificate is issued to validate the IAS server

 

YES

WPA or Dynamic WEP

 

Certificate-based wireless network security

 

Medium to large organization

 

Internet Authentication Services (IAS)

Certificate Services

 

YES

 

NO

Certificates used but may be modified to require passwords

 

WPA or Dynamic WEP

 

 

 

Securing Wireless LANs with Certificate Services

http://www.microsoft.com/technet/security/prodtech/windowsserver2003/pkiwire/swlan.mspx?mfr=true

 

“Securing Wireless LANs with PEAP and Passwords”

http://www.microsoft.com/technet/security/topics/cryptographyetc/peap_0.mspx

 

WPA Wireless Security for Home Networks

http://www.microsoft.com/windowsxp/using/networking/expert/bowman_03july28.mspx

 

“Advantages of Protected Extensible Authentication Protocol (PEAP)”

http://www.microsoft.com/technet/itsolutions/network/wifi/peap.mspx

 

Security of the WEP Algorithm

http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html

 

IEEE 802.11 Wireless LAN Security with Microsoft Windows XP – Document Download

http://www.microsoft.com/downloads/details.aspx?FamilyID=67fdeb48-74ec-4ee8-a650-334bb8ec38a9&DisplayLang=en

 

Tools for scanning for and dealing with rogue Wireless Access Points:

AirDefense Enterprise

http://www.asl-airdefense.co.uk/products/enterprise_overview.php

 

AirMagnet Enterprise

http://www.fetest.com/products/distributed/index.cfm?Prod=30

 

CAPICOM – Platform SDK Redistributable Tool Download:

http://www.microsoft.com/downloads/details.aspx?FamilyID=860ee43a-a843-462f-abb5-ff88ea5896f6&DisplayLang=en

 

PKI Enhancements in Windows XP Professional and Windows Server 2003

http://www.microsoft.com/technet/prodtechnol/winxppro/plan/pkienh.mspx

 

 

Session II – Responding to Computer Attacks

 

Howard, John D. “A Common Language for Computer Security Incidents” 1998.

http://www.cert.org/research/taxonomy_988667.pdf

 

The Bad Boys of Cyberspace

http://www.rider.edu/suler/psycyber/badboys.html

 

Great Security and Incidence Response Book Titles:

http://www.securitybooks.org/incident-response

 

CERT’s Virtual Training Environment (VTE)

http://www.sei.cmu.edu/products/courses/courses.html#VTE

https://www.vte.cert.org

 

Microsoft Security Response Center (MSRC)

http://www.microsoft.com/security/msrc

 

The Microsoft Security Response Center (MSRC) blog

http://blogs.technet.com/msrc/

 

Microsoft Security Advisories

http://www.microsoft.com/technet/security/advisory

 

Microsoft Security Bulletins

http://www.microsoft.com/technet/security/current.aspx

 

Security Notification Services (regular and comprehensive):

http://www.microsoft.com/technet/security/bulletin/notify.mspx

 

Monthly Security Bulletin webcast

http://www.microsoft.com/technet/security/bulletin/summary.mspx

 

Contact Microsoft Security Product Support Services (PSS)

TELEPHONE: 1-866-PCSAFETY

 

Windows Security Logging and Other Esoterica

http://blogs.msdn.com/ericfitz/

 

The Security Monitoring and Attack Detection Planning Guide

http://www.microsoft.com/technet/security/topics/auditingandmonitoring/securitymonitoring

 

Microsoft Windows Security Resource Kit v2.0 (ISBN: 0-7356-2174-8)

http://www.microsoft.com/MSPress/books/6815.asp

 

Computer Emergency Response Team (CERT)

http://www.cert.org/tech_tips/incident_reporting.htm

 

National Institute of Standards and Technology  (NIST)

Computer Security Incident Handling Guide

http://csrc.nist.gov/publications/nistpubs/800-61/sp800-61.pdf

 

Forum of Incident Response and Security Teams

http://www.first.org

 

SysInternals (Freeware utils AutoRuns, PSList, etc.)

http://www.sysinternals.com

 

“Incident Response: Investigating Computer Crime” (ISBN: 007222696X)

http://www.amazon.com/gp/product/007222696X/104-5141743-7097551?n=283155

 

 

Session III – “What’s Next for Microsoft Security?”

 

Windows Vista Security

http://www.microsoft.com/technet/windowsvista/evaluate/feat/secfeat.mspx

 

Windows System Center Certificate Lifecycle Manager Beta 1

http://www.microsoft.com/windowsserversystem/clm

 

Microsoft Antigen and FrontBridge

http://www.microsoft.com/securemessaging

 

Microsoft Exchange Hosted Services

http://www.microsoft.com/exchange/services

 

ISA Server 2006 Beta

http://www.microsoft.com/isaserver/2006

 

Network Access Protection – Overviews and Related Technologies

http://www.microsoft.com/technet/itsolutions/network/nap

 

And the most-asked-for item – the “We Share Your Pain” Video

You’ll find a link to where you can view it online here:

http://blogs.technet.com/kevinremde/archive/2006/02/24/420533.aspx

 


  • Live Event Resources
    For the past year or so I’ve gotten into the habit of typing out my live...