M. Omer Siddiqui's Blog

Infrastructure pieces on the web

Browse by Tags

Related Posts
  • Blog Post: Microsoft security updates for February 2011

    As part of Microsoft's routine, monthly security update cycle, we released 12 new security updates on February 8, 2011. Get the details and download at http://www.microsoft.com/security/pc-security/bulletins/201102.aspx?WT.mc_id=soc-n-sa- loc -services-omers
  • Blog Post: Microsoft Security Advisory 2737111 and Microsoft Exchange

    Yesterday Microsoft Security Research Center issued Microsoft Security Advisory (2737111) - Microsoft is investigating new public reports of vulnerabilities in third-party code, Oracle Outside In libraries, that affect Web-ready document viewing in Microsoft Exchange Server 2007 and Microsoft Exchange...
  • Blog Post: Privacy in the Cloud: Office 365

    Read about Microsoft’s practical approach to safeguarding information in the cloud, and discover the benefits that have resulted for Office 365 customers. Office 365 delivers the power of cloud productivity to businesses of all sizes, helping them to save time and money and free up valued resources. ...
  • Blog Post: Released: Update Rollup 6 for Exchange 2007 Service Pack 3

    This update contains a number of customer-reported and internally found issues since the release of RU5. See KB 2608656 : Description of Update Rollup 6 for Exchange Server 2007 Service Pack 3' for more details. We would like to specifically call out the following fixes which are included in this release...
  • Blog Post: TechNet Video: Microsoft Private Cloud Security Overview

    In this video, Nick Torkington, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other business decision-makers have when evaluating the Microsoft platform to build a private Infrastructure as a Service (IaaS) cloud. In this video, you will learn about: Building...
  • Blog Post: Exchange Server 2010 Technical Video: Information Protection and Control

    The Microsoft Exchange team is pleased to present the newest addition to the Exchange Server 2010 Technical Video Series – “Information Protection and Control” hosted by Greg Smiley and Ann Vu. In this video, Greg and Ann talk about the benefits of Security in Exchange 2010. The video includes demonstrations...
  • Blog Post: Cloud Security Is More Than a Leap of Faith

    IT administrators will continue to play an active role in security and risk management, even when leveraging cloud services as a utility. This edition of TechNet ON collects key guidance and resources to help address the security requirements in your cloud migration. Read more at http://technet.microsoft...
  • Blog Post: Microsoft security updates for December 2011

    As part of Microsoft's routine, monthly security update cycle, we released 13 new security updates on December 13, 2011. Get the details at http://www.microsoft.com/security/pc-security/bulletins/201112.aspx Read my favorites blogs: Designing a backup less Exchange 2010 Architecture Step by step guide...
  • Blog Post: Determining the type of CA

    Recently I was working on a PKI/CA project so I thought to write a short simple blog on how to determine the type of CA you have. One way that we generally use to determine the type of the CA is to look in the registry with either Regedit or Regedt32 and look at the following path HKEY_LOCAL_MACHINE...
  • Blog Post: Deploying Custom Registry Settings for Office 2010

    If you are planning to customize your Office 2010 deployment significantly, then at some point, you will more than likely need to make changes to the registry. Perhaps you wrote a custom add-in that you need to define (In “ HKLM\Software\Microsoft\Office\Word\Addins ”), or maybe you want to tweak the...
  • Blog Post: TechNet Video: Windows Azure Platform Security Essentials for Business Decision Makers

    In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other business decision-makers have regarding the security of their data in Windows Azure cloud platform. You’ll learn about: The security controls that Azure has in place to...
  • Blog Post: Email Information, Protection, and Control in Exchange 2010

    Protect sensitive information through versatile controls. To help prevent unauthorized and accidental distribution of data, Exchange 2010 can automatically inspect email and apply appropriate controls: For less sensitive communications, automated alerts remind users about potential data risks or policy...
  • Blog Post: October is Cyber Security Awareness Month

    Every October, Microsoft recognizes National Cyber Security Awareness Month (NCSAM) in the United States through our partnership with the National Cyber Security Alliance (NCSA). NCSAM was created to help increase awareness of online safety and security issues, and to help educate people about the best...
  • Blog Post: Introducing Microsoft BitLocker Administration 2.0 Beta

    A few months ago, Erwin started the conversation around what Windows 8 means for businesses at CeBIT in Hannover, Germany , and followed-up later with a post on Windows 8 enterprise edition . Last week, he began talking about the business value of Windows 8 Release Preview and today followed up with...
  • Blog Post: Making the Experience Better Together with Windows 7

    Windows Server 2008 R2 has many features that are designed specifically to work with client computers running Windows 7. Windows 7 is the most current version of the Windows operating system from Microsoft. Read all the security features at http://www.microsoft.com/windowsserver2008/en/us/R2-better-together...
  • Blog Post: Fostering Digital Citizenship

    Digital citizenship is usually defined as the "norms of behavior with regard to technology use." It encompasses digital literacy, ethics, etiquette, online safety, norms, rights, culture and more. Microsoft recognizes that good digital citizenship, when you use computers, gaming consoles, or...
  • Blog Post: PC Security

    Security scanners, tools, and safety guidelines for your PC, laptop, or mobile device. Find them all at http://www.microsoft.com/security/pc-security/default.aspx#Safety-products-and-scans Read my favorites blogs: Designing a backup less Exchange 2010 Architecture Step by step guide for upgrading Active...
  • Blog Post: Security Compliance Manager 2.5 now available for beta download

    For those not familiar with the Security Compliance Manager, SCM is a free tool from the Microsoft Solution Accelerators team that enables you to quickly configure and manage your computers, traditional data center, and private cloud using Group Policy and Microsoft System Center Configuration Manager...
  • Blog Post: Released: Update Rollup 4 for Exchange 2010 Service Pack 2

    On August 13th 2012, the Exchange CXP team released Update Rollup 4 for Exchange Server 2010 SP2 to the Download Center. This update contains a number of customer reported and internally found issues. See KB 2706690 Description of Update Rollup 4 for Exchange Server 2010 Service Pack 2 for more details...
  • Blog Post: Safety Scanner

    Do you think your PC has a virus? The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software. Note : The Microsoft Safety Scanner expires 10 days after...
  • Blog Post: Trustworthy Computing : 10 years now

    Trustworthy Computing focuses on creating and delivering secure, private, and reliable computing experiences based on sound business practices. Our goal is a safer, more trusted Internet. The security of our customers' computers and networks is a top priority. We are committed to building software and...
  • Blog Post: Fix it Solution Center

    Find automated solutions for your issues. Select a problem and find solution at http://support.microsoft.com/fixit/ Read my favorites blogs: Designing a backup less Exchange 2010 Architecture Step by step guide for upgrading Active Directory from Microsoft Windows 2003 to Microsoft Windows Server 2008...
  • Blog Post: New worm targeting weak passwords on Remote Desktop connections (port 3389)

    We've had reports of a new worm in the wild and that generates increased RDP traffic for our users on port 3389. Although the overall numbers of computers reporting detections are low in comparison to more established malware families, the traffic it generates is noticeable. The worm is detected as Worm...
  • Blog Post: Microsoft Safety Scanner

    Do you think your PC has a virus? The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software. Note: The Microsoft Safety Scanner expires 10 days after...
  • Blog Post: What does digital citizenship mean to you?

    Digital citizenship is usually defined as the "norms of behavior with regard to technology use." It encompasses digital literacy, ethics, etiquette, online safety, norms, rights, culture and more. Microsoft recognizes that good digital citizenship, when you use computers, gaming consoles, or...