Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Roger's Security Blog

  • The Windows 7 UAC “Vulnerability”

    It is always interesting how some things spin off. The claimed UAC vulnerability in Windows 7 in one of those events. There are numerous blogs which claim that they found a huge vulnerability in Windows 7. The reason for that is that you can change the...
  • Apple releases Keyboardless Laptop

    Wow, there are news, which we cannot cope with. Apple just announced the first laptop without keyboard : Apple Introduces Revolutionary New Laptop With No Keyboard and additionally the new Mac Tiny : They even talk about the Mac Nano in this video Enjoy...
  • Office 365 Single Sign-On with AD FS 2.0 whitepaper

    Sorry, I did not blog for quite a while. When looking at the Cloud, one of the key challenges to address - in my opinion - is how to manage the identity of the different users. If you have to add an additional identity to all the logons you already have...
  • Typing Arabic without a Arabic Keyboard: Microsoft Maren

    I am using a Latin keyboard and my Arabic is kind of “rusty” but I guess that this could be of real help if you write Arabic: Microsoft Maren There is a good video on that page. Roger
  • Distributed Denial of Service – and how it works

    I often get asked about Distributed Denial of Service (DDoS) attacks, how it works and what role we can play to prevent them. So, let me start with the first part of it: Our Security Intelligence Report version 5 talked about the underground economy and...
  • Deploying IPsec Server and Domain Isolation using Windows Server 2008 Group Policy

    As you know (at least I hope that you do) we introduced Network Access Protection with Windows Server 2008. Thomas Shinder now published an article on WindowsSecurity.com about how to implement NAP and IPSec and Domain Isolation via Group Policies. It...
  • Conficker and Microsoft Anti-Malware Software

    I want to add a few things as it is still not over: More and more enterprises are still hit. My last blog post showed you what you can do but I wanted to add two resources and a comment. The comment first: There were some discussions about our Anti-Malware...
  • New Baselines for the Security Compliance Manager

    There were just new resources released for the Security Compliance Manager: the Windows Server 2008 R2 Security Baseline and the Office 2010 Security Baseline, and setting packs for Windows 7 and Internet Explorer 8. This packs help you to manage your...
  • Russian Roulette with your Network (part 2)

    My latest blog post on this matter generated quite some attention. Based on what happened since then, let me be clear on what I wanted to say (and still want to say): If you decide not to roll out a security update which is so critical that we decide...
  • Most Popular Usernames and Passwords

    No clue what the source is but if they are right, it is scary: DRG SSH Username and Password Authentication Tag Clouds Roger
  • “Black Screen of Death” Reports

    Oh, wow – sometimes the power of social media, the blogs and the Internet can backfire. I guess in the meantime you have seen the claims by Prevx that approx. 80 Mio of PCs are affected by the Black Screen of Death problems supposedly caused by our November...
  • End-to-End Trust: The Internet – a safer place to work, play, learn and do business

    I often have the opportunity to keynote events on security. I rarely want to talk about products but much more about the way I see the development around security on the Internet. The reason why I do this presentation the way you see below is, that threats...
  • Patch Management, a key step towards compliance!

    As you might have read, I recently blogged about my infrastructure and the future of a platform towards a better management of compliance – honestly, I actually played with our latest technology . I wrote about Deploying PKI Time Sync on Virtual DCs Now...
  • Searchable Encryption for the Cloud–soon?

    This is a very interesting development. Encryption generally would solve a lot of problems around data sovereignty. So, encrypting the data, keeping the key and moving the data to the public cloud could basically address a lot of the risks. Today, it...
  • When Goog becomes your Roommate (a “must see”)

    I just found that this morning. If you have 15 minutes, you have to watch these videos. They are really fun (are they?):   Enjoy! I did (partly) Roger
  • COFEE freely downloadable on the Internet?

    You definitely have heard of COFEE (Computer Online Forensic Evidence Extractor) which we make freely available to Law Enforcement through Interpol and NW3C. Now, the probably unavoidable happened and the tool leaked to the Internet. There was actually...
  • It’s Performance Review Time

    We have our Financial Year closing in end of June. This means, it is Performance Review Time at Microsoft and it is by far not that bad. But I love Dilbert:
  • Direct Access and Virtual Smartcard

    I am a huge fan of DirectAccess – especially as a user. This means mainly, that I love it as a user as I do not have to care anymore about where I am connected – my notebook immediately connects to our Microsoft Corporation's network. Ages ago, when we...
  • Three Microsoft Announcements

    Last night Vinny Gullotto made some significant announcements at RSA Japan. At least for us they are significant: We published the second Security Intelligence Report. Now, you might ask, we this is significant. Think about the data sources, we...
  • Network Access Protection Client for Mac and Linux

    This is very exciting news: Unet , one of our NAP partners now delivers a NAP Client for Mac and Linux . Here are some very cool screenshots from their website: This is the Windows Client : Here for Mac : And finally for Linux : If you are running mixed...
  • How to manage “Bring your own device”

    A few years back a customer’s CSO left the room when I said that this customer should start thinking about a scenario, where selected users bring their own devices – he called me “nuts”. Well, I think the smartphone area proofed me right. Basically the...
  • UNODC: Open Ended Expert Group on Cybercrime

    From tomorrow on, UNDOC invited for an Open Ended Expert Group on Cybercrime in Vienna. I am really interested in seeing hoe these discussions will go. If – by any chance – you are there as well, please ping me and we will have a chat. Otherwise, I will...
  • Is a “Zero-Trust” Model the Silver Bullet?

    I was reading an interesting article: Forrester Pushes 'Zero Trust' Model For Security , where they mainly claim that you should not trust your internal network – something I am asking for since a long time. However, the conclusions Forrester and me are...
  • Have a look at Server and Domain Isolation

    I am often talking about different zones in the network and how you can create them. There is no a demo kit available for you to download and "play" with it: Server and Domain Isolation Demo Roger
  • Time Sync on Virtual DCs

    I was recently caught in a tricky problem: The clock of one of my host servers ran out of sync.. – significantly. The core problem was that my Mediacenter (which is domain integrated) started to record about 6-8 minutes too late but this is not the reason...