Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Browse by Tags

Related Posts
  • Blog Post: Update on the Khobe “vulnerability”

    Just an update on my recent post  on The “KHOBE – 8.0 earthquake” – What’s behind it . In the meantime we worked with Matousec and confirmed that neither Microsoft Security Essentials nor Forefront Client Security are affected by this “vulnerability”. So, to me it is as I stated above: Make noise...
  • Blog Post: 10 Reasons to migrate off Windows XP

    I would like you to sit back, close your eyes and think about the year 2001. Think about how you used technology back then, how you used the Internet. Now, let’s take it a little bit further back in history and think of the year 2000. Just after we realized that the Year-2000-Problem was handled very...
  • Blog Post: Two Important Whitepapers on Windows Server 2008

    If you are planning to implement Windows Server 2008, there are two paper recently published that could help you with it: Active Directory Certificate Services Upgrade and Migration Guide Configuring and Troubleshooting Certification Authority Clustering in Windows Server 2008 Roger
  • Blog Post: Deploying IPsec Server and Domain Isolation using Windows Server 2008 Group Policy

    As you know (at least I hope that you do) we introduced Network Access Protection with Windows Server 2008. Thomas Shinder now published an article on WindowsSecurity.com about how to implement NAP and IPSec and Domain Isolation via Group Policies. It is a first part of a very good step-by-step guide...
  • Blog Post: Jeff’s Vista One-Year Vulnerability Report

    Jeff released another report: He is looking back into one year of Windows Vista. We had the discussion about the value of vulnerability comparison and I do not want to open another discussion thread about that. But as long as we hear that our products are less secure than others because we have sooo...
  • Blog Post: Security – One of the Key Reasons to Migrate to Windows Vista (part 2)

    In my last post , I briefly touched on different features of Windows Vista, which I think are important with regards to the view on Windows XP vs. Windows Vista. Let’s take a different approach now: I recently was on a panel in Eastern Europe where I was asked, which model generates more secure software...
  • Blog Post: Windows Server 2008 Security Guide released

    You all showed great interest in the Windows Server 2008 Security Guide Beta. Now the "real" version is here. Get it on Technet Roger
  • Blog Post: Internet Explorer 8 Beta 1 is available

    We just made Internet Explorer 8 Beta 1 available. This is especially important if you are developing web applications in order to test them. Os, here are the important links: IE 8 Beta 1 Readiness Toolkit Channel 9 discussion on IE8 features Channel 10 first look at IE8 Have fun Roger
  • Blog Post: SharePoint External Collaboration Toolkit moved to Codeplex

    Quite a while ago I blogged about the SharePoint External Collaboration Toolkit. I just wanted to make you aware that this toolkit is now moved to Codeplex and can be found here: http://cks.codeplex.com/ Roger
  • Blog Post: Why you should not use P2P Windows 7 Builds

    This is not about piracy and not about leaks and not about… I am waiting for the new RC build as you are. I am running an intermediate build between Beta and RC and would love to upgrade all my machines (including my MediaCenter) to RC. However, I refrain from downloading it from any of the untrusted...
  • Blog Post: Update on our Forefront Strategy

    As I was on vacation last week, I could not blog on that but still – if you do not have seen that, you should look into this blog post by the Froefront team. I hope it clarifies certain questions you might have: Update on Forefront security management Roger
  • Blog Post: Typing Arabic without a Arabic Keyboard: Microsoft Maren

    I am using a Latin keyboard and my Arabic is kind of “rusty” but I guess that this could be of real help if you write Arabic: Microsoft Maren There is a good video on that page. Roger
  • Blog Post: Securing My Infrastructure: Firewall

    Well, this is a follow-up of my last posts about how I secure my environment. If you want to read the earlier posts of the series, see at the end of this post. So, we did the Risk Assessment, now, let's look a little bit closer into my perimeter. Technically I have a "normal" ADSL connection with...
  • Blog Post: MS09-017: An out-of-the-ordinary PowerPoint security update

    Our Security Research and Defense team blogged on the PowerPoint security update we published on Tuesday. There are a few things which were not “business as usual”: The update for the Windows version of PowerPoint went out before the Mac version. The reason is that we did not want to hold the Windows...
  • Blog Post: Security – One of The Key Reasons to Migrate to Windows Vista (part 1)

    The value of Windows Vista is often questioned. There are a lot of customers who still think that there might be nor reason to migrate to Windows Vista. I will publish two blog posts giving you some views on the security of our latest operating system. Most of the facts in here are widely known but this...
  • Blog Post: Security Intelligence Report v3 is Live!

    I hope you read my yesterday's blog on the RSA story (if not, it is here ). I mentioned the Security Intelligence Report there. SIR is actually live in its third version, covering what we saw January to June 2007. Let me point out some "highlights": Vulnerability Trends – Unfortunately the trend...
  • Blog Post: IE6 Countdown–Migrate to IE8 (or IE9)

    10 years ago a browser was born. Its name was Internet Explorer 6. Now that we’re in 2011, in an era of modern web standards, it’s time to say goodbye. We all know that Internet Explorer 6 is outdated and that you should move away from it to a newer browser immediately. For security...
  • Blog Post: Microsoft Security Compliance Manager: Now available!

    I recently blogged about the Beta version of our Security Compliance Manger, helping you to manage the security baselines in your organization. There are some screenshots in the corresponding post: Making the Management of Security Compliance Easier! Now, we released the final version of it. It can be...
  • Blog Post: HP and Microsoft Partnership: That’s What You Need in the Cloud

    Often when I talk to our customers and they ask me about the cloud, a lot of questions come up. Most of them are security related (obviously) but some of them are more management focused. For example the question about how to manage a hybrid environment, where part of your business is run on premise...
  • Blog Post: You deployed MS09-008 – are you now protected?

    You might have seen several reports that MS09-008 does not protect you from the vulnerabilities. We reviewed these claims and customers who have deployed MS09-008 are protected from the four vulnerabilities. If you want to have the details, you should consult our Security Research & Defense Blog...
  • Blog Post: The Carbon Footprint of Spam

    McAfee just published an interesting report as they are taking a different approach on Spam. They were looking at the environmental impact of Spam. So, how much energy do we have to invest in order to fight spam? These are the key findings from their report: An estimated worldwide total of 62 trillion...
  • Blog Post: Kinect Sensor For Autonomous Flight

    That’s really interesting: Impressive! Roger
  • Blog Post: Spam regarding IE7 installation

    We got an increase on helpdesk calls in different subsidiaries with regards to a mail that is circulating: The mail claims to be coming from admin@microsoft.com and provides a link to an IE7 (Beta) download site. As always: This is spam and a fake. If you want some detailed analysis: http://isc.sans...
  • Blog Post: How we do IT: Direct Access

    You might know that we have something we call the Microsoft IT Showcase , where our internal IT shows how they use our technology to run our environment. Now, we just published a new article, which might be interesting for you to read called Using DirectAccess to Provide Secure Access to Corporate Resources...
  • Blog Post: Summary of Bitlocker Discussions

    Last week there was quite some discussion about “successful attacks” on Bitlocker. Those discussions are often quite interesting for me as they show sometimes that people are looking for one technical solution for all the problems. Bitlocker has a clear threat model it wants to protect you from. This...