News

Enabling a Strategic IT Infrastructure with Microsoft Forefront and Microsoft System Center http://go.microsoft.com/?linkid=6755493

By Rex Backman, Senior Product Manager, Microsoft Corporation The complexity of the IT environment in many organizations is at an all-time high. To help the business meet its objectives, IT managers need tools and technologies that help secure and manage the IT environment cost-effectively and efficiently. This article explores how businesses can address these challenges and turn a possible IT liability into an asset.

Microsoft Security Intelligence Report http://go.microsoft.com/?linkid=6755495

The Microsoft Security Intelligence Report provides a comprehensive understanding of the types of threats Windows customers face today so they can take appropriate action to help ensure they are better protected. The report highlights trends observed over the past several years, leveraging data collected by Microsoft between July 1 and December 31, 2006, from numerous sources including the Microsoft Malicious Software Removal Tool (MSRT) and Windows Defender.

Microsoft Extends Security and Management Product Lines with Launch of Forefront Client Security and System Center Essentials 2007 http://go.microsoft.com/?linkid=6755496

On May 2, Microsoft outlined its vision for integrated security and management solutions and announced delivery of key products under the Forefront and System Center brands. Watch Microsoft Senior Vice President Bob Muglia's keynote address http://go.microsoft.com/?linkid=6755578 from the Los Angeles launch event on-demand to learn more about how Microsoft is delivering deeper integration with its Forefront and System Center solutions to help customers simplify security management, improve the productivity of IT professionals, and more closely align IT to the needs of their business.

Forefront Client Security 120-Day Trial Download http://go.microsoft.com/?linkid=6755497

Microsoft recently announced the release to manufacture of Microsoft Forefront Client Security, a security solution designed to help protect business desktops, laptops, and server operating systems from viruses, spyware, and other current and emerging threats. Forefront Client Security simplifies administration through central management and provides critical visibility into threats and vulnerabilities to help IT administrators protect their businesses with confidence and efficiency. Register to download the free 120-day trial software. You will receive resources that are targeted to address the challenges specific to each stage of evaluation as you discover, assess, and deploy the software.

Forefront Server Security Case Studies

SAS Extends SharePoint Collaboration Environment to Include an Extranet http://go.microsoft.com/?linkid=6728365

With the help of Microsoft Forefront Security for SharePoint, SAS protects its extranet with up to five simultaneous engines and maintains that protection without needing additional staff.

Vienna International Airport Keeps Its E-mail Flying Smoothly http://go.microsoft.com/?linkid=6728366

With Microsoft Forefront Security for Exchange Server throughout the enterprise, the airport expects the same high level of protection and simplified management that it had with the Forefront Security predecessor Microsoft Antigen.

Cable&Wireless Helps Its Customers Secure Their IT Environments http://go.microsoft.com/?linkid=6728367

After upgrading its managed services infrastructure to the new Microsoft Forefront Security for Exchange Server, Cable&Wireless has a security product that integrates well with its existing IT infrastructure as the company migrates its managed services from Exchange Server 2003 to Exchange Server 2007.

Perot Systems Safeguards Messaging Systems http://go.microsoft.com/?linkid=6728368

Microsoft Antigen for Exchange and Microsoft Antigen Spam Manager -- the predecessors to Forefront Security for Exchange Server -- make it easier for Perot Systems and its customers to block the approximately 8.5 million spam and virus-infected e-mails they receive each month.

Microsoft Forefront Client Security Is Released http://go.microsoft.com/?linkid=6838508

Microsoft announced the release to manufacture of Microsoft Forefront Client Security, a security solution that helps protect business desktops, laptops, and server operating systems from viruses, spyware, and other current and emerging threats.

Read how other IT professionals use Forefront Client Security http://go.microsoft.com/?linkid=6838581

Take the virtual labs http://go.microsoft.com/?linkid=6838582

Download the trial software http://go.microsoft.com/?linkid=6838583

Microsoft Forefront and System Center Demonstration Tool Kit http://go.microsoft.com/?linkid=6878256

See for yourself how Forefront and System Center products integrate with each other and with your infrastructure to put you in control of your environment. Register and try the unified, virtual machine-based demo environment containing Forefront and System Center products.

Microsoft Forefront Demos

Forefront family demo mms://wm.microsoft.com/ms/windowsserversystem/secure-messaging.wmv

Forefront Client Security demo http://go.microsoft.com/?linkid=6878337

Microsoft Security Bulletin Summary for May, 2007

http://www.microsoft.com/technet/security/bulletin/ms07-may.mspx

Search for previous security bulletins http://go.microsoft.com/?linkid=3992478

Security Bulletin Feed http://go.microsoft.com/?linkid=3992479 RSS http://go.microsoft.com/?linkid=3992480

Developer

JSON Hijacking and How ASP.NET AJAX 1.0 Avoids These Attacks http://go.microsoft.com/?linkid=6733509

Scott Guthrie discusses how ASP.NET AJAX 1.0 addresses the threat of JSON hijacking, including disabling web method invocation via GET requests by default.

The Security Development Lifecycle - Welcome to the SDL Blog http://go.microsoft.com/?linkid=6808087

We on the Security Engineering team at Microsoft have been getting a lot of friendly pokes from customers, partners, colleagues and competitors, asking us to say more about the Microsoft Security Development Lifecycle (SDL) in an open forum, so here it is.

Documents

Security Tip of the Month: Improving Management of Client Antimalware Solutions http://go.microsoft.com/?linkid=6755498

By Ryan McGee, Senior Product Manager, Microsoft Forefront Product Team This tip explores the technological adjustments IT teams can make to eliminate some of the challenges of managing client antimalware solutions and gain better control of their environments.

Security Management Tips for Aspiring IT Managers http://go.microsoft.com/?linkid=6755499

In today's fast-changing and often risky business environment, it is critical for IT to effectively secure systems -- a process that's both costly and time-consuming. At the same time, IT managers are expected to enhance worker productivity and implement new technologies that drive competitive advantage for the business. This article describes how, by adopting an organized approach to security, you will spend less time cleaning up messes and more time helping your organization meet its goals.

Five Ways to Improve Data Security: Guidance for Business Managers http://go.microsoft.com/?linkid=6755500

Many business managers think of security as an issue for the IT department, forgetting that the "I" in IT stands for "information." From balance sheets to sales figures to product designs, information is the lifeblood of a business. If unauthorized persons gain access to it, it is not the IT department alone that suffers the consequences. Below are five steps that executives in finance, sales, marketing, and operations roles can take to reduce their vulnerability to serious risks.

Optimize and Secure Your Core Infrastructure http://go.microsoft.com/?linkid=6755501

To help companies transform costly, inefficient IT environments, Microsoft offers guidance in the form of the Infrastructure Optimization model. This model outlines steps that companies can take to analyze where they are today and to create an IT environment that is well-managed, secure, and efficient. Learn how such an IT infrastructure can be a catalyst for company growth.

Core Infrastructure Optimization Implementer Resource Guide: Standardized to Rationalized http://go.microsoft.com/?linkid=6755502

The second in a series, this guide provides the resources needed to make secure your IT infrastructure by implementing strict policies and control, from desktop to server to firewall to extranet.

Service Management Functions: Security Management http://go.microsoft.com/?linkid=6755503

This article focuses on issues that organization leaders and senior managers should consider when developing an effective security policy and implementing it through a security program. It also discusses the individual and team security roles and their interrelationship with operational functions, and reviews tactics and best practices to increase staff awareness and encourage continuous improvement.

Service Management Functions: Security Administration http://go.microsoft.com/?linkid=6755504

This guide provides detailed information about security administration for organizations that have deployed, or are considering deploying, Microsoft technologies in a data center or other type of enterprise computing environment.

Security Monitoring and Attack Detection http://go.microsoft.com/?linkid=6755505

The primary goal of a security-monitoring and attack-detection system is to help identify suspicious events on a network that may indicate malicious activity or procedural errors. This guide describes how to develop a plan to help address the need for such a system on Windows-based networks. It also provides instructions about how to implement, manage, and validate such a system.

Microsoft Security Assessment Tool http://go.microsoft.com/?linkid=6755506

Designed to help organizations with fewer than 1,000 employees assess weaknesses in their current IT security environment, the Microsoft Security Assessment Tool (MSAT) identifies processes, resources, and technologies that are designed to promote good security planning and risk mitigation practices within your organization.

Microsoft Forefront Server Security Management Console Beta 1 http://go.microsoft.com/?linkid=6755507

This console allows administrators to easily manage Forefront Security for Exchange Server, Forefront Security for SharePoint, and Microsoft Antigen, and allows administrators to rapidly respond to outbreaks and update protection across enterprise deployments, improving organizational agility in responding to new threats.

Downloads

Privacy Guidelines for Developing Software Products and Services

This document is a set of privacy guidelines for developing software products and services that are based on our internal guidelines and our experience incorporating privacy into the development process.

http://www.microsoft.com/downloads/details.aspx?FamilyID=c48cf80f-6e87-48f5-83ec-a18d1ad2fc1f&DisplayLang=en

Internet Protocol Security Enforcement in the Network Access Protection Platform

This white paper describes the Network Access Protection (NAP) platform, how IPsec protects traffic, and how IPsec Enforcement in NAP provides system health policy enforcement for IPsec-secured communication.

http://www.microsoft.com/downloads/details.aspx?FamilyID=144cc69f-790f-4f52-8846-3f3b8584d7cd&DisplayLang=en

Introduction to Network Access Protection

Read this white paper for an overview of the NAP business scenarios, an outline of the components of NAP, and a description of how NAP works.

http://www.microsoft.com/downloads/details.aspx?FamilyID=5d5e243a-23a8-479c-9f2d-37d6d79153e7&DisplayLang=en

Step-by-Step Guide: Demonstrate VPN NAP Enforcement in a Test Lab

Test lab to demonstrate VPN NAP enforcement

http://www.microsoft.com/downloads/details.aspx?FamilyID=729bba00-55ad-4199-b441-378cc3d900a7&DisplayLang=en

Microsoft SCEP Implementation Whitepaper.

This whitepaper provides an overview of Microsoft implementation for SCEP in the Windows Server codename “Longhorn” release

http://www.microsoft.com/downloads/details.aspx?FamilyID=e11780de-819f-40d7-8b8e-10845bc8d446&DisplayLang=en

Step-by-Step Guide: Demonstrate DHCP NAP Enforcement in a Test Lab

Test lab to demonstrate DHCP NAP enforcement

http://www.microsoft.com/downloads/details.aspx?FamilyID=ac38e5bb-18ce-40cb-8e59-188f7a198897&DisplayLang=en

Step-by-Step Guide: Demonstrate IPsec NAP Enforcement in a Test Lab

Test lab to demonstrate IPsec NAP enforcement

http://www.microsoft.com/downloads/details.aspx?FamilyID=298ff956-1e6c-4d97-a3ed-7e7ffc4bed32&DisplayLang=en

Microsoft Security Intelligence Report (July – December 2006)

An in-depth perspective of software vulnerabilities, malicious code threats, and potentially unwanted software, focusing on the second half of 2006.

http://www.microsoft.com/downloads/details.aspx?FamilyID=af816e28-533f-4970-9a49-e35dc3f26cfe&DisplayLang=en

Step By Step Guide: Demonstrate 802.1X NAP Enforcement in a Test Lab

Test lab to demonstrate 802.1X NAP enforcement

http://www.microsoft.com/downloads/details.aspx?FamilyID=8a0925ee-ee06-4dfb-bba2-07605eff0608&DisplayLang=en

Microsoft Forefront and System Center Demonstration Toolkit

Microsoft Forefront business security products help protect client machines, server applications, and the network edge. System Center is a family of IT management solutions that helps proactively plan, deploy, manage, and optimize your IT environment. See how Forefront and System Center products integrate with each other and with your infrastructure to put you in control of your environment.

http://www.microsoft.com/downloads/details.aspx?FamilyID=4d7329b8-2bd1-4ab4-a73c-75e9e0912de8&DisplayLang=en

Podcasts: How Microsoft IT Uses Identity Lifecycle Manager

Learn how Microsoft IT uses ILM and other tools to manage identity and directory services in a large and complex environment.

http://www.microsoft.com/downloads/details.aspx?FamilyID=03a9bed0-bf35-476c-84fc-9c5fa75bea68&DisplayLang=en

Podcasts: How Microsoft IT Implemented Information Protection with Windows Rights Management Services

Learn how Microsoft IT implemented Windows Rights Management Services (RMS) to control how sensitive business e-mail messages and business productivity documents could be shared and used, without risking losses in productivity.

http://www.microsoft.com/downloads/details.aspx?FamilyID=7c22c565-9092-433e-bbe6-b939fa932eef&DisplayLang=en

Microsoft Forefront and System Center Demonstration Toolkit

Microsoft Forefront business security products help protect client machines, server applications, and the network edge. System Center is a family of IT management solutions that helps proactively plan, deploy, manage, and optimize your IT environment. See how Forefront and System Center products integrate with each other and with your infrastructure to put you in control of your environment.

http://www.microsoft.com/downloads/details.aspx?FamilyID=4d7329b8-2bd1-4ab4-a73c-75e9e0912de8&DisplayLang=en

How to Help Secure a Groove Manager Web Site

This document contains procedures you can use to help secure your Groove Manager Web site.

http://www.microsoft.com/downloads/details.aspx?FamilyID=4a339da8-ea59-428c-804a-e20a95ffcb44&DisplayLang=en

Microsoft® Internet Security and Acceleration (ISA) Server 2004 Standard Edition Service Pack 3

ISA Server 2004 Standard Edition Service Pack 3 (SP3) provides the latest updates for ISA Server 2004 Standard Edition.

http://www.microsoft.com/downloads/details.aspx?FamilyID=a05a074a-5033-4792-af8b-58b90d841436&DisplayLang=en

Microsoft® Internet Security and Acceleration (ISA) Server 2004 Enterprise Edition Service Pack 3

ISA Server 2004 Enterprise Edition Service Pack 3 (SP3) provides the latest updates for ISA Server 2004 Enterprise Edition.

http://www.microsoft.com/downloads/details.aspx?FamilyID=d2752df9-7249-4cea-b4d4-dfa53686186f&DisplayLang=en

Microsoft Forefront Client Security Evaluation Edition

Microsoft® Forefront™ Client Security provides unified malware protection for business desktops, laptops and server operating systems that is easy to manage and control. By delivering simplified administration through central management and providing critical visibility into threats and vulnerabilities, Microsoft Forefront Client Security helps protect your business with confidence and efficiency.

http://www.microsoft.com/downloads/details.aspx?FamilyID=7d0fbe8d-0174-4b49-b0e9-bbe6dfad3f79&DisplayLang=en

Microsoft Forefront Client Security Evaluation Software End User License Agreement

This document is the end-user license agreement for Microsoft Forefront Client Security.

http://www.microsoft.com/downloads/details.aspx?FamilyID=3ab1ad77-3c69-46d6-8011-32f6aae08436&DisplayLang=en

Certificate Settings in Group Policy Step-by-Step Guide for Windows Server Code Name "Longhorn"

Certificate settings in Group Policy in the Windows Server® Code Name "Longhorn" Beta 3 operating system allow you to manage the settings for certificate path discovery and validation using Group Policy objects.

http://www.microsoft.com/downloads/details.aspx?FamilyID=187fc784-b847-499a-929d-600c8754455f&DisplayLang=en

Microsoft ISA Server Diagnostic Logging Viewer

The ISA Server Diagnostic Logging Viewer is a command-line tool for easily viewing and querying log entries generated by the diagnostic logging feature introduced in Microsoft® Internet Security and Acceleration (ISA) 2004 Service Pack 3.

http://www.microsoft.com/downloads/details.aspx?FamilyID=f8a0bf4c-639e-41ef-89f6-050db1b2725d&DisplayLang=en

Microsoft Forefront Client Security Product Documentation

This download provides product documentation for Microsoft Forefront Client Security.

http://www.microsoft.com/downloads/details.aspx?FamilyID=90044d88-299b-49fb-b762-eae17a1f01f4&DisplayLang=en

Microsoft Forefront Client Security Privacy Policy

This document describes the privacy policy for Microsoft Forefront Client Security.

http://www.microsoft.com/downloads/details.aspx?FamilyID=3e868f82-1931-4bbe-9fd6-59da040df541&DisplayLang=en

Podcasts: Providing Security for Web Applications and Infrastructure: Best Practices for Managing Security Risks

The Windows Live Security team shares best practices, from platform and network security to incident management, for providing security for web applications and infrastructure.

http://www.microsoft.com/downloads/details.aspx?FamilyID=c6f35cf7-e704-4b79-a131-b5209cfb10ce&DisplayLang=en

Protecting Your Business from Online Threats

Prescriptive advice on how businesses can protect their domains, customers, and assets

http://www.microsoft.com/downloads/details.aspx?FamilyID=53903d69-9449-426b-b393-e031716a7368&DisplayLang=en

Security Enhancements in Windows Vista™

This article includes information about security enhancements in Windows Vista and how Microsoft used the Security Development Lifecycle to increase the security of the Windows operating system.

http://www.microsoft.com/downloads/details.aspx?FamilyID=6fb28358-68d9-43e9-b574-6a0d377bba34&DisplayLang=en

User-Based, Self-Service Password Change Solution Guide for MIIS 2003

This Guide describes how to plan and implement a user-based, self-service password change solution using IIS, a Web-based password management application, and WMI. The Step-by-Step document shows how to install, configure, and use IIS, ASP.NET, and the Web-based application.

http://www.microsoft.com/downloads/details.aspx?FamilyID=7e90b216-6cfd-4ccd-bdb9-2cc6be004bc4&DisplayLang=en

Active Directory Certificate Services Longhorn Beta3 Certificate Templates Whitepaper

Implementing and Administering Certificate Templates

This white paper details Certificate Templates in Windows Server “Longhorn” Beta3 and Windows Server 2003 Enterprise Certification Authorities.

http://www.microsoft.com/downloads/details.aspx?FamilyID=3c670732-c971-4c65-be9c-c0ebc3749e24&DisplayLang=en

Active Directory Certificate Services Longhorn Beta3 Key Archival and Recovery Whitepaper

Key Archival and Management

This white paper details the process of key archival and recovery in a Windows Server “Longhorn”– or Windows Server 2003–based certification authority (CA).

http://www.microsoft.com/downloads/details.aspx?FamilyID=b280e420-7cd8-4fd0-94a8-c91035b7b23b&DisplayLang=en

Microsoft® Windows® Malicious Software Removal Tool (KB890830)

This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.

http://www.microsoft.com/downloads/details.aspx?FamilyID=ad724ae0-e72d-4f54-9ab3-75b8eb148356&DisplayLang=en

Podcasts:How Microsoft IT Manages Security Knowledge for Better Application Risk Management

The process of threat modeling is built on a simple principle: To build a feasibly secure system, one must understand all the threats in that system. The challenge, however, is in making threat modeling more accessible to non-specialists.

http://www.microsoft.com/downloads/details.aspx?FamilyID=d637db50-0572-437c-ab18-ed124c24fa29&DisplayLang=en

Microsoft IT Showcase: Information Security at Microsoft Overview

Discover the best practices and processes Microsoft IT uses to secure its network. Provides a brief overview of the many aspects of network security; including some of the technologies used to protect against viruses, unapproved access attempts and malicious attacks. Describes the threat analysis and business reasons why certain practices and procedures were put into action.

http://www.microsoft.com/downloads/details.aspx?FamilyID=e959f26c-1f5c-4331-b1fb-6c720795704d&DisplayLang=en

Events/WebCasts

Microsoft Security Webcast Series: Upcoming and On-Demand

Security Webcast Calendar http://go.microsoft.com/fwlink/?LinkId=37910

Find security webcasts listed in an easy-to-use calendar format.

Upcoming Security Webcasts

http://www.microsoft.com/events/security/upcoming.mspx

Register for the following Webcasts on the link above

TechNet Webcast: Maximizing the Multiple Scan Engine Advantage in Forefront Server Security Solutions (Level 300)

Friday, June 1, 2007 9:30 A.M.-11:30 A.M. Pacific Time

TechNet Webcast: Why I Can Hack Your Network in a Day! [A live demonstration of techniques and tools used by hackers to compromise your network](Level 300)

Wednesday, June 6, 2007 5:30 A.M.-6:45 A.M. Pacific Time

TechNet Webcast: User Account Control Internals and Impact on Malware (Level 400)

Friday, June 8, 2007 7:45 A.M.-9:00 A.M. Pacific Time

TechNet Webcast: Securing Windows Vista with Software and Device Restriction Policies (Level 200)

Friday, June 8, 2007 6:00 A.M.-7:15 A.M. Pacific Time

TechNet Webcast: It's 11:00 P.M., Do You Know Where Your Data Is? (Level 300)

Friday, June 8, 2007 10:00 A.M.-11:15 A.M. Pacific Time

TechNet Webcast: User Account Control in Windows Vista (Level 200)

Monday, June 11, 2007 1:00 P.M.-2:30 P.M. Pacific Time

TechNet Webcast: How Microsoft IT Uses Network Access Protection to Manage Network Health (Level 300)

Tuesday, June 12, 2007 9:30 A.M.-10:30 A.M. Pacific Time

TechNet Webcast: Information About Microsoft June Security Bulletins (Level 200)

Wednesday, June 13, 2007 11:00 A.M.-12:00 P.M. Pacific Time

TechNet Webcast: A Technical Overview of Forefront Client Security (Level 200)

Friday, June 15, 2007 1:00 P.M.-2:30 P.M. Pacific Time

TechNet Webcast: How Microsoft IT Uses SQL Server 2005 to Power a Global Forensic Data Security Tool (Level 300)

Tuesday, June 19, 2007 9:30 A.M.-2\10:30 A.M. Pacific Time

TechNet Webcast: Public Key Infrastructure Enhancements in Windows Vista and Windows Server 'Longhorn' (Level 200)

Wednesday, June 20, 2007 11:30 A.M.-1:00 P.M. Pacific Time

TechNet Webcast: Security Features in Windows Vista (Level 200)

Monday, June 25, 2007 11:30 A.M.-1:00 P.M. Pacific Time

On-Demand Security Webcasts

http://www.microsoft.com/events/security/ondemand.mspx

A.O.B

Microsoft Product Lifecycle Information

Find information about your particular products on the Microsoft Product Lifecycle http://support.microsoft.com/common/international.aspx?rdpath=gp;[ln];lifecycle Web site.

See a List of Supported Service Packs http://go.microsoft.com/?linkid=6233929 - Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.