Help your customers securely deploy Windows Server 2008 with the Windows Server 2008 Security Guide! http://go.microsoft.com/fwlink/?LinkId=92550
Every day, adversaries attempt to invade your customers’ networks and access their servers—to bring them down, infect them with viruses, or steal information about customers or employees.
Your customers are looking to Microsoft and Windows Server® 2008 to help them address these threats. To assist customers in taking full advantage of the rich security features in Windows Server 2008, Microsoft has developed the Windows Server 2008 Security Guide.
The Windows Server 2008 Security Guide provides IT professionals with best practices, predefined security templates, and an automated deployment tool to help strengthen the security of servers running Windows Server 2008.
Supporting Your Family, Friends, and Neighbours http://go.microsoft.com/?linkid=8287993
By Steve Riley, Senior Security Strategist, Trustworthy Computing Have you become a support professional outside of the workplace? Read this article and learn how to discuss security with your family, friends, and neighbours to better help them stay safe and secure online.
More Security and Control for Mobile Devices http://go.microsoft.com/?linkid=8287995
Learn how to add, manage, secure, and update Windows Mobile devices like you do Windows-based laptops and PCs. Microsoft System Center Mobile Device Manager 2008 provides robust security features and a comprehensive device management solution that helps safeguard your corporate data, reduce the cost and complexity of mobile deployments, and centralize and simplify Windows Mobile device management.
Island Hopping: The Infectious Allure of Vendor Swag http://go.microsoft.com/?linkid=8287996
The technique of island hopping -- penetrating a network through a weak link and then hopping around systems within that network -- has been around for years, but it continues to take on new dimensions. This article discusses the beginning steps of using a USB flash drive to attack a network and why the least privilege approach really matters.
Security Quiz http://go.microsoft.com/?linkid=8287999
Know a friend or family member with a small business? Help them assess what they know and what they ought to know about protecting their businesses from security risks.
Help Employees Develop Better Security Habits http://go.microsoft.com/?linkid=8287997
Your biggest vulnerability is not necessarily your computers. It's your users. See how to educate them.
Get a Free Trial of Forefront Security for SharePoint http://go.microsoft.com/?linkid=8250906
Find out how to help protect your Microsoft Office SharePoint Server 2007 and Windows SharePoint Services 3.0 collaboration environments with Forefront Security for SharePoint with SP1, and download free trial software.
Learn About Forefront Edge Security and Get Free Trial Software http://go.microsoft.com/?linkid=8250907
The Forefront edge security and access products provide enhanced network edge protection and application-centric, policy-based access to corporate IT infrastructure. Find out more by visiting the Forefront edge security Web site. http://go.microsoft.com/?linkid=8250953
Microsoft Security Bulletin Summary for February, 2008
Search for previous security bulletins http://go.microsoft.com/?linkid=3992478
Security Bulletin Feed http://go.microsoft.com/?linkid=3992479 RSS http://go.microsoft.com/?linkid=3992480
Help Friends and Family Prevent Identity Theft, Spyware, and Viruses http://go.microsoft.com/?linkid=8287998
Microsoft Security at Home provides easy-to-understand guidelines to help people protect their computers, themselves, and their families.
Virus Protection and Security Checklist http://go.microsoft.com/?linkid=8288000
Virus protection is a two-stage process. First, you need to educate your users, and then strengthen your network's security defenses. Review this checklist to see if your employees and systems are covered.
Strong Passwords: How to Create and Use Them http://go.microsoft.com/?linkid=8288001
This article discusses what makes a strong password, password strategies to avoid, the importance of keeping passwords secret, and how to create a strong, memorable password in six easy steps.
Password Checker http://go.microsoft.com/?linkid=8288002
Use this tool to help you gauge the strength of your password.
Malicious Software Removal Tool http://go.microsoft.com/?linkid=8288003
The Microsoft Windows Malicious Software Removal Tool checks computers running Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software -- including Blaster, Sasser, and MyDoom. It also helps remove any infection you find. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed.
Microsoft Baseline Security Analyzer http://go.microsoft.com/?linkid=8288004
Detect computer vulnerabilities with the Microsoft Baseline Security Analyzer, a free tool that you can download and use to scan your stand-alone or networked computers for security vulnerabilities.
Partner Security: Establish a Strategy to Protect Shared Data http://go.microsoft.com/?linkid=8288005
Although many companies focus on the security of their internal systems, it's important to examine the external supply chain as well. Here's how to work with business partners to establish a comprehensive security strategy.
Data Encryption Toolkit for Mobile PCs http://go.microsoft.com/?linkid=8288006
Learn how to optimize two key encryption technologies already available to you in Windows XP and Windows Vista: the Encrypting File System (EFS) and Windows BitLocker Drive Encryption.
Microsoft Forefront Security for Exchange Server with Service Pack 1
Help protect your Exchange server from viruses and other malware.
EHS Filtering Datasheet
This datasheet outlines the Filtering service from Exchange Hosted Services.
Microsoft Antigen 9 with SP1 Readme
The Messaging Security Suite includes Antigen for Exchange, Antigen for SMTP Gateways, and Antigen Spam Manager, and provides server-level protection against the latest e-mail threats.
Microsoft IPsec Diagnostic Tool
Microsoft IPsec Diagnostic Tool assists Network administrators with troubleshooting network related failures, focusing primarily on IPsec. It is applicable on Windows XP, Windows Server 2003, Windows Vista and Windows Server 2008.
Security Configuration Wizard Manifest for Microsoft Windows SharePoint Services 3.0
Security Configuration Wizard (SCW) is an attack surface reduction tool introduced with Windows Server 2003 Service Pack 1.
ILM 2007 Password Management Collection
The Password Management Collection introduces users to the Password Change Notification Service (PCNS) in ILM 2007.
ILM 2007 Design Concepts
The ILM 2007 Design Concepts document set provides discussions and recommended solutions for specific challenges that are encountered during the design phase of ILM 2007.
Office Communications Server 2007 Document: Security Guide
The security guide provide guidelines for assessing and managing security risks to your Office Communications Server 2007 deployment.
Office 2007 Security Certificates
This download includes security certificate (.cer) files and a Systems Management Server (SMS) 2003 package definition (.sms) file for the Microsoft 2007 Office system.
Microsoft Forefront Server Security Management Console Documentation
Forefront Server Security Management Console allows administrators to easily manage Forefront Security for Exchange Server, Forefront Security for SharePoint, and Microsoft Antigen.
Internet Protocol Security Enforcement in the Network Access Protection Platform
This white paper describes the Network Access Protection (NAP) platform, how IPsec protects traffic, and how IPsec Enforcement in NAP provides system health policy enforcement for IPsec-secured communication.
Introduction to Network Access Protection
Read this white paper for an overview of the NAP business scenarios, an outline of the components of NAP, and a description of how NAP works.
IEEE 802.1X for Wired Networks and Internet Protocol Security with Microsoft Windows
This white paper examines and compared 802.1X for wired networks and IPsec.
Microsoft Antigen SP1 Documentation
Microsoft Forefront Security for Exchange Server with SP1 Documentation
Microsoft Forefront Security for SharePoint with SP1 Documentation
Protecting Your Business from Online Threats
Prescriptive advice on how businesses can protect their domains, customers, and assets
Committed to Protecting Your IT Infrastructure - Microsoft Investments In Security
Screencast: Deploying SSTP Remote Access
This screencast provides detailed information about how you can use three computers to create a test lab with which to configure and test virtual private network (VPN) remote access with Windows Server® 2008 and Windows Vista® with Service Pack 1 (SP1).
Network Access Protection Platform Architecture
Read this white paper for a detailed description of the components of the NAP architecture and how it allows third-party software vendors and system integrators to create complete solutions for system health validated network access.
Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2
Windows XP Service Pack 2 provides Windows Firewall, an enhanced firewall that is enabled by default. This white paper describes the methods used to deploy Windows Firewall settings in a managed environment.
Troubleshooting Windows Firewall in Microsoft Windows XP Service Pack 2
This article describes how Windows Firewall works, the common problems with using Windows Firewall, and the set of tools used to troubleshoot Windows Firewall issues.
Network Access Protection Policies in Windows Server 2008
You configure NAP health requirements and enforcement behaviors with Network Policy Server in Windows Server 2008.
System Center Data Protection Manager 2007 System Requirements
DPM 2007 System Requirements lists the minimum DPM hardware and software requirements for the DPM server and the computers and applications it is going to protect.
Deploying System Center Data Protection Manager 2007
Deploying DPM 2007 provides information about installing and configuring DPM 2007.
System Center Data Protection Manager 2007 Operations Guide - English
Step-by-Step Guide: Demonstrate NAP IPsec Enforcement in a Test Lab
Test lab to demonstrate NAP IPsec enforcement
Post Upgrade EFS Recovery Tool 1.0 (KB948690)
This tool can be used by server administrators to recover special user profiles and EFS encryption keys after a Windows file server has been upgraded to Windows Server 2008.
Step-by-Step Guide: Demonstrate NAP DHCP Enforcement in a Test Lab
Test lab to demonstrate NAP DHCP enforcement
Step-by-Step Guide: Demonstrate NAP 802.1X Enforcement in a Test Lab
Test lab to demonstrate NAP 802.1X enforcement
Microsoft DPM 2006 Management Pack
This DPM management pack for Operations Manager 2007 supports monitoring for Data Protection Manager 2006. Requires OpsMgr 2007 MOM 2005 Backward Compatibility MP Update 6.0.5000.16
Extended Security Update Inventory Tool
The Extended Security Update Inventory Tool is used to detect security bulletins not covered by MBSA including MS04-028, February 2005 bulletins, and future security bulletins that are exceptions to MBSA.
Update for Windows Mail Junk E-mail Filter for x64-based Systems [February 2008] (KB905866)
Install this update for Windows Mail to revise the definition files used to detect e-mail messages that should be considered junk e-mail or that may contain phishing content.
Update for Windows Mail Junk E-mail Filter [February 2008] (KB905866)
Microsoft® Windows® Malicious Software Removal Tool (KB890830)
This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.
Microsoft® Windows® Malicious Software Removal Tool (KB890830) x64
ILM 2007 Getting Started Collection
MIIS 2003 Design Concepts for Implementing Reverse Joins
The Getting Started Collection introduces users to various features and functionality of ILM 2007.
Backup Operations Service for Microsoft Office SharePoint Server 2007 with Data Protection Manager 2007 Datasheet
This offering helps customers to validate, envision, and plan the architecture and the design for an effective, rapid, and reliable recovery of their Office SharePoint Server farms.
Microsoft Internet Security and Acceleration (ISA) Server Best Practices Analyzer (BPA) Tool
The ISA Server Best Practices Analyzer Tool is designed for administrators who want to determine the overall health of their ISA Server computers and to diagnose current problems. The tool scans the configuration settings of the local ISA Server computer and reports issues that do not conform to the recommended best practices.
Step-by-Step Guide: Demonstrate NAP VPN Enforcement in a Test Lab
Test lab to demonstrate NAP VPN enforcement
Microsoft Security Webcast Series: Upcoming and On-Demand
Security Webcast Calendar http://go.microsoft.com/fwlink/?LinkId=37910
Find security webcasts listed in an easy-to-use calendar format.
Upcoming Security Webcasts
Register for the following Webcasts on the link above
IT Manager Webcast: Dynamic IT and Security (Part 5 of 5): Data Protection (Level 200)
Tuesday, March 04, 2008 11:00 A.M.-12:00 P.M. Pacific Time
TechNet Webcast: Information About Microsoft March Security Bulletins (Level 200)
Wednesday, March 12, 2008 11:00 A.M.-12:00 P.M. Pacific Time
On-Demand Security Webcasts
PingBack from http://spyware.iblogublog.info/?p=10653