Technical RollUp

Premier Field Engineering - Technical Rollup Mails

March 2008 - Technical Rollup Mail - Security

March 2008 - Technical Rollup Mail - Security

  • Comments 1
  • Likes

 News

 

Help your customers securely deploy Windows Server 2008 with the Windows Server 2008 Security Guide! http://go.microsoft.com/fwlink/?LinkId=92550

Every day, adversaries attempt to invade your customers’ networks and access their servers—to bring them down, infect them with viruses, or steal information about customers or employees.

Your customers are looking to Microsoft and Windows Server® 2008 to help them address these threats. To assist customers in taking full advantage of the rich security features in Windows Server 2008, Microsoft has developed the Windows Server 2008 Security Guide.

The Windows Server 2008 Security Guide provides IT professionals with best practices, predefined security templates, and an automated deployment tool to help strengthen the security of servers running Windows Server 2008.

 

Supporting Your Family, Friends, and Neighbours http://go.microsoft.com/?linkid=8287993

By Steve Riley, Senior Security Strategist, Trustworthy Computing Have you become a support professional outside of the workplace? Read this article and learn how to discuss security with your family, friends, and neighbours to better help them stay safe and secure online.

 

More Security and Control for Mobile Devices http://go.microsoft.com/?linkid=8287995

Learn how to add, manage, secure, and update Windows Mobile devices like you do Windows-based laptops and PCs. Microsoft System Center Mobile Device Manager 2008 provides robust security features and a comprehensive device management solution that helps safeguard your corporate data, reduce the cost and complexity of mobile deployments, and centralize and simplify Windows Mobile device management.

 

Island Hopping: The Infectious Allure of Vendor Swag http://go.microsoft.com/?linkid=8287996

The technique of island hopping -- penetrating a network through a weak link and then hopping around systems within that network -- has been around for years, but it continues to take on new dimensions. This article discusses the beginning steps of using a USB flash drive to attack a network and why the least privilege approach really matters.

 

Security Quiz http://go.microsoft.com/?linkid=8287999

Know a friend or family member with a small business? Help them assess what they know and what they ought to know about protecting their businesses from security risks.

 

Help Employees Develop Better Security Habits http://go.microsoft.com/?linkid=8287997

Your biggest vulnerability is not necessarily your computers. It's your users. See how to educate them.

 

Get a Free Trial of Forefront Security for SharePoint http://go.microsoft.com/?linkid=8250906

Find out how to help protect your Microsoft Office SharePoint Server 2007 and Windows SharePoint Services 3.0 collaboration environments with Forefront Security for SharePoint with SP1, and download free trial software.

 

Learn About Forefront Edge Security and Get Free Trial Software http://go.microsoft.com/?linkid=8250907

The Forefront edge security and access products provide enhanced network edge protection and application-centric, policy-based access to corporate IT infrastructure. Find out more by visiting the Forefront edge security Web site. http://go.microsoft.com/?linkid=8250953

 

Microsoft Security Bulletin Summary for February, 2008

http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx 

 

Search for previous security bulletins http://go.microsoft.com/?linkid=3992478 

 

Security Bulletin Feed http://go.microsoft.com/?linkid=3992479  RSS http://go.microsoft.com/?linkid=3992480

 

Documents

 

Help Friends and Family Prevent Identity Theft, Spyware, and Viruses http://go.microsoft.com/?linkid=8287998

Microsoft Security at Home provides easy-to-understand guidelines to help people protect their computers, themselves, and their families.

 

Security Quiz http://go.microsoft.com/?linkid=8287999

Know a friend or family member with a small business? Help them assess what they know and what they ought to know about protecting their businesses from security risks.

 

Virus Protection and Security Checklist http://go.microsoft.com/?linkid=8288000

Virus protection is a two-stage process. First, you need to educate your users, and then strengthen your network's security defenses. Review this checklist to see if your employees and systems are covered.

 

Strong Passwords: How to Create and Use Them http://go.microsoft.com/?linkid=8288001

This article discusses what makes a strong password, password strategies to avoid, the importance of keeping passwords secret, and how to create a strong, memorable password in six easy steps.

 

Password Checker http://go.microsoft.com/?linkid=8288002

Use this tool to help you gauge the strength of your password.

 

Malicious Software Removal Tool http://go.microsoft.com/?linkid=8288003

The Microsoft Windows Malicious Software Removal Tool checks computers running Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software -- including Blaster, Sasser, and MyDoom. It also helps remove any infection you find. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed.

 

Microsoft Baseline Security Analyzer http://go.microsoft.com/?linkid=8288004

Detect computer vulnerabilities with the Microsoft Baseline Security Analyzer, a free tool that you can download and use to scan your stand-alone or networked computers for security vulnerabilities.

 

Partner Security: Establish a Strategy to Protect Shared Data http://go.microsoft.com/?linkid=8288005

Although many companies focus on the security of their internal systems, it's important to examine the external supply chain as well. Here's how to work with business partners to establish a comprehensive security strategy.

 

Data Encryption Toolkit for Mobile PCs http://go.microsoft.com/?linkid=8288006

Learn how to optimize two key encryption technologies already available to you in Windows XP and Windows Vista: the Encrypting File System (EFS) and Windows BitLocker Drive Encryption.

 

Downloads

 

Microsoft Forefront Security for Exchange Server with Service Pack 1

Help protect your Exchange server from viruses and other malware.

http://www.microsoft.com/downloads/details.aspx?FamilyID=2ceb14d4-404b-4d8f-8a21-ebfc71b2e82b&DisplayLang=en

 

EHS Filtering Datasheet

This datasheet outlines the Filtering service from Exchange Hosted Services.

http://www.microsoft.com/downloads/details.aspx?FamilyID=7793ba73-50c0-4e07-9cd9-211558cbd890&DisplayLang=en

 

Microsoft Antigen 9 with SP1 Readme

The Messaging Security Suite includes Antigen for Exchange, Antigen for SMTP Gateways, and Antigen Spam Manager, and provides server-level protection against the latest e-mail threats.

http://www.microsoft.com/downloads/details.aspx?FamilyID=7793ba73-50c0-4e07-9cd9-211558cbd890&DisplayLang=en

 

Microsoft IPsec Diagnostic Tool

Microsoft IPsec Diagnostic Tool assists Network administrators with troubleshooting network related failures, focusing primarily on IPsec. It is applicable on Windows XP, Windows Server 2003, Windows Vista and Windows Server 2008.

http://www.microsoft.com/downloads/details.aspx?FamilyID=1d4c292c-7998-42e4-8786-789c7b457881&DisplayLang=en

 

Security Configuration Wizard Manifest for Microsoft Windows SharePoint Services 3.0

Security Configuration Wizard (SCW) is an attack surface reduction tool introduced with Windows Server 2003 Service Pack 1.

http://www.microsoft.com/downloads/details.aspx?FamilyID=0ab396e0-4333-4621-95fa-313230dcd946&DisplayLang=en

 

ILM 2007 Password Management Collection

The Password Management Collection introduces users to the Password Change Notification Service (PCNS) in ILM 2007.

http://www.microsoft.com/downloads/details.aspx?FamilyID=ae09d2f5-8ac2-4769-ab6a-48fe35a25c63&DisplayLang=en

 

ILM 2007 Design Concepts

The ILM 2007 Design Concepts document set provides discussions and recommended solutions for specific challenges that are encountered during the design phase of ILM 2007.

http://www.microsoft.com/downloads/details.aspx?FamilyID=40a52201-a297-4c35-82e9-f0b4ca05daeb&DisplayLang=en

 

Office Communications Server 2007 Document: Security Guide

The security guide provide guidelines for assessing and managing security risks to your Office Communications Server 2007 deployment.

http://www.microsoft.com/downloads/details.aspx?FamilyID=2d1ea693-25e0-43d9-8c5c-0822ef83955a&DisplayLang=en

 

Office 2007 Security Certificates

This download includes security certificate (.cer) files and a Systems Management Server (SMS) 2003 package definition (.sms) file for the Microsoft 2007 Office system.

http://www.microsoft.com/downloads/details.aspx?FamilyID=590b8eb2-9eda-441b-a972-b38e17883063&DisplayLang=en

 

Microsoft Forefront Server Security Management Console Documentation

Forefront Server Security Management Console allows administrators to easily manage Forefront Security for Exchange Server, Forefront Security for SharePoint, and Microsoft Antigen.

http://www.microsoft.com/downloads/details.aspx?FamilyID=ae4ce23b-9e1e-455c-87a4-36167fe43107&DisplayLang=en

 

Internet Protocol Security Enforcement in the Network Access Protection Platform

This white paper describes the Network Access Protection (NAP) platform, how IPsec protects traffic, and how IPsec Enforcement in NAP provides system health policy enforcement for IPsec-secured communication.

http://www.microsoft.com/downloads/details.aspx?FamilyID=144cc69f-790f-4f52-8846-3f3b8584d7cd&DisplayLang=en

 

Introduction to Network Access Protection

Read this white paper for an overview of the NAP business scenarios, an outline of the components of NAP, and a description of how NAP works.

http://www.microsoft.com/downloads/details.aspx?FamilyID=5d5e243a-23a8-479c-9f2d-37d6d79153e7&DisplayLang=en

 

IEEE 802.1X for Wired Networks and Internet Protocol Security with Microsoft Windows

This white paper examines and compared 802.1X for wired networks and IPsec.

http://www.microsoft.com/downloads/details.aspx?FamilyID=d9aef757-f528-41be-a01f-99a60c9a855d&DisplayLang=en

 

Microsoft Antigen SP1 Documentation

Microsoft Antigen SP1 Documentation

http://www.microsoft.com/downloads/details.aspx?FamilyID=7d00160e-4d15-4459-98a3-89f393ac008e&DisplayLang=en

 

Microsoft Forefront Security for Exchange Server with SP1 Documentation

Microsoft Forefront Security for Exchange Server with SP1 Documentation

http://www.microsoft.com/downloads/details.aspx?FamilyID=5cd4e36e-2dab-44d6-990e-3b8184b1cb1b&DisplayLang=en

 

Microsoft Forefront Security for SharePoint with SP1 Documentation

Microsoft Forefront Security for SharePoint with SP1 Documentation

http://www.microsoft.com/downloads/details.aspx?FamilyID=125efb1e-7ff8-4cc8-934a-28fc7c7e59f0&DisplayLang=en

 

Protecting Your Business from Online Threats

Prescriptive advice on how businesses can protect their domains, customers, and assets

http://www.microsoft.com/downloads/details.aspx?FamilyID=53903d69-9449-426b-b393-e031716a7368&DisplayLang=en

 

Committed to Protecting Your IT Infrastructure - Microsoft Investments In Security

Committed to Protecting Your IT Infrastructure - Microsoft Investments In Security

http://www.microsoft.com/downloads/details.aspx?FamilyID=e4e0d998-ba3e-4865-a4bb-09d812c0244c&DisplayLang=en

 

Screencast: Deploying SSTP Remote Access

This screencast provides detailed information about how you can use three computers to create a test lab with which to configure and test virtual private network (VPN) remote access with Windows Server® 2008 and Windows Vista® with Service Pack 1 (SP1).

http://www.microsoft.com/downloads/details.aspx?FamilyID=fc4d7d3f-0376-45bf-9544-ec35329a2fc1&DisplayLang=en

 

Network Access Protection Platform Architecture

Read this white paper for a detailed description of the components of the NAP architecture and how it allows third-party software vendors and system integrators to create complete solutions for system health validated network access.

http://download.microsoft.com/download/9/4/6/946958ef-7b86-4ddc-bfdb-c7ed2af4ce51/TCPIP_Fund.pdf

 

Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2

Windows XP Service Pack 2 provides Windows Firewall, an enhanced firewall that is enabled by default. This white paper describes the methods used to deploy Windows Firewall settings in a managed environment.

http://download.microsoft.com/download/9/4/6/946958ef-7b86-4ddc-bfdb-c7ed2af4ce51/TCPIP_Fund.pdf

 

Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2

Windows XP Service Pack 2 provides Windows Firewall, an enhanced firewall that is enabled by default. This white paper describes the methods used to deploy Windows Firewall settings in a managed environment.

http://www.microsoft.com/downloads/details.aspx?FamilyID=4454e0e1-61fa-447a-bdcd-499f73a637d1&DisplayLang=en

 

Troubleshooting Windows Firewall in Microsoft Windows XP Service Pack 2

This article describes how Windows Firewall works, the common problems with using Windows Firewall, and the set of tools used to troubleshoot Windows Firewall issues.

http://www.microsoft.com/downloads/details.aspx?FamilyID=a7628646-131d-4617-bf68-f0532d8db131&DisplayLang=en

 

Network Access Protection Policies in Windows Server 2008

You configure NAP health requirements and enforcement behaviors with Network Policy Server in Windows Server 2008.

http://www.microsoft.com/downloads/details.aspx?FamilyID=8e47649e-962c-42f8-9e6f-21c5ccdcf490&DisplayLang=en

 

System Center Data Protection Manager 2007 System Requirements

DPM 2007 System Requirements lists the minimum DPM hardware and software requirements for the DPM server and the computers and applications it is going to protect.

http://www.microsoft.com/downloads/details.aspx?FamilyID=961659c7-a66c-410d-a69d-064888db05b3&DisplayLang=en

 

Deploying System Center Data Protection Manager 2007

Deploying DPM 2007 provides information about installing and configuring DPM 2007.

http://www.microsoft.com/downloads/details.aspx?FamilyID=2812640f-a4a7-4ff8-b4c9-0d73b828328d&DisplayLang=en

 

System Center Data Protection Manager 2007 Operations Guide - English

http://www.microsoft.com/downloads/details.aspx?FamilyID=ffa07fd4-bdee-418b-a228-ed8c76c97ab4&DisplayLang=en

 

Step-by-Step Guide: Demonstrate NAP IPsec Enforcement in a Test Lab

Test lab to demonstrate NAP IPsec enforcement

http://www.microsoft.com/downloads/details.aspx?FamilyID=298ff956-1e6c-4d97-a3ed-7e7ffc4bed32&DisplayLang=en

 

Post Upgrade EFS Recovery Tool 1.0 (KB948690)

This tool can be used by server administrators to recover special user profiles and EFS encryption keys after a Windows file server has been upgraded to Windows Server 2008.

http://www.microsoft.com/downloads/details.aspx?FamilyID=fd786261-d278-40db-baf8-70f42d786223&DisplayLang=en

 

Step-by-Step Guide: Demonstrate NAP DHCP Enforcement in a Test Lab

Test lab to demonstrate NAP DHCP enforcement

http://www.microsoft.com/downloads/details.aspx?FamilyID=ac38e5bb-18ce-40cb-8e59-188f7a198897&DisplayLang=en

 

Step-by-Step Guide: Demonstrate NAP 802.1X Enforcement in a Test Lab

Test lab to demonstrate NAP 802.1X enforcement

http://www.microsoft.com/downloads/details.aspx?FamilyID=8a0925ee-ee06-4dfb-bba2-07605eff0608&DisplayLang=en

 

Microsoft DPM 2006 Management Pack

This DPM management pack for Operations Manager 2007 supports monitoring for Data Protection Manager 2006. Requires OpsMgr 2007 MOM 2005 Backward Compatibility MP Update 6.0.5000.16

http://www.microsoft.com/downloads/details.aspx?FamilyID=a3e0a46d-aad9-4ebf-9ce8-c5242d0e596c&DisplayLang=en

 

Microsoft Forefront Security for Exchange Server with SP1 Documentation

Microsoft Forefront Security for Exchange Server with SP1 Documentation

http://www.microsoft.com/downloads/details.aspx?FamilyID=5cd4e36e-2dab-44d6-990e-3b8184b1cb1b&DisplayLang=en

 

Microsoft Forefront Security for SharePoint with SP1 Documentation

Microsoft Forefront Security for SharePoint with SP1 Documentation

http://www.microsoft.com/downloads/details.aspx?FamilyID=125efb1e-7ff8-4cc8-934a-28fc7c7e59f0&DisplayLang=en

 

Extended Security Update Inventory Tool

The Extended Security Update Inventory Tool is used to detect security bulletins not covered by MBSA including MS04-028, February 2005 bulletins, and future security bulletins that are exceptions to MBSA.

http://www.microsoft.com/downloads/details.aspx?FamilyID=2c93da1d-48a0-4e5c-991f-87e08954f61b&DisplayLang=en

 

Update for Windows Mail Junk E-mail Filter for x64-based Systems [February 2008] (KB905866)

Install this update for Windows Mail to revise the definition files used to detect e-mail messages that should be considered junk e-mail or that may contain phishing content.

http://www.microsoft.com/downloads/details.aspx?FamilyID=749e10cd-f40c-4f94-8e38-d4221ded7652&DisplayLang=en

 

Update for Windows Mail Junk E-mail Filter [February 2008] (KB905866)

Install this update for Windows Mail to revise the definition files used to detect e-mail messages that should be considered junk e-mail or that may contain phishing content.

http://www.microsoft.com/downloads/details.aspx?FamilyID=aa029fde-f341-44fc-8b85-0c6f3d3c2d69&DisplayLang=en

 

Microsoft® Windows® Malicious Software Removal Tool (KB890830)

This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.

http://www.microsoft.com/downloads/details.aspx?FamilyID=ad724ae0-e72d-4f54-9ab3-75b8eb148356&DisplayLang=en

 

Microsoft® Windows® Malicious Software Removal Tool (KB890830) x64

This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.

http://www.microsoft.com/downloads/details.aspx?FamilyID=585d2bde-367f-495e-94e7-6349f4effc74&DisplayLang=en

 

ILM 2007 Getting Started Collection

MIIS 2003 Design Concepts for Implementing Reverse Joins

The Getting Started Collection introduces users to various features and functionality of ILM 2007.

http://www.microsoft.com/downloads/details.aspx?FamilyID=11fb01bc-94a9-4404-bb90-ceca1a206e32&DisplayLang=en

 

Deploying System Center Data Protection Manager 2007

Deploying DPM 2007 provides information about installing and configuring DPM 2007.

http://www.microsoft.com/downloads/details.aspx?FamilyID=2812640f-a4a7-4ff8-b4c9-0d73b828328d&DisplayLang=en

 

System Center Data Protection Manager 2007 System Requirements

DPM 2007 System Requirements lists the minimum DPM hardware and software requirements for the DPM server and the computers and applications it is going to protect.

http://www.microsoft.com/downloads/details.aspx?FamilyID=961659c7-a66c-410d-a69d-064888db05b3&DisplayLang=en

 

Backup Operations Service for Microsoft Office SharePoint Server 2007 with Data Protection Manager 2007 Datasheet

This offering helps customers to validate, envision, and plan the architecture and the design for an effective, rapid, and reliable recovery of their Office SharePoint Server farms.

http://www.microsoft.com/downloads/details.aspx?FamilyID=d423e7dd-4029-447c-ad26-031adfa41265&DisplayLang=en

 

Microsoft Internet Security and Acceleration (ISA) Server Best Practices Analyzer (BPA) Tool

The ISA Server Best Practices Analyzer Tool is designed for administrators who want to determine the overall health of their ISA Server computers and to diagnose current problems. The tool scans the configuration settings of the local ISA Server computer and reports issues that do not conform to the recommended best practices.

http://www.microsoft.com/downloads/details.aspx?FamilyID=d22ec2b9-4cd3-4bb6-91ec-0829e5f84063&DisplayLang=en

 

Step-by-Step Guide: Demonstrate NAP VPN Enforcement in a Test Lab

Test lab to demonstrate NAP VPN enforcement

http://www.microsoft.com/downloads/details.aspx?FamilyID=729bba00-55ad-4199-b441-378cc3d900a7&DisplayLang=en

 

Network Access Protection Platform Architecture

Read this white paper for a detailed description of the components of the NAP architecture and how it allows third-party software vendors and system integrators to create complete solutions for system health validated network access.

http://www.microsoft.com/downloads/details.aspx?FamilyID=2f37651e-1749-45c3-996e-53de05d44ef7&DisplayLang=en

 

Introduction to Network Access Protection

Read this white paper for an overview of the NAP business scenarios, an outline of the components of NAP, and a description of how NAP works.

http://www.microsoft.com/downloads/details.aspx?FamilyID=5d5e243a-23a8-479c-9f2d-37d6d79153e7&DisplayLang=en

 

Internet Protocol Security Enforcement in the Network Access Protection Platform

This white paper describes the Network Access Protection (NAP) platform, how IPsec protects traffic, and how IPsec Enforcement in NAP provides system health policy enforcement for IPsec-secured communication.

http://www.microsoft.com/downloads/details.aspx?FamilyID=144cc69f-790f-4f52-8846-3f3b8584d7cd&DisplayLang=en

 

Events/WebCasts 

 

Microsoft Security Webcast Series: Upcoming and On-Demand

 

Security Webcast Calendar http://go.microsoft.com/fwlink/?LinkId=37910 

Find security webcasts listed in an easy-to-use calendar format.

 

Upcoming Security Webcasts

http://www.microsoft.com/events/security/upcoming.mspx 

 

Register for the following Webcasts on the link above

 

IT Manager Webcast: Dynamic IT and Security (Part 5 of 5): Data Protection (Level 200)

Tuesday, March 04, 2008 11:00 A.M.-12:00 P.M. Pacific Time

 

TechNet Webcast: Information About Microsoft March Security Bulletins (Level 200)

Wednesday, March 12, 2008 11:00 A.M.-12:00 P.M. Pacific Time

 

On-Demand Security Webcasts

http://www.microsoft.com/events/security/ondemand.mspx  

 

 

Comments
Your comment has been posted.   Close
Thank you, your comment requires moderation so it may take a while to appear.   Close
Leave a Comment