News

Monitoring Malware Through the Edge with Microsoft Forefront Threat Management Gateway http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014550&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

By Yuri Diogenes, Security Support Engineer, Microsoft ISA and IAG Team Learn how to monitor your traffic with either real-time logging or on-demand reporting. Explore how to use new fields on the dashboard and real-time logging to instantly see if the traffic contains a piece of malware, the threat level, and whether it was cured. In addition, see how you can use new reports to work proactively to investigate trends and identify systems that may be compromised.

Secure and Monitor Your Windows and Office Environment -- Join the Beta Now http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014551&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Project Codename Sundance provides you with an end-to-end solution to help your organization plan, deploy, and monitor security baselines of Windows operating systems and Microsoft Office 2007 applications. The beta release is available now for your review through January 6, 2009. After joining the beta review program, bookmark this link to the program site to get the latest information about upcoming events.

Get the Free Windows HPC Server 2008 Trial http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014552&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Windows HPC Server 2008 can help shorten time-to-insight for HPC workload through easier deployment and management. By using the existing Windows-based information technology (IT) infrastructure, HPCS brings the security benefits of Windows Server to cluster environments and can provide a seamless parallel computing environment from desktop to the server.

Live Interview and Demo from Tech•Ed EMEA: Security Assessment http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014553&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Check out the demo in this Tech•Ed Online interview with the Group Product Manager behind the Microsoft Security Assessment Tool. Through the easy-to-use assessment process, you will find prioritized tasks with industry guidance, best practices, and recommendations to resolve security issues identified in the detailed reports.

Download CAT.NET Community Technology Preview and Anti-XSS 3.0 Beta

We've released two great free tools and they're now ready for you to download:

- Download Anti-XSS 3.0 Beta here http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11083374&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

- Download CAT.NET CTP here http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11083375&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

CAT.NET - Community Technology Preview

CAT.NET is a managed code static analysis tool for finding security vulnerabilities. It's the same tool we use internally to scan all of our line of business applications; it runs as a Visual Studio plug-in or stand-alone application. You can download the current CTP build from MSDN here and submit bugs and feedback to our Connect site here.

Anti-XSS 3.0 - Beta

Cross Site Scripting (XSS) continues to plague websites and among others things has become a common attack vector for Phishing attacks to distribute payloads to unsuspecting users. With this release, we have taken a fresh look at how to provide protection to ASP.NET applications.

You can download the current beta binaries from MSDN here and source code from CodePlex here and You can submit bugs and feedback directly to our CodePlex site here.

http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11083376&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11083377&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11083378&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Microsoft Security Bulletin Summary for December, 2008

http://www.microsoft.com/technet/security/bulletin/ms08-dec.mspx

Urgent security update for Internet Explorer http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11083462&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

On the 18th Dec 2008, we released security update MS08-078 which will address a vulnerability allowing remote code execution in all affected versions of Internet Explorer products. MS08-078 has a maximum severity rating of Critical for all versions of Internet Explorer. We encourage all customers to test and deploy this update as soon as possible. Our investigation of these attacks so far has verified that they are not successful against customers who have applied the security update.

You may be interested to know that we mobilized security engineering teams worldwide immediately to develop, test and deliver a security update for more than 300 versions of IE across more than 25 languages for automatic worldwide distribution in the unprecedented time of nine days.

Microsoft Product Lifecycle Information

Find information about your particular products on the Microsoft Product Support Lifecycle http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014482&s1=68628015-2ccc-cbc7-31b9-0e76c3415474 Web site.

See a List of Supported Service Packs http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014483&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.

Assess Your Desktop Security and Forefront Readiness with the New Security Assessment Tool http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11017293&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Find out how to assess whether your desktops are vulnerable to viruses and spyware with the new Microsoft Assessment and Planning (MAP) Toolkit 3.2. This free toolkit also assesses Forefront Client Security and Network Access Protection (NAP) readiness of your PCs.

Need to Share Methods and Practices of Writing Secure Code? http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11017294&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

The Security Development Lifecycle provides you and your team with corresponding levels of guidance and tools for strategy, assessment, and implementation of your security.

Documents

Security Tip of the Month: Security Considerations in High-Performance Computing http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014554&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

This article describes how you can monitor your traffic with either real-time logging or on-demand reporting. Learn how you can use new fields on the dashboard and real-time logging to instantly see if the traffic contains a piece of malware, the threat level, and whether it was cured. You can also see how to use new reports to work proactively to investigate trends and identify systems that may be compromised.

Technical Overview of Windows HPC Server 2008 http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014555&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Because HPC clusters are being adopted by a broad range of mainstream users for mission-critical applications, security and integration with the existing infrastructure are essential. Read this technical overview to learn how Windows HPC Server 2008 uses the Active Directory service to enable role-based security for all cluster jobs and administration.

Windows HPC Server 2008: Using MS-MPI http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014556&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

MPI and MPI2 are widely accepted specifications for managing messaging in high-performance clusters. Among the most widely accepted implementations of Message Passing Interface (MPI) is the open-source Argonne National Laboratory MPICH2 reference implementation. At the API level, MS MPI is identical to the more than 160 APIs implemented by MPICH2. At the same time, MS MPI adds enhanced security and process management capabilities for enterprise environments and a new execution-tracing feature for Windows HPC Server 2008. Read this white paper for more details.

HPC Pack 2008 SDK http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014557&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Microsoft HPC Server 2008 provides secure, scalable cluster resource management, a job scheduler, and an MPI stack for parallel programming. Download the Microsoft HPC Pack 2008 SDK to get the tools and content necessary to write parallel applications for the Windows HPC Server 2008 platform.

Securing the HPC Session http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014558&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

HPC uses HPC sessions to support the service-oriented architecture (SOA) programming model based on Windows Communication Foundation (WCF). The SOA programming model is ideal for writing interactive, parallel applications that provide near real-time calculation of complex algorithms, such as Monte Carlo simulations and BLAST searches. Read this topic for tips on how to secure the HPC session.

Use Windows Server 2008 to Develop Federation-Aware Applications http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014559&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Extend Web applications inside your firewall to vendors, partners, and other trusted organizations with secure, authenticated, and controlled external access.

 

Downloads

Update to Mitigate MS08-037 UDP Behavior Across NAT for Microsoft ISA Server 2006

This update causes ISA Server to use random source ports for UDP sessions created by access rules which serve hosts in networks for which ISA Server defines a network address translation (NAT) relationship.

http://www.microsoft.com/downloads/details.aspx?FamilyID=e96a6e20-0c04-4c7d-9f3e-207b02ae29cc&DisplayLang=en

Update to Mitigate MS08-037 UDP Behavior Across NAT for Microsoft ISA Server 2000 - English

http://www.microsoft.com/downloads/details.aspx?FamilyID=1455d4e6-a0b5-4583-82f1-ee8239fca207&DisplayLang=en

Update to Mitigate MS08-037 UDP Behavior Across NAT for Microsoft ISA Server 2004 Enterprise Edition

This update causes ISA Server to use random source ports for UDP sessions created by access rules which serve hosts in networks for which ISA Server defines a network address translation (NAT) relationship.

http://www.microsoft.com/downloads/details.aspx?FamilyID=55ce3623-2f7b-4900-9a2f-7e2aa2fe9c50&DisplayLang=en

Update to Mitigate MS08-037 UDP Behavior Across NAT for Microsoft ISA Server 2004 Standard Edition

This update causes ISA Server to use random source ports for UDP sessions created by access rules which serve hosts in networks for which ISA Server defines a network address translation (NAT) relationship.

http://www.microsoft.com/downloads/details.aspx?FamilyID=0ab83f12-653b-4be1-befe-594c4ef62baa&DisplayLang=en

Update for Root Certificates

This item updates the list of root certificates on your computer to the list that is accepted by Microsoft as part of the Microsoft Root Certificate Program.

http://www.microsoft.com/downloads/details.aspx?FamilyID=f814ec0e-ee7e-435e-99f8-20b44d4531b0&DisplayLang=en

Microsoft Code Name “Geneva”

Microsoft code name “Geneva”, an open platform for simplified user access based on claims.

http://www.microsoft.com/downloads/details.aspx?FamilyID=1e3c3efc-e980-4895-9095-86e51c1cd9d8&DisplayLang=en

Licensing Windows Server 2008 Terminal Services

This licensing brief helps to clarify Microsoft licensing policies for Windows Server® Terminal Services (TS), including the new components that are in the Windows Server 2008 operating system.

http://www.microsoft.com/downloads/details.aspx?FamilyID=b8a7c6ed-1bc1-4035-9110-1ee6da8f3fd4&DisplayLang=en

Update for Microsoft Office Outlook 2003 Junk Email Filter (KB958620)

This update provides the Junk E-mail Filter in Microsoft Office Outlook 2003 with a more current definition of which e-mail messages should be considered junk e-mail.

http://www.microsoft.com/downloads/details.aspx?FamilyID=d320c2b5-8888-4ef5-a624-21762516cfea&DisplayLang=en

Update for Windows Mail Junk E-mail Filter [December 2008] (KB905866)

Install this update for Windows Mail to revise the definition files that are used to detect e-mail messages that should be considered junk e-mail or that may contain phishing content.

http://www.microsoft.com/downloads/details.aspx?FamilyID=aa029fde-f341-44fc-8b85-0c6f3d3c2d69&DisplayLang=en

Microsoft® Identity Lifecycle Manager "2" (Release Candidate) Multi-forest Management Step-by-Step Guide

Learn how to use ILM "2" to manage objects in multiple forests

http://www.microsoft.com/downloads/details.aspx?FamilyID=cf34f433-0db9-4798-a08a-c42ec35d4617&DisplayLang=en

Update to Mitigate MS08-037 UDP Behavior Across NAT for Forefront Threat Management Gateway (TMG), Medium Business Edition (MBE)

This update causes TMG MBE to use random source ports for UDP sessions created by access rules which serve hosts in networks for which Forefront TMG MBE defines a network address translation (NAT) relationship.

http://www.microsoft.com/downloads/details.aspx?FamilyID=e974422f-42b0-426c-8852-ff8e67264909&DisplayLang=en

Update for Microsoft Office Outlook 2003 Junk Email Filter (KB958620)

This update provides the Junk E-mail Filter in Microsoft Office Outlook 2003 with a more current definition of which e-mail messages should be considered junk e-mail.

http://www.microsoft.com/downloads/details.aspx?FamilyID=d320c2b5-8888-4ef5-a624-21762516cfea&DisplayLang=en

Update for Microsoft Office Outlook 2007 Junk Email Filter (KB958619)

This update provides the Junk E-mail Filter in Microsoft Office Outlook 2007 with a more current definition of which e-mail messages should be considered junk e-mail.

http://www.microsoft.com/downloads/details.aspx?FamilyID=687083c2-2d36-4554-ab39-39742c8dd55b&DisplayLang=en

Microsoft® Windows® Malicious Software Removal Tool (KB890830) x64

This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.

http://www.microsoft.com/downloads/details.aspx?FamilyID=585d2bde-367f-495e-94e7-6349f4effc74&DisplayLang=en

Microsoft® Windows® Malicious Software Removal Tool (KB890830)

This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.

http://www.microsoft.com/downloads/details.aspx?FamilyID=ad724ae0-e72d-4f54-9ab3-75b8eb148356&DisplayLang=en

December 2008 Security Release ISO Image

This DVD5 ISO image file contains the security updates for Windows released on Windows Update on December 9th, 2008.

http://www.microsoft.com/downloads/details.aspx?FamilyID=a72bf06d-d755-445c-adc5-3b9561406aa4&DisplayLang=en

Extended Security Update Inventory Tool

The Extended Security Update Inventory Tool is used to detect security bulletins not covered by MBSA including MS04-028, February 2005 bulletins, and future security bulletins that are exceptions to MBSA.

http://www.microsoft.com/downloads/details.aspx?FamilyID=2c93da1d-48a0-4e5c-991f-87e08954f61b&DisplayLang=en

Microsoft Anti-Cross Site Scripting Library V3.0 Beta

AntiXSS 3.0 helps you to protect your current applications from cross-site scripting attacks, at the same time helping you to protect your legacy application with its Security Runtime Engine

http://www.microsoft.com/downloads/details.aspx?FamilyID=051ee83c-5ccf-48ed-8463-02f56a6bfc09&DisplayLang=en

Using Microsoft Windows IPSec to Help Secure an Internal Corporate Network Server

Describes how to configure Microsoft® Windows® 2000 IPSec and Windows XP IPSec to help secure an internal network server against network-based attacks from untrusted computers. IPSec enhancements in Windows 2000 service packs and in the Microsoft® Windows Server™ 2003 family are also described.

http://www.microsoft.com/downloads/details.aspx?FamilyID=a774012a-ac25-4a1d-8851-b7a09e3f1dc9&DisplayLang=en

AD RMS Templates Deployment Step-by-Step Guide

Step-by-step procedures for using identity federation services with Active Directory Rights Management Services (AD RMS). This guide walks you through the process of creating and deploying rights policy templates within your organization.

http://www.microsoft.com/downloads/details.aspx?FamilyID=34fd284b-3c7e-4a1f-b8ee-d58b173f2426&DisplayLang=en

Network Policy Server (NPS) Operations Guide

The Network Policy Server Operations Guide provides information about how to administer NPS after it is installed and deployed. It also includes troubleshooting information for specific issues and scenarios.

http://www.microsoft.com/downloads/details.aspx?FamilyID=585d2dca-c134-4568-b31c-a535ab0b0b3d&DisplayLang=en

AD RMS Deployment with Microsoft Office SharePoint Server 2007 Step-by-Step Guide

Step-by-step procedures for deploying Active Directory Rights Management Services with Office SharePoint Server 2007.

http://www.microsoft.com/downloads/details.aspx?FamilyID=d7d005da-b5e4-4c2e-9d44-58b5594232be&DisplayLang=en

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies

This step-by-step guide illustrates how to deploy Active Directory® Group Policy objects (GPOs) to configure Windows Firewall with Advanced Security in Windows Vista® and Windows Server® 2008.

http://www.microsoft.com/downloads/details.aspx?FamilyID=0b937897-ce39-498e-bb37-751c00f197d9&DisplayLang=en

AD RMS Licensing-only Cluster Deployment Step-by-Step Guide

Step-by-step procedures for deploying an Active Directory Rights Management Services licensing-only cluster

http://www.microsoft.com/downloads/details.aspx?FamilyID=d1b38f77-822b-47ed-b4b7-1a49c9e990f1&DisplayLang=en

AD RMS Decommissioning Step-by-Step Guide.doc

Step-by-step procedures for decommissioning an Active Directory Rights Management Services cluster.

http://www.microsoft.com/downloads/details.aspx?FamilyID=fa683f77-2b98-4047-9fef-6ca2d921627b&DisplayLang=en

AD RMS with AD FS Identity Federation Step-by-Step Guide

Step-by-step procedures for using identity federation services with Active Directory Rights Management Services (AD RMS). This guide walks you through the Active Directory Federation Services integration with AD RMS.

http://www.microsoft.com/downloads/details.aspx?FamilyID=1ce54040-cb96-4f37-a5b1-adf5c1e21b2b&DisplayLang=en

AD RMS Deployment in an Extranet Step-by-Step Guide

Step-by-step procedures for installing and configuring Active Directory Rights Management Services in an Extranet.

http://www.microsoft.com/downloads/details.aspx?FamilyID=262768eb-81d8-4c8f-bf2a-66a8d2dc4665&DisplayLang=en

AD RMS Step-by-Step Guide

Step-by-step procedures for installing and configuring Active Directory Rights Management Services, including installation by using Server Manager.

http://www.microsoft.com/downloads/details.aspx?FamilyID=a0ea7cd0-7de7-43a5-b1f9-b4cc679cecb3&DisplayLang=en

Identity Lifecycle Manager "2" RC Release

This download contains the Release Candidate version of Identity Lifecycle Manager "2."

http://www.microsoft.com/downloads/details.aspx?FamilyID=17489612-95f4-4dd5-a050-5da4b5d06b86&DisplayLang=en

Events/WebCasts

Visit TechNet Spotlight: www.microsoft.com/technetspotlight

Video on Demand, Video Downloads, PowerPoint Presentations, Audio and more

Microsoft Security Webcast Series: Upcoming and On-Demand

Security Webcast Calendar http://go.microsoft.com/fwlink/?LinkId=37910

Find security webcasts listed in an easy-to-use calendar format.

Upcoming Security Webcasts

http://www.microsoft.com/events/security/upcoming.mspx

Register for the following Webcasts on the link above

MSDN Webcast: Managing Cross-Site Scripting Using CAT.NET and AntiXSS (Level 200)

Friday, January 09, 2009 12:00 P.M.-1:00 P.M. Pacific Time

MSDN Webcast: Security Development Lifecycle Threat Modeling for Developers (Level 200)

Thursday, January 15, 2009 12:00 P.M.-1:00 P.M. Pacific Time

On-Demand Security Webcasts

http://www.microsoft.com/events/security/ondemand.mspx

A.O.B

Security Blogs

Michael Howard http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014499&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014500&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Eric Lippert http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014501&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014502&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Eric Fitzgerald http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014503&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014504&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Steve Lamb http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014505&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014506&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

MSRC Blog http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014507&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014508&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

ACE Team http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014509&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014510&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Jeff Jones http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014511&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014512&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Windows Vista Security http://blogs.msdn.com/windowsvistasecurity/default.aspx

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014513&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Solution Accelerators - Security & Compliance http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014514&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014515&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Kai Axford http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014516&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014517&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Security Vulnerability Research & Defense http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014518&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014519&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Steve Riley http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014520&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014521&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

Security Development Lifecycle (SDL) http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014522&s1=68628015-2ccc-cbc7-31b9-0e76c3415474

RSS http://co1piltwb.partners.extranet.microsoft.com/mcoeredir/mcoeredirect.aspx?linkId=11014523&s1=68628015-2ccc-cbc7-31b9-0e76c3415474