News

BlueHat Prize - New $260,000 Contest http://www.microsoft.com/security/bluehatprize/
The inaugural Microsoft BlueHat Prize contest challenges security researchers to design a novel runtime mitigation technology designed to prevent the exploitation of memory safety vulnerabilities. The solution considered to be the most innovative by the Microsoft BlueHat Prize board will be presented the grand prize of US $200,000, with $50,000 going to the runner up and a $10,000 MSDN Universal subscription for third place.


How Win32/FakeSysdef Corrupts Your Computer http://www.youtube.com/watch?v=lnP0pq4EJgs
Watch a short demonstration of how the Win32/FakeSysdef Trojan infects an unprotected computer, and find out how to remove the Trojan with Microsoft's Safety Scanner.

Microsoft Security Bulletin Summary for Sept, 2010

http://www.microsoft.com/technet/security/bulletin/ms11-sep.mspx

Security Bulletin Overview for Sept 2011

Microsoft Security Response Center (MSRC) Blog Post http://go.microsoft.com/?linkid=9683067

Windows Media Video (WMV) http://go.microsoft.com/?linkid=9683068

Windows Media Audio (WMA) http://go.microsoft.com/?linkid=9683069

iPod Video (MP4) http://go.microsoft.com/?linkid=9683070

MP3 Audio http://go.microsoft.com/?linkid=9683071

High Quality WMV (2.5 Mbps) http://go.microsoft.com/?linkid=9683072

Zune Video (WMV) http://go.microsoft.com/?linkid=9683073

Microsoft Product Lifecycle Information

Find information about your particular products on the Microsoft Product Lifecycle Web site http://go.microsoft.com/?linkid=9669804

See a List of Supported Service Packs http://go.microsoft.com/?linkid=9669805

Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.

Follow the Microsoft Security Response team on Twitter http://go.microsoft.com/?linkid=9739346 @MSFTSecResponse for the latest information on the threat landscape.

Forefront TMG and ISA Server

Forefront Security TechCenter

http://technet.microsoft.com/en-gb/forefront/default.aspx

Please note that if you have feedback on documentation or wish to request new documents - email isadocs@microsoft.com

Forefront Threat Management Gateway 2010 homepage

http://technet.microsoft.com/en-gb/forefront/ee807302.aspx

Forefront TMG (ISA Server) Product Team Blog

The ISA Server Product Team Blog (http://blogs.technet.com/isablog/) is updated on a regular basis. Latest entries include:

Understand ISA/TMG updates

http://blogs.technet.com/b/isablog/archive/2011/07/01/understand-isa-tmg-updates.aspx

“Slow Performance” accessing CRM IFD published with ISA/TMG

http://blogs.technet.com/b/isablog/archive/2011/08/05/slow-performance-accessing-crm-ifd-published-with-isa-tmg.aspx

How to patch a TMG array– some thoughts on NLB high availability

http://blogs.technet.com/b/isablog/archive/2011/09/16/how-to-patch-a-tmg-array-some-thoughts-on-nlb-high-availability.aspx

Forefront Unified Access Gateway & Intelligent Application Gateway 2007

Forefront Unified Access Gateway 2010 Technical Resources

http://technet.microsoft.com/en-gb/forefront/edgesecurity/ee907407.aspx

For comments, feedback, and requests, contact the Forefront UAG User Assistance team at uagdocs@microsoft.com.

Forefront Unified Access Gateway Product Team Blog

The UAG Product Team Blog (http://blogs.technet.com/edgeaccessblog) is updated on a regular basis. Latest entries include:

Detective agency

http://blogs.technet.com/b/edgeaccessblog/archive/2011/06/08/detective-agency.aspx

Microsoft Forefront UAG 2010 SP1 has passed Common Criteria Evaluation Assurance Level 2+ (EAL 2+)

http://blogs.technet.com/b/edgeaccessblog/archive/2011/08/11/microsoft-forefront-uag-2010-sp1-has-passed-common-criteria-evaluation-assurance-level-2-eal-2.aspx

Accessing Enterprise vault archived emails through UAG

http://blogs.technet.com/b/edgeaccessblog/archive/2011/09/01/accessing-enterprise-vault-archived-emails-through-uag.aspx

Forefront Edge on the Wiki

The home of community-generated content about Microsoft technologies — that anyone can edit! Read the latest wiki articles about TMG and UAG.

TMG - http://social.technet.microsoft.com/wiki/contents/articles/tags/tmg/default.aspx

UAG - http://social.technet.microsoft.com/wiki/contents/articles/tags/UAG/default.aspx

Downloads

Software Update 1 Rollup 4 for Forefront Threat Management Gateway (TMG) 2010 Service Pack 1

http://support.microsoft.com/kb/2517957

New KB’s

Microsoft Forefront Threat Management Gateway

FIX: Malware Scanning takes longer than expected in Microsoft Forefront Threat Management Gateway 2010 when you set the "Block files larger than (MB)" option to allow very large files

http://support.microsoft.com/kb/2518663

FIX: Users are prompted to authenticate when the ReturnAuthRequiredIfAuthUserDenied property is set to True, and users are denied access by an "All Users" rule in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2518670

FIX: Partial content may be sent to a client when anti-malware inspection is enabled in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2527291

FIX: The final ACK packet during an orderly closure of a SecureNAT client TCP connection may be dropped in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2518676

FIX: Outgoing request failures may occur when HTTPS Inspection is enabled and web server connection timeouts occur in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2518684

FIX: The TMG Firewall service (wspsrv.exe) may crash when the DiffServ Filter is enabled

http://support.microsoft.com/kb/2512710

FIX: Logging to a remote SQL Server database fails in a Forefront Threat Management Gateway 2010 environment when the database name includes a hyphen (-) character

http://support.microsoft.com/kb/2493655

FIX: When you install UAG, TMG installs first, and then the server crashes with a Stop error code: "DRIVER_IRQL_NOT_LESS_OR_EQUAL"

http://support.microsoft.com/kb/2512719

FIX: You cannot access a website that does not support TLS v1.0 when you enable HTTPS inspection and set HTTPSiClientProtocols

http://support.microsoft.com/kb/2545464

FIX: "E-Mail Policy - Configuration Reapplied" alerts occur when the content of a File filter or a Message Body filter is removed in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2535453

FIX: "E-Mail Policy - Configuration Reapplied" alerts occur when the "Scan inbound messages" check box or the "Scan outbound messages" check box is not selected in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2535454

Documents


Security Tip of the Month: IPv6 Security Considerations and Recommendations
IPv6 provides many benefits over Internet Protocol version 4 (IPv4). However, before deploying IPv6 you should be aware of additional security considerations. This article describes each of these security considerations in detail and provides Microsoft recommendations and best practices for mitigating the potential risks associated with IPv6 traffic. Find more helpful resources with the IPv6 Survival Guide.

DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies
Learn about IPv6 addressing, host configuration, and transitioning technologies including 6to4, Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), Teredo, and IP over HTTPS (IPHTTPS). Through a series of demos, you will learn how to build an IPv6 network and interoperate with IPv4 networks and hosts. Unfamiliar with DirectAccess? Start with the technical overviews and test lab guides here.

DirectAccess Technical Drilldown, Part 2 of 2: Putting It All Together
Dive deep into IPSec and components that are only available with Windows 7 and Windows Server 2008 R2 to build the DirectAccess infrastructure. Learn how to control access to corporate resources and manage Internet connected PCs through group policy. (Note: Part 1 is highly recommended as a prerequisite for Part 2.)

Dynamic Host Configuration Protocol Technical Reference
The DHCP is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a Transmission Control Protocol/Internet Protocol (TCP/IP)-based network, such as a private intranet. Learn how to configure, deploy, and use DHCP in your environment—or get step-by-step guides to help you try out DHCP on Windows Server 2008 R2 in a test lab.

Using Certificates for IPsec Authentication
Learn how to use certificates to provide authentication for your IPsec connections. This demonstration modifies an authenticated and encrypted Telnet connection to use certificates for the authentication method instead of the Kerberos default.

Remote Access VPN Test Lab Extension: Adding IPv6 Connectivity
Learn how to configure IPv6 connectivity for the Corpnet subnet and for remote access VPN clients.

Netsh Technical Reference
Network shell (netsh) is a command-line utility that allows you to configure and display the status of various network communications server roles and components after they are installed on computers running Windows 7, Windows Server 2008 R2, Windows Vista, or Windows Server 2008. Also available as a download, this exhaustive reference includes information on Routing and Remote Access (RRAS), DHCP, IPv6, and much more.

Events/WebCasts

Security Webcast Calendar http://go.microsoft.com/fwlink/?LinkId=37910

Find security webcasts listed in an easy-to-use calendar format.

Upcoming Security Webcasts

http://www.microsoft.com/events/security/upcoming.mspx

On-Demand Security Webcasts

http://www.microsoft.com/events/security/ondemand.mspx

Visit TechNet Spotlight: www.microsoft.com/technetspotlight

Video on Demand, Video Downloads, PowerPoint Presentations, Audio and more

A.O.B

This content is for informational purposes only. Microsoft makes no warranties express or implied, as to the information in this document. If you are a customer of Microsoft, please refer to the terms and conditions which cover the provision of support and consulting services to you/your organization.  If you are not corresponding in the course of, or in connection with a Microsoft contract or program with its own terms and conditions, please note that no liability is accepted by Microsoft for the contents of this document. 

TRM contributors this month were Paul Devlin and Jonny Sharp