News



  Security
  Intelligence Report v11 Now Available
http://www.microsoft.com/security/sir/default.aspx
 

 
Explore this collection of data from Internet services and over 600
  million computers worldwide for the latest information and trends on today's
  threat landscape. Volume 11 of the SIR offers an analysis of the global
  impact of exploits, vulnerabilities, and malware; detailed telemetry by
  country/region; and a special article on Zeroing
  In on Malware Propagation Methods
.



  Mobile
  Threats on the Desktop: An Update from the Microsoft Malware Protection
  Center
http://blogs.technet.com/b/mmpc/archive/2011/10/19/mobile-threats-on-the-desktop.aspx
 

 
The Microsoft Malware Protection Center (MMPC) routinely monitors threats
  (via the desktop) that affect different mobile platforms. One of the
  increasingly common ways mobile devices are being compromised is related to
  allowing users to download and install applications independently. Explore
  this trend in more detail by reading this MMPC Blog post.

 

Microsoft Security Bulletin Summary for Oct, 2011

http://technet.microsoft.com/en-us/security/bulletin/ms11-oct

 

 

Security Bulletin Overview for Oct 2011

Microsoft Security Response Center (MSRC) Blog
  Post
http://go.microsoft.com/?linkid=9683067
 

Windows Media Video (WMV) http://go.microsoft.com/?linkid=9683068
 

Windows Media Audio (WMA) http://go.microsoft.com/?linkid=9683069
 

iPod Video (MP4) http://go.microsoft.com/?linkid=9683070
 

MP3 Audio http://go.microsoft.com/?linkid=9683071
 

High Quality WMV (2.5 Mbps) http://go.microsoft.com/?linkid=9683072
 

Zune Video (WMV) http://go.microsoft.com/?linkid=9683073
 

 

Microsoft Product Lifecycle Information

Find information about your particular products
  on the Microsoft Product Lifecycle Web site http://go.microsoft.com/?linkid=9669804
 

 

See a List of Supported Service Packs http://go.microsoft.com/?linkid=9669805
 

Microsoft provides free software updates for
  security and nonsecurity issues for all supported service packs.

 

Follow the
  Microsoft Security Response team on Twitter
http://go.microsoft.com/?linkid=9739346
  @MSFTSecResponse for the latest information on the threat landscape.

 

Forefront TMG and ISA Server

 

News

Microsoft Forefront Threat Management Gateway (TMG)
2010 Service Pack 2.

http://www.microsoft.com/download/en/details.aspx?id=27603

The service pack includes the following new functionality
and feature improvements:

  • · New Reports

The new Site
Activity report displays a report showing the data transfer between users and
specific websites for any user.

  • · Error Pages

A new look and
feel has been created for error pages.

Error pages can be
more easily customized and can include embedded objects.

  • · Kerberos Authentication

You can now use
Kerberos authentication when you deploy an array using network load balancing
(NLB).

 

Forefront Security TechCenter

http://technet.microsoft.com/en-gb/forefront/default.aspx

Please note that if you have feedback
on documentation or wish to request new documents - email isadocs@microsoft.com

 

Forefront Threat Management Gateway
2010 homepage

http://technet.microsoft.com/en-gb/forefront/ee807302.aspx

 

Forefront TMG (ISA Server) Product Team
Blog

The ISA Server Product Team Blog (http://blogs.technet.com/isablog/)
is updated on a regular basis. Latest entries include:

 

How to generate a certificate with
subject alternative names (SAN)

http://blogs.technet.com/b/isablog/archive/2011/10/09/how-to-generate-a-certificate-with-subject-alternative-names-san.aspx

 

Use the Power of Excel Pivot Tables to
analyze attacks and session distribution

http://blogs.technet.com/b/isablog/archive/2011/10/12/use-the-power-of-excel-pivot-tables-to-analyze-attacks-and-session-distribution.aspx

 

Forefront TMG Service Pack 2 Now
Available

http://blogs.technet.com/b/isablog/archive/2011/10/12/forefront-tmg-service-pack-2-now-available.aspx

 

New in SP2: Kerberos Authentication in
Load Balanced Scenarios

http://blogs.technet.com/b/isablog/archive/2011/10/12/new-in-sp2-kerberos-authentication-in-load-balanced-scenarios.aspx

 

New in SP2: Site Activity Report

http://blogs.technet.com/b/isablog/archive/2011/10/12/new-in-sp2-site-activity-report.aspx

 

New in SP2: Improved Error Pages

http://blogs.technet.com/b/isablog/archive/2011/10/13/new-in-sp2-improved-error-pages.aspx

 

Forefront Unified Access Gateway &
Intelligent Application Gateway 2007

 

Forefront Unified Access Gateway 2010
Technical Resources

http://technet.microsoft.com/en-gb/forefront/edgesecurity/ee907407.aspx

For comments, feedback, and requests,
contact the Forefront UAG User Assistance team at uagdocs@microsoft.com.

 

Forefront Unified Access Gateway
Product Team Blog

The UAG Product Team Blog (http://blogs.technet.com/edgeaccessblog)
is updated on a regular basis. Latest entries include:

 

Lessons from the Field and Best Practices for
Active Directory Authorization on Unified Access Gateway 2010(UAG)

http://blogs.technet.com/b/edgeaccessblog/archive/2011/10/31/lessons-from-the-field-and-best-practices-for-active-directory-authorization-on-unified-access-gateway-2010-uag.aspx

 

Forefront Edge on the Wiki

The home of community-generated content
about Microsoft technologies — that anyone can edit! Read the latest wiki
articles about TMG and UAG.

 

TMG - http://social.technet.microsoft.com/wiki/contents/articles/tags/tmg/default.aspx

UAG - http://social.technet.microsoft.com/wiki/contents/articles/tags/UAG/default.aspx

 

Downloads

Microsoft Forefront Threat Management Gateway (TMG)
2010 Service Pack 2.

http://www.microsoft.com/download/en/details.aspx?id=27603

 

New KB’s

 

Microsoft Forefront Threat Management
Gateway

 

Microsoft Forefront Threat Management Gateway 2010
Service Pack 2

http://support.microsoft.com/kb/2555840

 

Microsoft Internet Security and
Acceleration Server 2006

 

Description of the ISA Server 2006 hotfix package:
September 2011

http://support.microsoft.com/kb/2616326

 

FIX: Users in remote forests cannot change their
passwords through ISA Server 2006

http://support.microsoft.com/kb/2618727

 

FIX: Large files become corrupted during file
transfer through the Socks V4 client

http://support.microsoft.com/kb/2620088

 

FIX: Outlook Web App clients are not timed out in
ISA 2006 after the ISA FBA idle time-out is reached

http://support.microsoft.com/kb/2620076

 

FIX: ISA 2006 blocks published website requests for
URLs that include carriage returns (CR) or linefeeds (LF)

http://support.microsoft.com/kb/2622172

 

Documents

 

Microsoft
  Technologies for Consumerization


 
Explore the technologies that can help you embrace the latest trends in
  consumerization while maintaining control over your IT environment. Learn
  more with answers to frequently asked questions and a video deep dive into Microsoft's strategy
  around slate devices, technical differentiators for Windows slate devices,
  and the technologies available to help support non-Windows slate devices.

Consumerization
  of IT and Sophistication of Attacks


 
Watch this video for information on how cybercriminals use marketing-like
  tactics to target consumers, how that can impact your organization, and
  guidance on how to stay protected.

The
  Future of Client Security and Management


 
Get insight into how products like System Center Configuration Manager
  2012 can help address the challenges associated with managing various devices
  like iPads, iPhones, Android phones, Windows Phones, slates from a single
  console. This video from TechNet Edge also discusses user-centric versus
  computer- or device- centric management, and options for managing the
  physical and the virtual in a single console with Microsoft Virtual Desktop
  Infrastructure (VDI) and Microsoft Application Virtualization (App-V) integration.

Deploying
  Private Desktops


 
Learn how to deploy a full VDI infrastructure featuring both Microsoft
  and Citrix. View related step-by-step videos from the VDI Day series on how
  to deploy and manage private or pooled desktops, how to address shared and
  private storage for desktops, and the different application delivery models
  including streamed, hosted, and locally installed.

Microsoft
  System Center Checklist for Mobile Device Management


 
Explore the steps required to support mobile device management on
  Configuration Manager—and the resources available to help you complete each
  step.

Understanding
  Client Access Security in Microsoft Exchange


 
Security is an important aspect of any Exchange Server 2010 installation.
  By default, all Exchange 2010 protocols are automatically configured for
  Secure Sockets Layer (SSL) connectivity. Explore these resources to better
  understand the variety of security settings you can configure for the
  Microsoft Office Outlook Web App, Exchange ActiveSync (EAS), Outlook
  Anywhere, and POP3 and IMAP4.

BitLocker
  Drive Encryption for Windows: Step by Step


 
Learn how to use BitLocker technologies to encrypt all data stored on the
  Windows operating system volume and configured data volumes with answers to frequently asked questions,
  step-by-step guides on design and deployment, best practices, and much more.

Windows
  Phone 7.5 Enterprise Security and Policy Management Guide


 
Explore data and malware protection considerations, and get security and
  policy management information for EAS security–related policies that can be
  managed by IT departments

Web
  Service Security for Windows Phone


 
Windows Phone applications have the ability to exchange data with
  computers all over the world, but the more valuable the data is, the more
  important it is to make sure that your application requests and receives data
  using security procedures that reflect the value of that data. This article
  describes several different ways to help secure Windows Phone applications
  when they make calls to web services.

How
  to Encrypt Data in a Windows Phone Application


 
Learn how to encrypt and decrypt confidential data such as passwords,
  connection strings, and PINs in a Windows Phone application by using the Data
  Protection API (DPAPI).

WebBrowser
  Control Security Best Practices for Windows Phone


 
When you are developing an application that uses the WebBrowser control,
  consider these best practices and information regarding security.

Events/WebCasts

 

Security
Webcast Calendar

http://go.microsoft.com/fwlink/?LinkId=37910

Find
security webcasts listed in an easy-to-use calendar format.

 

Upcoming
Security Webcasts

http://www.microsoft.com/events/security/upcoming.mspx

 

Webcast

Information about Microsoft Security Bulletins for
  December

12/14/2011

200

Webcast

Information about Microsoft Security Bulletins for
  November

11/9/2011

200

Video

Security Talk Series: Newer Software is Better
  Protection

 

 

On-Demand
Security Webcasts

http://www.microsoft.com/events/security/ondemand.mspx

 

Visit
TechNet Spotlight:
www.microsoft.com/technetspotlight

Video
on Demand, Video Downloads, PowerPoint Presentations, Audio and more

 

A.O.B