News


Microsoft Office 365 Cloud-Based Productivity Service Now Helps Customers Comply with HIPAA Privacy and Security Standards

With reimbursements falling and medical loss ratio minimums rising, hospitals, physicians, and health plans are under unprecedented pressure to drive down operating costs while still improving the quality and safety of patient care. Explore how Microsoft is helping remove that barrier by embedding privacy and security capabilities in Office 365 so that Office 365 is now a cloud-based platform that complies with leading information privacy and security standards for customers operating in the United States and European Union.

Patterns & Practices: Cloud Security Approach in a Nutshell
See how Microsoft is building on experience to secure its own cloud developments and utilizing an approach that simplifies and improves security by chunking up security in a way that helps leverage proven practices, while sharing information around emerging practices.

Microsoft Security Bulletin Summary for Dec, 2011

http://technet.microsoft.com/en-us/security/bulletin/ms11-dec

Security Bulletin Overview for Dec 2011

Microsoft Security Response Center (MSRC) Blog Post http://go.microsoft.com/?linkid=9683067

Windows Media Video (WMV) http://go.microsoft.com/?linkid=9683068

Windows Media Audio (WMA) http://go.microsoft.com/?linkid=9683069

iPod Video (MP4) http://go.microsoft.com/?linkid=9683070

MP3 Audio http://go.microsoft.com/?linkid=9683071

High Quality WMV (2.5 Mbps) http://go.microsoft.com/?linkid=9683072

Zune Video (WMV) http://go.microsoft.com/?linkid=9683073

Microsoft Product Lifecycle Information

Find information about your particular products on the Microsoft Product Lifecycle Web site http://go.microsoft.com/?linkid=9669804

See a List of Supported Service Packs http://go.microsoft.com/?linkid=9669805

Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.

Follow the Microsoft Security Response team on Twitter http://go.microsoft.com/?linkid=9739346 @MSFTSecResponse for the latest information on the threat landscape.

Forefront TMG and ISA Server

Forefront Security TechCenter

http://technet.microsoft.com/en-gb/forefront/default.aspx

Please note that if you have feedback on documentation or wish to request new documents - email isadocs@microsoft.com

Forefront Threat Management Gateway 2010 homepage

http://technet.microsoft.com/en-gb/forefront/ee807302.aspx

Forefront TMG (ISA Server) Product Team Blog

The ISA Server Product Team Blog (http://blogs.technet.com/isablog/) is updated on a regular basis. Latest entries include:

Forefront TMG SP2 at Security Talk Show

http://blogs.technet.com/b/isablog/archive/2011/11/22/forefront-tmg-sp2-at-security-talk-show.aspx

L2TP VPN issues when utilizing TMG as your RRAS server and NLB is configured on your external Interfaces

http://blogs.technet.com/b/isablog/archive/2011/12/15/l2tp-vpn-issues-when-utilizing-tmg-as-your-rras-server-and-nlb-is-configured-on-your-external-interfaces.aspx

You cannot install a Forefront Threat Management Gateway 2010 service pack on branch office servers

http://blogs.technet.com/b/isablog/archive/2011/12/21/you-cannot-install-a-forefront-threat-management-gateway-2010-service-pack-on-branch-office-servers.aspx

Switching to text file logging fails with Event ID 11003

http://blogs.technet.com/b/isablog/archive/2011/12/28/switching-to-text-file-logging-fails-with-event-id-11003.aspx

X-flash-version header can prevent ISA/TMG from compressing contents

http://blogs.technet.com/b/isablog/archive/2011/12/30/x-flash-version-header-can-prevent-isa-tmg-from-compressing-contents.aspx

Walk-through for RSA SecurID Authentication for TMG 2010 Part 1: RSA Authentication Manager 7.1 Server Configuration

http://blogs.technet.com/b/isablog/archive/2012/01/04/walk-through-for-rsa-securid-authentication-for-tmg-2010-part-1-rsa-authentication-manager-7-1-server-configuration.aspx

Walk-through for RSA SecurID Authentication for TMG 2010 Part 2: TMG Array Members Preparation

http://blogs.technet.com/b/isablog/archive/2012/01/05/walk-through-for-rsa-securid-authentication-for-tmg-2010-part-2-tmg-array-members-preparation.aspx

Walk-through for RSA SecurID Authentication for TMG 2010 Part 3: Configure TMG Authentication and Delegation

http://blogs.technet.com/b/isablog/archive/2012/01/06/walk-through-for-rsa-securid-authentication-for-tmg-2010-part-3-configure-tmg-authentication-and-delegation.aspx

Forefront Unified Access Gateway & Intelligent Application Gateway 2007

Forefront Unified Access Gateway 2010 Technical Resources

http://technet.microsoft.com/en-gb/forefront/edgesecurity/ee907407.aspx

For comments, feedback, and requests, contact the Forefront UAG User Assistance team at uagdocs@microsoft.com.

Forefront Unified Access Gateway Product Team Blog

The UAG Product Team Blog (http://blogs.technet.com/edgeaccessblog) is updated on a regular basis. Latest entries include:

The UAG DirectAccess Web Monitor shows “Network Security” as Not Healthy

http://blogs.technet.com/b/edgeaccessblog/archive/2011/12/15/the-uag-directaccess-web-monitor-shows-network-security-as-not-healthy.aspx

DirectAccess Connectivity Assistant polling interval

http://blogs.technet.com/b/edgeaccessblog/archive/2011/12/20/directaccess-connectivity-assistant-polling-interval.aspx

Forefront Edge on the Wiki

The home of community-generated content about Microsoft technologies — that anyone can edit! Read the latest wiki articles about TMG and UAG.

TMG - http://social.technet.microsoft.com/wiki/contents/articles/tags/tmg/default.aspx

Forefront Threat Management Gateway (TMG) 2010 Troubleshooting Survival Guide

http://social.technet.microsoft.com/wiki/contents/articles/2702.aspx

UAG - http://social.technet.microsoft.com/wiki/contents/articles/tags/UAG/default.aspx

New KB’s

Forefront TMG 2010

You cannot install a Forefront Threat Management Gateway 2010 service pack on branch office servers

http://support.microsoft.com/kb/2648207

Documents

Cloud Computing: Cloud Security Concerns
While maintaining appropriate data security continues to be a prevailing concern, a cloud computing infrastructure can actually increase your overall security. Learn how then explore specific concerns around virtual cloud security in the follow-up article.

Cloud Security Overview
Moving to a cloud-based platform requires a change in mindset for IT security professionals. Explore key security considerations for the cloud, the differences between the public and private cloud, and why the ideal solution is often an in-house private cloud solution that exists entirely behind the firewall and hybrid clouds, but which combines private cloud systems with Internet-based (public or private cloud) services.

Cloud Security: Safely Sharing IT Solutions
Find out how you can share IT solutions between the fixed cost of local resources and the variable cost of cloud resources without losing control of access to enterprise assets.

Identity and Access Management in the Cloud
Identity and access management (IAM) refers to the processes, technologies, and policies for managing digital identities and controlling how identities can be used to access resources. Explore why identity management in a cloud system requires a complex collection of technologies to manage authentication, authorization and access control across distributed environments.

Security Considerations for Infrastructure as a Service (IaaS)
Gain a better understanding of common concerns and scenarios around security for and public cloud and private cloud Infrastructure as a Service (IaaS) solutions. From network security to storage and data, this article provides a number of insights that can help you implement a better, more secure IaaS.

Managing the Cloud with Windows Intune
Learn how the cloud-based PC management solution Windows Intune can help you keep your organization's PCs secure, updated and manageable, no matter where they are located. This article provides detail on each workspace in Windows Intune and the benefits it provides as well as background information on the technical architecture. Want more technical information on Windows Intune?

Understanding Security Account Management in Windows Azure
Find out why, although cloud computing relieves some of the security burden, you still have an active role in managing access, securing communications, and ensuring data protection.

Crypto Services and Data Security in Windows Azure
Get an introduction to some of the basic concepts of cryptography and related security considerations with Windows Azure including key storage and persistence, immutability, and message queues.

Events/WebCasts

Security Webcast Calendar http://go.microsoft.com/fwlink/?LinkId=37910

Find security webcasts listed in an easy-to-use calendar format.

Upcoming Security Webcasts

http://www.microsoft.com/events/security/upcoming.mspx

December OOB Webcast (see link below) MS11-100

http://events.microsoft.com/Pages/Home.aspx#m=Security Talk Series|;r=0;s=Series;yourrole=001100;eventtype=111000;level=11100;timelength=2;v=list;pi=7230,8664;mi=678906,678907,678908;si=18;ai=IT Professionals

On-Demand Security Webcasts

http://www.microsoft.com/events/security/ondemand.mspx

Visit TechNet Spotlight: www.microsoft.com/technetspotlight

Video on Demand, Video Downloads, PowerPoint Presentations, Audio and more