News

Harmonizing Cloud Security Requirements to Enable Cloud Adoption http://blogs.technet.com/b/privacyimperative/archive/2012/06/22/harmonizing-cloud-security-requirements-to-enable-cloud-adoption.aspx
Learn about the approach Microsoft is taking to manage its compliance program and control framework to meet the complex and changing requirements associated with operating online and cloud services.

clip_image001

How Microsoft Uses the Security, Trust & Assurance Registry to Provide Greater Transparency http://www.microsoft.com/en-us/download/details.aspx?id=30157
Explore the various risk, governance, and information security frameworks and standards leveraged by Cloud Security Alliance (CSA) and learn about the cloud-specific framework known as the Security, Trust & Assurance Registry (STAR). This white paper also describes how cloud service offerings including Windows Azure, Office365, and Microsoft Dynamics CRM are operated using the evaluation criteria documented in the STAR.

clip_image001[1]

The Security Development Lifecycle and Critical Infrastructure Protection: The Return on Investment http://www.microsoft.com/en-us/download/details.aspx?id=30157
Hear about the real-world experiences of two organizations that are using the Microsoft Security Development Lifecycle (SDL) to enhance their overall security posture—and experiencing tangible returns as a result.

Microsoft Security Bulletin Summary for June, 2012

http://technet.microsoft.com/en-us/security/bulletin/ms12-may

Security Bulletin Overview for May 2012

Microsoft Security Response Center (MSRC) Blog Post http://go.microsoft.com/?linkid=9683067

Windows Media Video (WMV) http://go.microsoft.com/?linkid=9683068

Windows Media Audio (WMA) http://go.microsoft.com/?linkid=9683069

iPod Video (MP4) http://go.microsoft.com/?linkid=9683070

MP3 Audio http://go.microsoft.com/?linkid=9683071

High Quality WMV (2.5 Mbps) http://go.microsoft.com/?linkid=9683072

Zune Video (WMV) http://go.microsoft.com/?linkid=9683073

Microsoft Product Lifecycle Information

Find information about your particular products on the Microsoft Product Lifecycle Web site http://go.microsoft.com/?linkid=9669804

See a List of Supported Service Packs http://go.microsoft.com/?linkid=9669805

Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.

Follow the Microsoft Security Response team on Twitter http://go.microsoft.com/?linkid=9739346 @MSFTSecResponse for the latest information on the threat landscape.

Forefront TMG and ISA Server

Forefront Security TechCenter

http://technet.microsoft.com/en-gb/forefront/default.aspx

Please note that if you have feedback on documentation or wish to request new documents - email isadocs@microsoft.com

Forefront Threat Management Gateway 2010 homepage

http://technet.microsoft.com/en-gb/forefront/ee807302.aspx

Forefront TMG (ISA Server) Product Team Blog

The ISA Server Product Team Blog (http://blogs.technet.com/isablog/) is updated on a regular basis. Latest entries include:

Understand ISA/TMG updates

http://blogs.technet.com/b/isablog/archive/2011/07/01/understand-isa-tmg-updates.aspx

“Slow Performance” accessing CRM IFD published with ISA/TMG

http://blogs.technet.com/b/isablog/archive/2011/08/05/slow-performance-accessing-crm-ifd-published-with-isa-tmg.aspx

How to patch a TMG array– some thoughts on NLB high availability

http://blogs.technet.com/b/isablog/archive/2011/09/16/how-to-patch-a-tmg-array-some-thoughts-on-nlb-high-availability.aspx

Forefront Unified Access Gateway & Intelligent Application Gateway 2007

Forefront Unified Access Gateway 2010 Technical Resources

http://technet.microsoft.com/en-gb/forefront/edgesecurity/ee907407.aspx

For comments, feedback, and requests, contact the Forefront UAG User Assistance team at uagdocs@microsoft.com.

Forefront Unified Access Gateway Product Team Blog

The UAG Product Team Blog (http://blogs.technet.com/edgeaccessblog) is updated on a regular basis. Latest entries include:

Detective agency

http://blogs.technet.com/b/edgeaccessblog/archive/2011/06/08/detective-agency.aspx

Microsoft Forefront UAG 2010 SP1 has passed Common Criteria Evaluation Assurance Level 2+ (EAL 2+)

http://blogs.technet.com/b/edgeaccessblog/archive/2011/08/11/microsoft-forefront-uag-2010-sp1-has-passed-common-criteria-evaluation-assurance-level-2-eal-2.aspx

Accessing Enterprise vault archived emails through UAG

http://blogs.technet.com/b/edgeaccessblog/archive/2011/09/01/accessing-enterprise-vault-archived-emails-through-uag.aspx

Forefront Edge on the Wiki

The home of community-generated content about Microsoft technologies — that anyone can edit! Read the latest wiki articles about TMG and UAG.

TMG - http://social.technet.microsoft.com/wiki/contents/articles/tags/tmg/default.aspx

UAG - http://social.technet.microsoft.com/wiki/contents/articles/tags/UAG/default.aspx

Downloads

Software Update 1 Rollup 4 for Forefront Threat Management Gateway (TMG) 2010 Service Pack 1

http://support.microsoft.com/kb/2517957

New KB’s

Microsoft Forefront Threat Management Gateway

FIX: Malware Scanning takes longer than expected in Microsoft Forefront Threat Management Gateway 2010 when you set the "Block files larger than (MB)" option to allow very large files

http://support.microsoft.com/kb/2518663

FIX: Users are prompted to authenticate when the ReturnAuthRequiredIfAuthUserDenied property is set to True, and users are denied access by an "All Users" rule in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2518670

FIX: Partial content may be sent to a client when anti-malware inspection is enabled in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2527291

FIX: The final ACK packet during an orderly closure of a SecureNAT client TCP connection may be dropped in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2518676

FIX: Outgoing request failures may occur when HTTPS Inspection is enabled and web server connection timeouts occur in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2518684

FIX: The TMG Firewall service (wspsrv.exe) may crash when the DiffServ Filter is enabled

http://support.microsoft.com/kb/2512710

FIX: Logging to a remote SQL Server database fails in a Forefront Threat Management Gateway 2010 environment when the database name includes a hyphen (-) character

http://support.microsoft.com/kb/2493655

FIX: When you install UAG, TMG installs first, and then the server crashes with a Stop error code: "DRIVER_IRQL_NOT_LESS_OR_EQUAL"

http://support.microsoft.com/kb/2512719

FIX: You cannot access a website that does not support TLS v1.0 when you enable HTTPS inspection and set HTTPSiClientProtocols

http://support.microsoft.com/kb/2545464

FIX: "E-Mail Policy - Configuration Reapplied" alerts occur when the content of a File filter or a Message Body filter is removed in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2535453

FIX: "E-Mail Policy - Configuration Reapplied" alerts occur when the "Scan inbound messages" check box or the "Scan outbound messages" check box is not selected in a Forefront Threat Management Gateway 2010 environment

http://support.microsoft.com/kb/2535454

Documents

Security Tip of the Month: Step-by-Step DirectAccess Installation
Just because you're part of a small business doesn't mean you can't extend your network securely over the Internet with DirectAccess. Learn how, with a Windows Server 2008 R2 server with two network interface cards and two consecutive public IP addresses, you can power up your own DirectAccess always-on virtual private network (VPN).

clip_image001[2]

Simplified Implementation of the Microsoft SDL
Better understand the core concepts of the Microsoft Security Development Lifecycle (SDL) and the types of activities that should be performed (and by whom) in order to produce more secure applications.

clip_image001[3]

Security Compliance as an Engineering Discipline
When building comprehensive application security programs for the first time, many organizations are looking to the proven success of the Microsoft SDL. This can be a smart business move, but it's important to understand how the engineering focus of the SDL makes it different from the typical security-compliance effort. This article discusses some of the ways to harmonize compliance-focused programs with security engineering to improve your software development practices.

clip_image001[4]

The Myth of Informed Consent
Are your applications posing impossible questions to users? Learn why one programming expert thinks too many developers are just protecting themselves when prompting users to make decisions they can't possibly understand.

clip_image001[5]

Secure Cloud Deployment from the Start with SCM 2.5!
Security Compliance Manager 2.5 (SCM 2.5) enables you to quickly configure and manage computers and your private cloud using Group Policy and Microsoft System Center Configuration Manager. It also includes updated security guides and attack surface reference workbooks to help you reduce the security risks that you consider to be the most important.

clip_image001[6]

Mobile Computing: Be on the Lookout for Mobile Malware
In this article, an ethical hacker gives his view on the dangers of mobile malware and the steps you can take to protect your mobile workforce.

clip_image001[7]

Manage and Secure PCs Using Windows Cloud Services and Windows 7
Windows Intune enables you to secure and manage PCs and mobile devices from virtually anywhere. With expanded management and security benefits, you can provide users with a productive and personalized experience without compromising cost, control, security, and compliance. Access technical resources, free tools, and expert guidance to help you evaluate, deploy, and customize Windows Intune for your organization.

clip_image001[8]

Endpoint Protection in System Center Configuration Manager
Learn how Endpoint Protection in Configuration Manager 2012 lets you manage antimalware policies and Windows Firewall security for client computers in your Configuration Manager hierarchy.

clip_image001[9]

Security and Privacy for System Center 2012 Configuration Manager
If you already understand the fundamentals of Configuration Manager, read this article to find guidance to help you implement security and privacy measures.

clip_image001[10]

Windows Server 2008 R2: Secure Your Windows Server
Microsoft provides a vast array of security mechanisms for Windows Server 2008 R2. With so many choices, it can be difficult to know which individual security mechanisms and settings you should use to adequately secure your servers. This article highlights some of the security features and techniques that will likely be the most beneficial to most of you.

Events/WebCasts

Security Webcast Calendar http://go.microsoft.com/fwlink/?LinkId=37910

Find security webcasts listed in an easy-to-use calendar format.

Upcoming Security Webcasts

http://www.microsoft.com/events/security/upcoming.mspx

Webcast

Mitigating Risk: Why Sticking with Windows XP is a Bad Idea

6/25/2012

100

Webcast

You Can't Hack Yourself Secure

4/12/2012

100

On-Demand Security Webcasts

http://www.microsoft.com/events/security/ondemand.mspx

Visit TechNet Spotlight: www.microsoft.com/technetspotlight

Video on Demand, Video Downloads, PowerPoint Presentations, Audio and more