Wednesday, September 10, 2008

Microsoft Security Newsletter - Volume 5, Issue 9

Microsoft Security Newsletter
Welcome to the Microsoft Security Newsletter - a monthly newsletter for IT professionals and developers bringing security news, guidance, updates, and community resources direct to your inbox. To view an online version of this newsletter, please click here. If you would like to receive less technical security news, guidance and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.

Viewpoint
By Kai Axford, CISSP and Senior Security Strategist, Microsoft Trustworthy Computing Group
As with any new technology, there are plenty of myths out there with regard to protecting virtual servers. This article addresses the top-three virtual security myths and offers a few observations for those considering the virtual route.

Top Stories
At the RSA Conference 2008 in April, Microsoft proposed a vision for End-to-End Trust and began an internal effort to identify scenarios that would realize this vision in a concrete form. This communication shares some of the feedback we have received to date from governments, industry partners, customers, industry analysts, and public interest groups. The article expresses our thoughts on that feedback and provides an update on our efforts around in-person-proofing (IPP) as the basis for authenticating identity attributes on the Internet.
The Federated Identity team is excited to offer a public beta of Microsoft Code Name "Zermatt." "Zermatt" is a .NET developer framework and SDK that helps developers build claims-aware applications to address today's application security requirements. "Zermat" uses a simplified model that is open and extensible, can improve security, and boosts productivity for developers. Developers can build externalized authentication (authN) capabilities for "relying party" applications and build custom "identity providers," often referred to as Security Token Services (STS).

Security Guidance
Securing the virtualization server involves all the measures you take to secure any Windows Server 2008 server role, plus a few extra to help secure the virtual machines, configuration files, and data. This month's tip offers best practices to improve the security of your virtualization servers configured with the Hyper-V role, many of which apply to other virtualization servers as well.
Gain an initial understanding of the considerations you should take into account when planning to deploy Hyper-V, and find installation and configuration details that will help you deploy it. Learn about virtual networking basics and how to configure the Hyper-V role for remote management on a full installation of Windows Server 2008.
Download this free tool to identify servers for Hyper-V virtualization. This tool also offers migration assessment for Windows Vista, the 2007 Microsoft Office system, Windows Server 2008, and Microsoft SQL Server.
Download the new Offline Virtual Machine Servicing Tool Solution Accelerator, which automates software updates for virtual machines stored in a library managed by Virtual Machine Manager. This solution works with either System Center Configuration Manager 2007 or Windows Server Update Services.
This document discusses how Data Protection Manager offers comprehensive data protection for organizations of all sizes, helping to maintain the business value of your Virtual Server infrastructure by making it better protected and more available.
This step-by-step guide covers installing Microsoft Virtual Server and System Center Virtual Machine Manager; converting a workload to a virtual machine; installing Microsoft System Center Data Protection Manager; and backing up a running virtual machine.

This Month's Security Bulletins
Critical:

Community / MVP Update
Microsoft believes the time is ripe for a broad public dialog about how to build a roadmap for bringing Trustworthy Computing to the Internet. To that end, we have established a public discussion forum where anyone concerned about online security and privacy can let their voice be heard.
MVP of the Month: Alessandro Perilli   
Alessandro Perilli is an independent industry analyst based in Rome, Italy, with CISSP, MCSES, CCSE+, CCNA, SECURITY+, LINUX+, and CIWP certifications. In 2006, he received the MVP award for firewall technologies and again, in 2008, for virtualization technologies. Today, Alessandro provides a broad range of strategic and technical research analysis services for venture capital firms, IT vendors, system integrators, and multinationals worldwide. Alessandro is also a recognized conference speaker, performing keynotes and lectures at U.S. and EMEA events about virtualization and security, and the founder of Virtualization.info.

Microsoft Product Lifecycle Information
Find information about your particular products on the Microsoft Product Support Lifecycle Web site.
See a List of Supported Service Packs: Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.

Security Events and Training
In this podcast, Brandon Baker, Senior Development Lead on the Microsoft Hyper-V team. Will talk about some security best practices on how to lock down a Hyper-V host
Virtualization is the "next big thing." You've at least examined it and probably are using several virtualized servers already. How are you handling the security of your images? How are you securing the guest and host operating systems, and the applications you're running? Virtualization raises certain unique security requirements and provides some interesting security capabilities, too. Join Steve Riley as he explores the interesting aspects of virtualization and security.
In an environment where there are complex applications such as line-of-business or customized in-house software, there are solutions that can greatly reduce the burden of having to deliver access to these applications to outsourced firms or partners. Use the resources in this learning path to find out how to control partner access or outsourcing.

Upcoming Security Webcasts
Upcoming security webcasts in a dynamic, interactive format.
For IT Professionals
TechNet Webcast: Protect SQL Server 2008 with Data Protection Manager 2007 (Level 300)
Friday, September 26, 9:30 AM Pacific Time
Jason Buffington, Senior Technical Product Manager, Microsoft Corporation
TechNet Webcast: Microsoft Online Services: Critical Infrastructure and Operations for Delivering Secure, Enterprise-Class Software Services (Level 200)
Monday, September 29, 1:00 PM Pacific Time
Mike Ziock, Senior Director Operations, Microsoft Corporation
TechNet Webcast: Information About Microsoft October Security Bulletins (Level 200)
Wednesday, October 8, 11:00 AM Pacific Time
Bill Sisk, Security Response Communications Manager, Microsoft Corporation and Adrian Stone, Lead Security Program Manager, Microsoft Corporation
For Developers
MSDN Webcast: geekSpeak: Virtualization for Developers with Stephen Rose (Level 200)
Wednesday, September 24, Noon Pacific Time
Stephen Rose, Partner, Odyssey Consulting Group
Microsoft On-Demand Webcasts
TechNet Webcast: Managing Hyper-V Virtual Machines with WMI and Windows PowerShell (Level 300)
Learn how to automate the most common management tasks, how to create a delegation model using Windows Authorization Manager, and where the power of Windows Management Instrumentation (WMI) can pick up where Microsoft System Center Virtual Machine Manager leaves off.
TechNet Webcast: Windows Server Virtualization Under the Hood (Level 200)
This webcast starts with a quick recap of Microsoft Virtual Server before covering the new hypervisor-based architecture. Then it looks at the integrated management for virtual and physical resources, including the Microsoft Management Console (MMC) consoles, the new virtual machine creation wizard, the conversion tools, the performance enhancements that have been made, and integration into Group Policy.

Security Newsletter
Volume 5, No. 9

September 2008
In This Issue:
Viewpoint
Top Stories
Security Guidance
This Month's Security Bulletins
Community / MVP Update
Microsoft Product Lifecycle Information
Security Events and Training
Upcoming Security Webcasts
Security Program Guide
Security Awareness Materials
Guidance, samples, and templates for creating a security-awareness program in your organization.
Learn Security On the Job
Learning Paths for Security - Microsoft Training References and Resources
Upcoming Chats
Windows Mobile App Dev Chat
September 16, 9:00 AM Pacific Time
SQL Server 2008 RTM Live Chat
September 23, 10:00 AM Pacific Time
View a listing of upcoming technical chats
Free In-Person Events
TechNet Events
Security Blogs
Michael Howard RSS
Eric Lippert RSS
Eric Fitzgerald RSS
Steve Lamb RSS
MSRC Blog RSS
ACE Team RSS
Jeff Jones RSS
Windows Vista Security RSS
Solution Accelerators - Security & Compliance RSS
Kai Axford RSS
Security Vulnerability Research & Defense RSS
Steve Riley RSS
Security Development Lifecycle (SDL) RSS
Security Newsgroups
General Security issues/questions
Open with newsreader
Virus issues/questions
Open with newsreader
ISA Server
Open with newsreader
Windows 2000: Security
Open with newsreader
Window Client: Security
Open with newsreader
SQL Server: Security
Open with newsreader
Windows Server: Security
Open with newsreader
Other Security Newsgroups
Community Web Sites
IT Pro Security Community
Security Newsgroups
Related Communities
Additional Security Resources
Security Help and Support for IT Professionals
TechNet Troubleshooting and Support Page
Microsoft Security Glossary
TechNet Security Center
MSDN Security Developer Center
Midsize Business Security Center
Sign-Up for the Microsoft Security Notification Service
Security Bulletin Search Page
Home Users: Protect Your PC
MCSE/MCSA: Security Certifications
Subscribe to TechNet
Register for TechNet Flash IT Newsletter
Register for the UK MSDN Flash Newsletter
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Hyper-V, MSDN, SQL Server, Windows Mobile, Windows Server, and Windows Vista are trademarks of the Microsoft group of companies.

To cancel your subscription to this newsletter, reply to this message with the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at http://www.microsoft.com/info/unsubscribe.htm. You can manage all your Microsoft.com communication preferences at this site.

Legal Information.

This newsletter was sent by the Microsoft Corporation
One Microsoft Way
Redmond, Washington, USA
98052

Sign up for other newsletters | Unsubscribe | Update your profile
© 2008 Microsoft Corporation Terms of Use | Trademarks | Privacy Statement
Microsoft

Your cOmment"s Here! Hover Your cUrsOr to leave a cOmment.


Subscribe to: Post Comments (Atom)