Wednesday, February 11, 2009

Microsoft Security Newsletter - Volume 6, Issue 2

Microsoft Security Newsletter
Welcome to the Microsoft Security Newsletter - a monthly newsletter for IT professionals and developers bringing security news, guidance, updates, and community resources direct to your inbox. To view an online version of this newsletter, please click here. If you would like to receive less technical security news, guidance and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.
Featured Article
By Rajiv Arunkundram, Senior Product Manager, Windows Server
The introduction of Hyper-V makes virtualization an even more compelling solution for IT environments. Get an overview of today's virtualization market and see how Hyper-V improves the manageability, reliability, and security of virtualization.

Top Stories
In an article from an upcoming series in CIO Magazine, Jeff Jones from the Microsoft Trustworthy Computing (TwC) group addresses browser security and "the safest Web browser."
Microsoft Forefront Security for Office Communications Server provides fast and effective protection against IM-based malware by including multiple scanning engines from industry-leading security partners, and it helps reduce corporate liability by blocking IM messages containing inappropriate content.
Examine how Microsoft uses defense-in-depth at an organization level to ensure that there are many opportunities to detect and remove software vulnerabilities. You'll see how security responsibilities are assigned, from the individual developer to the global security team.
Security doesn't start with coding, it starts with secure design. In this article, you'll see how Microsoft uses threat modeling to ensure secure design and prevent vulnerabilities that could not be fixed with simple coding changes.
Antivirus and anti-malware protection is key to the security of your business desktops and laptops. Use the newly released Microsoft Assessment and Planning (MAP) Toolkit 3.2 to assess if they are vulnerable to viruses and malware. This free toolkit also helps you migrate to Windows Vista, the 2007 Microsoft Office system, Windows Server 2008, Windows Server 2008 Hyper-V, Microsoft Virtual Server 2005 R2, Microsoft SQL Server 2008, Microsoft Application Virtualization 4.5 (formerly SoftGrid), Microsoft Online Services, and Microsoft Forefront.

Security Guidance
Starting in November 2008, the Microsoft Malware Protection Center (MMPC) began detecting variants of the Conficker worm. Learn how to help protect your systems from Conficker -- and how to recover systems that have been infected by this worm -- which seeks to propagate itself through network-based attacks.
Securing the virtualization server involves all the measures you take to secure any Windows Server 2008 server role, plus a few extra to help secure the virtual machines, configuration files, and data. This month's tip offers best practices to improve the security of your virtualization servers configured with the Hyper-V role, many of which apply to other virtualization servers as well.
As with any new technology, there are plenty of myths out there about protecting virtual servers. This article addresses the top-three virtual security myths and offers a few observations for those considering the virtual route.
This security guide provides IT professionals like you with guidance, instructions, and recommendations to address your key security concerns about server virtualization: hardening Hyper-V, virtual machine management and delegation, and protecting virtual machines. The beta release is available now for your review through March 6. After joining the Beta review program, bookmark this link to the program site to get the latest information about upcoming events.
Learn about Microsoft Application Virtualization 4.5 Security Configuration Roles, which can be used to help protect and harden your Application Virtualization environment on Windows Server 2003 and 2008 by closing or disabling unnecessary ports and services reducing the overall attack surface.
This article provides specific guidelines for deploying Microsoft Internet Security and Acceleration (ISA) Server and Microsoft Forefront Threat Management Gateway within hardware virtualization.
Watch this video to learn the basics of Code Access Security, the integrated security model in the Microsoft .NET Framework, particularly how Code Access Security works conceptually and how to implement it with a simple application.
In this video, you can learn the basics behind encryption algorithms and practices used to create cryptographic schemes. Learn more about symmetric and asymmetric encryption algorithms, the SHA256 hash encryption algorithms, and how to implement in a simple application.
View this short Microsoft Silverlight video to see two experts from TwC discuss the Microsoft Security Assessment Tool (MSAT) and how it helps IT professionals solve a common security problem -- establishing a baseline for security in your enterprise and managing an action plan for resolution of security challenges.

This Month's Security Bulletins
Critical:
Important:

Community / MVP Update
Security MVP of the Month: Ronald Beekelaar   
Ronald Beekelaar, MCSE and MCT, is an independent consultant and trainer who specializes in Windows Server security and network infrastructure consultancy and training. He is also a well-known expert in virtual machine technology (VMware/Virtual PC/Virtual Server/Hyper-V). He has created many virtual machine-based hands-on labs for Microsoft Learning and for other groups within Microsoft, which are often used at Microsoft conferences, in Microsoft training engagements, in partner offerings, and online.
Want to use hardware more efficiently, securely, and cost-effectively? In this video, Microsoft Virtual Machine MVP Ronald Beekelaar covers how to manage virtual systems effectively, the challenges involved, and their role in implementing cost-effective IT solutions.

Microsoft Product Lifecycle Information
Find information about your particular products on the Microsoft Product Support Lifecycle Web site.
See a List of Supported Service Packs: Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.

Security Events and Training
Browse the sessions in the Security, Identity, and Access track for sessions on "Getting Started with the Microsoft Forefront Code Name 'Stirling' Virtual Machines in Hyper-V," "Security Best Practices for Hyper-V and Server Virtualization," and much more. Register by February 27 and save $200.
Join this virtual lab to learn how to add security to the applications built with Microsoft Visual Studio by signing the messages that you create and by verifying the messages that you receive. You can also learn to use Microsoft Visual Studio Team Foundation Server to track bugs.
Join this virtual lab to learn how to create Signing Key Project in Visual Studio 2008 and sign XML with a Digital Signature.

Upcoming Security Webcasts
Tuesday, February 24, 1:00 PM Pacific Time
Uri Lichtenfeld, Product Manager, Microsoft Corporation
Thursday, February 26, 8:00 AM Pacific Time
Martin Pichardo, Technology Solution Professional, Microsoft Corporation
Friday, March 6, 8:00 AM Pacific Time
Security is of paramount concern for all organizations, and it is no different for a virtual solution. In this webcast, we look at the four main solutions from the previous webcasts and cover some best practices for ensuring that your virtual environment is secure.
Wednesday, March 11, 8:00 AM Pacific Time
The best overall virtualization solution for an organization could be a combination of all the products, technologies, and practices we have seen so far in this webcast series. This begs the question of management. With all these technologies, how will an IT department cope with enforcing company policy? In this webcast, we look at the management side of virtualization in more detail, covering how polices can be managed centrally.
Find out about upcoming security webcasts using a dynamic, interactive format.
For IT Professionals
TechNet Webcast: Using Presentation Virtualization (Level 300)
Friday, February 13, 8:00 AM Pacific Time
Matt Hester, IT Pro Evangelist, Microsoft Corporation
TechNet Webcast: How Microsoft Designs the Virtualization Host and Network Infrastructure (Level 300)
Tuesday, February 17, 9:30 AM Pacific Time
David Lef, Microsoft IT Technology Architect, Microsoft Corporation
TechNet Webcast: Creating a Virtual Desktop Infrastructure (Level 300)
Wednesday, March 4, 8:00 AM Pacific Time
Yung Chou, IT Pro Evangelist, Microsoft Corporation
TechNet Webcast: Information About Microsoft March Security Bulletins (Level 200)
Wednesday, March 11, 11:00 AM Pacific Time
Al Brown, Program Manager, Microsoft Corporation
For Developers
MSDN Webcast: Software Security with Static Code Analysis Using CAT.NET (Level 200)
Wednesday, February 25, 8:00 AM Pacific Time
Andreas Fuchsberger, Senior Software Design Engineer, Microsoft Corporation
MSDN Webcast: geekSpeak: Live Identity Services with Michele Leroux Bustamante (Level 200)
Wednesday, February 25, 12:00 noon Pacific Time
Michele Leroux Bustamante, Chief Architect, IDesign, Inc.
MSDN Webcast: Office Communications Server 2007 R2, Exchange Server 2007 SP1, and the Unified Communications Platform (Level 100)
Wednesday, February 25, 1:00 PM Pacific Time
Chris Mayo, Unified Communications Technical Evangelist, Microsoft Corporation
Microsoft On-Demand Webcasts
TechNet Webcast: Selecting the Right Candidates for Virtualization (Level 300)
In this webcast, we look at the first steps for creating a virtual environment. Following up on the first webcast in the series, Virtualization in a Nutshell, where we discussed virtualization technologies, we now examine the specifics that you need to consider. Virtualization is an ideal solution to help reduce costs in an organization. However, virtualization is not just a case of taking an application or system and creating virtual environments on a single system. You need to consider compatibility, supportability, licensing, and -- above all -- the long-term benefits to the business. All these factors play key parts when considering virtualization, and we analyze what makes a good candidate for virtualization and what does not. We also cover the software and hardware requirements for the main types of virtualization. At the end of this webcast, the webcast series splits into more in-depth discussions about the different virtualization types as we follow four scenario companies through their virtualization efforts.

Security Newsletter
Volume 6, No. 2

February 2009
In This Issue:
Featured Article
Top Stories
Security Guidance
This Month's Security Bulletins
Community / MVP Update
Microsoft Product Lifecycle Information
Security Events and Training
Upcoming Security Webcasts
Security Program Guide
Security Awareness Materials
Guidance, samples, and templates for creating a security-awareness program in your organization.
Learn Security On the Job
Learning Paths for Security - Microsoft Training References and Resources
Upcoming Chats
NAP with NPS Open Forum
March 26, 1:00 PM Pacific Time
View a listing of upcoming technical chats
Free In-Person Events
TechNet Events
Security Blogs
Michael Howard RSS
Eric Lippert RSS
Eric Fitzgerald RSS
Steve Lamb RSS
MSRC Blog RSS
ACE Team RSS
Jeff Jones RSS
Windows Vista Security RSS
Solution Accelerators - Security & Compliance RSS
Kai Axford RSS
Security Vulnerability Research & Defense RSS
Steve Riley RSS
Security Development Lifecycle (SDL) RSS
Security Newsgroups
General Security issues/questions
Open with newsreader
Virus issues/questions
Open with newsreader
ISA Server
Open with newsreader
Windows 2000: Security
Open with newsreader
Window Vista: Security
Open with newsreader
SQL Server: Security
Open with newsreader
Windows Server: Security
Open with newsreader
Other Security Newsgroups
Community Web Sites
IT Pro Security Community
Security Newsgroups
Related Communities
Additional Security Resources
Security Help and Support for IT Professionals
TechNet Troubleshooting and Support Page
Microsoft Security Glossary
TechNet Security Center
MSDN Security Developer Center
Midsize Business Security Center
Sign-Up for the Microsoft Security Notification Service
Security Bulletin Search Page
Home Users: Protect Your PC
MCSE/MCSA: Security Certifications
Subscribe to TechNet
Register for TechNet Flash IT Newsletter
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Forefront, Hyper-V, MSDN, Silverlight, SoftGrid, SQL Server, Visual Studio, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

To cancel your subscription to this newsletter, reply to this message with the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at http://www.microsoft.com/info/unsubscribe.htm. You can manage all your Microsoft.com communication preferences at this site.

Legal Information.

This newsletter was sent by the Microsoft Corporation
One Microsoft Way
Redmond, Washington, USA
98052

Sign up for other newsletters | Unsubscribe | Update your profile
© 2009 Microsoft Corporation Terms of Use | Trademarks | Privacy Statement
Microsoft

Your cOmment"s Here! Hover Your cUrsOr to leave a cOmment.


Subscribe to: Post Comments (Atom)