Monday, August 23, 2010

Microsoft Security Newsletter - August 2010


NOTE FROM THE EDITOR

Tim Rains Welcome to August's Security Newsletter! Recently the Microsoft Security Response Center (MSRC) released a bevy of fresh new content and data focused on the progress it has made related to the three programs it announced two years ago: the Microsoft Active Protections Program (MAPP), the Microsoft Exploitability Index, and the Microsoft Security Vulnerability Research (MSVR) program.

For example, did you know that as of June 2010, MAPP consisted of 65 companies, including vendors based in North America, Europe, the Middle East, and Asia? During late 2009 and early 2010, MAPP membership grew especially strongly in Asia. Do you know if your antivirus (AV) or intrusion detection/prevention systems (IDS/IPS) vendor is a MAPP partner and receiving vulnerability information earlier than the "bad guys"? Click here and find out.

Another new resource I'd like to draw your attention to is a whitepaper entitled "Vulnerability Management at Microsoft." If you are an IT pro or security professional responsible for helping to protect your organization's network infrastructure and data, and you'd like to understand more about the specific engineering processes Microsoft uses to release security updates, this is required reading. Have you ever wondered where the most time and effort is spent as Microsoft develops security updates? This paper provides you with some good insight into this and other related topics. For a closer look at the activities of the MSVR program, click here.



If you explore any of the content I mention above, you might also notice the recent improvements to the MSRC website including a new video on the home page that will help you understand the inner workings of the MSRC. With all of this new content, plus the Office 2010 security guidance featured below, you'll have plenty to catch up on before September's newsletter!

Best regards,
Tim Rains, Group Product Manager, Microsoft Trustworthy Computing

Follow the Microsoft Security Response team on Twitter @MSFTSecResponse for the latest information on the threat landscape.


Microsoft Security Response Center Progress Report
Get the latest information from the Microsoft Security Response Center on the progress of three initiatives that share information to foster deeper industry collaboration, increase community-based defenses, and better protect customers.

Join the Security Compliance Manager Beta 2 Program
Preview this new security baseline, and gain knowledge to help you more effectively deploy and monitor your security baseline for Windows Server 2008 R2, Exchange 2007, Office 2010, SQL Server 2008, and SQL Server 2008 R2 as well as setting packs for Windows 7 and Internet Explorer 8.

Security Tip of the Month: Using the MSRC Exploitability Index
Explore the reasons why home (non-domain) users and those who use enterprise (domain-joined) computers face different vulnerabilities then find a selection of best practices and solutions that should be considered to help protect your users.

Understanding Security Threats and Countermeasures for Office 2010
Get the information you need to plan for a secure desktop configuration for Office 2010, including which security risks and threats are relevant to Office 2010, and which might pose a risk to the organization's business assets or processes.

Configuring Security for Office 2010
Learn how to configure security settings for Office 2010 by using the Office Customization Tool (OCT) and Group Policy.

Planning for Security and Protection in Outlook 2010
Access guidance on how to choose security and protection settings, determine attachment settings, limit junk mail, and utilize email messaging cryptography in Outlook 2010.

Planning for Privacy in Office 2010
Learn how to configure privacy options in Office 2010 to meet your organization's security requirements.

TechNet Wiki Spotlight: Enforcing Security Compliance with Group Policy
Enforcing security compliance on application servers can be a complex and tedious process. Explore best practices that could assist enterprises that utilize many different applications.

Also from the TechNet Wiki:

Search Federation Security in Microsoft Office SharePoint Server 2007
Explore security best practices for the federation feature of Microsoft Office SharePoint Server 2007, Federation is a feature that first appeared in Search Server 2008 and is made available to Office SharePoint Server 2007 by installing the Infrastructure Update for Microsoft Office Servers. Federated search enables end users to issue one query that can query one or more search engines that are compliant with Open-search 1.1 and display results from each search engine in a separate Web part on a single search results page.

Take a Fun and Informative Cloud Quiz
What kind of cloud are you? Take a short quiz to find out how Microsoft cloud services can help you offload commodity workloads, manage security capabilities and "shadow" IT applications, and maintain compliance with industry regulations.

Managing the Cloud with Windows Intune
Windows Intune is a new cloud-based PC management solution that can help you keep your organization's PCs secure, updated and manageable no matter where they're located. This TechNet Magazine article goes into detail on each workspace that is available and the benefits it provides, and then delves into the technical architecture of Windows Intune. Want to learn more about Windows Intune? Check out the Windows Intune resource page on TechNet.

Microsoft Trustworthy Computing: Job Listings
Today, Trustworthy Computing is a core corporate value at Microsoft, guiding almost everything we do. It is about more than just addressing today's challenges. Explore the jobs currently available with the Microsoft Trustworthy Computing team and join us in our efforts to ensure that the innovations people will rely on tomorrow are designed from the very beginning to be reliable and secure, respectful of their privacy, and supported by trustworthy and responsive companies.

Critical:
• MS10-046: Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)
• MS10-049: Vulnerabilities in SChannel Could Allow Remote Code Execution (980436)
• MS10-051: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2079403)
• MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution (2115168)
• MS10-053: Cumulative Security Update for Internet Explorer (2183461)
• MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution (982214)
• MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution (982665)
• MS10-056: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (2269638)
• MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (2265906)

Important:
• MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (981852)
• MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2160329)
• MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (981997)
• MS10-057: Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution (2269707)
• MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)
• MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow an Elevation of Privilege (982799)

Security Bulletin Overview for August 2010
Microsoft Security Bulletin MS10-046 - Critical: Vulnerability in Windows Shell Could Allow Remote Code Execution
On August 2, 2010, Microsoft has released an Out of Band Security Update to address a .LNK vulnerability in Windows. MS10-046 addresses that vulnerability in Windows which has a maximum severity rating of Critical and an Exploitability Index rating of 1. The security vulnerability affects all supported editions versions of Windows XP, Vista, Windows 7, Windows Server 2008, and Windows Server 2008 R2. It is recommended that customers deploy the updates as soon as possible to help protect their computers from criminal attacks. In order to continue to benefit from security releases, it is highly recommended that customers who are currently on unsupported version of Windows upgrade to the supported versions.

For more information, browse the Out-Of-Band Security Bulletin Webcast Q&A .

Find information about your particular products on the Microsoft Product Lifecycle Web site.

Security Talk: Using the Microsoft Security Intelligence Report v8
Take a comprehensive look at vulnerabilities, exploits, malware, and the threat landscape as determined by Microsoft security experts, including analysis and recommendations based on data input from over 500 million computers worldwide. In this video, you'll also explore action-focused strategies, mitigations, and countermeasures that can help you understand how you can protect your organization's IT investments. A podcast version of this video is also available.

For IT Professionals For Developers Now On Demand
  • Security Talk Podcast: File Fuzzing for Fun and Profit
    Fuzzing is the most commonly used method for finding security flaws in software, but fuzzing can also be used by development teams to find and fix security holes before deployment. Learn how file fuzzing works, and how to do file fuzzing practically using both homemade and commercially available tools. We show you how to generate the input and automate the testing process. We also discuss the feasibility of covering entire search spaces and the various aspects and trade-offs of choosing different attack vectors.
Interactive Security Webcast Calendar
Upcoming security webcasts in a dynamic, interactive format.


This is a monthly newsletter for IT professionals and developers-bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.

© 2010 Microsoft Corporation. All rights reserved. Microsoft, MSDN, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

To cancel your subscription to this newsletter, reply to this message with the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at http://www.microsoft.com/info/unsubscribe.htm. You can manage all your Microsoft.com communication preferences at this site.

Legal Information.

This newsletter was sent by the Microsoft Corporation
One Microsoft Way
Redmond, WA, 98052, USA





August 2010 Edition

IN THIS ISSUE

•  Top Stories
•  Security Guidance
•  Community/MVP Update
•  The Business of Security
•  Cloud Security Corner
•  This Month's Security Bulletins
•  Microsoft Product Lifecycle Information
•  Security Events and Training
•  Upcoming Security Webcasts
SECURITY PROGRAM GUIDE

•  Microsoft SDL - Developer Starter Kit
•  Security Awareness Materials
•  Learn Security On the Job
•  Learning Paths for Security -Microsoft Training References and Resources
UPCOMING CHATS

•  View a listing of upcoming technical chats
SECURITY BLOGS

•  Trustworthy Computing Security/Privacy Blogs RSS
•  Michael Howard RSS
•  Eric Lippert RSS
•  Windows auditing team RSS
•  MSRC Blog RSS
•  ACE Team RSS
•  Windows Security RSS
•  Forefront Team RSS
•  Solution Accelerators - Security & Compliance RSS
•  Security Research & Defense RSS
•  Security Development Lifecycle (SDL) RSS
COMMUNITY WEBSITES

•  IT Pro Security Community
ADDITIONAL SECURITY RESOURCES

•  Security Help and Support for IT Professionals
•  TechNet Troubleshooting and Support Page
•  Microsoft Security Glossary
•  TechNet Security Center
•  MSDN Security Developer Center
•  Sign-Up for the Microsoft Security Notification Service
•  Security Bulletin Search Page
•  Microsoft Security Center
•  Home Users: Protect Your PC
•  MCSE/MCSA: Security Certifications
•  Subscribe to TechNet
•  Register for TechNet Flash IT Newsletter


Sign up for this newsletter | Unsubscribe | Update your profile
© 2010 Microsoft Corporation Terms of Use | Trademarks | Privacy Statement
 

Your cOmment"s Here! Hover Your cUrsOr to leave a cOmment.


Subscribe to: Post Comments (Atom)