Thursday, October 16, 2008

CORRECTION: Microsoft Security Newsletter - Volume 5, Issue 10

Microsoft Security Newsletter
Welcome to the Microsoft Security Newsletter - a monthly newsletter for IT professionals and developers bringing security news, guidance, updates, and community resources direct to your inbox. To view an online version of this newsletter, please click here. If you would like to receive less technical security news, guidance and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.

**Editor's Note: The October edition of the Microsoft Security Newsletter contained an error. The Security Tip of the Month for October is "Who, Where, When? Simple Tools for Auditing in the Enterprise."**

Give us feedback!
We are dedicated to continuing to improve the value of the Microsoft Security Newsletter. Please take this short survey (eight questions) that will help us continue to improve your experience.


Viewpoint
By Steve Riley, Senior Security Strategist, Microsoft Trustworthy Computing
In this article, Steve Riley outlines four classes of access requests, the usage scenarios related to each, and the kinds of information that should be made available to each class in order to help you understand the client security responsibilities associated with the ongoing quest to provide "anywhere access."

Top Stories
Identity theft is not only a threat faced by consumers but also a significant concern for organizations as they handle growing volumes of personally identifiable information (PII) and use it in more diverse ways. This paper outlines a set of near-term tactics for mitigating online identity theft as well as a longer-range strategic vision for fundamentally "changing the game" with regard to how people assert their identity on the Internet and how such identity claims are verified by other parties during an online interaction or transaction.
As part of its commitment to make the Security Development Lifecycle (SDL) available to every developer, Microsoft is delivering three new SDL programs and tools in November 2008: the SDL Pro Network, the SDL Optimization Model, and the Microsoft SDL Threat Modeling Tool. These offerings will enable the industry to create more secure and privacy-enhanced technology for an online world. Learn more about these programs or watch a demo about the SDL Threat Modeling Tool.
UrlScan version 3.0 is a security tool that restricts the types of HTTP requests that Internet Information Services (IIS) 6.0 will process. UrlScan screens all incoming requests to the server by filtering the requests based on rules that are set by the administrator. Filtering the requests helps secure the server by ensuring that only valid requests are processed.
Check out J. D. Meier's overview of the patterns & practices approach to security engineering, which covers—among other topics—the security frame used to perform security code and design inspections.

Security Guidance
How do you know who is accessing what in your IT environment? This vital question is often faced by security administrators, and many IT organizations have challenges identifying and understanding patterns of client access to enterprise resources. This articles offers some quick tips and tools to help you understand which users or system accounts have access to which resources, and when.
This collection of software components and guidance helps you configure a compliance health policy for computers that run Microsoft Forefront Client Security. Network administrators can use this kit to assess the health of these computers before they are granted network access. If a computer is not compliant with the health policy for Forefront Client Security, it can be isolated to a restricted network until it is properly remediated.
This guide provides you with specific recommendations and automated tools to help strengthen the security of desktop and laptop computers running Windows Vista in a domain with the Active Directory service. You'll also learn how to use the GPOAccelerator tool that accompanies the guide to help you automatically deploy security settings in minutes instead of hours.
Benefit from tested guidance and powerful tools to help you protect your most vulnerable information—the data residing on your laptops. This toolkit shows you how to use two key encryption technologies: BitLocker Drive Encryption, which is included with specific versions of Windows Vista, and the Encrypting File System, which is included with Windows XP Professional and Windows Vista.
This toolkit provides you with best practices to plan, deploy, monitor, and remediate a security baseline for your organization. It also offers a proven method that you can use to effectively monitor the compliance state of a security baseline for Windows Vista, Windows XP Service Pack 2 (SP2), and Windows Server 2003 SP2.
In this podcast, Paul Cooke, Director in the Windows Client division specializing in security, discusses BitLocker Drive Encryption, and how it has been extended in Windows Vista SP1.
Learn how to effectively use the new Group Policy objects in Windows Vista to improve manageability and strengthen security with this podcast by Derek Melber, author, IT consultant, and Microsoft MVP for Group Policy.

This Month's Security Bulletins
Critical:
Important:
Moderate:

Community / MVP Update
MVP of the Month: Derek Melber   
Derek Melber -- one of the leading technical instructors, project leaders, and solution developers in the nation -- has an innate understanding of how to decipher, organize, and communicate complex issues. Derek's areas of expertise include Group Policy, Active Directory (former Directory Services MVP), security, desktop management, and security auditing. He provides custom and public training on all of these subjects and regularly speaks at conferences including TechMentor and MISTI. Derek runs Braincore (www.braincore.net) and also is a contributing editor to Windowsecurity.com, Redmond Magazine, RIAG Journal, IT Audit newsletter, and various other publications.

Microsoft Product Lifecycle Information
Find information about your particular products on the Microsoft Product Support Lifecycle Web site.
See a List of Supported Service Packs: Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.

Security Events and Training
BlueHat v8: C3P0wned takes place October 16 - 17 at the Microsoft corporate headquarters. A by-invitation-only Microsoft event, the security conference brings together Microsoft security professionals and external security researchers in a relaxed environment to promote the sharing of ideas and social networking.
Delve into Windows Vista secure deployment strategies, configurations, and best practices with Mark Russinovich and a panel of Microsoft MVPs and IT pros from multiple industries.
Learn how to help keep your security environment operational and effective even during a disaster. Use the resources in this learning path to help you lock down your infrastructure and harden security to prevent PC and desktop disruption.

Upcoming Security Webcasts
Upcoming security webcasts in a dynamic, interactive format.
For IT Professionals
TechNet Labcast: Desktop Deployment: Planning, Deploying, and Managing the 2007 Office System (Part 1 of 2) (Level 200)
Tuesday, October 21, 9:00 PM Pacific Time
Dennis Wakefield, Senior Technical Trainer, Entirenet LLC
TechNet Labcast: Desktop Deployment: Planning, Deploying, and Managing the 2007 Office System (Part 2 of 2) (Level 200)
Thursday, October 23, 8:30 AM Pacific Time
Dennis Wakefield, Senior Technical Trainer, Entirenet LLC
TechNet Webcast: Information About Microsoft November Security Bulletins (Level 200)
Wednesday, November 12, 11:00 AM Pacific Time
Christopher Budd, Security Response Communications Lead, Microsoft Corporation and Adrian Stone, Lead Security Program Manager, Microsoft Corporation
For Developers
MSDN Webcast: BenkoTIPS Live and On-Demand: 10 Ways Your Applications Can Be More Secure on Windows Vista (Level 100)
Wednesday, October 22, 11:00 AM Pacific Time
Mike Benkovich, Developer Evangelist, Microsoft Corporation
MSDN Webcast: More Secure Online Services Powered by the Microsoft Security Development Lifecycle (Level 300)
Friday, October 31, 10:00 AM Pacific Time
Bryan Sullivan, Security Program Manager, Microsoft Corporation
MSDN Webcast: Convincing Management: The Business Case for Adding Security to the Development Life Cycle (Level 200)
Monday, November 3, 11:00 AM Pacific Time
Joe Stagner, Senior Program Manager, Microsoft Corporation
MSDN Webcast: Security Development Lifecycle: Building an Intentionally Secure Development Process (Level 200)
Monday, November 10, 11:00 AM Pacific Time
Joe Stagner, Senior Program Manager, Microsoft Corporation
Microsoft On-Demand Webcasts
TechNet Webcast: Troubleshooting Forefront Client Security in Large Enterprises (Level 300)
Attend this session to learn how Forefront Client Security uses Microsoft Operations Manager technology, integrates with Active Directory, employs Windows Server Update Services for signature and client deployment, and uses Microsoft SQL Server database software for data retention.
TechNet Webcast: Deploying Internet Protocol Security (IPsec) with Windows Vista (Level 200)
Join this session to see how new network stack innovations in the Windows Vista operating system can help you secure your network by providing features that allow you to filter network traffic and prevent unwanted forwarding.

Security Newsletter
Volume 5, No. 10

October 2008
In This Issue:
Viewpoint
Top Stories
Security Guidance
This Month's Security Bulletins
Community / MVP Update
Microsoft Product Lifecycle Information
Security Events and Training
Upcoming Security Webcasts
Security Program Guide
Security Awareness Materials
Guidance, samples, and templates for creating a security-awareness program in your organization.
Learn Security On the Job
Learning Paths for Security - Microsoft Training References and Resources
Upcoming Chats
Windows Internet Explorer 8 Expert Zone Chat
October 16, 10:00 AM Pacific Time
View a listing of upcoming technical chats
Free In-Person Events
TechNet Events
Security Blogs
Michael Howard RSS
Eric Lippert RSS
Eric Fitzgerald RSS
Steve Lamb RSS
MSRC Blog RSS
ACE Team RSS
Jeff Jones RSS
Windows Vista Security RSS
Solution Accelerators - Security & Compliance RSS
Kai Axford RSS
Security Vulnerability Research & Defense RSS
Steve Riley RSS
Security Development Lifecycle (SDL) RSS
Security Newsgroups
General Security issues/questions
Open with newsreader
Virus issues/questions
Open with newsreader
ISA Server
Open with newsreader
Windows 2000: Security
Open with newsreader
Window Client: Security
Open with newsreader
SQL Server: Security
Open with newsreader
Windows Server: Security
Open with newsreader
Other Security Newsgroups
Community Web Sites
IT Pro Security Community
Security Newsgroups
Related Communities
Additional Security Resources
Security Help and Support for IT Professionals
TechNet Troubleshooting and Support Page
Microsoft Security Glossary
TechNet Security Center
MSDN Security Developer Center
Midsize Business Security Center
Sign-Up for the Microsoft Security Notification Service
Security Bulletin Search Page
Home Users: Protect Your PC
MCSE/MCSA: Security Certifications
Subscribe to TechNet
Register for TechNet Flash IT Newsletter
Register for the UK MSDN Flash Newsletter
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, BizTalk, Forefront, Internet Explorer, SQL Server, Windows, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

To cancel your subscription to this newsletter, reply to this message with the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at http://www.microsoft.com/info/unsubscribe.htm. You can manage all your Microsoft.com communication preferences at this site.

Legal Information.

This newsletter was sent by the Microsoft Corporation
One Microsoft Way
Redmond, Washington, USA
98052

Sign up for other newsletters | Unsubscribe | Update your profile
© 2008 Microsoft Corporation Terms of Use | Trademarks | Privacy Statement
Microsoft

Your cOmment"s Here! Hover Your cUrsOr to leave a cOmment.


Subscribe to: Post Comments (Atom)