Welcome to the Microsoft Security Newsletter - a monthly newsletter for IT professionals and developers bringing security news, guidance, updates, and community resources direct to your inbox. To view an online version of this newsletter, please click here. If you would like to receive less technical security news, guidance and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter. Featured Article | By Yuri Diogenes, Security Support Engineer, Microsoft ISA and IAG Team Learn how to monitor your traffic with either real-time logging or on-demand reporting. Explore how to use new fields on the dashboard and real-time logging to instantly see if the traffic contains a piece of malware, the threat level, and whether it was cured. In addition, see how you can use new reports to work proactively to investigate trends and identify systems that may be compromised. | Top Stories | Project Codename Sundance provides you with an end-to-end solution to help your organization plan, deploy, and monitor security baselines of Windows operating systems and Microsoft Office 2007 applications. The beta release is available now for your review through January 6, 2009. After joining the beta review program, bookmark this link to the program site to get the latest information about upcoming events. | | Windows HPC Server 2008 can help shorten time-to-insight for HPC workload through easier deployment and management. By using the existing Windows-based information technology (IT) infrastructure, HPCS brings the security benefits of Windows Server to cluster environments and can provide a seamless parallel computing environment from desktop to the server. | | Check out the demo in this Tech•Ed Online interview with the Group Product Manager behind the Microsoft Security Assessment Tool. Through the easy-to-use assessment process, you will find prioritized tasks with industry guidance, best practices, and recommendations to resolve security issues identified in the detailed reports. | Security Guidance | This article describes how you can monitor your traffic with either real-time logging or on-demand reporting. Learn how you can use new fields on the dashboard and real-time logging to instantly see if the traffic contains a piece of malware, the threat level, and whether it was cured. You can also see how to use new reports to work proactively to investigate trends and identify systems that may be compromised. | | Because HPC clusters are being adopted by a broad range of mainstream users for mission-critical applications, security and integration with the existing infrastructure are essential. Read this technical overview to learn how Windows HPC Server 2008 uses the Active Directory service to enable role-based security for all cluster jobs and administration. | | MPI and MPI2 are widely accepted specifications for managing messaging in high-performance clusters. Among the most widely accepted implementations of Message Passing Interface (MPI) is the open-source Argonne National Laboratory MPICH2 reference implementation. At the API level, MS MPI is identical to the more than 160 APIs implemented by MPICH2. At the same time, MS MPI adds enhanced security and process management capabilities for enterprise environments and a new execution-tracing feature for Windows HPC Server 2008. Read this white paper for more details. | | Microsoft HPC Server 2008 provides secure, scalable cluster resource management, a job scheduler, and an MPI stack for parallel programming. Download the Microsoft HPC Pack 2008 SDK to get the tools and content necessary to write parallel applications for the Windows HPC Server 2008 platform. | | HPC uses HPC sessions to support the service-oriented architecture (SOA) programming model based on Windows Communication Foundation (WCF). The SOA programming model is ideal for writing interactive, parallel applications that provide near real-time calculation of complex algorithms, such as Monte Carlo simulations and BLAST searches. Read this topic for tips on how to secure the HPC session. | | Extend Web applications inside your firewall to vendors, partners, and other trusted organizations with secure, authenticated, and controlled external access. | This Month's Security Bulletins Critical: Important: Microsoft Product Lifecycle Information Security Events and Training | While data warehousing is primarily concerned with the integration of vast amounts of data across multiple business systems, business intelligence is concerned with how to use that integrated data to make strategic business decisions. Security becomes an immediate concern whenever private corporate data is accessed. Stories of conspicuous data leaks have been making news headlines for years. Use this learning path to help you take security into consideration when developing a business intelligence strategy. | | Friday, December 12, 8:30 AM Pacific Time Attention developers and IT professionals! Do not miss this live virtual event where you will learn best practices for developing for Windows for standard users, delve into specifics around Windows security and BitLocker, and get a preview of Windows 7 and Windows Server 2008 R2. | Upcoming Security Webcasts | Upcoming security webcasts in a dynamic, interactive format. | For IT Professionals For Developers Microsoft On-Demand Webcasts |