Welcome to the Microsoft Security Newsletter - a monthly newsletter for IT professionals and developers bringing security news, guidance, updates, and community resources direct to your inbox. To view an online version of this newsletter, please click here. If you would like to receive less technical security news, guidance and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter. Want to receive more frequent updates on news and featured resources? Subscribe to the Featured Security and Privacy Content RSS feed. Have an idea for a future article, or looking for guidance around a specific topic that you have not seen in this newsletter (or on TechNet or MSDN)? E-mail secaware@microsoft.com. Security Viewpoint | By Gina Narkunas, Director – IE8 Product Marketing, Microsoft Corporation Gain insight into the rapid evolution of Web-based threats and learn more about how the new security and privacy protections in Internet Explorer 8 can benefit your organization. | Top Stories | Microsoft Codename "Geneva" Beta 2 is an open platform that provides simplified user access and single sign-on for on-premises and cloud-based applications in the enterprise, across organizations and on the Web. Download Beta 2 today and learn more about "Geneva" at www.microsoft.com/geneva. | | Find out what you want to know about identity and access control. From weekly interviews with product team members and developer how-tos to news and key resources, this new site offers content for identity experts and those just getting started. Don't forget to also download the Identity Developer Training Kit. | | Learn about the Business Productivity Online Suite—a set of subscription-based enterprise software services that operate within a complete ecosystem of features and capabilities designed to meet and in many cases to exceed the security and availability goals that you have for your business applications. | Security Guidance | Get a quick overview of new security features in Windows 7, and changes to security features and technologies from Windows Vista. | | Delve deep into the various aspects of deploying BitLocker Drive Encryption on computers running Windows 7 Enterprise or Windows 7 Ultimate from using certifications and smart cards to enabling BitLocker by using the command line. | | Designed to help you become familiar with BitLocker Drive Encryption in a Windows 7 test environment, this guide details basic information and procedures you need to start configuring and deploying BitLocker in your organization. | | Learn how to use the ActiveX Installer Service to manage the deployment of ActiveX controls by using Group Policy on computers in an organization. | | This step-by-step guide is designed to help administrators become familiar with AppLocker by providing the instructions needed to set up AppLocker in a test lab environment. Each scenario provides basic information and procedures that administrators can use to start configuring and deploying AppLocker in their network environments. | | Windows 7 gives you more control over the Security Messages and other Notifications you may or may not want to receive. Learn how, for starters, you can configure how notifications are handled on the Taskbar—choosing to hide certain types of notifications, such as Action Center messages, Network messages, Windows Update Automatic Updates messages, and so on. | | Learn how to slipstream a Forefront Client Security engine update into your System Center Configuration Manager (SCCM) or script-based initial Client Security client deployment, so that you are deploying the most up to date engine. | | Internet Explorer Enhanced Security Configuration places your server and Internet Explorer in a configuration that decreases the exposure of your server to potential attacks that can occur through Web content and application scripts. Learn more about this configuration and browser security best practices. | This Month's Security Bulletins Critical: Important: Moderate: Community / MVP Update | Debra Littlejohn Shinder is a technology trainer, author, and consultant who currently co-owns TACteam (Trainers, Authors and Consultants), a company specializing in producing content, technical guidance, and training for top technology companies. She has co-authored or contributed to more than 28 technology books and has published hundreds of articles in print and online publications like TechRepublic, CNET, Windows & .NET Magazine/Windows IT Pro, and ComputerWorld. | | Learn about some of the keys to keeping clients safe in this article by Microsoft Enterprise Security MVP Deb Shinder—proper configuration settings, secure application development, and the deployment of the appropriate security mechanisms based on how and where the client computer is used. | Microsoft Product Lifecycle Information Security Events and Training | In this Channel9 video, Principal Developer Louis Lafreniere takes you through the history and future of /GS, in a deep way, of course. Watch as he maps out exactly how /GS works and what to expect from /GS++. | | Take a closer look at a variety secure messaging and collaboration solutions available through a family of Microsoft products that help protect information and control access. | Upcoming Security Webcasts | Upcoming security webcasts in a dynamic, interactive format. | For IT Professionals For Developers |