Thursday, December 10, 2009

Microsoft Security Newsletter - Volume 6, Issue 12

Microsoft Security Newsletter
This is a monthly newsletter for IT professionals and developers—bringing security news, guidance, updates, and community resources directly to your inbox. To view an online version of this newsletter, click here or subscribe to the Featured Security and Privacy Content RSS feed to receive more frequent updates on news and featured resources. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.
Note from the Editor
Tim Rains  
Hi, I'm Tim Rains, your guest editor for this month's edition of the Microsoft Security Newsletter. In case you missed last month's announcement, the latest Microsoft Security Intelligence Report (SIRv7) was released on November 2. It's the largest security report that Microsoft has ever published -- with 232 pages on the latest trends and data points you need to better understand what is happening in the threat landscape today.

For those of you who aren't familiar with the SIR, the report provides insights into the threat landscape from multiple vantage points so that you receive a well-rounded view of how attackers are behaving on the Internet. For example, on page 41 you'll find a malware infection rate "heat map" that illustrates infection rates around the world followed by deep dives into malware trends in 19 countries -- very helpful information if your organization does business in different parts of the world. Later in the report there is a graph that shows infection-rate trends for the different operating systems and service packs over the past two years. If you are an IT pro looking for data to help make the case to move to a newer, more secure OS or simply the newest service pack, the data in SIRv7 may be able to help.

Personally, I find the section in the SIR on industry-wide vulnerability disclosure trends to be very interesting. On page 149 you'll see that the vast majority of vulnerability disclosures since 2004 have been related to applications. This is a good reminder for all IT departments to maintain a strategy to keep all software up to date, not just the OS or the browser.

I hope these examples have made you curious about SIRv7. You can get the full report or the 19-page Key Findings Summary in ten languages at www.microsoft.com/sir, as well as video overviews if you aren't in the mood to read.

If you have any feedback on the report -- what you find useful or areas that can be improved -- please send us an e-mail message at sirfb@microsoft.com.

In addition to SIRv7, Microsoft Office 2010 Beta is now available; try it and Microsoft Exchange 2010 in your environment today. Read on for tools and guidance to help you protect your applications and messaging servers from the modern threat landscape.

Wishing you safe and happy holidays,

Tim Rains, Group Product Manager, Microsoft Trustworthy Computing

Top Stories
Based on the past decade of experience examining and addressing privacy challenges in the evolving online services realm, this new "Privacy in the Cloud Computing Era" paper discusses how Microsoft is approaching privacy as it relates to cloud computing and describes how the underlying privacy principles provide a solid foundation for addressing evolving privacy issues.
Quickly find security podcasts, stream or download .WMA or MP3 files to your favorite podcast software or mobile device, and subscribe to RSS feeds or automatically have podcasts downloaded to your computer.

Security Guidance
Learn how to leverage Windows Identity Foundation (WIF) to significantly reduce the code required to implement rich application scenarios that involve federated and claims-based security.
Per the Agile Manifesto, Agile projects should have short iterations, lasting from one month to a few weeks or less. SDL-Agile breaks the SDL into three categories of requirements: the requirements so important that they must be completed every iteration; the requirements that only have to be completed once per project no matter how long it runs; and the requirements that still need to be completed regularly but are not so important that they need to be completed every sprint. Read this overview of SDL methodologies for Agile development and then download the complete SDL-Agile guidance, part of the SDL 4.1a Process Guidance.
Get guidance, workbooks, and tools to help you plan, deploy, and monitor the security baselines of computers running the 2007 Microsoft Office Service Pack 1 (SP1) applications in your environment.
Use this technical reference for the security settings and privacy options in the 2007 Microsoft Office system to determine what each setting does, what the default configurations are, which tool to use to configure a setting, and where to find the setting in the Office Customization Tool (OCT) or the Group Policy Object Editor.
Learn about the new password rules feature in Microsoft Office 2010, and get guidance on how to enable and configure it. Want a high-level introduction to several of the new security features in Office 2010? Click here.
The Application Verifier (AppVerifier) is a collection of tests used during the application development and testing process to help developers identify potential application compatibility, stability, and security issues -- and find guidance for source-code level fixes.
Gain an understanding of the Windows Mobile security model from both the device and server perspectives. This paper will help you know which security levels and features are available on front door and back door Windows Mobile powered devices and how Microsoft Exchange ActiveSync interacts with each of them. Read the Security Model for Windows Mobile 5.0 and Windows Mobile 6 for more detailed technical information on provisioning and managing Windows Mobile powered devices.

This Month's Security Bulletins
Critical:
Important:
Security Bulletin Overview for December 2009

Microsoft Product Lifecycle Information
Find information about your particular products on the Microsoft Product Lifecycle Web site.

Microsoft provides free software updates for security and nonsecurity issues for all supported service packs. You can see a list of supported packs here.

Security Events and Training
Wednesday, February 3, 2010 | San Francisco, CA
Learn the basics of secure design, development, and testing, and then delve into threat modeling and building privacy into software products and services.
Learn how to deploy your Office Add-ins and SharePoint applications and the roles that the end user and administrator play in each. Topics covered are security, SharePoint Solution (WSP) files, ClickOnce, Add-ins, and Document Templates.
This one-hour clinic describes Microsoft Exchange Server 2010 features, deployment scenarios, and development platform options, including storage, compliance, and management tools. Follow up with Clinic 6901: Exchange Server 2010 in an Enterprise for more detail on unified messaging and data protection.
Learn how AppLocker provides not only security protections, but also operational and compliance benefits by: stopping users from running applications that needlessly consume network bandwidth or otherwise impact the enterprise computing environment; preventing vulnerable, unauthorized applications from running in your desktop environment, including malware; and helping ensure your desktop environment is in compliance with corporate policies and industry regulations.

Upcoming Security Webcasts
Tuesday, December 22, 11:00 AM Pacific Time
The Access Control Service (ACS), part of Windows Azure platform AppFabric, makes it easy to secure REST-based services using a simple set of standard protocols. Take a tour of ACS features and learn how to configure ACS, how to request a token from the ACS, and how applications and services can authorize access based on the ACS token.
Upcoming security webcasts in a dynamic, interactive format.
For IT Professionals
For Developers
Now On Demand
TechNet Webcast: Microsoft Secure Messaging Solution (Level 300)
Learn how to protect your e-mail messages from malware and inappropriate content and from leaking into the wrong hands, and securely publish your Microsoft Exchange server for access from virtually any device.
ARCHITECT CAFÉ Webcast: Software as a Service in the Cloud
Learn how to solve difficult technical problems encountered when building software as a service applications. Topics include certificate security, low-IT-capable clients, business continuity when connectivity is lost, provisioning of services, scalability as the number of clients increase, database design for clients, how to use virtualization, and how to integrate and release service functionality over several different client applications.

Security Newsletter
Volume 6, No. 12

December 2009
In This Issue:
Top Stories
Security Guidance
This Month's Security Bulletins
Microsoft Product Lifecycle Information
Security Events and Training
Upcoming Security Webcasts
Security Program Guide
Microsoft SDL – Developer Starter Kit
Security Awareness Materials
Learn Security on the Job
Learning Paths for Security – Microsoft Training References and Resources
Upcoming Chats
View a listing of upcoming technical chats
Security Blogs
Trustworthy Computing Security/Privacy Blogs RSS
Michael Howard RSS
Eric Lippert RSS
Eric Fitzgerald RSS
MSRC Blog RSS
ACE Team RSS
Windows Security RSS
Solution Accelerators - Security & Compliance RSS
Kai Axford RSS
Security Vulnerability Research & Defense RSS
Security Development Lifecycle (SDL) RSS
Security Newsgroups
General Security issues/questions
Open with newsreader
Virus issues/questions
Open with newsreader
ISA Server
Open with newsreader
Window Vista: Security
Open with newsreader
SQL Server: Security
Open with newsreader
Windows Server: Security
Open with newsreader
Community Web Sites
IT Pro Security Community
Additional Security Resources
Security Help and Support for IT Professionals
TechNet Troubleshooting and Support Page
Microsoft Security Glossary
TechNet Security Center
MSDN Security Developer Center
Sign-Up for the Microsoft Security Notification Service
Security Bulletin Search Page
Home Users: Protect Your PC
MCSE/MCSA: Security Certifications
Subscribe to TechNet
Register for TechNet Flash IT Newsletter
© 2009 Microsoft Corporation. All rights reserved. Microsoft, MSDN, ActiveSync, Azure, Forefront, SharePoint, Windows, Windows Media, Windows Mobile, Windows Server, Windows Vista, and Zune are trademarks of the Microsoft group of companies.

To cancel your subscription to this newsletter, reply to this message with the word UNSUBSCRIBE in the Subject line. You can also unsubscribe at http://www.microsoft.com/info/unsubscribe.htm. You can manage all your Microsoft.com communication preferences at this site.

Legal Information.

This newsletter was sent by the Microsoft Corporation
One Microsoft Way
Redmond, Washington, USA
98052

Sign up for other newsletters | Unsubscribe | Update your profile
© 2009 Microsoft Corporation Terms of Use | Trademarks | Privacy Statement
Microsoft

Your cOmment"s Here! Hover Your cUrsOr to leave a cOmment.


Subscribe to: Post Comments (Atom)