| | | Security Intelligence Report Video Series, On the Spot - Paris Watch as Bernard Ourghanlian, National Technology Officer and Chief Security Officer for Microsoft France discusses the Security Intelligence Report v9 and the most prevalent threats in France with Vinny Gullotto, Microsoft Engineering General Manager for the Microsoft Malware Protection Center (MMPC). | New Version of Microsoft Security Compliance Manager (SCM) Version Now Available Now updated to work reliably behind corporate proxy servers; Microsoft SCM v.1.1.2 also features security baselines for Windows 7, Microsoft Office 2010, Windows Server 2008 R2, and Windows Internet Explorer 8. Download the latest version of this free tool and starting moving toward more effective security and compliance processes for some of the most widely-used Microsoft products. | Join the SCM Community on the New TechNet Wiki Looking for the latest info on SCM? Check out the new SCM Wiki, and keep current with SCM through continuously updated content including an FAQ, getting started materials, baseline download help, release notes, and more. | | | | | | Security Tip of the Month: Using the Enhanced Mitigation Experience Toolkit to Safeguard Against Zero Days There have been a number of zero-day vulnerabilities circulating around the Internet recently. Find out how the Enhanced Mitigation Experience Toolkit (EMET) can help you manage security mitigations for your systems.
| Maintaining DNS and DHCP Server Roles This lesson is part of a two-day, 300-level course focusing on managing and maintaining Windows Server 2008 server roles and security for server administrators who have a good understanding of DHCP, DNS, and other core networking services.
| Securing Windows Server Get a consolidated view of the feature overviews, step-by-step-guides, and configuration tips for the various security and protection technologies in Windows Server 2008 and Windows Server 2008 R2 from authorization and information protection to security management and network security.
| BranchCache Security Guide Get comprehensive guidance on how to manage the security of the Microsoft BranchCache feature introduced in Windows Server 2008 R2 and Windows 7.
| Windows Server 2008 and Windows Server 2008 R2 IT Compliance Management Download the IT Compliance Management Series to access free tools and guidance to help you configure Windows Server 2008 and Windows Server 2008 R2 to address specific IT governance, risk, and compliance (GRC) requirements.
| Securing Client Access Servers in Exchange Server 2010 Learn how to manage security and authentication related options available for a computer running Microsoft Exchange Server 2010 that has the Client Access server role installed.
| Hardening SQL Server for SharePoint Environments Get a summary of hardening recommendations then specific details on how to configure a SQL Server instance to listen on a non-default port, how to configure and test a SQL client alias, and much more.
| | | | | | | | Enforcing Security Compliance with Group Policy By Ron Mayo, MCTS, MCSE Explore best practices for enforcing security compliance on servers using Active Directory and Group Policy that can also be applied to enforcing security compliance on workstations. | | | | | | Windows Azure Platform Security Essentials for Business Decision Makers Watch this video for answers to the most common security concerns CxOs and other business decision-makers have regarding the security of their data in Windows Azure cloud platform. You'll learn about the security controls that Azure has in place to help protect the customer applications and data, the security aspects of the Azure infrastructure, and how Microsoft secures its datacenters. You'll also hear a brief description of physical data storage and replication capabilities associated with Windows Azure Storage. | Windows Azure Platform Security Essentials for Technical Decision Makers Get answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. Included in the discussion are the security controls that Azure has in place to help protect the customer applications and data, an architecture overview of each of the Windows Azure Storage components (blobs, tables, queues and drives), SQL Azure and SQL Azure security (including similarities and differences to the on-premises installation of SQL Server), and details on how Microsoft secures its datacenters. | | | | | | | ADDITIONAL SECURITY RESOURCES
| | | |