| | | Security Tip of the Month: Forefront Unified Access Gateway (UAG) Deployment Checklist Get a quick list to help you plan your Forefront Unified Access Gateway (UAG) deployment. This article lists the tasks you should do to install and deploy Forefront UAG successfully—and provides links to where you can find step-by-step instructions and planning considerations for each task.
| Understanding Security for Outlook Anywhere There are several methods available to help secure Outlook Anywhere (formerly known as RPC over HTTP). This article provides a quick overview of advanced firewall server, Secure Sockets Layer (SSL), and authentication solutions, and includes links to step-by-step guidance for each option.
| Active Directory Federation Services (AD FS) 2.0 Step-by-Step and How To Guides Walk through the process of setting up a small test lab environment that you can use to evaluate the next generation of Microsoft federated identity technologies including AD FS 2.0. Don't have AD FS 2.0? Download it here.
| Single Sign-On (SSO) from Active Directory to a Windows Azure Application Find step-by-step instructions for using Windows Identity Foundation, Windows Azure, and Active Directory Federation Services (AD FS) 2.0 for achieving SSO across web applications that are deployed both on premises and in the cloud.
| Microsoft Forefront Identity Manager (FIM) 2010 Capacity Planning Guide Explore the ways in which topology, hardware, policy configuration, scale, and load can affect the overall capacity and performance of your FIM 2010 deployment.
| Cross-Forest Management Deployment Guide for FIM 2010 Find instructions for planning and implementing a cross-forest management solution in an enterprise environment using FIM 2010.
| Windows Server 2008 R2 Remote Desktop Services Resource Kit In-depth and comprehensive, this official Microsoft Resource Kit delivers the information you need to plan, deploy, and administer Remote Desktop Services in Windows Server 2008 R2. You get authoritative technical guidance from those who know the technology best—leading industry experts and members of the Microsoft Desktop Virtualization Team. Looking for online guidance? Visit the TechNet Library.
| Getting Started with Microsoft Security Compliance Manager (SCM) Getting Started with Microsoft Security Compliance Manager (SCM) | | | | | | | | Security MVP of the Month: Dana Epp Dana Epp, Scorpion Software Corp's founder and CEO, researches software security and sets the vision in the convergence of information security principles and practices with digital information asset protection for small business. As a computer security software architect, Mr. Epp has spent the last 15 years focusing on computer programming with a particular emphasis on security engineering to offer a safer computing environment for business. His latest research has been on risk-based authentication, focusing on strong two-factor authentication for small business.
| The Napkin Sketch: An Overview of Secure Anywhere Access with Remote Desktop Services By Dana Epp, Microsoft MVP - Enterprise and Developer Security Explore the evolution of Terminal Services, now called Remote Desktop Services, and learn how to use this framework to help provide secure anywhere access to applications, remote desktops, and virtual desktop environments. | | | | | | Applying Microsoft SDL Implementation Practices within Windows Azure Explore how the Implementation phase of the Microsoft SDL applies to building Windows Azure applications. In this video, we define both the similarities and key differences between implementation of on-premises solutions and Windows Azure-based applications. We then dive into specific tools that can be of use to secure implementation of applications on Windows Azure, including Checkmarx, Coverity and Veracode. The conversation then moves to properly implementing defenses against usual web threats (SQL injection, XSS, authentication, etc.) in the Windows Azure web applications. | Applying Microsoft SDL Release Practices within Windows Azure Learn how to apply the Microsoft SDL release phase practices to applications built on top of Windows Azure. Find out how the Microsoft SDL can apply to any cloud-based deployment with similar steps to those used for a typical on-premises application (File an Incident Response Plan, Perform a Final Security Review and Release Archive). Because Windows Azure makes it so simple to deploy applications, this video emphasizes the importance of reviewing the deployment and securing deployment-related artifacts such as management accounts, access to Service Management API and SSL certificates used by applications. | | | | | | | ADDITIONAL SECURITY RESOURCES
| | | |