Best regards, Tim Rains, Director, Product Management, Microsoft Trustworthy Computing
Follow the Microsoft Security Response team on Twitter @MSFTSecResponse for the latest information on the threat landscape.
| | End of Support for Office XP On July 12, 2011, Office XP exited the Extended Support phase of its lifecycle. This means that Microsoft will no longer provide public fixes for the Office XP release and that the Automatic Updates that ship on "Update Tuesday" have been discontinued for Office XP. Learn about the full impact of this milestone and find out how to keep your systems secure moving forward. | End of Support for Windows Vista Service Pack 1 Windows Vista Service Pack 1 also reached the end of support on July 12, 2011. As unsupported versions of Windows and Windows service packs will no longer receive software updates from Microsoft, you will need to upgrade your users to Service Pack 2 (SP2) for Windows Server 2008 and Windows Vista or Windows 7 to stay secure and continue support. | Battling the Rustock Threat Learn about the Win32/Rustock family of rootkit-enabled backdoor Trojans including background on Win32/Rustock, its functionality, how it works, and threat telemetry data and analysis from calendar year 2010 through May 2011. In addition, this document details the legal and technical action used to takedown the Rustock botnet and how to detect and remove the threat using Microsoft antimalware products. | | | | | | Security Tip of the Month: Security Best Practices for Microsoft Office 2010 Applications Get a quick list of the resources that can best help you understand Office 2010 security capabilities and security best practices for deploying and maintaining Office 2010 in your environment.
| Security in Office 365 Office 365 is a suite of Internet-based services that are designed to help meet your needs for robust security, 24/7 reliability, and user productivity. Start with an overview of the security practices and technologies that support enterprise-grade security in Office 365 for businesses of all sizes then delve into a more comprehensive and detailed treatment of security in Office 365 with Office 365 for Enterprise Service Descriptions.
| Security Threats and Countermeasures for Office 2010 Gain a better understanding of which security risks and threats are relevant to Office 2010, and learn about the default countermeasures in Office 2010.
| Plan Security for Office 2010 New security controls are available in Office 2010 to help you plan a robust defense against threats while maintaining information worker productivity. Familiarize yourself with the security controls for Trusted Locations, privacy, VBA macros, ActiveX, Trusted Publishers, junk email, and more with this set of security planning guidance.
| Configure Security Settings for Office 2010 Learn how to use the Office Customization Tool (OCT) and Group Policy to configure security settings in Office 2010. | Office 2010 Security Baseline Explore Microsoft's recommended security configuration settings for Office 2010 with the Microsoft Office 2010 Security Baseline. Part of the Microsoft Security Compliance Manager (SCM) tool, the Office 2010 Security Baseline package includes the Office 2010 Security Guide and an Office 2010 Settings Pack.
| | | | | | This Month's Spotlight: SQL Azure and Cloud Database Security SQL Azure Security Overview – Learn about the two types of access control in SQL Azure: SQL Authentication and a server-side firewall that restricts access by IP address. Securing SQL Azure – Explore the various features and techniques available to help you secure your SQL Azure installation—including methods of access control, authentication, and encryption—with this article from the July 2011 edition of TechNet Magazine. Security Guidelines for SQL Azure – Get guidelines to help you securely connect to SQL Azure databases and build secure applications on SQL Azure. How Do I: Configure SQL Azure Security? – Watch this demonstration to learn how to create logins, databases, and users in SQL Azure. The views sys.sql_logins and sys.databases which allow the display of logins and databases from the master database are also discussed. | | | | | |