| Infection rate trends for currently and recently supported 32-bit versions of Windows XP, Windows Vista, and Windows 7, first quarter of 2010 – second quarter 2011
Important Note: If you are still running Windows XP Service Pack 2 (SP2), or know someone that is, it's time to install Windows XP Service Pack 3 (SP3). Support for Windows XP Service Pack 2 ended on July 13, 2010, which means that security updates are no longer being offered for this platform. |
The data shown above represents just one of the more than 600 pages of data and insights in SIRv11. If you need to understand the strategies and tactics that criminals are using to try to take advantage of you and your organization, download the report, watch related videos, and browse key findings online by visiting www.microsoft.com/sir today. In addition, in the weeks to come, I will be providing deeper analysis of many parts of the Microsoft Security Intelligence Report in the official Microsoft Security Blog.
One of the topics enterprise customers ask me about frequently is BitLocker administration. Organizations around the world use BitLocker Drive Encryption and BitLocker To Go to protect data on Windows 7 PCs and portable storage devices, but managing drive encryption on a large-scale can be challenging. To make large-scale BitLocker implementations easier to manage, you can use Microsoft BitLocker Administration and Monitoring (MBAM). Part of the Microsoft Desktop Optimization Pack (MDOP), MBAB simplifies deployment and key recovery, centralizing provisioning, monitoring, and reporting of the encryption status of fixed and removable drives, thus minimizing support costs. You can download the MBAM evaluation guide and other technical documentation from the Microsoft Download Center, and find videos including a deployment and architecture overview on the MDOP Videos page.
To learn more about other security technologies and best practices to help you manage today's evolving workplace in the Security Guidance section below.
Best regards, Tim Rains, Director, Product Management, Microsoft Trustworthy Computing
Follow the Microsoft Security Response team on Twitter @MSFTSecResponse for the latest information on the threat landscape.
| | Microsoft Technologies for Consumerization Explore the technologies that can help you embrace the latest trends in consumerization while maintaining control over your IT environment. Learn more with answers to frequently asked questions and a video deep dive into Microsoft's strategy around slate devices, technical differentiators for Windows slate devices, and the technologies available to help support non-Windows slate devices.
| Consumerization of IT and Sophistication of Attacks Watch this video for information on how cybercriminals use marketing-like tactics to target consumers, how that can impact your organization, and guidance on how to stay protected.
| The Future of Client Security and Management Get insight into how products like System Center Configuration Manager 2012 can help address the challenges associated with managing various devices like iPads, iPhones, Android phones, Windows Phones, slates from a single console. This video from TechNet Edge also discusses user-centric versus computer- or device- centric management, and options for managing the physical and the virtual in a single console with Microsoft Virtual Desktop Infrastructure (VDI) and Microsoft Application Virtualization (App-V) integration.
| Deploying Private Desktops Learn how to deploy a full VDI infrastructure featuring both Microsoft and Citrix. View related step-by-step videos from the VDI Day series on how to deploy and manage private or pooled desktops, how to address shared and private storage for desktops, and the different application delivery models including streamed, hosted, and locally installed.
| Microsoft System Center Checklist for Mobile Device Management Explore the steps required to support mobile device management on Configuration Manager—and the resources available to help you complete each step.
| Understanding Client Access Security in Microsoft Exchange Security is an important aspect of any Exchange Server 2010 installation. By default, all Exchange 2010 protocols are automatically configured for Secure Sockets Layer (SSL) connectivity. Explore these resources to better understand the variety of security settings you can configure for the Microsoft Office Outlook Web App, Exchange ActiveSync (EAS), Outlook Anywhere, and POP3 and IMAP4.
| BitLocker Drive Encryption for Windows: Step by Step Learn how to use BitLocker technologies to encrypt all data stored on the Windows operating system volume and configured data volumes with answers to frequently asked questions, step-by-step guides on design and deployment, best practices, and much more.
| Windows Phone 7.5 Enterprise Security and Policy Management Guide Explore data and malware protection considerations, and get security and policy management information for EAS security–related policies that can be managed by IT departments
| Web Service Security for Windows Phone Windows Phone applications have the ability to exchange data with computers all over the world, but the more valuable the data is, the more important it is to make sure that your application requests and receives data using security procedures that reflect the value of that data. This article describes several different ways to help secure Windows Phone applications when they make calls to web services.
| How to Encrypt Data in a Windows Phone Application Learn how to encrypt and decrypt confidential data such as passwords, connection strings, and PINs in a Windows Phone application by using the Data Protection API (DPAPI).
| WebBrowser Control Security Best Practices for Windows Phone When you are developing an application that uses the WebBrowser control, consider these best practices and information regarding security.
| | | | | | | | | ADDITIONAL SECURITY RESOURCES
| | | |