Tuesday, October 25, 2011

Microsoft Security Newsletter – October 2011


NOTE FROM THE EDITOR

Tim Rains
Welcome to October's Security Newsletter!

The latest volume of the Microsoft Security Intelligence Report (SIR) (volume 11) is now available. The report offers a large collection of data and insights on the threat landscape, most of which are dedicated to providing deep dive data on the threat landscape in more than 100 countries and regions around the world.

New in this edition of the SIR are contributions from Microsoft Technical Fellow Mark Russinovich on advanced malware cleaning techniques for IT professionals. This section of the report will help you understand how malware operates, and offers a rudimentary roadmap for cleaning infected computers manually for those IT professionals looking to learn this art.

In terms of new malware infection data, newer operating systems and service packs continue to have lower malware infection rates than older software:




October 2011 Edition

IN THIS ISSUE

Top Stories
Security Guidance
Community/MVP Update
Cloud Security Corner
This Month's Security Bulletins
Microsoft Product Lifecycle Information
Security Events and Training
Upcoming Security Webcasts

SECURITY PROGRAM GUIDE

Microsoft SDL - Developer Starter Kit
Security Awareness Materials
Learn Security On the Job
Infection rate trends for currently and recently supported 32-bit versions of Windows XP, Windows Vista, and Windows 7, first quarter of 2010 – second quarter 2011

Important Note: If you are still running Windows XP Service Pack 2 (SP2), or know someone that is, it's time to install Windows XP Service Pack 3 (SP3). Support for Windows XP Service Pack 2 ended on July 13, 2010, which means that security updates are no longer being offered for this platform.


The data shown above represents just one of the more than 600 pages of data and insights in SIRv11. If you need to understand the strategies and tactics that criminals are using to try to take advantage of you and your organization, download the report, watch related videos, and browse key findings online by visiting www.microsoft.com/sir today. In addition, in the weeks to come, I will be providing deeper analysis of many parts of the Microsoft Security Intelligence Report in the official Microsoft Security Blog.

One of the topics enterprise customers ask me about frequently is BitLocker administration. Organizations around the world use BitLocker Drive Encryption and BitLocker To Go to protect data on Windows 7 PCs and portable storage devices, but managing drive encryption on a large-scale can be challenging. To make large-scale BitLocker implementations easier to manage, you can use Microsoft BitLocker Administration and Monitoring (MBAM). Part of the Microsoft Desktop Optimization Pack (MDOP), MBAB simplifies deployment and key recovery, centralizing provisioning, monitoring, and reporting of the encryption status of fixed and removable drives, thus minimizing support costs. You can download the MBAM evaluation guide and other technical documentation from the Microsoft Download Center, and find videos including a deployment and architecture overview on the MDOP Videos page.

To learn more about other security technologies and best practices to help you manage today's evolving workplace in the Security Guidance section below.

Best regards,
Tim Rains, Director, Product Management, Microsoft Trustworthy Computing

Follow the Microsoft Security Response team on Twitter @MSFTSecResponse for the latest information on the threat landscape.


Security Intelligence Report v11 Now Available
Explore this collection of data from Internet services and over 600 million computers worldwide for the latest information and trends on today's threat landscape. Volume 11 of the SIR offers an analysis of the global impact of exploits, vulnerabilities, and malware; detailed telemetry by country/region; and a special article on Zeroing In on Malware Propagation Methods.

Mobile Threats on the Desktop: An Update from the Microsoft Malware Protection Center
The Microsoft Malware Protection Center (MMPC) routinely monitors threats (via the desktop) that affect different mobile platforms. One of the increasingly common ways mobile devices are being compromised is related to allowing users to download and install applications independently. Explore this trend in more detail by reading this MMPC Blog post.

Microsoft Technologies for Consumerization
Explore the technologies that can help you embrace the latest trends in consumerization while maintaining control over your IT environment. Learn more with answers to frequently asked questions and a video deep dive into Microsoft's strategy around slate devices, technical differentiators for Windows slate devices, and the technologies available to help support non-Windows slate devices.

Consumerization of IT and Sophistication of Attacks
Watch this video for information on how cybercriminals use marketing-like tactics to target consumers, how that can impact your organization, and guidance on how to stay protected.

The Future of Client Security and Management
Get insight into how products like System Center Configuration Manager 2012 can help address the challenges associated with managing various devices like iPads, iPhones, Android phones, Windows Phones, slates from a single console. This video from TechNet Edge also discusses user-centric versus computer- or device- centric management, and options for managing the physical and the virtual in a single console with Microsoft Virtual Desktop Infrastructure (VDI) and Microsoft Application Virtualization (App-V) integration.

Deploying Private Desktops
Learn how to deploy a full VDI infrastructure featuring both Microsoft and Citrix. View related step-by-step videos from the VDI Day series on how to deploy and manage private or pooled desktops, how to address shared and private storage for desktops, and the different application delivery models including streamed, hosted, and locally installed.

Microsoft System Center Checklist for Mobile Device Management
Explore the steps required to support mobile device management on Configuration Manager—and the resources available to help you complete each step.

Understanding Client Access Security in Microsoft Exchange
Security is an important aspect of any Exchange Server 2010 installation. By default, all Exchange 2010 protocols are automatically configured for Secure Sockets Layer (SSL) connectivity. Explore these resources to better understand the variety of security settings you can configure for the Microsoft Office Outlook Web App, Exchange ActiveSync (EAS), Outlook Anywhere, and POP3 and IMAP4.

BitLocker Drive Encryption for Windows: Step by Step
Learn how to use BitLocker technologies to encrypt all data stored on the Windows operating system volume and configured data volumes with answers to frequently asked questions, step-by-step guides on design and deployment, best practices, and much more.

Windows Phone 7.5 Enterprise Security and Policy Management Guide
Explore data and malware protection considerations, and get security and policy management information for EAS security–related policies that can be managed by IT departments

Web Service Security for Windows Phone
Windows Phone applications have the ability to exchange data with computers all over the world, but the more valuable the data is, the more important it is to make sure that your application requests and receives data using security procedures that reflect the value of that data. This article describes several different ways to help secure Windows Phone applications when they make calls to web services.

How to Encrypt Data in a Windows Phone Application
Learn how to encrypt and decrypt confidential data such as passwords, connection strings, and PINs in a Windows Phone application by using the Data Protection API (DPAPI).

WebBrowser Control Security Best Practices for Windows Phone
When you are developing an application that uses the WebBrowser control, consider these best practices and information regarding security.


Managing Mobile Devices with System Center
Everyone has a smartphone, laptop and tablet these days, so having a solid strategy for secure device management is essential. Read this article to learn more about the System Center management tools that can help you manage devices then get guidance on key considerations when building a mobile device management security strategy.


Microsoft Forefront: Secure Access to Your Cloud Services
Find out how you can provide secure access to cloud services while maintaining business continuity using Forefront Threat Management Gateway 2010.

Critical:
• MS11-078: Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2604930)
• MS11-081: Cumulative Security Update for Internet Explorer (2586448)

Important:
• MS11-075: Vulnerability in Microsoft Active Accessibility Could Allow Remote Code Execution (2623699)
• MS11-076: Vulnerability in Windows Media Center Could Allow Remote Code Execution (2604926)
• MS11-077: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2567053)
• MS11-079: Vulnerabilities in Microsoft Forefront Unified Access Gateway Could Cause Remote Code Execution (2544641)
• MS11-080: Vulnerability in Ancillary Function Driver Could Allow Elevation of Privilege (2592799)
• MS11-082: Vulnerabilities in Host Integration Server Could Allow Denial of Service (2607670)

Security Bulletin Overview for October 2011
SECURITY BLOGS

Trustworthy Computing Security/Privacy Blogs RSS
Microsoft Security Blog RSS
Michael Howard RSS
Eric Lippert RSS
Eric Fitzgerald RSS
MSRC Blog RSS
ACE Team RSS
Windows Security RSS
Forefront Team RSS
Solution Accelerators - Security & Compliance RSS
Security Vulnerability Research & Defense RSS
Security Development Lifecycle (SDL) RSS
UPCOMING CHATS

View a listing of upcoming technical chats
COMMUNITY WEBSITES

IT Pro Security Community
ADDITIONAL SECURITY RESOURCES

Security Help and Support for IT Professionals
TechNet Troubleshooting and Support Page
Microsoft Security Glossary
TechNet Security Center
MSDN Security Developer Center
Sign-Up for the Microsoft Security Notification Service
Security Bulletin Search Page
Microsoft Security Center
Home Users: Protect Your PC
MCSE/MCSA: Security Certifications
Subscribe to TechNet
Register for TechNet Flash IT Newsletter

Windows XP End of Support: April 8, 2014
On April 8, 2014, security patches and hotfixes for all versions of Windows XP will no longer be available. This means that, after this date, PCs running Windows XP will be vulnerable to security threats. In addition, many third party software providers are not planning to extend support for their applications running on Windows XP, which translates to even more complexity, risk, and ultimately, added management cost for your IT department if you are still managing Windows XP environments. Explore your options with this blog post from the Springboard Series and download the Windows XP End Of Support Countdown Gadget to help remind you about this important milestone.

Find information about your particular products on the Microsoft Product Lifecycle Web site.

New Cloud-Focused Episodes from the Security Talk Series: From End to Edge and Beyond

Join hosts Yuri Diogenes and Tom Shinder for new insights into the latest trends in computer and network security, and get valuable tips and guidance from Microsoft and industry experts:

New episodes of this Security Talk series will be airing monthly; visit the series' blog to stay informed.

For Decision Makers and IT Professionals
For IT Professionals

This is a monthly newsletter for IT professionals and developers—bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.

© 2011 Microsoft Corporation. All rights reserved. Microsoft, MSDN, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Microsoft respects your privacy. To learn more please read our online Privacy Statement.

If you would prefer to no longer receive this newsletter, please click here.
To set your contact preferences for other Microsoft communications click here.

Microsoft Corporation
One Microsoft Way
Redmond, WA 98052 USA



2011 Microsoft Corporation Sign up for this newsletter | Update your profile | Terms of Use | Trademarks

Your cOmment"s Here! Hover Your cUrsOr to leave a cOmment.


Subscribe to: Post Comments (Atom)