• | Another excellent resource is the TechNet Windows Client Networking Zone. Here you'll find technical content ranging from 100-level to 400-level resources including step-by-step guides for deployment, troubleshooting, and other tasks. |
Best regards, Tim Rains, Director, Product Management, Microsoft Trustworthy Computing
Follow the Microsoft Security Response team on Twitter @MSFTSecResponse for the latest information on the threat landscape.
| | BlueHat Prize - New $260,000 Contest The inaugural Microsoft BlueHat Prize contest challenges security researchers to design a novel runtime mitigation technology designed to prevent the exploitation of memory safety vulnerabilities. The solution considered to be the most innovative by the Microsoft BlueHat Prize board will be presented the grand prize of US $200,000, with $50,000 going to the runner up and a $10,000 MSDN Universal subscription for third place. | How Win32/FakeSysdef Corrupts Your Computer Watch a short demonstration of how the Win32/FakeSysdef Trojan infects an unprotected computer, and find out how to remove the Trojan with Microsoft's Safety Scanner. | | | | | | Security Tip of the Month: IPv6 Security Considerations and Recommendations IPv6 provides many benefits over Internet Protocol version 4 (IPv4). However, before deploying IPv6 you should be aware of additional security considerations. This article describes each of these security considerations in detail and provides Microsoft recommendations and best practices for mitigating the potential risks associated with IPv6 traffic. Find more helpful resources with the IPv6 Survival Guide.
| DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies Learn about IPv6 addressing, host configuration, and transitioning technologies including 6to4, Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), Teredo, and IP over HTTPS (IPHTTPS). Through a series of demos, you will learn how to build an IPv6 network and interoperate with IPv4 networks and hosts. Unfamiliar with DirectAccess? Start with the technical overviews and test lab guides here.
| DirectAccess Technical Drilldown, Part 2 of 2: Putting It All Together Dive deep into IPSec and components that are only available with Windows 7 and Windows Server 2008 R2 to build the DirectAccess infrastructure. Learn how to control access to corporate resources and manage Internet connected PCs through group policy. (Note: Part 1 is highly recommended as a prerequisite for Part 2.)
| Dynamic Host Configuration Protocol Technical Reference The DHCP is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a Transmission Control Protocol/Internet Protocol (TCP/IP)-based network, such as a private intranet. Learn how to configure, deploy, and use DHCP in your environment—or get step-by-step guides to help you try out DHCP on Windows Server 2008 R2 in a test lab.
| Using Certificates for IPsec Authentication Learn how to use certificates to provide authentication for your IPsec connections. This demonstration modifies an authenticated and encrypted Telnet connection to use certificates for the authentication method instead of the Kerberos default.
| Remote Access VPN Test Lab Extension: Adding IPv6 Connectivity Learn how to configure IPv6 connectivity for the Corpnet subnet and for remote access VPN clients.
| Netsh Technical Reference Network shell (netsh) is a command-line utility that allows you to configure and display the status of various network communications server roles and components after they are installed on computers running Windows 7, Windows Server 2008 R2, Windows Vista, or Windows Server 2008. Also available as a download, this exhaustive reference includes information on Routing and Remote Access (RRAS), DHCP, IPv6, and much more.
| | | | | | TechNet Wiki Spotlight: Why Split Tunneling is Not a Security Issue with DirectAccess When split tunneling is disabled, the VPN client uses the VPN gateway as its default gateway, so that all off subnet communications must go through the VPN gateway. It also prevents the VPN clients from potentially routing communications between two networks, such as the client's network and the corporate network. For this reason, most experienced VPN admins disable split tunneling by default. However, what they gain in security is lost in performance for the corporate Internet connection. Learn why split tunneling is enabled by default in DirectAccess then explore the pros and cons of Split Tunneling Versus Force Tunneling for DirectAccess Clients.
| | | | | | Security in Office 365 Moving productivity services to the cloud requires a serious consideration of security and privacy issues and technologies. Office 365 is designed to deliver the enterprise-grade security you require to move to the cloud with confidence. Learn more about the security practices and technology that support enterprise-grade security in Microsoft Office 365 for businesses of all sizes. | | | | | |