|
| | Patch Management on Business-Critical Servers By Dan Griffin, Microsoft MVP - Enterprise Security and Tom Jones, Software Architect, JW Secure Software system security has come to depend on customer information technology (IT) organizations closely monitoring patches for vulnerabilities, and on the ability of those organizations to test and deploy the patches before they can be exploited. Discover best practices that can help you better manage and deploy patches, avoid downtime, and extend operating time without reboots.
| Microsoft Security Update Guide, Second Edition Designed to help IT professionals manage organizational risk and develop a repeatable, effective deployment mechanism for security updates, the Microsoft Security Update Guide offers a convenient glossary of terms, an overview of the Microsoft Security Bulletin process, and a stage-by-stage review of Microsoft Security Updates This second edition includes additional content describing how Microsoft tests security updates before they are released, revised advice and guidance on testing updates in your own environment, and an expanded and updated resources section.
| Getting Started with Microsoft Security Compliance Manager (SCM) Security Compliance Manager is a free tool from the Microsoft that enables you to quickly configure and manage your desktops, traditional datacenters, and private cloud using Group Policy and System Center Configuration Manager. Download SCM and learn how to use it today with helpful resources like our technical overview, answers to frequently asked questions, and baseline download help.
| Virtual Machine Servicing Tool (VMST) 3.0 Familiarize yourself with this free downloadable tool that can help you reduce IT costs by making it easier to update offline virtual machines, templates, and virtual hard disks with the latest operating system and application patches--without introducing vulnerabilities into your IT infrastructure.
| Windows Server Update Services (WSUS) Troubleshooting Survival Guide While troubleshooting a technology such as WSUS, you need to identify where the issue is located (client or server) in order to correctly collect and analyze the data you need to properly troubleshoot an issue. This TechNet Wiki article offers a troubleshooting framework for WSUS and a place for you to share your own troubleshooting scenarios and techniques for WSUS with the community.
| Secure Credential Storage What's the most secure way to store a secret? Read this Microsoft Security Development Lifecycle (SDL) blog post for the answer. | | | | | | Ten Years of Trustworthy Computing at Microsoft By Raffaele Rialdi, Microsoft MVP - Developer Security Increased awareness of the importance of application security over the last ten years has led to an incredible number of Microsoft initiatives for developers--all of which are aimed at making it easier to implement security best practices. Explore one developer's insights on which initiatives have had the biggest impact on the Microsoft developer community.
| The Evolution of Elevation: Threat Modeling in a Microsoft World By Dana Epp, Microsoft MVP - Enterprise and Developer Security The concept of threat modeling is not new—you can't design a secure system until you understand the threats to it, and what weaknesses an adversary might exploit in the system. Check out one IT professional's take on threat modeling in a Microsoft world.
| | | | | | Windows Intune Technology Tune-Up Sometimes enterprise-level security solutions can be too costly or complex for a small or midsize business to adopt. Windows Intune is a cloud service that helps you centrally manage and better secure your PCs through a simple web-based console. In this video, you'll hear from Microsoft Technical Fellow Mark Russinovich and a panel of IT professionals and cloud experts as they discuss best practices in PC management, the challenges of protecting and supporting remote users, and real life experience with Windows Intune. Want to learn more? Visit the Windows Intune Resource Zone on TechNet. | | | | | | Cloud Fundamentals: Cloud Transparency as an Element of Trust Get insight on cloud transparency as an element of trust from Mark Estberg, Senior Director of Microsoft Global Foundation Services and Tim Rains, Director of Product Management for Microsoft Trustworthy Computing. Learn even more—watch part two of this two-part video. | Cloud Fundamentals: Cloud Computing and Business Agility There is a lot of discussion in the industry right now about the potential cost savings for organizations that leverage of cloud computing. In this video, John Howie, who helps to manage the security for Microsoft's cloud services, discusses another potential benefit of leveraging cloud computing: increased business agility. | Cloud Fundamentals: Cloud Computing Requires Transparency When information technology departments evaluate potential uses of cloud computing for their organization, many of them quickly realize they no longer have the near omniscient visibility into the operations environment they have when hosting those same workloads inside their own premises. In this video, Mark Estberg, Senior Director in Microsoft's Global Foundation Services, describes the need for partnership between customers and cloud service providers. | | | | | | Critical: Important: Security Bulletin Overview for January 2012 | | | | | | | | | ADDITIONAL SECURITY RESOURCES
| | | |