Nefarious spam

We’ve all seen phishing expeditions; however I have to admit that the following example has to be one of the cleverest I’ve seen so far, or a total fluke.   Traditionally you would expect a plea from a company explaining that your account or username has been compromised, and your urgent attention is required to…

0

Beta Available for the Data Encryption Toolkit and EFS Assistant

The Solution Accelerators for Security and Compliance (SA-SC) team is currently developing the Data Encryption Toolkit for Mobile PCs (DET). The Toolkit is a collection of guidance and tools designed to help you address specific data security risks that are related to laptop computers. By implementing the guidance and tools provided in the Toolkit, you…

1

Contribute to the Longhorn Server Security Guide! Join the Review Team!

The Microsoft Solution Accelerators Team is building guidance and an automation tool for the Longhorn Server Security Guide. The guidance focuses on how to help create and maintain a secure environment for servers running the Microsoft® Windows Server® Code Name “Longhorn” operating system, the next major release of Windows Server®. The guide will explain the…

1

Data Encryption Toolkit for Mobile PCs Executive Overview Released

The Solution Accelerators for Security and Compliance team is pleased to announce the release of the Executive Overview for our newest Solution Accelerator, the Data Encryption Toolkit for Mobile PCs. A free Solution Accelerator from Microsoft, the Data Encryption Toolkit for Mobile PCs provides tested guidance and powerful tools to help you protect your organization’s most vulnerable…

1

2007 Microsoft Office Security Guide – make sure your voice is heard!

The 2007 Microsoft Office Security Guide will provide instructions and recommendations about how to help strengthen the security of the 2007 Microsoft Office system on Windows Vista™ or Windows XP SP2 desktops and laptops. We are conducting a requirements survey for this Solution Accelerator and we need your input! This is your chance to help shape…

1

Vista Security Guide: Audio and SSLF configuration

The SSLF configuration currently prescribed in the guide contains a setting recommendation that prevents the Windows Audio service from starting correctly. The Windows Audio service manages audio for Windows programs. If this service is stopped, audio devices do not function properly. To ensure this service starts correctly on SSLF computers, the Increase a process working…

1

Data Encryption Toolkit for Mobile PCs Security Analysis Beta Released

The Data Encryption Toolkit for Mobile PCs project team has released a beta for one of the documents that is part of the solution.  The Security Analysis discusses the risks to data presented by laptop computers, and reviews the various technologies that Microsoft provides for protecting data on mobile clients.  The Security Analysis is targeted at IT…

0

Fundamental Computer Investigation Guide for Windows Now Available!

Microsoft is pleased to announce the Fundamental Computer Investigation Guide for Windows, which is now available for downloading. Best Practices and Tools for Computer Investigations If you’re like many of our customers, you’re facing a growing problem of illegal or improper activity on your organization’s computers and networks.  When investigating this activity, you may not…

3