IE Win XP SP2 guidance

This paper came out recently and examines the state of Web browser security and the correlation between a browser’s vulnerability and its advanced functionality. http://www.microsoft.com/downloads/details.aspx?FamilyId=E550F940-37A0-4541-B5E2-704AB386C3ED&displaylang=en  A few interesting sections with their page numbers: Security Versus Functionality 5Default Settings & Patches 6 Browser Attacks: How They Work 8Embedding Malicious Code in Web Pages and Sites 8URL Spoofing 8 Internet Explorer Service…

0

Wireless Security and Defending Shared Computer Webcasts

A couple of webcasts done in June 2005: “Wireless Security using PEAP and Passwords or Digital Certificates”https://www.livemeeting.com/cc/lmevents/view?id=msft062805st&pw=D654WT Recording On: Tuesday, Jun 28, 2005 8:05 AM (PDT) Duration : 0:56 “Defend Public Computers with the Shared Computer Toolkit”https://www118.livemeeting.com/cc/lmevents/view?id=msft062905st6pm&pw=WTD654 Recording On: Wednesday, Jun 29, 2005 6:02 PM (PDT) Duration : 1:04

0

Headache Alert: Managing Shared Computers

Here’s an answer for those folk that have to manage PCs that are used in public locations and/or PCs with multiple user accounts. Microsoft Shared Computer Toolkit for Windows XP. http://www.microsoft.com/sharedaccess. Shared computers are found in schools, libraries, Internet and gaming cafés, community centers, and other locations. Often, non-technical personnel are asked to manage shared…

0

June 2005 Password Management and Identity Management

Microsoft Identity and Access Management Series This series of papers provides numerous identity and access management concepts, techniques, and solutions. It has been updated to describe several password management approaches including password policies, as well as enabling password reset, password change, and password synchronization to multiple authentication stores using Microsoft® Identity Integration Server 2003, Enterprise…

0

June 2005 Planning Guides

The Services and Service Accounts Security Planning Guide This guide addresses the common problem of Windows services that are set to run with highest possible privileges, which an attacker could compromise to gain full and unrestricted access to the computer or domain, or even to the entire forest. http://go.microsoft.com/fwlink/?LinkId=41311   The Security Monitoring and Attack Detection…

0

About the MSSC Team

The Microsoft Solutions for Security & Compliance (MSSC) team is responsible for creating cross-product prescriptive guidance solutions for the IT professional. The team is always interested on hearing from IT teams on what cross-product guidance they need as well as comments/edits on the guidance currently available. All the best, and hope to chat soon. MSSC…

0

May 2005 Security 360 Webcast on Identity Management

This Webcast talked a lot about identity management and included a checklist at: http://www.microsoft.com/events/series/security360may05list.mspx  The Webcast can be viewed at: http://security360.savvislive.com/20050517/registration.html  Tony.

0

Network Isolation April 2005 Webcast

Thought y’all might want to see this webcast: https://www119.livemeeting.com/cc/microsoft/view?id=JH3PH2&pw=NK3C8X More info: This session discusses utilizing capability built into Windows XP and Windows Server, to implement a logical isolation strategy. This strategy can help to better protect domains, servers and desktops, from rogue machine, infections and information theft threats.The Microsoft Solutions for Security (MSS) team has…

0

Rogue Machines, Infections and Information Theft Protection

http://www.microsoft.com/technet/security/topics/architectureanddesign/ipsec/default.mspx Isolating Network Resources to Better Protect Against Rogue Machines, Infections and Information Theft ·         How does one restrict sensitive traffic to specific machines within the network? ·         What happens if a new virus or worm reaches your network and your desktops become infected? By utilizing capability built into Windows XP and Windows Server, you…

0

Here are some great how-to sites

http://www.windowsecurity.com http://www.windowsnetworking.com http://www.security-forums.com http://www.msterminalservices.org/ http://www.wxpnews.com/index.cfm  

0