HIPAA or PCI or FISMA Baseline? (FAQ)

A teammate of mine posted a FAQ this week about the GRC space and how it intersects with Microsoft Baselines. Check it out! http://social.technet.microsoft.com/wiki/contents/articles/grc-baselines-made-easy.aspx   -jeff PS – for those of you wanting the SCM v2 Beta, I’ve got great news. Just a little bit longer and we will have something for you. Hang in there,…

0

Now available: System Center Configuration Manager Extensions for SCAP Beta

If your organization is affected by the Federal Desktop Core Configuration (FDCC) mandate, and the Security Content Automation Protocol (SCAP), then this new Beta program will be of interest to you. The FDCC mandate from the Office of Management and Budget (OMB) requires federal agencies and organizations to configure their computers running Windows Vista® and…

1

Integrate AccessChk.exe with DCM Scripts

The DCM feature supports a powerful way for data discovery by using scripting. By invoking AccessChk.exe from DCM scripts, the output of user rights assignment data from AccessChk.exe can be collected by the DCM scripting data discovery provider. The following procedure enables you to use Microsoft Visual Basic Scripting Edition (VBScript) in combination with the…

1

How to Use AccessChk.exe for Security Compliance Management

In this article we invite Michael Tan, one of our senior program mangers, to introduce a new feature in the recently updated Sysinternals tool called AccessChk. His two part article looks at how the new AccessChk feature works and the benefits of using this Sysinternals tool. The second part takes a look at the using…

6

Partner adopts Security Compliance Management toolkit

  I wanted to thank Securevantange in making the Security Compliance Management toolkit a success in their world.     Our customers and partners are all very pleased with the new baselines provided in the Security Compliance Management toolkit for DCM along with the ease of customization supported via Config Pack design and guidance. This…

1

Configuration Drift

    In my last blog I introduced a new Solution Accelerator called the Security Compliance Management toolkit. Today I’d like to help you learn more about this new Accelerator, but in a somewhat indirect way—by discussing a problem space known as configuration drift.   Probably the simplest way to understand configuration drift is to…

2