Tools 2 Use - Security Post Mortem

Did you know TechNet has a magazine?

Check out this article for good advice on the first thing you should do after you've dealt with an IT security incident. https://www.microsoft.com/technet/technetmag/issues/2005/01/IncidentResponse/default.aspx

For some more process advice from the IT security group inside Microsoft see:

Incident Response: Managing Security at Microsoft Microsoft IT has developed a preventative approach to managing computer vulnerabilities. Designed to reduce the occurrences and severity of attacks, Microsoft IT's security methodology includes the development of processes to reduce open ports and vulnerable systems and services, manage user permissions, regularly assess risks, and regularly monitor compliance with security guidelines. Downloads (Technical White Paper, Technical White Paper Presentation)

IT Security at Microsoft Overview Designed to reduce the occurrences and severity of attacks, Microsoft IT's security methodology includes the development of processes to reduce open ports and vulnerable systems and services, manage user permissions, regularly assess risks, and regularly monitor compliance with security guidelines. Downloads (Technical White Paper, Technical White Paper Presentation)

Microsoft IT Attack and Penetration Testing Team This discussion gives some best practice advice and lessons learned from the Microsoft IT experience building and operating an internal attack and penetration testing team. Downloads (Technical White Paper, Technical White Paper Presentation)