March 2008 – Technical Rollup Mail – Security







 News


 


Help your customers securely deploy Windows Server 2008 with the Windows Server 2008 Security Guide! http://go.microsoft.com/fwlink/?LinkId=92550


Every day, adversaries attempt to invade your customers’ networks and access their servers—to bring them down, infect them with viruses, or steal information about customers or employees.


Your customers are looking to Microsoft and Windows Server® 2008 to help them address these threats. To assist customers in taking full advantage of the rich security features in Windows Server 2008, Microsoft has developed the Windows Server 2008 Security Guide.


The Windows Server 2008 Security Guide provides IT professionals with best practices, predefined security templates, and an automated deployment tool to help strengthen the security of servers running Windows Server 2008.


 


Supporting Your Family, Friends, and Neighbours http://go.microsoft.com/?linkid=8287993


By Steve Riley, Senior Security Strategist, Trustworthy Computing Have you become a support professional outside of the workplace? Read this article and learn how to discuss security with your family, friends, and neighbours to better help them stay safe and secure online.


 


More Security and Control for Mobile Devices http://go.microsoft.com/?linkid=8287995


Learn how to add, manage, secure, and update Windows Mobile devices like you do Windows-based laptops and PCs. Microsoft System Center Mobile Device Manager 2008 provides robust security features and a comprehensive device management solution that helps safeguard your corporate data, reduce the cost and complexity of mobile deployments, and centralize and simplify Windows Mobile device management.


 


Island Hopping: The Infectious Allure of Vendor Swag http://go.microsoft.com/?linkid=8287996


The technique of island hopping — penetrating a network through a weak link and then hopping around systems within that network — has been around for years, but it continues to take on new dimensions. This article discusses the beginning steps of using a USB flash drive to attack a network and why the least privilege approach really matters.


 


Security Quiz http://go.microsoft.com/?linkid=8287999


Know a friend or family member with a small business? Help them assess what they know and what they ought to know about protecting their businesses from security risks.


 


Help Employees Develop Better Security Habits http://go.microsoft.com/?linkid=8287997


Your biggest vulnerability is not necessarily your computers. It’s your users. See how to educate them.


 


Get a Free Trial of Forefront Security for SharePoint http://go.microsoft.com/?linkid=8250906


Find out how to help protect your Microsoft Office SharePoint Server 2007 and Windows SharePoint Services 3.0 collaboration environments with Forefront Security for SharePoint with SP1, and download free trial software.


 


Learn About Forefront Edge Security and Get Free Trial Software http://go.microsoft.com/?linkid=8250907


The Forefront edge security and access products provide enhanced network edge protection and application-centric, policy-based access to corporate IT infrastructure. Find out more by visiting the Forefront edge security Web site. http://go.microsoft.com/?linkid=8250953


 


Microsoft Security Bulletin Summary for February, 2008


http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx 


 


Search for previous security bulletins http://go.microsoft.com/?linkid=3992478 


 


Security Bulletin Feed http://go.microsoft.com/?linkid=3992479  RSS http://go.microsoft.com/?linkid=3992480


 


Documents


 


Help Friends and Family Prevent Identity Theft, Spyware, and Viruses http://go.microsoft.com/?linkid=8287998


Microsoft Security at Home provides easy-to-understand guidelines to help people protect their computers, themselves, and their families.


 


Security Quiz http://go.microsoft.com/?linkid=8287999


Know a friend or family member with a small business? Help them assess what they know and what they ought to know about protecting their businesses from security risks.


 


Virus Protection and Security Checklist http://go.microsoft.com/?linkid=8288000


Virus protection is a two-stage process. First, you need to educate your users, and then strengthen your network’s security defenses. Review this checklist to see if your employees and systems are covered.


 


Strong Passwords: How to Create and Use Them http://go.microsoft.com/?linkid=8288001


This article discusses what makes a strong password, password strategies to avoid, the importance of keeping passwords secret, and how to create a strong, memorable password in six easy steps.


 


Password Checker http://go.microsoft.com/?linkid=8288002


Use this tool to help you gauge the strength of your password.


 


Malicious Software Removal Tool http://go.microsoft.com/?linkid=8288003


The Microsoft Windows Malicious Software Removal Tool checks computers running Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software — including Blaster, Sasser, and MyDoom. It also helps remove any infection you find. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed.


 


Microsoft Baseline Security Analyzer http://go.microsoft.com/?linkid=8288004


Detect computer vulnerabilities with the Microsoft Baseline Security Analyzer, a free tool that you can download and use to scan your stand-alone or networked computers for security vulnerabilities.


 


Partner Security: Establish a Strategy to Protect Shared Data http://go.microsoft.com/?linkid=8288005


Although many companies focus on the security of their internal systems, it’s important to examine the external supply chain as well. Here’s how to work with business partners to establish a comprehensive security strategy.


 


Data Encryption Toolkit for Mobile PCs http://go.microsoft.com/?linkid=8288006


Learn how to optimize two key encryption technologies already available to you in Windows XP and Windows Vista: the Encrypting File System (EFS) and Windows BitLocker Drive Encryption.


 


Downloads


 


Microsoft Forefront Security for Exchange Server with Service Pack 1


Help protect your Exchange server from viruses and other malware.


http://www.microsoft.com/downloads/details.aspx?FamilyID=2ceb14d4-404b-4d8f-8a21-ebfc71b2e82b&DisplayLang=en


 


EHS Filtering Datasheet


This datasheet outlines the Filtering service from Exchange Hosted Services.


http://www.microsoft.com/downloads/details.aspx?FamilyID=7793ba73-50c0-4e07-9cd9-211558cbd890&DisplayLang=en


 


Microsoft Antigen 9 with SP1 Readme


The Messaging Security Suite includes Antigen for Exchange, Antigen for SMTP Gateways, and Antigen Spam Manager, and provides server-level protection against the latest e-mail threats.


http://www.microsoft.com/downloads/details.aspx?FamilyID=7793ba73-50c0-4e07-9cd9-211558cbd890&DisplayLang=en


 


Microsoft IPsec Diagnostic Tool


Microsoft IPsec Diagnostic Tool assists Network administrators with troubleshooting network related failures, focusing primarily on IPsec. It is applicable on Windows XP, Windows Server 2003, Windows Vista and Windows Server 2008.


http://www.microsoft.com/downloads/details.aspx?FamilyID=1d4c292c-7998-42e4-8786-789c7b457881&DisplayLang=en


 


Security Configuration Wizard Manifest for Microsoft Windows SharePoint Services 3.0


Security Configuration Wizard (SCW) is an attack surface reduction tool introduced with Windows Server 2003 Service Pack 1.


http://www.microsoft.com/downloads/details.aspx?FamilyID=0ab396e0-4333-4621-95fa-313230dcd946&DisplayLang=en


 


ILM 2007 Password Management Collection


The Password Management Collection introduces users to the Password Change Notification Service (PCNS) in ILM 2007.


http://www.microsoft.com/downloads/details.aspx?FamilyID=ae09d2f5-8ac2-4769-ab6a-48fe35a25c63&DisplayLang=en


 


ILM 2007 Design Concepts


The ILM 2007 Design Concepts document set provides discussions and recommended solutions for specific challenges that are encountered during the design phase of ILM 2007.


http://www.microsoft.com/downloads/details.aspx?FamilyID=40a52201-a297-4c35-82e9-f0b4ca05daeb&DisplayLang=en


 


Office Communications Server 2007 Document: Security Guide


The security guide provide guidelines for assessing and managing security risks to your Office Communications Server 2007 deployment.


http://www.microsoft.com/downloads/details.aspx?FamilyID=2d1ea693-25e0-43d9-8c5c-0822ef83955a&DisplayLang=en


 


Office 2007 Security Certificates


This download includes security certificate (.cer) files and a Systems Management Server (SMS) 2003 package definition (.sms) file for the Microsoft 2007 Office system.


http://www.microsoft.com/downloads/details.aspx?FamilyID=590b8eb2-9eda-441b-a972-b38e17883063&DisplayLang=en


 


Microsoft Forefront Server Security Management Console Documentation


Forefront Server Security Management Console allows administrators to easily manage Forefront Security for Exchange Server, Forefront Security for SharePoint, and Microsoft Antigen.


http://www.microsoft.com/downloads/details.aspx?FamilyID=ae4ce23b-9e1e-455c-87a4-36167fe43107&DisplayLang=en


 


Internet Protocol Security Enforcement in the Network Access Protection Platform


This white paper describes the Network Access Protection (NAP) platform, how IPsec protects traffic, and how IPsec Enforcement in NAP provides system health policy enforcement for IPsec-secured communication.


http://www.microsoft.com/downloads/details.aspx?FamilyID=144cc69f-790f-4f52-8846-3f3b8584d7cd&DisplayLang=en


 


Introduction to Network Access Protection


Read this white paper for an overview of the NAP business scenarios, an outline of the components of NAP, and a description of how NAP works.


http://www.microsoft.com/downloads/details.aspx?FamilyID=5d5e243a-23a8-479c-9f2d-37d6d79153e7&DisplayLang=en


 


IEEE 802.1X for Wired Networks and Internet Protocol Security with Microsoft Windows


This white paper examines and compared 802.1X for wired networks and IPsec.


http://www.microsoft.com/downloads/details.aspx?FamilyID=d9aef757-f528-41be-a01f-99a60c9a855d&DisplayLang=en


 


Microsoft Antigen SP1 Documentation


Microsoft Antigen SP1 Documentation


http://www.microsoft.com/downloads/details.aspx?FamilyID=7d00160e-4d15-4459-98a3-89f393ac008e&DisplayLang=en


 


Microsoft Forefront Security for Exchange Server with SP1 Documentation


Microsoft Forefront Security for Exchange Server with SP1 Documentation


http://www.microsoft.com/downloads/details.aspx?FamilyID=5cd4e36e-2dab-44d6-990e-3b8184b1cb1b&DisplayLang=en


 


Microsoft Forefront Security for SharePoint with SP1 Documentation


Microsoft Forefront Security for SharePoint with SP1 Documentation


http://www.microsoft.com/downloads/details.aspx?FamilyID=125efb1e-7ff8-4cc8-934a-28fc7c7e59f0&DisplayLang=en


 


Protecting Your Business from Online Threats


Prescriptive advice on how businesses can protect their domains, customers, and assets


http://www.microsoft.com/downloads/details.aspx?FamilyID=53903d69-9449-426b-b393-e031716a7368&DisplayLang=en


 


Committed to Protecting Your IT Infrastructure – Microsoft Investments In Security


Committed to Protecting Your IT Infrastructure – Microsoft Investments In Security


http://www.microsoft.com/downloads/details.aspx?FamilyID=e4e0d998-ba3e-4865-a4bb-09d812c0244c&DisplayLang=en


 


Screencast: Deploying SSTP Remote Access


This screencast provides detailed information about how you can use three computers to create a test lab with which to configure and test virtual private network (VPN) remote access with Windows Server® 2008 and Windows Vista® with Service Pack 1 (SP1).


http://www.microsoft.com/downloads/details.aspx?FamilyID=fc4d7d3f-0376-45bf-9544-ec35329a2fc1&DisplayLang=en


 


Network Access Protection Platform Architecture


Read this white paper for a detailed description of the components of the NAP architecture and how it allows third-party software vendors and system integrators to create complete solutions for system health validated network access.


http://download.microsoft.com/download/9/4/6/946958ef-7b86-4ddc-bfdb-c7ed2af4ce51/TCPIP_Fund.pdf


 


Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2


Windows XP Service Pack 2 provides Windows Firewall, an enhanced firewall that is enabled by default. This white paper describes the methods used to deploy Windows Firewall settings in a managed environment.


http://download.microsoft.com/download/9/4/6/946958ef-7b86-4ddc-bfdb-c7ed2af4ce51/TCPIP_Fund.pdf


 


Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2


Windows XP Service Pack 2 provides Windows Firewall, an enhanced firewall that is enabled by default. This white paper describes the methods used to deploy Windows Firewall settings in a managed environment.


http://www.microsoft.com/downloads/details.aspx?FamilyID=4454e0e1-61fa-447a-bdcd-499f73a637d1&DisplayLang=en


 


Troubleshooting Windows Firewall in Microsoft Windows XP Service Pack 2


This article describes how Windows Firewall works, the common problems with using Windows Firewall, and the set of tools used to troubleshoot Windows Firewall issues.


http://www.microsoft.com/downloads/details.aspx?FamilyID=a7628646-131d-4617-bf68-f0532d8db131&DisplayLang=en


 


Network Access Protection Policies in Windows Server 2008


You configure NAP health requirements and enforcement behaviors with Network Policy Server in Windows Server 2008.


http://www.microsoft.com/downloads/details.aspx?FamilyID=8e47649e-962c-42f8-9e6f-21c5ccdcf490&DisplayLang=en


 


System Center Data Protection Manager 2007 System Requirements


DPM 2007 System Requirements lists the minimum DPM hardware and software requirements for the DPM server and the computers and applications it is going to protect.


http://www.microsoft.com/downloads/details.aspx?FamilyID=961659c7-a66c-410d-a69d-064888db05b3&DisplayLang=en


 


Deploying System Center Data Protection Manager 2007


Deploying DPM 2007 provides information about installing and configuring DPM 2007.


http://www.microsoft.com/downloads/details.aspx?FamilyID=2812640f-a4a7-4ff8-b4c9-0d73b828328d&DisplayLang=en


 


System Center Data Protection Manager 2007 Operations Guide – English


http://www.microsoft.com/downloads/details.aspx?FamilyID=ffa07fd4-bdee-418b-a228-ed8c76c97ab4&DisplayLang=en


 


Step-by-Step Guide: Demonstrate NAP IPsec Enforcement in a Test Lab


Test lab to demonstrate NAP IPsec enforcement


http://www.microsoft.com/downloads/details.aspx?FamilyID=298ff956-1e6c-4d97-a3ed-7e7ffc4bed32&DisplayLang=en


 


Post Upgrade EFS Recovery Tool 1.0 (KB948690)


This tool can be used by server administrators to recover special user profiles and EFS encryption keys after a Windows file server has been upgraded to Windows Server 2008.


http://www.microsoft.com/downloads/details.aspx?FamilyID=fd786261-d278-40db-baf8-70f42d786223&DisplayLang=en


 


Step-by-Step Guide: Demonstrate NAP DHCP Enforcement in a Test Lab


Test lab to demonstrate NAP DHCP enforcement


http://www.microsoft.com/downloads/details.aspx?FamilyID=ac38e5bb-18ce-40cb-8e59-188f7a198897&DisplayLang=en


 


Step-by-Step Guide: Demonstrate NAP 802.1X Enforcement in a Test Lab


Test lab to demonstrate NAP 802.1X enforcement


http://www.microsoft.com/downloads/details.aspx?FamilyID=8a0925ee-ee06-4dfb-bba2-07605eff0608&DisplayLang=en


 


Microsoft DPM 2006 Management Pack


This DPM management pack for Operations Manager 2007 supports monitoring for Data Protection Manager 2006. Requires OpsMgr 2007 MOM 2005 Backward Compatibility MP Update 6.0.5000.16


http://www.microsoft.com/downloads/details.aspx?FamilyID=a3e0a46d-aad9-4ebf-9ce8-c5242d0e596c&DisplayLang=en


 


Microsoft Forefront Security for Exchange Server with SP1 Documentation


Microsoft Forefront Security for Exchange Server with SP1 Documentation


http://www.microsoft.com/downloads/details.aspx?FamilyID=5cd4e36e-2dab-44d6-990e-3b8184b1cb1b&DisplayLang=en


 


Microsoft Forefront Security for SharePoint with SP1 Documentation


Microsoft Forefront Security for SharePoint with SP1 Documentation


http://www.microsoft.com/downloads/details.aspx?FamilyID=125efb1e-7ff8-4cc8-934a-28fc7c7e59f0&DisplayLang=en


 


Extended Security Update Inventory Tool


The Extended Security Update Inventory Tool is used to detect security bulletins not covered by MBSA including MS04-028, February 2005 bulletins, and future security bulletins that are exceptions to MBSA.


http://www.microsoft.com/downloads/details.aspx?FamilyID=2c93da1d-48a0-4e5c-991f-87e08954f61b&DisplayLang=en


 


Update for Windows Mail Junk E-mail Filter for x64-based Systems [February 2008] (KB905866)


Install this update for Windows Mail to revise the definition files used to detect e-mail messages that should be considered junk e-mail or that may contain phishing content.


http://www.microsoft.com/downloads/details.aspx?FamilyID=749e10cd-f40c-4f94-8e38-d4221ded7652&DisplayLang=en


 


Update for Windows Mail Junk E-mail Filter [February 2008] (KB905866)


Install this update for Windows Mail to revise the definition files used to detect e-mail messages that should be considered junk e-mail or that may contain phishing content.


http://www.microsoft.com/downloads/details.aspx?FamilyID=aa029fde-f341-44fc-8b85-0c6f3d3c2d69&DisplayLang=en


 


Microsoft® Windows® Malicious Software Removal Tool (KB890830)


This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.


http://www.microsoft.com/downloads/details.aspx?FamilyID=ad724ae0-e72d-4f54-9ab3-75b8eb148356&DisplayLang=en


 


Microsoft® Windows® Malicious Software Removal Tool (KB890830) x64


This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.


http://www.microsoft.com/downloads/details.aspx?FamilyID=585d2bde-367f-495e-94e7-6349f4effc74&DisplayLang=en


 


ILM 2007 Getting Started Collection


MIIS 2003 Design Concepts for Implementing Reverse Joins


The Getting Started Collection introduces users to various features and functionality of ILM 2007.


http://www.microsoft.com/downloads/details.aspx?FamilyID=11fb01bc-94a9-4404-bb90-ceca1a206e32&DisplayLang=en


 


Deploying System Center Data Protection Manager 2007


Deploying DPM 2007 provides information about installing and configuring DPM 2007.


http://www.microsoft.com/downloads/details.aspx?FamilyID=2812640f-a4a7-4ff8-b4c9-0d73b828328d&DisplayLang=en


 


System Center Data Protection Manager 2007 System Requirements


DPM 2007 System Requirements lists the minimum DPM hardware and software requirements for the DPM server and the computers and applications it is going to protect.


http://www.microsoft.com/downloads/details.aspx?FamilyID=961659c7-a66c-410d-a69d-064888db05b3&DisplayLang=en


 


Backup Operations Service for Microsoft Office SharePoint Server 2007 with Data Protection Manager 2007 Datasheet


This offering helps customers to validate, envision, and plan the architecture and the design for an effective, rapid, and reliable recovery of their Office SharePoint Server farms.


http://www.microsoft.com/downloads/details.aspx?FamilyID=d423e7dd-4029-447c-ad26-031adfa41265&DisplayLang=en


 


Microsoft Internet Security and Acceleration (ISA) Server Best Practices Analyzer (BPA) Tool


The ISA Server Best Practices Analyzer Tool is designed for administrators who want to determine the overall health of their ISA Server computers and to diagnose current problems. The tool scans the configuration settings of the local ISA Server computer and reports issues that do not conform to the recommended best practices.


http://www.microsoft.com/downloads/details.aspx?FamilyID=d22ec2b9-4cd3-4bb6-91ec-0829e5f84063&DisplayLang=en


 


Step-by-Step Guide: Demonstrate NAP VPN Enforcement in a Test Lab


Test lab to demonstrate NAP VPN enforcement


http://www.microsoft.com/downloads/details.aspx?FamilyID=729bba00-55ad-4199-b441-378cc3d900a7&DisplayLang=en


 


Network Access Protection Platform Architecture


Read this white paper for a detailed description of the components of the NAP architecture and how it allows third-party software vendors and system integrators to create complete solutions for system health validated network access.


http://www.microsoft.com/downloads/details.aspx?FamilyID=2f37651e-1749-45c3-996e-53de05d44ef7&DisplayLang=en


 


Introduction to Network Access Protection


Read this white paper for an overview of the NAP business scenarios, an outline of the components of NAP, and a description of how NAP works.


http://www.microsoft.com/downloads/details.aspx?FamilyID=5d5e243a-23a8-479c-9f2d-37d6d79153e7&DisplayLang=en


 


Internet Protocol Security Enforcement in the Network Access Protection Platform


This white paper describes the Network Access Protection (NAP) platform, how IPsec protects traffic, and how IPsec Enforcement in NAP provides system health policy enforcement for IPsec-secured communication.


http://www.microsoft.com/downloads/details.aspx?FamilyID=144cc69f-790f-4f52-8846-3f3b8584d7cd&DisplayLang=en


 


Events/WebCasts 


 


Microsoft Security Webcast Series: Upcoming and On-Demand


 


Security Webcast Calendar http://go.microsoft.com/fwlink/?LinkId=37910 


Find security webcasts listed in an easy-to-use calendar format.


 


Upcoming Security Webcasts


http://www.microsoft.com/events/security/upcoming.mspx 


 


Register for the following Webcasts on the link above


 


IT Manager Webcast: Dynamic IT and Security (Part 5 of 5): Data Protection (Level 200)


Tuesday, March 04, 2008 11:00 A.M.-12:00 P.M. Pacific Time


 


TechNet Webcast: Information About Microsoft March Security Bulletins (Level 200)


Wednesday, March 12, 2008 11:00 A.M.-12:00 P.M. Pacific Time


 


On-Demand Security Webcasts


http://www.microsoft.com/events/security/ondemand.mspx  


 


 

Comments (1)