May 2011 – Technical Rollup Mail – Security


Windows Intune Now Available - Get Started With A 30-Day Trial
Windows Intune helps simplify how businesses manage and secure PCs using Windows cloud services and the Windows 7 operating system. Download a free 30-day trial to see how Windows Intune can better enable your computers and users to operate at peak performance from virtually anywhere. The visit the Windows Intune Resource Zone on TechNet for technical guidance to help you get the most out of your trial.

Sign Up for Solution Accelerator Notifications
Looking for tools and guidance that help build your organization's security and compliance infrastructure? Microsoft Solution Accelerators provide tested guidance and automated tools to help you plan, securely deploy, and manage new Microsoft technologies—easier, faster, and at less cost. To stay up-to-date, subscribe to the Solution Accelerators Newsletter.

Inside Security Compliance Manager with Chase Carpenter
When we hear about a disaster like the earthquake in Japan, many of us try to think of ways we can help. Read this Security Tips & Talk blog post for valuable tips you can pass on to your end users to help them avoid online donation scams.

Microsoft Security Bulletin Summary for April, 2011

Security Bulletin Overview for April 2011

Microsoft Security Response Center (MSRC) Blog Post

Windows Media Video (WMV)

Windows Media Audio (WMA)

iPod Video (MP4)

MP3 Audio

High Quality WMV (2.5 Mbps)

Zune Video (WMV)

Microsoft Product Lifecycle Information

Find information about your particular products on the Microsoft Product Lifecycle Web site

See a List of Supported Service Packs

Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.

Follow the Microsoft Security Response team on Twitter @MSFTSecResponse for the latest information on the threat landscape.

Forefront TMG and ISA Server

Forefront Security TechCenter

Please note that if you have feedback on documentation or wish to request new documents - email

Forefront Threat Management Gateway 2010 homepage

Forefront TMG (ISA Server) Product Team Blog

The ISA Server Product Team Blog ( is updated on a regular basis. Latest entries include:

TMG URL Filtering fails

Requiring Strong Authentication Only for Specific Published Paths or Sites

Forefront Unified Access Gateway & Intelligent Application Gateway 2007

Forefront Unified Access Gateway 2010 Technical Resources

For comments, feedback, and requests, contact the Forefront UAG User Assistance team at

Forefront Unified Access Gateway Product Team Blog

The UAG Product Team Blog ( is updated on a regular basis. Latest entries include:

Creating custom icons for applications

Forefront Edge on the Wiki

The home of community-generated content about Microsoft technologies — that anyone can edit! Read the latest wiki articles about TMG and UAG.




Security Tip of the Month: 5 Security Tips for Windows Intune
Learn how to use Attack Surface Analyzer, a free tool from Microsoft, to better understand the aggregate attack surface change that may result from the introduction of line-of-business (LOB) applications to the Windows platform.

Microsoft Security Update Guide, Second Edition
The Microsoft Security Update Guide Second Edition is a valuable source of in-depth information and guidance that helps IT professionals deploy Microsoft security updates and create a safer, more secure computing and Internet environment.

Windows Security Survival Guide
Many companies invest a good amount of money trying to protect their resources by adding more software to provide additional layers of protection, and by enhancing policies and procedures to enforce security. Get a better understanding of the core principles of Windows Security and how to take advantage of Windows operating system security capabilities to achieve your company's security goals.

Security and Compliance in the Cloud, Part 1
Join Jim Reavis of the Cloud Security Alliance, Pete Boden of Microsoft and Allan A. Friedman of the Brookings Institution to see what you need to consider as you move to data and applications to the cloud. Watch Part 2 of the discussion for additional insights and tips for organizations of all sizes.

Windows Azure: Understanding Security Account Management in Windows Azure
Cloud computing relieves some of the security burden, but you still have an active role in managing access, securing communications and ensuring data protection. Learn what you need to know about account management, certificate management, and employee transitions.

SQL Server: Protect Data at All Costs
Maintaining high availability to corporate data stores managed with SQL Server is an essential element of any data management strategy. Get tips on how to work through the requirements and limitations, align your strategy to those requirements, and test the effectiveness of your approach.


Licensing Windows Server 2008 Terminal Services

This licensing brief helps to clarify Microsoft licensing policies for Windows Server® Terminal Services (TS), including the new components that are in the Windows Server 2008 operating system.

Forefront Identity Manager 2010 Monitoring Management Pack

The FIM 2010 Management Pack discovers and monitors FIM server components.

Windows Server 2008: Planning for Active Directory Forest Recovery

This guide contains best-practice recommendations for recovering an Active Directory forest, if forest-wide failure has rendered all domain controllers in the forest incapable of functioning normally.

AD FS 2.0 Step-by-Step Guide: Federation with IBM Tivoli Federated Identity Manager

Guide to AD FS 2.0 interoperability with IBM Tivoli Federated Identity Manager

Information Security Management System for Microsoft Cloud Infrastructure

This paper describes Information Security Management System for Microsoft Cloud Infrastructure as well as some of the processes and benefits realized from operating this model, including an overview of the key certifications and attestations Microsoft maintains to prove to cloud customers that information security is central to Microsoft cloud operations.

Microsoft Security Development Lifecycle (SDL) - Version 5.1

Microsoft Security Development Lifecycle (SDL) Process Guidance - Version 5.1

Microsoft .NET Framework 4 Platform Update 1 – Design-time Update for Visual Studio 2010 SP1 (KB2495593)

This package contains updated design-time files for Visual Studio 2010 SP1 corresponding to Microsoft .NET Framework 4 Platform Update 1.

Microsoft .NET Framework 4 Platform Update 1 - Runtime Update (KB2478063)

This is a Platform Update to the Microsoft .NET Framework 4 containing a set of new features addressing top customer feature requests and important .NET Framework scenarios.

Providing Flexible, Security-Enhanced Network Access to Contractors with a Virtual Desktop Infrastructure

Microsoft IT deployed a secure and cost-effective pilot solution called Virtual Desktop Infrastructure (VDI) to a global group of contractors. VDI supplies a virtual desktop environment that is authentication-enabled and auditable for security purposes.

Microsoft Lync Server 2010 Security Guide

The Security Guide provides guidelines for assessing and managing security risks to your Lync Server 2010 deployment.

Microsoft’s Identity and Access Management Platform Whitepapers

Identity and Access Whitepapers

Microsoft® Windows® Malicious Software Removal Tool (KB890830)

This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.

Microsoft® Windows® Malicious Software Removal Tool (KB890830) x64

This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.

Building Global Trust Online: Policy Perspectives on Privacy, Security and Safety

This booklet is intended to be a relevant and useful guide for any decision-maker with responsibility for developing new ideas and solutions for online privacy, security and safety.

Microsoft Office File Validation Add-in (KB2501584)

Office File Validation is a security add-in for Office 2003 and 2007. Office File Validation is used to validate that Binary File Format files conform to the Microsoft Office File Format. The user will be notified of possible security risks if files fail to conform to the format.

Windows XP End Of Support Countdown Gadget

Looking to get off Windows XP? Use this handy gadget to count down the number of days until Windows XP End of Support (EOS) in 2014.

CVD at Microsoft

Information about Coordinated Vulnerability Disclosure

Active Directory Federation Services 2.0 RTW

Active Directory Federation Services 2.0 helps IT enable users to collaborate across organizational boundaries and easily access applications on-premises and in the cloud, while maintaining application security.


Security Webcast Calendar

Find security webcasts listed in an easy-to-use calendar format.

Upcoming Security Webcasts

TechNet Webcast: Information About Microsoft May Security Bulletins (Level 200)

Wednesday, May 11, 2011 11:00 A.M.-12:00 P.M. Pacific Time

TechNet Webcast: Talk TechNet with Keith Combs and Matt Hester – Episode 21: Joseph Davies and Christopher Palmer on IPv6 (Level 100)

Wednesday, May 25, 2011 9:00 A.M.-10:00 A.M. Pacific Time

Business Insights Webcast: How to handle Data Security, User Authorization and Authentication in the Windows Azure (Level 200)

Wednesday, May 25, 2011 11:00 A.M.-12:00 P.M. Pacific Time

On-Demand Security Webcasts

Visit TechNet Spotlight:

Video on Demand, Video Downloads, PowerPoint Presentations, Audio and more

Comments (0)

Skip to main content