Don’t Let BYOD Backfire on Your Business http://blogs.technet.com/b/trustworthycomputing/archive/2012/08/17/don-t-let-byod-backfire-on-your-business.aspx
There are several reasons for organizations to at least consider adopting BYOD; however compliance mandates and security issues are two large hurdles that should be carefully considered when weighing the pros and cons of BYOD. See why, even if those issues are managed, BYOD can go down a path that neutralizes the benefits and turns into a source of employee dissatisfaction.
Working Toward a Privacy Framework for the "Big Data" Era http://blogs.technet.com/b/trustworthycomputing/archive/2012/09/14/working-toward-a-privacy-framework-for-the-big-data-era.aspx
Over the past several months, Microsoft has been talking with some of the world’s foremost privacy thinkers, including representatives of regulatory bodies, government policymakers, academia, and industry to explore alternate models for privacy in a modern information economy. Learn more about these discussions and the types of issues being raised.
Microsoft Security Response Center Progress Report 2012 http://blogs.technet.com/b/mmpc/archive/2012/09/14/microsoft-security-response-center-msrc-progress-report-2012.aspx
The Microsoft Security Response Center (MSRC) recently published its annual MSRC Progress Report. This year’s report provides the latest information on the progress of various security initiatives that share information to foster deeper industry collaboration around software security, increase community-based defenses, and better protect customers from malware. Check out the new report today.
Microsoft Security Bulletin Summary for September, 2012
Security Bulletin Overview for September 2012
Microsoft Security Response Center (MSRC) Blog Post http://go.microsoft.com/?linkid=9683067
Windows Media Video (WMV) http://go.microsoft.com/?linkid=9683068
Windows Media Audio (WMA) http://go.microsoft.com/?linkid=9683069
iPod Video (MP4) http://go.microsoft.com/?linkid=9683070
MP3 Audio http://go.microsoft.com/?linkid=9683071
High Quality WMV (2.5 Mbps) http://go.microsoft.com/?linkid=9683072
Zune Video (WMV) http://go.microsoft.com/?linkid=9683073
Microsoft Product Lifecycle Information
Find information about your particular products on the Microsoft Product Lifecycle Web site http://go.microsoft.com/?linkid=9669804
See a List of Supported Service Packs http://go.microsoft.com/?linkid=9669805
Microsoft provides free software updates for security and nonsecurity issues for all supported service packs.
Follow the Microsoft Security Response team on Twitter http://go.microsoft.com/?linkid=9739346 @MSFTSecResponse for the latest information on the threat landscape.
Forefront TMG and ISA Server
Forefront Security TechCenter
Please note that if you have feedback on documentation or wish to request new documents – email email@example.com
Forefront Threat Management Gateway 2010 homepage
Forefront TMG (ISA Server) Product Team Blog
The ISA Server Product Team Blog (http://blogs.technet.com/isablog/) is updated on a regular basis. Latest entries include:
Important Information Regarding Changes to Forefront Product Roadmaps
TMG Logging to LLQ
Forefront Unified Access Gateway & Intelligent Application Gateway 2007
Forefront Unified Access Gateway 2010 Technical Resources
For comments, feedback, and requests, contact the Forefront UAG User Assistance team at firstname.lastname@example.org.
Forefront Unified Access Gateway Product Team Blog
The UAG Product Team Blog (http://blogs.technet.com/edgeaccessblog) is updated on a regular basis. Latest entries include:
The Java Runtime Environment (JRE) is not installed on this device, or the installed JRE version is older than version 1.5
KB: Microsoft Forefront Unified Access Gateway 2010 Direct Access machine crashes with stop code 0xD1
Other TechNet Blogs
Windows 2012 DirectAccess (Unified Remote Access) webcast with Bala Natarajan
Designing Your Cloud Infrastructure
Forefront Edge on the Wiki
The home of community-generated content about Microsoft technologies — that anyone can edit! Read the latest wiki articles about TMG and UAG.
Microsoft Forefront Unified Access Gateway 2010 Direct Access machine crashes with stop code 0xD1
Consumerization of IT Jump Start
Get a high-level overview of the consumerization of IT and BYOD trend, then delve into more detail with demonstrations of key IT scenarios related to supporting this trend in an enterprise organization:
- Consumerization of IT Jump Start (03): User-Centric Application Delivery
- Consumerization of IT Jump Start (04): Mobile Device Management
- Consumerization of IT Jump Start (05): Productive with Office 365
- Consumerization of IT Jump Start (06): Information Protection
- Consumerization of IT Jump Start (07): Cloud Security and Management with Windows Intune
- Consumerization of IT Jump Start (08): Desktop Virtualization
Microsoft Technologies for Consumerization http://technet.microsoft.com/en-US/windows/hh182562.aspx?ocid=wc-nl-secnews
Explore the technologies that can help you embrace the latest trends in consumerization while maintaining control over your IT environment.
Consumerization of IT FAQ http://technet.microsoft.com/en-US/windows/hh182562.aspx?ocid=wc-nl-secnews
Get answers to common questions about the consumerization of IT trend including recommendations on how to approach mixed-OS environments, smartphones, and desktop virtualization.
Infrastructure Planning and Design Guide for User State Virtualization http://technet.microsoft.com/library/ff877478.aspx
Windows user state virtualization (USV) can help IT find the right balance between centralized management of business-critical data and a rich user desktop experience. This guide offers instructions on how to gather relevant user and IT requirements, then compare and contrast Windows USV technologies (Folder Redirection, Offline Files, and Roaming User Profiles) in light of scenarios that are relevant to your business.
Network Access Protection Deployment Guide http://technet.microsoft.com/library/dd314175.aspx
Learn how to deploy Network Access Protection (NAP), an extensible platform that provides infrastructure components and an application programming interface (API) for adding components that verify and remediate a computer’s health and enforce various types of network access or communication.
Managing "BYO" PCs in the Enterprise http://blogs.msdn.com/b/b8/archive/2012/04/19/managing-quot-byo-quot-pcs-in-the-enterprise-including-woa.aspx
Find tips and insights to help you more securely manage Windows on ARM (WOA) PCs and configure basic security and data protection policies.
Security Webcast Calendar http://go.microsoft.com/fwlink/?LinkId=37910
Find security webcasts listed in an easy-to-use calendar format.
Upcoming Security Webcasts
On-Demand Security Webcasts
Visit TechNet Spotlight: www.microsoft.com/technetspotlight
Video on Demand, Video Downloads, PowerPoint Presentations, Audio and more