Monthly Security Resources

Security Tip of the Month: 5 Security Tips for Windows Intune
Learn how to use Attack Surface Analyzer, a free tool from Microsoft, to better understand the aggregate attack surface change that may result from the introduction of line-of-business (LOB) applications to the Windows platform.

Microsoft Security Update Guide, Second Edition
The Microsoft Security Update Guide Second Edition is a valuable source of in-depth information and guidance that helps IT professionals deploy Microsoft security updates and create a safer, more secure computing and Internet environment.

Windows Security Survival Guide
Many companies invest a good amount of money trying to protect their resources by adding more software to provide additional layers of protection, and by enhancing policies and procedures to enforce security. Get a better understanding of the core principles of Windows Security and how to take advantage of Windows operating system security capabilities to achieve your company’s security goals.

Security and Compliance in the Cloud, Part 1
Join Jim Reavis of the Cloud Security Alliance, Pete Boden of Microsoft and Allan A. Friedman of the Brookings Institution to see what you need to consider as you move to data and applications to the cloud. Watch Part 2 of the discussion for additional insights and tips for organizations of all sizes.

Windows Azure: Understanding Security Account Management in Windows Azure
Cloud computing relieves some of the security burden, but you still have an active role in managing access, securing communications and ensuring data protection. Learn what you need to know about account management, certificate management, and employee transitions.

SQL Server: Protect Data at All Costs
Maintaining high availability to corporate data stores managed with SQL Server is an essential element of any data management strategy. Get tips on how to work through the requirements and limitations, align your strategy to those requirements, and test the effectiveness of your approach.

Information Security Management System for Microsoft Cloud Infrastructure

This paper describes Information Security Management System for Microsoft Cloud Infrastructure as well as some of the processes and benefits realized from operating this model, including an overview of the key certifications and attestations Microsoft maintains to prove to cloud customers that information security is central to Microsoft cloud operations.

Microsoft Security Development Lifecycle (SDL) – Version 5.1

Microsoft Security Development Lifecycle (SDL) Process Guidance – Version 5.1

Providing Flexible, Security-Enhanced Network Access to Contractors with a Virtual Desktop Infrastructure

Microsoft IT deployed a secure and cost-effective pilot solution called Virtual Desktop Infrastructure (VDI) to a global group of contractors. VDI supplies a virtual desktop environment that is authentication-enabled and auditable for security purposes.

Microsoft Lync Server 2010 Security Guide

The Security Guide provides guidelines for assessing and managing security risks to your Lync Server 2010 deployment.

Microsoft’s Identity and Access Management Platform Whitepapers

Identity and Access Whitepapers

Building Global Trust Online: Policy Perspectives on Privacy, Security and Safety

This booklet is intended to be a relevant and useful guide for any decision-maker with responsibility for developing new ideas and solutions for online privacy, security and safety.

Microsoft Office File Validation Add-in (KB2501584)

Office File Validation is a security add-in for Office 2003 and 2007. Office File Validation is used to validate that Binary File Format files conform to the Microsoft Office File Format. The user will be notified of possible security risks if files fail to conform to the format.

Windows XP End Of Support Countdown Gadget

Looking to get off Windows XP? Use this handy gadget to count down the number of days until Windows XP End of Support (EOS) in 2014.

Coordinated Vulnerability Disclosure at Microsoft

Information about Coordinated Vulnerability Disclosure

Active Directory Federation Services 2.0 RTW

Active Directory Federation Services 2.0 helps IT enable users to collaborate across organizational boundaries and easily access applications on-premises and in the cloud, while maintaining application security.

0 Kommentare