Monthly Security Resources

Security Tip of the Month: 5 Security Tips for Windows Intune http://technet.microsoft.com/en-gb/security/hh144814.aspx
Learn how to use Attack Surface Analyzer, a free tool from Microsoft, to better understand the aggregate attack surface change that may result from the introduction of line-of-business (LOB) applications to the Windows platform.

Microsoft Security Update Guide, Second Edition http://www.microsoft.com/security/msrc/whatwedo/securityguide.aspx
The Microsoft Security Update Guide Second Edition is a valuable source of in-depth information and guidance that helps IT professionals deploy Microsoft security updates and create a safer, more secure computing and Internet environment.

Windows Security Survival Guide http://social.technet.microsoft.com/wiki/contents/articles/windows-security-survival-guide.aspx
Many companies invest a good amount of money trying to protect their resources by adding more software to provide additional layers of protection, and by enhancing policies and procedures to enforce security. Get a better understanding of the core principles of Windows Security and how to take advantage of Windows operating system security capabilities to achieve your company’s security goals.

Security and Compliance in the Cloud, Part 1 http://www.microsoft.com/showcase/en/US/details/66401d6b-881a-416c-97d5-601f99c27e51
Join Jim Reavis of the Cloud Security Alliance, Pete Boden of Microsoft and Allan A. Friedman of the Brookings Institution to see what you need to consider as you move to data and applications to the cloud. Watch Part 2 of the discussion for additional insights and tips for organizations of all sizes.

Windows Azure: Understanding Security Account Management in Windows Azure http://technet.microsoft.com/en-gb/magazine/gg607453.aspx
Cloud computing relieves some of the security burden, but you still have an active role in managing access, securing communications and ensuring data protection. Learn what you need to know about account management, certificate management, and employee transitions.

SQL Server: Protect Data at All Costs http://technet.microsoft.com/en-gb/magazine/gg981678.aspx
Maintaining high availability to corporate data stores managed with SQL Server is an essential element of any data management strategy. Get tips on how to work through the requirements and limitations, align your strategy to those requirements, and test the effectiveness of your approach.

Information Security Management System for Microsoft Cloud Infrastructure

This paper describes Information Security Management System for Microsoft Cloud Infrastructure as well as some of the processes and benefits realized from operating this model, including an overview of the key certifications and attestations Microsoft maintains to prove to cloud customers that information security is central to Microsoft cloud operations.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=7bc2afa0-6e6c-48f7-825d-752ca5914344

Microsoft Security Development Lifecycle (SDL) – Version 5.1

Microsoft Security Development Lifecycle (SDL) Process Guidance – Version 5.1

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e5ff2f9d-7e72-485a-9ec0-5d6d076a8807

Providing Flexible, Security-Enhanced Network Access to Contractors with a Virtual Desktop Infrastructure

Microsoft IT deployed a secure and cost-effective pilot solution called Virtual Desktop Infrastructure (VDI) to a global group of contractors. VDI supplies a virtual desktop environment that is authentication-enabled and auditable for security purposes.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=39c528f6-2885-45c9-b338-a65a2bd43e4e

Microsoft Lync Server 2010 Security Guide

The Security Guide provides guidelines for assessing and managing security risks to your Lync Server 2010 deployment.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=1400504e-8b2e-4d75-b091-1bf9f7bbc46f

Microsoft’s Identity and Access Management Platform Whitepapers

Identity and Access Whitepapers

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=9ca5c685-3172-4d8f-81cb-1a59bdc9f7e3

Building Global Trust Online: Policy Perspectives on Privacy, Security and Safety

This booklet is intended to be a relevant and useful guide for any decision-maker with responsibility for developing new ideas and solutions for online privacy, security and safety.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=b4e5277d-ab04-4b80-9a4d-fea0c1440fe7

Microsoft Office File Validation Add-in (KB2501584)

Office File Validation is a security add-in for Office 2003 and 2007. Office File Validation is used to validate that Binary File Format files conform to the Microsoft Office File Format. The user will be notified of possible security risks if files fail to conform to the format.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=6a4e39a4-4c3f-4cc7-98ec-1cb2d5cb5881

Windows XP End Of Support Countdown Gadget

Looking to get off Windows XP? Use this handy gadget to count down the number of days until Windows XP End of Support (EOS) in 2014.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=53a27766-0168-4617-b44e-74b2886cec6d

Coordinated Vulnerability Disclosure at Microsoft

Information about Coordinated Vulnerability Disclosure

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=2f25ef80-88b1-461e-95e0-3e3ec7f2fe8e

Active Directory Federation Services 2.0 RTW

Active Directory Federation Services 2.0 helps IT enable users to collaborate across organizational boundaries and easily access applications on-premises and in the cloud, while maintaining application security.

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=118c3588-9070-426a-b655-6cec0a92c10b

0 Kommentare