Microsoft guides

Fushigi

Storage Is My Life
Joined
Jan 23, 2002
Messages
2,890
Location
Illinois, USA
Microsoft said:
From: _____@MICROSOFT.COM]
Sent: Tuesday, March 23, 2004 3:47:03 PM
To: _____
Subject: FYI: Interesting Security Information Downloads for the Week of March 15 -19


Server Security Patch Management at Microsoft

Overview


Detailed discussion on how the Microsoft IT group manages server security patching. Details on internal processes, tools, and Systems Management Server (SMS) 2003 features are given. Also included are the best practices and lessons learned for patch management, including security patch management for servers based on the internal Microsoft IT early adopter experience.

http://www.microsoft.com/downloads/...a5-676f-4f00-bc7a-3c7058f1f327&DisplayLang=en

Microsoft Baseline Security Analyzer Sample Scripts

Overview


MBSA generates individual reports in XML format, but only supports viewing them individually-there is no built-in dashboard or summarization of the results. In addition, there are limitations in the number of hosts MBSA can scan in batch-mode where computer names or IP addresses are read from an input file (/fh and /fip options.) Another limitation is the requirement to be a local administrator in order to scan the local computer.

For each of these cases, there are some great alternatives to broaden the capabilities of MBSA using scripting. These samples provide example command lines, and the sample scripts needed to resolve many of these limitations. Because they are samples, you may adapt them for your needs and extend their functionality.

http://www.microsoft.com/downloads/...18-93c2-4ce2-85d6-3679defe1a3e&DisplayLang=en


Incident Response—Managing Security at Microsoft

Microsoft IT has developed a preventative approach to managing computer vulnerabilities.

http://www.microsoft.com/downloads/...be-4fb0-447a-943a-7484cba0e7c1&DisplayLang=en

Overview

Microsoft IT has developed a preventative approach to managing computer vulnerabilities. Designed to reduce the occurrences and severity of attacks, Microsoft IT's security methodology includes the development of processes to reduce open ports and vulnerable systems and services, manage user permissions, regularly assess risks, and regularly monitor compliance with security guidelines.

IT Operations at Microsoft

Overview


Discussion of Microsoft IT delivers integrated IT and trustworthy infrastructure services for line-of-business and Internet applications while at the same time being Microsoft's first and best customer. See first hand how Microsoft IT runs its business on Microsoft solutions and learn about the lessons and best practices that emerge as Microsoft employees "do IT." This presentation lets you in on how Microsoft IT balances the need for agility with the complexity of operating an IT organization with over 7,000 servers spanning more than 400 sites worldwide. Find out how to make centralized operations and monitoring work, provide incentives for server standardization, and respond effectively to incidents that occur within and outside your network.

http://www.microsoft.com/downloads/...85-6d57-4edc-847d-fb0ad1cabf23&DisplayLang=en


Using the Windows Firewall INF File in Microsoft Windows XP Service Pack 2

Overview


Microsoft Windows XP Service Pack 2 (SP2), now in Beta testing, includes significant enhancements to the Windows Firewall component (formerly known as the Internet Connection Firewall). Windows Firewall is a stateful host firewall that discards unsolicited incoming traffic, providing a level of protection for computers against malicious users or programs. To provide better protection for computers connected to any kind of network (such as the Internet, a home network, or an organization network), Windows XP SP2 enables Windows Firewall on all network connections by default. Network administrators can use the Windows Firewall INF file (Netfw.inf) to modify default settings either before installation or after installation. This article describes the usage of the Windows Firewall INF file.

http://www.microsoft.com/downloads/...1d-2f97-4e63-a581-bf25685b4c43&DisplayLang=en


Deploying Windows Firewall Settings for Microsoft® Windows® XP with Service Pack 2

Overview


Windows XP Service Pack 2 (SP2), currently a Release Candidate in Beta testing, includes significant enhancements to the Windows Firewall component, previously known as the Internet Connection Firewall (ICF). Windows Firewall is a stateful host-based firewall that discards unsolicited incoming traffic, providing a level of protection for computers against malicious users or programs. To provide better protection for computers connected to any kind of network (such as the Internet, a home network, or an organization network), Windows XP SP2 enables Windows Firewall on all network connections by default. This new behavior can impair some types of communications. This article describes how to deploy the appropriate configuration settings for Windows Firewall on an organization network so that it is enabled and providing protection, and so that communications are not impaired.

http://www.microsoft.com/downloads/...e1-61fa-447a-bdcd-499f73a637d1&DisplayLang=en


Securing Remote Users at Microsoft

Overview


Discussion of Microsoft IT's Secure Remote User initiative to improve the security of remote access connections. As part of the company's ongoing Trustworthy Computing strategy, Microsoft's internal IT group safeguards employee remote access connections (around one million per month) to make computing more secure at Microsoft. Although first conceived and articulated by Microsoft, the evolving goals of the Trustworthy Computing initiative will require unprecedented industry collaboration as well as a firm commitment from customers to establishing and maintaining secure environments.

http://www.microsoft.com/downloads/...59-17bf-4430-8578-9ca7d7387e00&DisplayLang=en


Securing Wireless LANs with PEAP and Passwords

Overview


Securing Wireless LANs with Password Authentication is the second security solution for WLANs produced by Microsoft® Solutions for Security. It is a companion to the first solution, Securing Wireless LANs - a Certificate Services Solution. Whereas the first solution was aimed at large organizations, the second is considerably simpler and easier to deploy and is designed for small and medium-sized organizations. The primary technological difference between the two solutions is that the first solution uses public key certificates to authenticate users and computers to the WLAN whereas the second uses user name and password authentication. Other distinguishing features of this solution are that it uses existing (rather than new) server hardware, employs a simpler administrative delegation model, and automates many more of the configuration tasks using scripts and predefined settings.

http://www.microsoft.com/downloads/...a1-9820-480e-aa38-63485eca8b9b&DisplayLang=en


Systems Management Server 2003: Desktop Patch Management at Microsoft

Overview


Detailed discussion on how Microsoft IT uses SMS 2003 to manage the process of deploying critical security updates and critical Microsoft Office System software updates to desktop computers. Microsoft IT turned to SMS 2003 to manage the application deployment process, improve hardware and software asset management, and to manage the deployment of security and software updates across the enterprise.

http://www.microsoft.com/downloads/...30-fe19-44fd-a8fb-acd96b895f40&DisplayLang=en


Smart Card Deployment at Microsoft

Overview


Enterprises that allow remote access to network assets are becoming increasingly vulnerable to hackers and malicious intruders. Microsoft's internal IT group took advantage of its existing Microsoft Windows Server infrastructure, including its private Public Key Infrastructure, to deploy Smart Cards to employees needing remote network access to substantially increase the strength of its network security

http://www.microsoft.com/downloads/...86-ce2b-4e01-b80d-35847c47303b&DisplayLang=en



Trustworthy Messaging at Microsoft

Overview


Microsoft needed to use e-mail for transmitting business-sensitive data but was concerned about security and data privacy. Microsoft's internal IT group deployed a solution they called trustworthy messaging, offering both senders and recipients three levels of protection for their data. These solutions were based on applying Secure Multipurpose Internet Mail Extensions (S/MIME) digital signatures, S/MIME encryption, and/or rights management policies.

http://www.microsoft.com/downloads/...48-fe02-4fd4-b7d0-ff88d8e18c6a&DisplayLang=en


Exchange Server 2003 Security Hardening Guide

Overview


This guide is designed to provide you with essential information about how to harden your Microsoft® Exchange Server 2003 environment. In addition to practical, hands-on configuration recommendations, this guide includes strategies for combating spam, viruses, and other external threats to your Exchange 2003 messaging system. While most server administrators can benefit from reading this guide, it is designed to produce maximum benefits for administrators responsible for Exchange messaging, both at the mailbox and architect levels.

This guide is a companion to the Windows Server 2003 Security Guide <http://go.microsoft.com/fwlink/?LinkId=21638>. Specifically, many of the procedures in this guide are related directly to security recommendations introduced in the Windows Server 2003 Security Guide. Therefore, before you perform the procedures presented in this guide, it is recommended that you first read the Windows Server 2003 Security Guide.

http://www.microsoft.com/downloads/...1f-e5c9-4aef-9a44-504db09b9065&DisplayLang=en


Multilingual User Interface Pack for Rights Management Add-on for Internet Explorer

Overview


The Windows Rights Management Add-on for Internet Explorer provides a way for users of supported Windows operating systems to view, but not alter, files with restricted permission. These restrictions enable authors to prevent sensitive documents, Web-based information, and e-mail messages from being forwarded, edited, or copied by unauthorized individuals. These restrictions provide protection, not only while the information is in transit, but also after the recipient of the information has received it.

Multilingual User Interface Pack

Many enterprise customers have deployed the Windows XP Multilingual User Interface Pack in their corporations as a way to ease desktop administration and reduce desktop management costs in multilingual computing environments.

The Microsoft Rights Management Add-on for Internet Explorer provides support for customers who have deployed this version of the Windows operating system through the release of the Multilingual User Interface Pack for Rights Management Add-on for Internet Explorer.

Note: In order for you to successfully run the Rights Management Add-on for Internet Explorer (RMA) please first install the Windows Rights Management client (RM) <http://go.microsoft.com/fwlink/?linkid=18134>. Installing the RM client places software on your computer that allows it to respond to requests for licenses and keys. The RMA will not correctly run without installing the RM client before the RMA.

http://www.microsoft.com/downloads/...82-e7b6-4953-9ccb-a916075ec73d&DisplayLang=en


Original Equipment Manufacturer (OEM) Quarterly Technical Briefing: February 2004

Overview


This presentation gives an understanding of two important Microsoft initiatives, security sustained engineering in Microsoft Windows products and the pre-"Longhorn" version of Microsoft Windows PE.

http://www.microsoft.com/downloads/...02-ac82-48c4-b671-06f0844769ef&DisplayLang=en


Original Equipment Manufacturer (OEM) Quarterly Technical Briefing: April 2004

Overview


In this month's segment, we will continue our focus on security and Microsoft Windows XP Service Pack 2 as Ryan Burkhardt guides us through advanced security features.

http://www.microsoft.com/downloads/...73-dc90-46c5-840a-e237cc3e12a7&DisplayLang=en
 

Fushigi

Storage Is My Life
Joined
Jan 23, 2002
Messages
2,890
Location
Illinois, USA
Microsoft said:
Subject: FYI: Security Information for week of March 22- 26

Security

TechNet Radio Broadcast: IT Security at Microsoft

Overview


Welcome to Microsoft TechNet Radio. TechNet Radio is audio-only content aimed at IT professionals, featuring the latest information from Microsoft insiders on the trends and technologies that are shaping our industry. You'll learn useful tips and techniques from Microsoft insiders in an accessible interview-style format that's a perfect way to keep up with what's new.:

This broadcast includes the following tracks:

Track 1: Introduction

Track 2: IT at Microsoft Overview

Track 3: How Microsoft Does IT Security

Track 4: Compliance Enforcement

Track 5: Securing Wireless and Other Topics

Track 6: Resources and Action Items

http://www.microsoft.com/downloads/...1a-2737-49e2-b873-aae3f75bf2ce&DisplayLang=en

Best Practice Guide for Securing Active Directory Installations

Overview


Organizations require a network operating system (NOS) that provides secure network access to network data by authorized users and that rejects access by unauthorized users. For a Microsoft® Windows® Server 2003 NOS, the Active Directory® directory service provides many key components for authenticating users and for generating authorization data that controls access to network resources.

A breach in Active Directory security can result in the loss of access to network resources by legitimate clients or in the inappropriate disclosure of potentially sensitive information. Such information disclosure affects data that is stored on network resources or in Active Directory. To avoid these situations, organizations need more extensive information and support to ensure enhanced security for their NOS environments. This guide addresses this need for organizations that have new, as well as existing, Active Directory deployments.

This guide contains recommendations for protecting domain controllers against known threats, establishing administrative policies and practices to maintain network security, and protecting DNS servers from unauthorized updates. It also provides guidelines for maintaining Active Directory security boundaries and securing Active Directory administration.

This guide also includes procedures for enacting these recommendations.

http://www.microsoft.com/downloads/...65-3f18-488a-be1e-f03390ec5f91&DisplayLang=en

IT Security at Microsoft Overview

Overview


Overview discussion on what the Microsoft Corporate Security group does to prevent malicious or unauthorized use of digital assets at Microsoft. This asset protection takes place through a formal risk management framework, risk management processes, and clear organizational roles and responsibilities. The basis of the approach is recognition that risk is an inherent part of any environment and that risk should be proactively managed. The principles and techniques described can be employed to manage risk at any organization. Other areas of corporate security, such as security in software design and physical security, are not covered.

http://www.microsoft.com/downloads/...6c-1f5c-4331-b1fb-6c720795704d&DisplayLang=en

Deploying Windows Firewall Settings for Microsoft® Windows® XP with Service Pack 2

Overview


Windows XP Service Pack 2 (SP2), currently a Release Candidate in Beta testing, includes significant enhancements to the Windows Firewall component, previously known as the Internet Connection Firewall (ICF). Windows Firewall is a stateful host-based firewall that discards unsolicited incoming traffic, providing a level of protection for computers against malicious users or programs. To provide better protection for computers connected to any kind of network (such as the Internet, a home network, or an organization network), Windows XP SP2 enables Windows Firewall on all network connections by default. This new behavior can impair some types of communications. This article describes how to deploy the appropriate configuration settings for Windows Firewall on an organization network so that it is enabled and providing protection, and so that communications are not impaired.

http://www.microsoft.com/downloads/...e1-61fa-447a-bdcd-499f73a637d1&DisplayLang=en
 
Top