Archive for the ‘Security’ Category

Microsoft Security Compliance Manager (SCM 2) tool

Secure Client Computers with updated SCM 2 Client Baselines—Beta now available for download

Available beta baselines are:

  • Windows 7 SP1 Security Compliance Baseline
  • Windows Vista SP2 Security Compliance Baseline
  • Windows XP SP3 Security Compliance Baseline
  • Office 2010 SP1 Security Baseline
  • Internet Explorer 8 Security Compliance Baseline

SCM 2 enables you to quickly configure and manage your desktops and laptops, traditional data center, and private cloud using Group Policy and Microsoft System Center Configuration Manager.

SCM 2 is a free tool from the Microsoft Solution Accelerators team that enables you to quickly configure and manage your computers, traditional data center, and private cloud using Group Policy and Microsoft System Center Configuration Manager.

Key features in SCM 2 include:

  • Integration with the System Center 2012 IT GRC Process Pack for Service Manager-Beta:Product configurations are integrated into the IT GRC Process Pack to provide oversight and reporting of your compliance activities.

  • Gold master support: Import andtake advantage of your existing Group Policy or create a snapshot of a reference machine to kick-start your project.

  • Configure stand-alone machines: Deploy your configurations to non-domain joined computers using the new GPO Pack feature.

  • Updated security guidance: Take advantage of the deep security expertise and best practices in the updated security guides, and the attack surface reference workbooks to help reduce the security risks that you consider to be the most important.

  • Compare against industry best practices: Analyze your configurations against prebuilt baselines for the latest Windows client and server operating systems.

  • image

SCM 2 released with the a full complement of Microsoft product baselines, including Windows Internet Explorer 9, Windows Server 2008 R2 Service Pack 1 (SP1), Windows Server 2008 SP2, and Windows Server 2003 SP2.

Also the security guides are also in the download.

 

Get SCM2 from the Microsoft Download Center. Click here to download the latest version of the tool.

Security and Compliance Baselines

In addition to the previously released security baselines, the SCM 2 includes a new Windows Internet Explorer 9 Security Baseline, and updated versions of the security and compliance baselines for Windows Server 2008 R2 SP1, Windows Server 2008 SP2, and Windows Server 2003 SP2.

These new beta baselines provide:

  • Setting severity ratings, allowing you to quickly sort, prioritize, and apply Microsoft security recommendations.
  • Consolidated product baselines that eliminate EC and SSLF baseline components, and make viewing, customizing, and implementing your security baselines easier than ever!
  • New compliance-based settings groups allow quicker and easier compliance reporting and audit preparation, when used with theGRC management solution within System Center.

Microsoft Security Compliance Manager (SCM 2) tool

Secure Client Computers with updated SCM 2 Client Baselines—Beta now available for download

Available beta baselines are:

  • Windows 7 SP1 Security Compliance Baseline
  • Windows Vista SP2 Security Compliance Baseline
  • Windows XP SP3 Security Compliance Baseline
  • Office 2010 SP1 Security Baseline
  • Internet Explorer 8 Security Compliance Baseline

SCM 2 enables you to quickly configure and manage your desktops and laptops, traditional data center, and private cloud using Group Policy and Microsoft System Center Configuration Manager.

SCM 2 is a free tool from the Microsoft Solution Accelerators team that enables you to quickly configure and manage your computers, traditional data center, and private cloud using Group Policy and Microsoft System Center Configuration Manager.

Key features in SCM 2 include:

  • Integration with the System Center 2012 IT GRC Process Pack for Service Manager-Beta:Product configurations are integrated into the IT GRC Process Pack to provide oversight and reporting of your compliance activities.

  • Gold master support: Import andtake advantage of your existing Group Policy or create a snapshot of a reference machine to kick-start your project.

  • Configure stand-alone machines: Deploy your configurations to non-domain joined computers using the new GPO Pack feature.

  • Updated security guidance: Take advantage of the deep security expertise and best practices in the updated security guides, and the attack surface reference workbooks to help reduce the security risks that you consider to be the most important.

  • Compare against industry best practices: Analyze your configurations against prebuilt baselines for the latest Windows client and server operating systems.

  • image

SCM 2 released with the a full complement of Microsoft product baselines, including Windows Internet Explorer 9, Windows Server 2008 R2 Service Pack 1 (SP1), Windows Server 2008 SP2, and Windows Server 2003 SP2.

Also the security guides are also in the download.

 

Get SCM2 from the Microsoft Download Center. Click here to download the latest version of the tool.

Security and Compliance Baselines

In addition to the previously released security baselines, the SCM 2 includes a new Windows Internet Explorer 9 Security Baseline, and updated versions of the security and compliance baselines for Windows Server 2008 R2 SP1, Windows Server 2008 SP2, and Windows Server 2003 SP2.

These new beta baselines provide:

  • Setting severity ratings, allowing you to quickly sort, prioritize, and apply Microsoft security recommendations.
  • Consolidated product baselines that eliminate EC and SSLF baseline components, and make viewing, customizing, and implementing your security baselines easier than ever!
  • New compliance-based settings groups allow quicker and easier compliance reporting and audit preparation, when used with theGRC management solution within System Center.

Security Content

Teach Kids Mobile Safety brochure  (view content)

This brochure discusses how to work with kids to set clear limits for mobile device use, and responsible use as well as how to get help from technology and what to do if there are problems.

 

Security Alliance

 

Coordinated Vulnerability Disclosure (view content)

Video- Coordinated Vulnerability Disclosure (view content)

In July 2010, Microsoft announced a shift in philosophy on vulnerability disclosure, reframing its practice of Responsible Disclosure and moving to adopt Coordinated Vulnerability Disclosure as its new approach. The purpose of this shift was to move away from the endless and often unproductive debate between responsible and full disclosure proponents, and focus instead on the heightened role that coordination plays in minimizing risk to customers.  Microsoft believes that the process of vulnerability disclosure is a shared responsibility best practiced in strong coordination between finders, vendors, and protection providers working together to protect customers, businesses, and critical infrastructure.

 

 

Adding Usable Security to the SDL (view content)

Security Alliance

Adam Shostack blogs about adding usable security to the SDL- “Lately, I’ve been focused on how we bring the engineering of usable security into the SDL. When I say usable security, I mean that for those times when we need to ask a user for input on something only they know. (For example, are you connecting to a coffee shop network or your work network? Are you trying to print to a printer you’ve never used before?) We want to ensure that those questions enable users to make security decisions in accordance with their preferences and goals”.

 

National Cyber Security Alliance (NCSA) Partnership (view content)

Security Alliance

Microsoft has partnered with the National Cyber Security Alliance (NCSA) since its inception nearly a decade ago. Founded by the Department of Homeland Security (DHS), NCSA’s mission is to help increase awareness of Internet safety and security, and to educate people about how to best protect themselves and their devices. Microsoft works with the NCSA on many issues and activities, including strategic programs and projects, market research and industry and public outreach.

 

Beware of bin Laden malware on the web and in email (view content)

Security Alliance

Cybercriminals are quick to put up fraudulent websites that people will find when they’re searching for popular news topics. These sites often contain fake security software that tries to trick you into to downloading malware by making you think that your security is at risk.

Posted May 13, 2011 by Robert Smit in Security

  • Tag