This site is my way to share my views and general business and IT information with you about Microsoft, IT solutions for ISVs, technologists and businesses, large and small.  
TechNet Security Postings for June

New security features in Internet Explorer 7 (Beta 2) http://go.microsoft.com/?linkid=4979991

Learn about the new security features in the browser's latest version that help better protect your PC and personal information

Microsoft Threat Analysis and Modelling Tool, Version 2.0, RC1 http://go.microsoft.com/?linkid=5049706

The free Microsoft Threat Analysis and Modelling tool allows nonsecurity subject matter experts to enter already-known information, including business requirements and application architecture, to produce a feature-rich threat model. Along with automatically identifying threats, the tool can produce valuable security artefacts such as data control, component access control, and subject-object matrices as well as data flows and focused reports.

Reduce Your Risk: 10 Security Rules to Live By http://go.microsoft.com/?linkid=5049703

When you manage security you must strive to reduce unacceptable risk while keeping the impact on workflow of the organization and total cost of ownership of the infrastructure to a minimum. Here are 10 key points an administrator should keep in mind while working on a security management plan.

Ten Principles of Microsoft Patch Management http://go.microsoft.com/?linkid=4985813

In the latest TechNet Security Management column, Christopher Budd explores best practices for enterprise update management, designed to help you better protect your systems.

Group Policy: Ins and Outs of Delegation and Control http://go.microsoft.com/?linkid=5049704

Delegating power within any organization is not a trivial matter. When it concerns group policy, you need to decide just who creates group policy objects (GPOs) and who can link them to areas in Active Directory. This article discusses how, even though the Domain Administrators are the only people who can create GPOs by default, these permissions can be delegated to deputy administrators so they can create GPOs, alleviating some of the burden.

Windows Mobile 5.0 Application Security http://go.microsoft.com/?linkid=5049705

Every Windows Mobile-based device implements a set of security policies that determine whether an application is allowed to run and, if allowed, with what level of trust. To develop an application for a Windows Mobile-based device, you need to know what the security configuration of your device is. Read this article and learn how to develop an application for a Windows Mobile-based device, including how to determine the security configuration of your device and how to sign your application with the appropriate certificate.

June 2006 Security Releases ISO Image

These ISO-9660 CD image files contain the security updates for Windows released on Windows Update on June 13th, 2006



Enterprise Update Scanning Tool version 3 for Bulletin MS04-028 (Standalone)

MS04-028 Enterprise Update Scanning Tool version 3 (Standalone) for detecting needed updates prescribed in bulletin MS04-028


June 13, 2006 Enterprise Update Scan Tool (standalone version)

Enterprise Update Scan Tool (standalone version) for detecting needed updates prescribed in the security bulletins released in June 2006. Addresses MS06-023 and MS06-024.


Extended Security Update Inventory Tool

The Extended Security Update Inventory Tool is used to detect security bulletins not covered by MBSA including MS04-028, February 2005 bulletins, and future security bulletins that are exceptions to MBSA.


Microsoft® Windows® Malicious Software Removal Tool (KB890830)

This tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found. Microsoft will release an updated version of this tool on the second Tuesday of each month.




Posted Mon, Jul 3 2006 7:11 AM by David Overton

Add a Comment

Remember Me?

(c)David Overton 2006-23