Security is always a big subject area. Over the last two months Technet have published the following items that will help understanding and delivery of secure systems base do Microsoft technology.
Windows Vista
TechNet Magazine: Inside Windows Vista User Account Control
Mark Russinovich explains that User Account Control (UAC) is one of the most misunderstood new features in Windows Vista. But its goal -- to enable users to run with standard user rights -- can solve many security issues. Get an inside look at the problems UAC addresses and see exactly how this new feature works.
http://go.microsoft.com/?linkid=6803653
Network Security
Internet Protocol Security Enforcement in the Network Access Protection Platform
This white paper describes the Network Access Protection (NAP) platform, how IPsec protects traffic, and how IPsec Enforcement in NAP provides system health policy enforcement for IPsec-secured communication.
http://www.microsoft.com/downloads/details.aspx?FamilyID=144cc69f-790f-4f52-8846-3f3b8584d7cd&DisplayLang=en
Introduction to Network Access Protection
Read this white paper for an overview of the NAP business scenarios, an outline of the components of NAP, and a description of how NAP works.
http://www.microsoft.com/downloads/details.aspx?FamilyID=5d5e243a-23a8-479c-9f2d-37d6d79153e7&DisplayLang=en
Step-by-Step Guide: Demonstrate VPN NAP Enforcement in a Test Lab
Test lab to demonstrate VPN NAP enforcement
http://www.microsoft.com/downloads/details.aspx?FamilyID=729bba00-55ad-4199-b441-378cc3d900a7&DisplayLang=en
General
Microsoft Security Intelligence Report http://go.microsoft.com/?linkid=6755495
The Microsoft Security Intelligence Report provides a comprehensive understanding of the types of threats Windows customers face today so they can take appropriate action to help ensure they are better protected. The report highlights trends observed over the past several years, leveraging data collected by Microsoft between July 1 and December 31, 2006, from numerous sources including the Microsoft Malicious Software Removal Tool (MSRT) and Windows Defender.
Privacy Guidelines for Developing Software Products and Services
This document is a set of privacy guidelines for developing software products and services that are based on our internal guidelines and our experience incorporating privacy into the development process.
http://www.microsoft.com/downloads/details.aspx?FamilyID=c48cf80f-6e87-48f5-83ec-a18d1ad2fc1f&DisplayLang=en
Six Easy Pieces for Computer Security http://www.microsoft.com/technet/community/columns/sectip/st0707.mspx
By Mike Danseglio, Senior Group Program Manager, Security & Compliance Solution Accelerators, Microsoft Corporation
This article presents six easy steps that every company should take to enhance computer security in terms of getting the proverbial biggest bang for the security buck. Each suggestion is described in some detail with links to more in-depth treatments, templates, and tools.
Security Guidelines for Professional Services Firms http://www.microsoft.com/midsizebusiness/security/professionalservices.mspx
When it comes to security, professional services companies are hampered by tight IT budgets, an ever-increasing amount of content, and a lack of dedicated security personnel. Protecting data at services firms may require a melding of technology and services to get the job done. This article offers some guidelines to help midsize professional service firms.
ttfn
David
Posted
Thu, Aug 16 2007 11:57 PM
by
David Overton
Filed under: Windows 7, Vista and XP, Support and Tools, Security, Windows Server 2003, Event, Windows Client, Vista, Documentation, Research, Windows Server 2008