This site is my way to share my views and general business and IT information with you about Microsoft, IT solutions for ISVs, technologists and businesses, large and small.  
Security for Windows Vista (understanding more about UAC), Networks, plus advice and guidance

Security is always a big subject area.  Over the last two months Technet have published the following items that will help understanding and delivery of secure systems base do Microsoft technology.

Windows Vista

TechNet Magazine: Inside Windows Vista User Account Control

Mark Russinovich explains that User Account Control (UAC) is one of the most misunderstood new features in Windows Vista. But its goal -- to enable users to run with standard user rights -- can solve many security issues. Get an inside look at the problems UAC addresses and see exactly how this new feature works.

Network Security

Internet Protocol Security Enforcement in the Network Access Protection Platform

This white paper describes the Network Access Protection (NAP) platform, how IPsec protects traffic, and how IPsec Enforcement in NAP provides system health policy enforcement for IPsec-secured communication.


Introduction to Network Access Protection

Read this white paper for an overview of the NAP business scenarios, an outline of the components of NAP, and a description of how NAP works.


Step-by-Step Guide: Demonstrate VPN NAP Enforcement in a Test Lab

Test lab to demonstrate VPN NAP enforcement



Microsoft Security Intelligence Report http://go.microsoft.com/?linkid=6755495

The Microsoft Security Intelligence Report provides a comprehensive understanding of the types of threats Windows customers face today so they can take appropriate action to help ensure they are better protected. The report highlights trends observed over the past several years, leveraging data collected by Microsoft between July 1 and December 31, 2006, from numerous sources including the Microsoft Malicious Software Removal Tool (MSRT) and Windows Defender.

Privacy Guidelines for Developing Software Products and Services

This document is a set of privacy guidelines for developing software products and services that are based on our internal guidelines and our experience incorporating privacy into the development process.


Six Easy Pieces for Computer Security  http://www.microsoft.com/technet/community/columns/sectip/st0707.mspx

By Mike Danseglio, Senior Group Program Manager, Security & Compliance Solution Accelerators, Microsoft Corporation
This article presents six easy steps that every company should take to enhance computer security in terms of getting the proverbial biggest bang for the security buck. Each suggestion is described in some detail with links to more in-depth treatments, templates, and tools.

Security Guidelines for Professional Services Firms  http://www.microsoft.com/midsizebusiness/security/professionalservices.mspx

When it comes to security, professional services companies are hampered by tight IT budgets, an ever-increasing amount of content, and a lack of dedicated security personnel. Protecting data at services firms may require a melding of technology and services to get the job done. This article offers some guidelines to help midsize professional service firms.




Posted Thu, Aug 16 2007 11:57 PM by David Overton


University Update-Michael Moore-Security for Windows Vista (understanding more about UAC), Networks, plus advice and guidance wrote University Update-Michael Moore-Security for Windows Vista (understanding more about UAC), Networks, plus advice and guidance
on Fri, Aug 17 2007 8:57 AM

Pingback from  University Update-Michael Moore-Security for Windows Vista (understanding more about UAC), Networks, plus advice and guidance

Add a Comment

Remember Me?

(c)David Overton 2006-23