Microsoft Security Advisor Program


1st, go here for yourself and bookmark it as it is subject to change and new reports come out.
http://www.microsoft.com/security/default.asp

Also, go to
http://msdn.microsoft.com/workshop/essentials/mail.asp
and get on the mailing list for subjects of interest to you.

Windows 98 Download: Windows Update and Security
http://www.microsoft.com/windows98/downloads/corporate.asp

Updated June 15, 1999

Security Bulletins
Microsoft provides a list of security-related issues with our products. New issues include:
Microsoft has released a security bulletin that details a workaround for a vulnerability involving IIS 4.0 Read more.

Worm.Explore.Zip Virus
Microsoft has learned of a virus circulating on the Internet called Worm.Explore.Zip that is affecting a number of e-mail users. Customers can avoid being affected by this virus by following standard security precautions, such as using Outlook's security features and ensuring that their anti-virus software is up-to-date. Read more!

Securing Microsoft BackOffice for E-Commerce Seminars!
Internet Security Systems is hosting a nationwide series of presentations on how to run Windows NT, IIS, SiteServer, and SQL Server in secure environments such as as commerce extranets, and secured line-of-business scenarios. Read more!

Security Walkthroughs for Windows 2000!
Windows 2000 includes many great new security features, and the easiest way to learn about them is to try them out. Step-by-step walkthroughs make this easy Read more!

Security Checklist for IIS!
Security is important for any server, but it's especially critical for web servers. Microsoft has developed a checklist that will enable web site operators to deploy IIS web servers with confidence that they're configured for secure operation Read more!

Black Hat Briefings
Microsoft is pleased to sponsor this year's Black Hat Briefings, July 7th and 8th in Las Vegas, NV. The Black Hat Briefings focus on the vital security issues facing organizations with large Enterprise networks and mixed network operating systems. Topics will include Intrusion Detection Systems (IDS), Computer Forensics (CF) systems, Incident Response, and others. Read more!

Kerberos in Windows 2000
The use of the Kerberos authentication protocol in Windows 2000 significantly improves security, network performance and interoperability. A new white paper details how the protocol is implemented and used in Windows 2000. Download the paper!

Windows NT Server Achieves Major Security Milestone!
On April 28th 1999, the UK Government announced that Windows NT 4.0 has been successfully evaluated at the E3/F-C2 level. This evaluation, which is roughly equivalent to a C2 evaluation according to the US "Orange Book", confirms what millions of customers already know—that Windows NT Server provides the security needed by banking, health care, military and other customers, as well as the flexibility and ease of use demanded by small business and home users. Read more!

Security Planning Tool for IIS Available!
A tool is available for web designers that explains Windows NT security as it relates to Internet Information Server (IIS). It covers authentication mechanisms, how they differ, several ways of controlling access to key areas on your Web server, and the important, but almost universally misunderstood, concept of "delegation." Read more!

Office 2000 Security Web Site
Microsoft Office 2000 contains many new and improved security features that help customers protect their data and ensure that their networks are safe from security threats like macro viruses. A new web site, Security and Microsoft Office; http://officeupdate.microsoft.com/focus/Catalog/FocusSecurity.htm, discusses the features and how to use them. Read more.

"Melissa" Virus
This Word macro virus has affected a number of users and companies. Customers can avoid being affected by this virus by following standard security precautions, such as using Word's macro security features and ensuring that their anti-virus software is up-to-date. Read more.

Windows NT Server Provides Security for NATO
When NATO deployed forces to Bosnia, it needed to exchange sensitive information up and down the chain of command. It developed CRONOS, a network built on Windows NT Server. Today, CRONOS' role is expanding to carry command as well as tactical data. Read more.

ASB Bank Provides Secure On-line Banking Using Server Gated Cryptography!
ASB Bank, one of New Zealand's leading banks, has long earned a reputation for leading the pack when it comes to using technology to respond to customers' needs. So when customers wanted secure, convenient banking via the Internet, ASB Bank responded using Microsoft's Server Gated Cryptography, a technology that for the first time makes strong cryptography available to worldwide banking customers. Read more.

Adaptec Gains Improved Manageability and Security by Deploying Windows NT
The native single sign-on capability of Windows NT, and the improved security that it provides, were among the reasons why this industry leader switched from Novell Netware 3.x to Windows NT 4.0. Read more.

Receive an E-mail Claiming to Contain an Upgrade from Microsoft? Beware!
Malicious users often try to camouflage harmful software in an effort to get unsuspecting users to run it. Several e-mails currently are circulating that claim to contain upgrades of Microsoft software. However, Microsoft does not distribute software by e-mail. If you receive such an e-mail, delete it or report to the sender's Internet Service Provider. Read more.

Microsoft and Modulo Products Safeguard the Brazilian Elections
The ultimate mission-critical application -- the world's largest electronic election! In the most recent Brazilian election, over 60 million voters cast their ballots electronically for President, Senate and over 2000 local offices. Microsoft Windows NT 4.0, and He@tseeker Pro and CFW98 -- products from Modulo, a member of the Microsoft Security Partners Program -- provided rock-solid security, ensuring the integrity and trustworthiness of the elections. Read more.

Important White Paper: Single Sign-On in Windows 2000 Networks
Single Sign-On (SSO) allows enterprises to improve the ease of network administration, increase user productivity, and improve security, by enabling users to easily access servers, printers, and other network resources without additional logons or passwords. Windows 2000 provides a native SSO capability that can dramatically reduce Total Cost of Ownership, both in homogeneous and heterogeneous networks. Read on.

Security Basics White Paper Available
Need a quick introduction to security issues? PricewaterhouseCoopers has published a great new white paper on security basics. Click here for more information.

MSDN Online Chat about Secure COM with Don Box and Keith Brown
Read the transcript of the August chat with Don Box and Keith Brown, columnists for Microsoft Systems Journal and industry experts on COM. Box and Brown discuss how COM deals with various security issues, such as authentication and encryption.

Read WindowsPro Magazine's Special Report on Windows NT 5.0 Security!
WindowsPro Magazine has just published a great preview of Windows NT 5.0 security. The article details the core security technologies in Windows NT 5.0 -- the Active Directory and Kerberos authentication protocol -- and highlights the great strides that Windows NT 5.0 makes in security manageability, scalability, and interoperability. Don't miss it!

Comparing the Security Architectures of Microsoft Windows NT 4.0 and Novell IntranetWare 4.11
SAIC has just completed a comparison of the Windows NT 4.0 and IntranetWare 4.11 security architectures. It concludes that the flexibility of the Windows NT 4.0 peer architecture, along with its improved authentication, auditing, security partitioning, and manageability make Windows NT 4.0 the choice platform for modern enterprise networks. Although Novell IntranetWare 4.11 provides a secure solution for file and print server requirements, its suitability for use in an enterprise network environment is limited by the inflexibility of the file server architecture. The full white paper is available for downloading.

Meeting Enterprise Security needs - Windows NT and Unix
Windows NT provides a secure platform that satisfies all the critical security requirements that businesses must consider when selecting an operating system for mission critical operations. Download the White paper that compares the security underpinnings of Windows NT and Unix.

Article on Windows NT 5.0 implementation of Kerberos
Read this article about "Kerberos authentication in Windows NT 5.0 domains", written by Peter Brundrett, Windows NT Security Program Manager at Microsoft. This article was first published in May 1998 in the special security issue of ;login:, the magazine of the USENIX Association.

Analysis of Windows NT Security by The Burton Group
Microsoft Windows NT has been designed from the ground up with a distributed security model and security is an important feature of both client and server versions of Windows NT. Read The Burton Group analysis of the Windows NT security architecture and Microsoft's long-term security strategy for Windows NT.

Valuable New Resources for Implementing Security using Windows NT!

As part of a project for the National Security Agency (NSA), Trusted Systems has produced guidelines for securely configuring the Microsoft® Windows NT® operating system. These guidelines target best commercial and military practices, and are based on extensive research into previous and concurrent efforts. The completed 110-page guidelines are available free from the Trusted Systems Web site.
The SANS Institute has published a step-by-step guide that helps customers establish, maintain, and fine-tune security for their users and data using Microsoft Windows NT. Security experts from major corporate and government computing centers contributed to the report, which is available at the SANS Institute Web site.

© 1999 Microsoft Corporation. All rights reserved.


How Hackers Break Into Your Home Computer
http://www.networkice.com/Library/homeprotect.htm

Protect Yourself Against Internet Intruders and Hackers!
Internet ALERT '99
http://www.bonzi.com/internetalert/ia99m.asp

Are You Being Bugged?
This is a MUST SEE if you have anything on your computer that you don't want other to see.
http://www.winmag.com/fixes/webbugs.htm


  • Back To The Top    • Back To Home