![]() |
Microsoft Security Advisor Program |
Also, go to
http://msdn.microsoft.com/workshop/essentials/mail.asp
and get on the mailing list for subjects of interest to you.
Windows 98 Download: Windows Update and Security
http://www.microsoft.com/windows98/downloads/corporate.asp
Updated June 15, 1999
Security
Bulletins
Microsoft provides a list of security-related issues with our products.
New issues include:
Microsoft has released a security bulletin that details a workaround
for a vulnerability involving IIS 4.0 Read more.
Worm.Explore.Zip
Virus
Microsoft has learned of a virus circulating on the Internet called
Worm.Explore.Zip that is affecting a number of e-mail users. Customers
can avoid being affected by this virus by following standard security precautions,
such as using Outlook's security features and ensuring that their anti-virus
software is up-to-date. Read more!
Securing
Microsoft BackOffice for E-Commerce Seminars!
Internet Security Systems is hosting a nationwide series of presentations
on how to run Windows NT, IIS, SiteServer, and SQL Server in secure environments
such as as commerce extranets, and secured line-of-business scenarios.
Read more!
Security
Walkthroughs for Windows 2000!
Windows 2000 includes many great new security features, and the easiest
way to learn about them is to try them out. Step-by-step walkthroughs make
this easy Read more!
Security
Checklist for IIS!
Security is important for any server, but it's especially critical
for web servers. Microsoft has developed a checklist that will enable web
site operators to deploy IIS web servers with confidence that they're configured
for secure operation Read more!
Black
Hat Briefings
Microsoft is pleased to sponsor this year's Black Hat Briefings, July
7th and 8th in Las Vegas, NV. The Black Hat Briefings focus on the vital
security issues facing organizations with large Enterprise networks and
mixed network operating systems. Topics will include Intrusion Detection
Systems (IDS), Computer Forensics (CF) systems, Incident Response, and
others. Read more!
Kerberos
in Windows 2000
The use of the Kerberos authentication protocol in Windows 2000 significantly
improves security, network performance and interoperability. A new white
paper details how the protocol is implemented and used in Windows 2000.
Download the paper!
Windows
NT Server Achieves Major Security Milestone!
On April 28th 1999, the UK Government announced that Windows NT 4.0
has been successfully evaluated at the E3/F-C2 level. This evaluation,
which is roughly equivalent to a C2 evaluation according to the US "Orange
Book", confirms what millions of customers already know—that Windows NT
Server provides the security needed by banking, health care, military and
other customers, as well as the flexibility and ease of use demanded by
small business and home users. Read more!
Security
Planning Tool for IIS Available!
A tool is available for web designers that explains Windows NT security
as it relates to Internet Information Server (IIS). It covers authentication
mechanisms, how they differ, several ways of controlling access to key
areas on your Web server, and the important, but almost universally misunderstood,
concept of "delegation." Read more!
Office
2000 Security Web Site
Microsoft Office 2000 contains many new and improved security features
that help customers protect their data and ensure that their networks are
safe from security threats like macro viruses. A new web site, Security
and Microsoft Office; http://officeupdate.microsoft.com/focus/Catalog/FocusSecurity.htm,
discusses the features and how to use them. Read more.
"Melissa"
Virus
This Word macro virus has affected a number of users and companies.
Customers can avoid being affected by this virus by following standard
security precautions, such as using Word's macro security features and
ensuring that their anti-virus software is up-to-date. Read more.
Windows
NT Server Provides Security for NATO
When NATO deployed forces to Bosnia, it needed to exchange sensitive
information up and down the chain of command. It developed CRONOS, a network
built on Windows NT Server. Today, CRONOS' role is expanding to carry command
as well as tactical data. Read more.
ASB
Bank Provides Secure On-line Banking Using Server Gated Cryptography!
ASB Bank, one of New Zealand's leading banks, has long earned a reputation
for leading the pack when it comes to using technology to respond to customers'
needs. So when customers wanted secure, convenient banking via the Internet,
ASB Bank responded using Microsoft's Server Gated Cryptography, a technology
that for the first time makes strong cryptography available to worldwide
banking customers. Read more.
Adaptec
Gains Improved Manageability and Security by Deploying Windows NT
The native single sign-on capability of Windows NT, and the improved
security that it provides, were among the reasons why this industry leader
switched from Novell Netware 3.x to Windows NT 4.0. Read more.
Receive
an E-mail Claiming to Contain an Upgrade from Microsoft? Beware!
Malicious users often try to camouflage harmful software in an effort
to get unsuspecting users to run it. Several e-mails currently are circulating
that claim to contain upgrades of Microsoft software. However, Microsoft
does not distribute software by e-mail. If you receive such an e-mail,
delete it or report to the sender's Internet Service Provider. Read more.
Microsoft
and Modulo Products Safeguard the Brazilian Elections
The ultimate mission-critical application -- the world's largest electronic
election! In the most recent Brazilian election, over 60 million voters
cast their ballots electronically for President, Senate and over 2000 local
offices. Microsoft Windows NT 4.0, and He@tseeker Pro and CFW98 -- products
from Modulo, a member of the Microsoft Security Partners Program -- provided
rock-solid security, ensuring the integrity and trustworthiness of the
elections. Read more.
Important
White Paper: Single Sign-On in Windows 2000 Networks
Single Sign-On (SSO) allows enterprises to improve the ease of network
administration, increase user productivity, and improve security, by enabling
users to easily access servers, printers, and other network resources without
additional logons or passwords. Windows 2000 provides a native SSO capability
that can dramatically reduce Total Cost of Ownership, both in homogeneous
and heterogeneous networks. Read on.
Security
Basics White Paper Available
Need a quick introduction to security issues? PricewaterhouseCoopers
has published a great new white paper on security basics. Click here for
more information.
MSDN
Online Chat about Secure COM with Don Box and Keith Brown
Read the transcript of the August chat with Don Box and Keith Brown,
columnists for Microsoft Systems Journal and industry experts on COM. Box
and Brown discuss how COM deals with various security issues, such as authentication
and encryption.
Read
WindowsPro Magazine's Special Report on Windows NT 5.0 Security!
WindowsPro Magazine has just published a great preview of Windows NT
5.0 security. The article details the core security technologies in Windows
NT 5.0 -- the Active Directory and Kerberos authentication protocol --
and highlights the great strides that Windows NT 5.0 makes in security
manageability, scalability, and interoperability. Don't miss it!
Comparing
the Security Architectures of Microsoft Windows NT 4.0 and Novell IntranetWare
4.11
SAIC has just completed a comparison of the Windows NT 4.0 and IntranetWare
4.11 security architectures. It concludes that the flexibility of the Windows
NT 4.0 peer architecture, along with its improved authentication, auditing,
security partitioning, and manageability make Windows NT 4.0 the choice
platform for modern enterprise networks. Although Novell IntranetWare 4.11
provides a secure solution for file and print server requirements, its
suitability for use in an enterprise network environment is limited by
the inflexibility of the file server architecture. The full white paper
is available for downloading.
Meeting
Enterprise Security needs - Windows NT and Unix
Windows NT provides a secure platform that satisfies all the critical
security requirements that businesses must consider when selecting an operating
system for mission critical operations. Download the White paper that compares
the security underpinnings of Windows NT and Unix.
Article
on Windows NT 5.0 implementation of Kerberos
Read this article about "Kerberos authentication in Windows NT 5.0
domains", written by Peter Brundrett, Windows NT Security Program Manager
at Microsoft. This article was first published in May 1998 in the special
security issue of ;login:, the magazine of the USENIX Association.
Analysis
of Windows NT Security by The Burton Group
Microsoft Windows NT has been designed from the ground up with a distributed
security model and security is an important feature of both client and
server versions of Windows NT. Read The Burton Group analysis of the Windows
NT security architecture and Microsoft's long-term security strategy for
Windows NT.
Valuable New Resources for Implementing Security using Windows NT!
As part of a project for the National Security Agency (NSA), Trusted
Systems has produced guidelines for securely configuring the Microsoft®
Windows NT® operating system. These guidelines target best commercial
and military practices, and are based on extensive research into previous
and concurrent efforts. The completed 110-page guidelines are available
free from the Trusted Systems Web site.
The SANS Institute has published a step-by-step guide that helps customers
establish, maintain, and fine-tune security for their users and data using
Microsoft Windows NT. Security experts from major corporate and government
computing centers contributed to the report, which is available at the
SANS Institute Web site.
© 1999 Microsoft Corporation. All rights reserved.
Protect Yourself Against Internet Intruders
and Hackers!
Internet ALERT '99
http://www.bonzi.com/internetalert/ia99m.asp
Are You Being Bugged?
This is a MUST SEE if you have anything on your computer that
you don't want other to see.
http://www.winmag.com/fixes/webbugs.htm