Microsoft Security Newsletter - July 2013
Trustworthy Computing | July 2013
Microsoft Security Newsletter
Welcome to July’s Security Newsletter!
This month our newsletter focuses on the Bring Your Own Device (BYOD) trend in the workplace and the implications it has for IT professionals. For many organizations, allowing employees to bring in personal computing devices—such as smart phones, tablets and PCs—can improve productivity and reduce the costs associated with deploying and supporting company-issued assets. As a result, BYOD has become a popular trend that is gaining wide acceptance in locations around the world. Microsoft recently commissioned the Trust in Computing survey to help uncover current attitudes and perceptions related to security and privacy. The study found that 78% of organizations allow employees to bring their own computing devices to the office for work purposes. There were also some interesting regional variations that can been seen in the below chart.
While the immediate benefits of BYOD might seem clear, they also come with IT security and management implications as IT departments can lose some of the control they traditionally exercised over managed resources. The security challenges of BYOD include enforcing policies like the use of strong passwords on multiple devices, ensuring that every device has up-to-date patches and robust anti-malware protection, the encryption of sensitive data, and mitigating other risks such as the loss of devices and the use of unsecured third-party data connections. Recognizing the benefits that BYOD can provide, Microsoft has designed its products and services with BYOD-friendly policies in mind.There are a few resources I suggest for diving deeper if you are interested in learning more about the topic and Microsoft’s approach:
-
http://blogs.technet.com/b/security/archive/2013/07/10/trust-in-computing-surve y-part-i-consumerization-of-it-goes-mainstream.aspx
Trust in Computing Survey, Part 1: Consumerization of IT Goes Mainstream
-
http://technet.microsoft.com/windows/jj874384.aspx?ocid=wc-nl-secnews
Managing Windows 8 Devices in a Bring Your Own Device World
-
http://www.microsoft.com/en-us/windows/enterprise/scenarios/BYOD.aspx
How to Embrace BYOD: Guidance for Enterprises
Finally, I’d like to thank those of you who sent us your ideas on how to improve this newsletter moving forward. We are always looking for additional feedback so email us at
mailto:
secnlfb@microsoft.com
secnlfb@microsoft.com and share your ideas.
Best regards,
Tim Rains, Director
Microsoft
Trustworthy
Computing
Top Stories
http://blogs.technet.com/b/in_the_cloud/archive/2013/07/10/what-s-new-in-2012-r 2-making-device-users-productive-and-protecting-corporate-information.aspx What’s New in Windows Server 2012 R2: Making Device Users Productive and Protecting Corporate Information
The modern workforce isn’t just better connected and more mobile than ever before, it’s also more discerning (and demanding) about the hardware and software used on the job. Get a helpful overview of the architecture and critical components of
http://www.microsoft.com/en-us/server-cloud/pcit.aspx
People-centric IT (PCIT) , learn how to embrace the consumerization of IT, and get insight into the technologies that will help you enable BYOD scenarios in your organization.
http://blogs.technet.com/b/security/archive/2013/07/12/trust-in-computing-surve y-part-2-less-than-half-of-developers-use-a-security-development-process.aspx Trust in Computing Survey, Part 2: Less Than Half of Developers Use a Security Development Process
The threat landscape is continually evolving. Attackers are constantly seeking out new ways to compromise potential victims on a broad or targeted scale. They attempt to exploit unpatched vulnerabilities, use deceitful tactics to trick users into installing malicious software, attempt to guess weak passwords, and employ other dirty tricks. Despite this reality, a large number of organizations are still not developing applications with security in mind. Explore the reasons behind this concerning trend.
http://blogs.technet.com/b/security/archive/2013/07/08/trustworthy-blog-app-now -available-for-windows-phone-8.aspx
Trustworthy Computing Blog App Now Available for Windows Phone 8
Learn about the improvements available in the new version of our Trustworthy Computing Blogs Windows Phone application, which include optimization for Windows Phone 8 users, live tile notifications, and improved graphics.
Security Guidance
http://technet.microsoft.com/library/dn268299.aspx
Windows Server 2012 R2 Preview: What's New in Access and Information Protection
In Windows Server 2012 R2 Preview, Active Directory has been enhanced to allow IT risk management while also enabling IT to empower their users to be productive from a variety of devices. Learn about these enhancements, then get step-by-step guidance with these walkthroughs:
-
http://technet.microsoft.com/library/dn280938.aspx
Workplace Join with a Windows Device
-
http://technet.microsoft.com/library/dn280933.aspx
Workplace Join with an iOS Device
-
http://technet.microsoft.com/library/dn280943.aspx
Connect to Applications and Services from Anywhere with Web Application Proxy
-
http://technet.microsoft.com/library/dn280936.aspx
Manage Risk with Multi-factor Access Control
-
http://technet.microsoft.com/library/dn280946.aspx
Manage Risk with Additional Multi-Factor Authentication for Sensitive Applications
http://technet.microsoft.com/library/jj884158.aspx
How to Manage Mobile Devices by Using Configuration Manager and Windows Intune
Learn how to manage apps for Windows Phone 8, Windows RT, iOS, and Android devices by using the Windows Intune service and the System Center Configuration Manager console.
http://technet.microsoft.com/systemcenter/hh927307.aspx
Ensure the Compliance of Devices with Configuration Manager
System Center 2012 Configuration Manager SP1 contains new capabilities you can use to manage roaming profiles, offline files, and folder redirection on computers that run Windows 8 in your organization. Learn how to create configuration data, and deploy and manage configuration baselines, in order to ensure that your devices all contain consistent configurations and settings, and even automatically remediate settings found to be noncompliant.
http://technet.microsoft.com/library/ee424371.aspx?ocid=wc-nl-secnews
When to Use AppLocker
AppLocker is an application control feature in Windows Server 2012, Windows Server 2008 R2, Windows 8, and Windows 7 that helps you control which applications and files users can run. Find out how AppLocker can help you to protect the digital assets within your organization, reduce the threat of malicious software being introduced into your environment, and improve the management of application control and the maintenance of application control policies.
http://technet.microsoft.com/windows/dn260725.aspx?ocid=wc-nl-secnews
Windows RT in the Enterprise: Security Technologies
Windows RT is designed to leverage all of the security technologies present in Windows 8, several of which are new. Explore why Windows RT not only supports these technologies, but requires many of them for all Windows RT devices to help ensure that the devices are protected from the first time they are turned on.
http://technet.microsoft.com/en-us/library/aa998599(v=exchg.150).aspx
Messaging Policy and Compliance in Exchange Server 2013
Messaging stores and mailboxes have become repositories of valuable data. Explore the messaging policy and compliance features in Exchange Server 2013, then get step-by-step guidance to help you configure key features such as Data Loss Prevention (DLP) and messaging records management (MRM).
Cloud Security Corner
http://blogs.technet.com/b/trustworthycomputing/archive/2013/07/08/cloud-securi ty-best-practices-and-recommended-resources.aspx
Cloud Security: Best Practices and Recommended Resources
As cloud computing begins to mature, organizations are looking at ways to understand the opportunities and assess their own current IT environment with regard to security, privacy and reliability practices, policies and compliance.To help organizations make informed security decisions and evaluate IT readiness for moving assets to the cloud, check out the top two resources recommended by Microsoft Trustworthy Computing General Manager Adrienne Hall.
This Month’s Security Bulletins
Microsoft Security Bulletin Summary for June 2013
Critical
-MS13-052:2861561
https://technet.microsoft.com/en-us/security/bulletin/ms13-052
Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution
-MS13-053:2850851
https://technet.microsoft.com/en-us/security/bulletin/ms13-053
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution
-MS13-054:2848295
https://technet.microsoft.com/en-us/security/bulletin/ms13-054
Vulnerability in GDI+ Could Allow Remote Code Execution
-MS13-055:2846071
https://technet.microsoft.com/en-us/security/bulletin/ms13-055
Cumulative Security Update for Internet Explorer
-MS13-056:2845187
https://technet.microsoft.com/en-us/security/bulletin/ms13-056
Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
-MS13-057:2847883
https://technet.microsoft.com/en-us/security/bulletin/ms13-057
Vulnerability in Windows Media Format Runtime Could Allow Remote Code Execution
Important
-MS13-058:2847927
http://technet.microsoft.com/en-us/security/bulletin/MS13-058
Vulnerability in Windows Defender Could Allow Elevation of Privilege
July 2013 Security Bulletin Resources:
-
http://blogs.technet.com/b/msrc/archive/2013/07/09/a-new-policy-for-store-apps- and-the-july-2013-security-updates.aspx
Microsoft Security Response Center (MSRC) Blog Post
-
Security Bulletin Quick Overview (MP4) –
http://content1.catalog.video.msn.com/e2/ds/939736f6-1014-4852-ab34-edc5f707541 9.mp4
3000k |
http://content3.catalog.video.msn.com/e2/ds/f4734742-c7f7-4011-8a60-58023630112 5.mp4
600k |
http://content3.catalog.video.msn.com/e2/ds/9e3d7e7c-c80d-4dc5-836b-3ff24b9a941 5.mp4
400k
-
Security Bulletin Webcast (MP4) –
http://content1.catalog.video.msn.com/e2/ds/7409a224-97f4-4ecc-a81e-f04763e7d60 8.mp4
3000k |
http://content3.catalog.video.msn.com/e2/ds/b0eec976-3c95-4181-a3e5-97f04f6077b c.mp4
600k |
http://content3.catalog.video.msn.com/e2/ds/b8e202cf-5798-45f2-8222-0b36ddd32f0 6.mp4
400k
-
http://blogs.technet.com/b/msrc/p/july-2013-security-bulletin-q-a.aspx
Security Bulletin Webcast Q&A
Security Events and Training
http://online.holsystems.com/Software/holLaunchPadOnline/holLaunchPadOnline.app lication?eng=Windows8&auth=none&src=microsoft.holsystems.com&altadd=true&labid= 7709
Virtual Lab: Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control
Windows Server 2012 provides new, features to easily implement secure remote user features. In this lab, you will begin by leveraging both RemoteApp and VDI to allow users to work securely on remote applications from home computers. Next, you will grant those users access to corporate resources by enabling them to leverage DirectAccess. Finally, you will grant those users access to secure files via Dynamic Access Control by modifying properties of the user accounts.
http://online.holsystems.com/Software/holLaunchPadOnline/holLaunchPadOnline.app lication?eng=Windows8&auth=none&src=microsoft.holsystems.com&altadd=true&labid= 7709
Microsoft Webcast: Information about the August 2013 Security Bulletin Release Wednesday, August 14, 2013
Join this webcast for a brief overview of the technical details of August’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.
https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032557378
Microsoft Webcast: Information about the September 2013 Security Bulletin Release
Wednesday, September 11, 2013
Join this webcast for a brief overview of the technical details of September’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.
Essential Tools
-
http://technet.microsoft.com/security/bulletin
Microsoft Security Bulletins
-
http://technet.microsoft.com/security/advisory
Microsoft Security Advisories
-
http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
Security Compliance Manager
-
http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
Microsoft Security Development Lifecycle Starter Kit
-
http://support.microsoft.com/kb/2458544
Enhanced Mitigation Experience Toolkit
-
http://www.microsoft.com/security/pc-security/malware-removal.aspx
Malicious Software Removal Tool
-
http://technet.microsoft.com/security/cc184924.aspx
Microsoft Baseline Security Analyzer
Security Centers
-
http://technet.microsoft.com/security
Security TechCenter
-
http://msdn.microsoft.com/security
Security Developer Center
-
http://www.microsoft.com/security/msrc/default.aspx
Microsoft Security Response Center
-
http://www.microsoft.com/security/portal/
Microsoft Malware Protection Center
-
http://www.microsoft.com/privacy
Microsoft Privacy
-
http://support.microsoft.com/select/default.aspx?target=hub&c1=10750
Microsoft Security Product Solution Centers
Additional Resources
-
http://www.microsoft.com/about/twc/en/us/blogs.aspx
Trustworthy Computing Security and Privacy Blogs
-
http://www.microsoft.com/security/sir
Microsoft Security Intelligence Report
-
http://www.microsoft.com/security/sdl
Microsoft Security Development Lifecycle
-
http://technet.microsoft.com/library/cc162838.aspx
Malware Response Guide
-
http://technet.microsoft.com/security/bb980617.aspx
Security Troubleshooting and Support Resources
microsoft.com/about/twcTrustworthy Computing
This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.
(c) 2013 Microsoft Corporation. All rights reserved. Microsoft, MSDN, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Microsoft respects your privacy. To learn more please read our online
http://go.microsoft.com/fwlink/?LinkId=81184
Privacy Statement .
If you would prefer to no longer receive this newsletter, please
http://pages.email.microsoftemail.com/page.aspx?QS=38dfbe491fab00ea380afe73db21 804e1836ec2291e123ed&emailid=267002&memberid=10030559&jobid=2553033&listid=8857 87&listname=Subscription_10030559_1109&subscriberkey=
lordtime@tds.net&emailaddr =
lordtime@tds.net&subscriberid=328026660
click here .
To set your contact preferences for other Microsoft communications
http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc84bb331c0f9343921fd47162ef456b0163d27fbf53070fe33e85bf6139eafc967
click here .
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052 USA
---
■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games