Pop-Up Thingie

Digital Distortion
  • Home
  • Forum
  • Files
  • Web Monitor
  • Log in

  1. Forum
  2. League10
  3. Microsoft Sec. Bulletin
  • Microsoft Security Newsletter - August 2014

    From Lord Time@TIME to All on Thu Aug 28 09:14:21 2014
    Microsoft Security Newsletter - August 2014



    Trustworthy Computing | August 2014
    Microsoft Security Newsletter



    Welcome to August’s Security Newsletter!

    This month’s newsletter focuses on the importance of security and compliance for productivity solutions in enterprise environments. With increased regulations, the consumerization of IT, the rapid adoption of Bring Your Own Device (BYOD) scenarios, the explosion of data collected by organizations, and new collaboration scenarios, enterprises of all sizes are faced with a growing need to protect sensitive information. At the same time, enterprises have a need to securely share that same information amongst appropriate employees and other individuals within and outside the corporate network. When you need visibility into what’s happening or the ability to take action on your data, choosing the right application can offer immediate and immense benefits. Microsoft Office 365 provides those tools, and much more. Office 365 provides secure anywhere access to professional e-mail, shared calendars, instant messaging (IM), video conferencing, and document collaboration.



    You can learn more about the security technology and compliance practices that support enterprise-grade security in Office 365 by downloading the "

    http://www.microsoft.com/download/details.aspx?id=26552
    Security in Office 365 " white paper. If you are looking for more information beyond service-level security, I encourage you to also download "

    http://office.microsoft.com/en-us/business/redir/XT104364341.aspx
    Security and Compliance: Customer Controls for Information Protection in Office 365 ," which describes the security and compliance controls that Office 365 provides in the product, and to visit the

    http://office.microsoft.com/en-us/business/office-365-trust-center-cloud-comput ing-security-FX103030390.aspx#welcome
    Office 365 Trust Center .



    Please read on for additional resources to help you better secure productivity solutions such as Office 365, SharePoint Online, Exchange Server 2013, and Lync Server 2013.



    Best regards,

    Tim Rains, Director

    Microsoft Trustworthy Computing



    Have feedback on how we can improve this newsletter? Email us at mailto:secnlfb@microsoft.com
    secnlfb@microsoft.com and share your ideas.



    Top Stories



    http://blogs.technet.com/b/security/archive/2014/08/11/cyberspace-2025-overview .aspx
    What Will Cybersecurity Look Like in 2025?

    Cybersecurity challenges are emerging not only from the commonly recognized sources – criminals, malware, or even targeted cyber-attacks – they can also grow from public policies as well. Delve into Microsoft’s recent research report, " http://www.microsoft.com/security/cybersecurity/cyberspace2025/
    Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain ," with this three-part Microsoft Security Blog series:


    - http://blogs.technet.com/b/security/archive/2014/08/11/cyberspace-2025-overview .aspx
    Part 1: The catalysts that will shape the future
    - http://blogs.technet.com/b/security/archive/2014/08/20/what-will-cybersecurity- look-like-in-2025-part-2-microsoft-envisions-an-optimistic-future.aspx
    Part 2: Microsoft envisions an optimistic future
    - http://blogs.technet.com/b/security/archive/2014/08/26/what-will-cybersecurity- look-like-in-2025-part-3-how-microsoft-is-shaping-the-future-of-cybersecurity.a spx
    Part 3: How Microsoft is shaping the future of cybersecurity

    http://blogs.technet.com/b/mmpc/archive/2014/08/19/the-fall-of-rogue-antivirus- software-brings-new-methods-to-light.aspx
    The Fall of Rogue Antivirus Software Brings New Methods to Light

    Rogue antivirus software has been a part of the malware ecosystem for many years, but we are now seeing a dropping trend in the telemetry for some of the once most-prevalent rogue families. Learn more about this trend.


    http://blogs.msdn.com/b/ie/archive/2014/08/06/internet-explorer-begins-blocking -out-of-date-activex-controls.aspx
    Internet Explorer Begins Blocking Out-of-Date ActiveX Controls

    Starting September 9, 2014, Internet Explorer will block out-of-date ActiveX controls with a new security feature, called out-of-date ActiveX control blocking that lets you know when Internet Explorer prevents a webpage from loading common, but outdated, ActiveX controls; inventory the ActiveX controls your organization is using; and update the outdated control, so that it's up-to-date and safer to use.




    Security Guidance

    http://office.microsoft.com/en-us/sharepoint-server-help/create-and-apply-infor mation-management-policies-HA102773281.aspx
    Security Tip of the Month: Create and Apply Information Management Policies in SharePoint Online

    Information management policies enable organizations to control and track things like how long content is retained or what actions users can take with that content. Learn how to create a policy to use on multiple content types within a site collection, create a policy for a site content type, and create a policy for a list or library.


    http://technet.microsoft.com/library/dn798914.aspx
    Identify Sensitive Data Stored on SharePoint Online Sites

    Data loss prevention (DLP) in SharePoint Online provides you with a way to identify that data, so you can work with document owners to reduce the risk posed to your organization. Learn how to use this feature to search for

    http://technet.microsoft.com/library/jj150541.aspx
    sensitive information types such as driver’s license numbers, routing numbers, and the like.


    http://technet.microsoft.com/library/dn569286.aspx
    Encryption in Office 365

    Office 365 Message Encryption is an online service that’s built on Microsoft Azure Rights Management. Explore the encryption process then find step-by-step guidance on how to

    http://technet.microsoft.com/library/dn569291.aspx
    set up Microsoft Azure Rights Management ,

    http://technet.microsoft.com/library/dn569289.aspx
    define rules to encrypt or decrypt email messages ,

    http://technet.microsoft.com/library/dn569292.aspx
    add branding to encrypted messages , and

    http://technet.microsoft.com/library/dn569287.aspx
    send, view, or reply to encrypted messages .


    http://www.microsoft.com/online/legal/v2/en-us/E.EDU.GOV_Advanced_Privacy_Optio ns_for_Admins.htm
    Office 365: Advanced Privacy Options for Administrators

    Office 365 Midsize Business, Office 365 Enterprise, Office 365 Education, and Office 365 Government offer extensive data protection settings and capabilities. As an administrator, you can control how your organization’s data is shared externally, between users, and how it is used within the service. This document provides a straightforward guide to configuring various privacy settings found in the Office 365 admin center.


    LINK
    Manage Transport Rules in Exchange 2013

    Using transport rules, you can look for specific conditions in messages that pass through your organization and take action on them. Transport rules let you apply messaging policies to email messages, secure messages, protect messaging systems, and prevent information leakage. Find out how to create, copy, adjust the order, enable or disable, delete, or import or export rules, and how to monitor rule usage.


    http://technet.microsoft.com/library/dn194021(v=office.15).aspx
    Guide to Office 2013 Security

    Use this roadmap to quickly locate information on the security features in Office 2013 as well as guidance on how to configure security using Group Policy and the Office Customization Tool, protect Office file integrity, and guard against external threats.


    http://technet.microsoft.com/library/dn342827.aspx
    Planning for Security in Lync Server 2013

    Find out how to address security during your Lync Server deployment. This short topic provides general guidelines and best practices for assessing and managing the most common security risks.




    Community Update

    http://social.technet.microsoft.com/wiki/contents/articles/9082.office-365-and- adfs-active-directory-federation-service-installation.aspx
    Office 365 and ADFS…Active Directory Federation Service Installation

    Active Directory Federation Services (AD FS) provide your Active Directory users, who are logged on to computers located physically on the corporate network or who are logged on remotely to the corporate network, with single sign-on access to Office 365 services using their corporate domain credentials. Get an overview of ADFS architecture plus a step-by-step guide to installation.


    http://social.technet.microsoft.com/wiki/contents/articles/19431.office-365-and -active-directory-synchronization.aspx
    Office 365 and Active Directory Synchronization

    Learn how to integrate Office 365 with Active Directory without the help of AD FS.




    This Month's Security Bulletins


    August 2014 Security Bulletins


    Critical

    -MS14-043:2978742
    https://technet.microsoft.com/library/security/ms14-043

    Vulnerability in Windows Media Center Could Allow Remote Code Execution

    -MS14-051:2976627
    https://technet.microsoft.com/library/security/ms14-051

    Cumulative Security Update for Internet Explorer



    Important

    -MS14-044:2984340
    https://technet.microsoft.com/library/security/ms14-044

    Vulnerabilities in SQL Server Could Allow Elevation of Privilege

    -MS14-045:2984615
    https://technet.microsoft.com/library/security/ms14-045

    Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation Of Privilege

    -MS14-046:2984625
    https://technet.microsoft.com/library/security/ms14-046

    Vulnerability in .NET Framework Could Allow Security Feature Bypass

    -MS14-047:2978668
    https://technet.microsoft.com/library/security/ms14-047

    Vulnerability in LRPC Could Allow Security Feature Bypass

    -MS14-048:2977201
    https://technet.microsoft.com/library/security/ms14-048

    Vulnerability in OneNote Could Allow Remote Code Execution

    -MS14-049:2962490
    https://technet.microsoft.com/library/security/ms14-049

    Vulnerability in Windows Installer Service Could Allow Elevation of Privilege

    -MS14-050:2977202
    https://technet.microsoft.com/library/security/ms14-050

    Vulnerability in Microsoft SharePoint Server Could Allow Elevation of Privilege



    August 2014 Security Bulletin Resources:

    - http://blogs.technet.com/b/msrc/archive/2014/08/12/august-2014-security-updates .aspx

    August 2014 Bulletin Release Blog Post "August 2014 Security Updates"
    -
    https://www.youtube.com/watch?v=JmghP1A9sTU
    August 2014 Security Bulletin Webcast
    -
    http://blogs.technet.com/b/msrc/p/aug-2014-security-bulletin-q-a.aspx
    August 2014 Security Bulletin Webcast Q&A
    - http://www.microsoft.com/en-us/download/malicious-software-removal-tool-details .aspx
    Malicious Software Removal Tool: August 2014 Update



    Security Events and Training



    http://www.microsoftvirtualacademy.com/training-courses/managing-office-365-ide ntities-and-services
    Microsoft Virtual Academy (MVA): Managing Office 365 Identities and Services

    If you are evaluating, planning for, deploying, and operating Office 365 services, including its identities, dependencies, requirements, and supporting technologies, check out this course from Microsoft Virtual Academy. This 12-module course focuses on the skills required to set up an Office 365 tenant, including federation with existing user identities, and skills required to sustain an Office 365 tenant and users.


    http://www.microsoftvirtualacademy.com/training-courses/office-guides-identity- management-with-office-365
    MVA Office Guides: Identity Management with Office 365

    Learn how to synchronize your on-premises and cloud-based organizations using Active Directory synchronization, and prepare your organization to install and configure Active Directory Federation Services. You’ll also see how to enable single sign-on access in your organization using Active Directory Federation Services and how to add a custom domain to Office 365 and then convert it to a federated domain.


    http://www.microsoftvirtualacademy.com/training-courses/office-guides-configuri ng-exchange-protection-and-control
    MVA Office Guides: Configuring Exchange Protection and Control

    Explore some of the data loss prevention features and options that make it easier to protect sensitive data in the new Exchange and see how data loss prevention features enhance protection of information commonly sent in email, including financial and personal data.


    http://www.microsoftvirtualacademy.com/training-courses/securing-lync-deploymen ts
    MVA: Securing Lync Deployments

    This course explores common security questions and explains how IIS ARR (Application Request Routing) and the addition of Two-Factor Authentication can be used to meet your needs for stronger authentication.






    Essential Tools


    -
    http://technet.microsoft.com/security/bulletin
    Microsoft Security Bulletins

    -
    http://technet.microsoft.com/security/advisory
    Microsoft Security Advisories

    -
    http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
    Security Compliance Manager

    -
    http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
    Microsoft Security Development Lifecycle Starter Kit

    -
    http://support.microsoft.com/kb/2458544
    Enhanced Mitigation Experience Toolkit

    -
    http://www.microsoft.com/security/pc-security/malware-removal.aspx
    Malicious Software Removal Tool

    -
    http://technet.microsoft.com/security/cc184924.aspx
    Microsoft Baseline Security Analyzer


    Security Centers


    -
    http://technet.microsoft.com/security
    Security TechCenter

    -
    http://msdn.microsoft.com/security
    Security Developer Center

    -
    http://www.microsoft.com/security/msrc/default.aspx
    Microsoft Security Response Center

    -
    http://www.microsoft.com/security/portal/
    Microsoft Malware Protection Center

    -
    http://www.microsoft.com/privacy
    Microsoft Privacy

    -
    http://support.microsoft.com/select/default.aspx?target=hub&c1=10750
    Microsoft Security Product Solution Centers


    Additional Resources


    -
    http://www.microsoft.com/about/twc/en/us/blogs.aspx
    Trustworthy Computing Security and Privacy Blogs

    -
    http://www.microsoft.com/security/sir
    Microsoft Security Intelligence Report

    -
    http://www.microsoft.com/security/sdl
    Microsoft Security Development Lifecycle

    -
    http://technet.microsoft.com/library/cc162838.aspx
    Malware Response Guide

    -
    http://technet.microsoft.com/security/bb980617.aspx
    Security Troubleshooting and Support Resources

    -
    http://www.microsoft-careers.com/go/Trustworthy-Computing-Jobs/194701/ Trustworthy Computing Careers




    microsoft.com/about/twcTrustworthy Computing




    This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.



    (c) 2014 Microsoft Corporation

    http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Copyright/defau lt.aspx
    Terms of Use |

    http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Trademarks/EN-U S.aspx
    Trademarks


    Microsoft respects your privacy. To learn more please read our online http://go.microsoft.com/fwlink/?LinkId=248681
    Privacy Statement .



    If you would prefer not to receive the Microsoft Security Newsletter from Microsoft and its family of companies please http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc8e2d3448ef48ea9b39f5c8c42d97ac24a168dc7a502ad873459bebb5ef3d071e7&oneClick =newsletter
    click here . These settings will not affect any other newsletters you've requested or any mandatory service communications that are considered part of certain Microsoft services.



    To set your contact preferences for other Microsoft communications http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc8e2d3448ef48ea9b39f5c8c42d97ac24a168dc7a502ad873459bebb5ef3d071e7
    click here .



    Microsoft Corporation

    One Microsoft Way

    Redmond, WA 98052 USA






    ---
    ■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games
  • Web-based telnet client

    Other Links
    What is a BBS?
    Doors installed on this BBS
    Digital Distortion Doors & Tools
    Door stats
    Trivia scores
    Message networks
    Terminal software
    Synchronet archiver setup
    Ready.gov anti-terrorist guidelines as of 2003

    Other services
    Telnet
    RLogin
    IRC
    Email & news access

    Feel free to send me an email.

    BBS UPS stats
  • Who's Online

  • Recent Visitors

    • Merlin
      Mon Apr 14 06:31:48 2025
      from Milton, WV via HTTP
    • Merlin
      Sun Apr 6 09:19:55 2025
      from Milton, WV via HTTP
    • xbit
      Sat Feb 22 04:36:09 2025
      from Portland, Or via HTTP
    • Wilmaxs
      Wed Aug 16 04:20:48 2023
      via HTTP
  • System Info

    Sysop: Eric Oulashin
    Location: Beaverton, Oregon, USA
    Users: 104
    Nodes: 16 (0 / 16)
    Uptime: 09:52:53
    Calls: 6,070
    Calls today: 11
    Files: 8,500
    D/L today: 70 files
    (57,349K bytes)
    Messages: 347,631
    Posted today: 2

© Digital Distortion, 2025