Pop-Up Thingie

Digital Distortion
  • Home
  • Forum
  • Files
  • Web Monitor
  • Log in

  1. Forum
  2. League10
  3. Microsoft Sec. Bulletin
  • Microsoft Security Newsletter - March 2015

    From Lord Time@TIME to All on Mon Mar 30 22:12:14 2015
    Microsoft Security Newsletter - March 2015



    Trustworthy Computing | March 2015
    Microsoft Security Newsletter



    Welcome to March 2015's Security Newsletter!

    This month, we are highlighting the security controls available in Office 365, with a focus on http://blogs.office.com/2015/03/30/announcing-general-availabil ity-of-built-in-mobile-device-management-for-office-365/

    the built-in mobile device management (MDM) capabilities now available for Office 365 . With MDM for Office 365, you can manage access to Office 365 data across a diverse range of phones and tablets, including iOS, Android and Windows Phone devices. More importantly, the built-in MDM features are included at no additional cost in all Office 365 commercial plans, including Business, Enterprise, EDU, and Government plans.



    If you are looking for protection beyond what's included in Office 365, you can subscribe to http://www.microsoft.com/en-us/server-cloud/products/microsoft-int une/default.aspx Microsoft Intune , part of the http://www.microsoft.com/en-us/server-cloud/enterprise-mobility/Overview.aspx Microsoft Enterprise Mobility Suite , and receive additional device and application management capabilities for phones, tablets and PCs. To learn more, check out the new https://azureinfo.microsoft.com/EMS-Series-US.html?ls=Social&lsd=so1 Enterprise Mobility Suite webinar series . Each month, there will be one webinar based on the solutions and the big picture for enterprise mobility, and a second, deeper dive webinar on specific product features and how-to guidance.



    Also, if you haven't done so already, register for Microsoft Ignite this May to get up to speed on security best practices for Office 365 and enterprise mobility as well as the latest in client, server, browser, network, cloud, and app security technologies and practices. Not able to attend in person this year? Stay tuned for details on how to watch on-demand sessions after the event.



    Best regards,

    Tim Rains, Chief Security Advisor

    Cybersecurity & Cloud Strategy, Microsoft



    Want to share this newsletter with a friend or colleague? https://technet.microsoft.com/en-us/security/cc307424.aspx Click here for the online edition and subscription options .


    Have feedback on how we can improve this newsletter? Email us at mailto:secnlfb@microsoft.com secnlfb@microsoft.com and share your ideas.




    Top Stories



    http://blogs.technet.com/b/srd/archive/2015/03/16/emet-5-2-is-available.aspx EMET 5.2 Now Available

    Enhanced Mitigation Experience Toolkit (EMET) 5.2 includes increased security protections to improve your security posture, such as Control Flow Guard, improvements to the configuration for Attack Surface Reduction (ASR) mitigation, and full support for reporting from Modern Internet Explorer, or Desktop IE with Enhanced Protected Mode enabled.

    http://blogs.msdn.com/b/azuresecurity/archive/2015/03/03/microsoft-azure-netwo rk-security-whitepaper-version-3-is-now-available.aspx

    Updated White Paper on Microsoft Azure Network Security

    Download the latest version of this white paper, which now includes guidance on how to use Azure's native network security features to help protect your information assets.




    Security Guidance

    https://technet.microsoft.com/en-us/library/dn532171.aspx
    Office 365 Security and Compliance

    Quickly access more information on the features in Office 365 that are available to help you with fulfill your organization's security and compliance needs from https://technet.microsoft.com/library/dn790611.aspx anti-spam and anti-malware protection to https://technet.microsoft.com/library/dn569286.aspx encryption and https://technet.microsoft.com/library/dn792011.aspx Information Rights Management .



    https://technet.microsoft.com/library/faa7d8e5-645d-4d59-839c-c8d4c1869e4a(v=t echnet.10).aspx

    Overview of Mobile Device Management for Office 365

    You can manage and secure mobile devices when they're connected to your Office 365 organization by using Mobile Device Management for Office 365. Get a quick overview of setup steps for admins plus a summary of device management tasks and where you'll go to perform them.



    https://technet.microsoft.com/en-US/library/ms.o365.cc.devicepolicysupportedde vice.aspx

    Capabilities of Mobile Device Management for Office 365

    Mobile Device Management for Office 365 can help you secure and manage mobile devices like iPhones, iPads, Androids, and Windows Phones used by licensed Office 365 users in your organization. Find out which devices are supported and explore policy settings, security settings, and more.




    https://technet.microsoft.com/library/dn957912.aspx
    Choosing Between Microsoft Intune and Built-in MDM for Office 365

    As an IT purchasing manager or an IT administrator, you might have questions about which cloud-based Microsoft mobile device management solution is the best fit for your needs. This article compares the capabilities of Built-in Mobile Device Management for Office 365 to the capabilities of Microsoft Intune to help you to make this decision.





    Community Update
    http://products.office.com/en-us/business/office-365-trust-center-top-10-trust -tenets-cloud-security-and-privacy#securityAndPrivacy

    Office 365 Trust Center: Top 10 Lists

    Need to determine the security and trustworthiness of cloud productivity services and choose a cloud service provider that meets your security expectations? Based on community feedback and real-world customer experiences, these top-ten lists, which include "Top questions you should ask a cloud service provider when you are considering the cloud for your IT services, and how Microsoft Office 365 answers these questions," can help you focus on the key privacy and security considerations that should inform your decision.






    This Month's Security Bulletins


    March 2015 Security Bulletins


    Critical

    -MS15-018:3032359
    https://technet.microsoft.com/library/security/ms15-018

    Cumulative Security Update for Internet Explorer

    -MS15-019:3040297
    https://technet.microsoft.com/library/security/ms15-019

    Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution

    -MS15-020:3041836
    https://technet.microsoft.com/library/security/ms15-020

    Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution

    -MS15-021:3032323
    https://technet.microsoft.com/library/security/ms15-021

    Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution

    -MS15-022:3038999
    https://technet.microsoft.com/library/security/ms15-022

    Vulnerabilities in Microsoft Office Could Allow Remote Code Execution



    Important

    -MS15-023:3034344
    https://technet.microsoft.com/library/security/ms15-023

    Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege

    -MS15-024:3035132
    https://technet.microsoft.com/library/security/ms15-024

    Vulnerability in PNG Processing Could Allow Information Disclosure

    -MS15-025:3038680
    https://technet.microsoft.com/library/security/ms15-025

    Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege

    -MS15-026:3040856
    https://technet.microsoft.com/library/security/ms15-026

    Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege

    -MS15-027:3002657
    https://technet.microsoft.com/library/security/ms15-027

    Vulnerability in NETLOGON Could Allow Spoofing

    -MS15-028:3030377
    https://technet.microsoft.com/library/security/ms15-028

    Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass

    -MS15-029:3035126
    https://technet.microsoft.com/library/security/ms15-029

    Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure

    -MS15-030:3039976
    https://technet.microsoft.com/library/security/ms15-030

    Vulnerability in Remote Desktop Protocol Could Allow Denial of Service

    -MS15-031:3046049
    https://technet.microsoft.com/library/security/ms15-031

    Vulnerability in Schannel Could Allow Security Feature Bypass


    March 2015 Security Bulletin Resources:

    -
    http://blogs.technet.com/b/msrc/archive/2015/03/10/march-2015-updates.aspx

    March 2015 Bulletin Release Blog Post
    - http://www.microsoft.com/en-us/download/malicious-software-removal-tool-detai ls.aspx

    Malicious Software Removal Tool: March 2015 Update



    Security Events and Training


    http://blogs.office.com/2014/09/03/garage-series-office-365-assessing-top-5-cl oud-security-threats-mark-russinovich/

    The Garage Series for Office 365: Assessing the Top 5 Cloud Security Threats with Mark Russinovich

    Learn about the most frequently discussed cloud security threats then listen as Microsoft Technical Fellow Mark Russinovich describes each threat and how Microsoft architects its cloud services to maximize data security and protect against data loss. You'll also get pro tips to help you protect against credential loss and contain the risk of user-driven shadow IT.


    http://ignite.microsoft.com/
    Microsoft Ignite
    May 4-8, 2015 û Chicago, IL

    Ready to explore the latest security and access management technologies? Want to dive deep and learn how to improve the security of your IT infrastructure as well as the devices you manage and the apps you create? http://ignite.microsoft.com/Register#fbid=wmVeVBjEauv Register for Microsoft Ignite 2015 for access to more than 70 http://ignite.microsoft.com/Sessions sessions on everything from SharePoint data security and next-generation malware detection to secure development best practices for web and cross-platform mobile apps.



    Here is just a sample of the sessions you could attend:


    - http://ignite.microsoft.com/session/sessionmoreinfo/?topicid=24b9cff8-b79f-e4 11-b87f-00155d5066d7#fbid=wmVeVBjEauv

    Windows 10: Security Internal
    - http://ignite.microsoft.com/session/sessionmoreinfo/?topicid=4f10608f-b09f-e4 11-b87f-00155d5066d7#fbid=wmVeVBjEauv

    Browser Security
    - http://ignite.microsoft.com/session/sessionmoreinfo/?topicid=eba03d6a-b89f-e4 11-b87f-00155d5066d7#fbid=wmVeVBjEauv

    How You Can Hack-Proof Your Clients and Servers in a Day
    - http://ignite.microsoft.com/session/sessionmoreinfo/?topicid=549f9127-dab2-e4 11-b87f-00155d5066d7#fbid=wmVeVBjEauv

    Configuring Corporate-Owned Mobile Devices with Microsoft Intune
    - http://ignite.microsoft.com/session/sessionmoreinfo/?topicid=df1d9b24-1d95-e4 11-b87f-00155d5066d7#fbid=wmVeVBjEauv

    Experts Unplugged: Office 365 Security
    - http://ignite.microsoft.com/session/sessionmoreinfo/?topicid=e68edc3c-58a2-e4 11-b87f-00155d5066d7#fbid=wmVeVBjEauv

    Microsoft Identity Platform for Developers û Overview and Roadmap





    Essential Tools


    -
    http://technet.microsoft.com/security/bulletin
    Microsoft Security Bulletins

    -
    http://technet.microsoft.com/security/advisory
    Microsoft Security Advisories

    -
    http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
    Microsoft Security Development Lifecycle Starter Kit

    -
    http://support.microsoft.com/kb/2458544
    Enhanced Mitigation Experience Toolkit

    -
    http://www.microsoft.com/security/pc-security/malware-removal.aspx
    Malicious Software Removal Tool

    -
    http://technet.microsoft.com/security/cc184924.aspx
    Microsoft Baseline Security Analyzer


    Security Centers


    -
    http://technet.microsoft.com/security
    Security TechCenter

    -
    http://msdn.microsoft.com/security
    Security Developer Center

    -
    http://www.microsoft.com/security/msrc/default.aspx
    Microsoft Security Response Center

    -
    http://www.microsoft.com/security/portal/
    Microsoft Malware Protection Center

    -
    http://www.microsoft.com/privacy
    Microsoft Privacy

    -
    http://support.microsoft.com/select/default.aspx?target=hub&c1=10750 Microsoft Security Product Solution Centers


    Additional Resources


    -
    http://blogs.microsoft.com/cybertrust/
    Microsoft Cybertrust Blog

    -
    http://www.microsoft.com/security/sir
    Microsoft Security Intelligence Report

    -
    http://www.microsoft.com/security/sdl
    Microsoft Security Development Lifecycle

    -
    http://technet.microsoft.com/library/cc162838.aspx
    Malware Response Guide

    -
    http://technet.microsoft.com/security/bb980617.aspx
    Security Troubleshooting and Support Resources




    microsoft.com/about/twcTrustworthy Computing




    This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.



    (c) 2014 Microsoft Corporation
    http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Copyright/defa ult.aspx

    Terms of Use |
    http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Trademarks/EN- US.aspx

    Trademarks


    Microsoft respects your privacy. To learn more please read our online http://go.microsoft.com/fwlink/?LinkId=248681 Privacy Statement .



    If you would prefer not to receive the Microsoft Security Newsletter from Microsoft and its family of companies please http://click.email.microsoftemail. com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b6311d344a0079e5cc587f4d16330b7c3cc 8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31618dc81933a69be6aa8408e01ec57acf04 d91a5e63866e1ef94beb69fc2157ee80bc43&oneClick=newsletter

    click here . These settings will not affect any other newsletters you've requested or any mandatory service communications that are considered part of certain Microsoft services.



    To set your contact preferences for other Microsoft communications http://click .email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b6311d344a007 9e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31618dc81933a6 9be6aa8408e01ec57acf04d91a5e63866e1ef94beb69fc2157ee80bc43

    click here .



    Microsoft Corporation

    One Microsoft Way

    Redmond, WA 98052 USA
    ---
    ■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games
  • Web-based telnet client

    Other Links
    What is a BBS?
    Doors installed on this BBS
    Digital Distortion Doors & Tools
    Door stats
    Trivia scores
    Message networks
    Terminal software
    Synchronet archiver setup
    Ready.gov anti-terrorist guidelines as of 2003

    Other services
    Telnet
    RLogin
    IRC
    Email & news access

    Feel free to send me an email.

    BBS UPS stats
  • Who's Online

  • Recent Visitors

    • Merlin
      Mon Apr 14 06:31:48 2025
      from Milton, WV via HTTP
    • Merlin
      Sun Apr 6 09:19:55 2025
      from Milton, WV via HTTP
    • xbit
      Sat Feb 22 04:36:09 2025
      from Portland, Or via HTTP
    • Wilmaxs
      Wed Aug 16 04:20:48 2023
      via HTTP
  • System Info

    Sysop: Eric Oulashin
    Location: Beaverton, Oregon, USA
    Users: 104
    Nodes: 16 (0 / 16)
    Uptime: 08:29:06
    Calls: 6,070
    Calls today: 11
    Files: 8,500
    D/L today: 66 files
    (56,445K bytes)
    Messages: 347,613
    Posted today: 2

© Digital Distortion, 2025