Microsoft Security Newsletter - June 2015
Trustworthy Computing | June 2015
Microsoft Security Newsletter
Welcome to June 2015's Security Newsletter!
The latest volume of the
http://microsoft.com/sir
Microsoft Security Intelligence Report is now available. This volume of the report focuses on the threat landscape in the second half of 2014 when there were some dramatic changes.
The vulnerability disclosure data published in the report suggests that there was a 56.3% increase in vulnerability disclosures between the third and fourth quarters of 2014. After many periods of relatively small changes in disclosure totals, the 4,512 vulnerabilities disclosed during the second half of 2014 is the largest number of vulnerabilities disclosed in any half-year period since the CVE system was launched in 1999. Disclosures of vulnerabilities in applications other than web browsers and operating system applications increased 98.3% in the second half of 2014 and accounted for 76.5% of total disclosures for the period.
Figure 1. Industrywide vulnerability disclosures between the first half of 2012 (1H12) and the second half of 2014 (2H14)
Figure 2. Industrywide operating system, browser, and application vulnerabilities between the first half of 2012 (1H12) and the second half of 2014 (2H14)
Overall, encounters with Java exploits continued to decrease significantly in the second half of 2014, while Flash Player exploit attempts increased.
Figure 3. Trends for the top Java exploits detected and blocked by Microsoft real-time antimalware products in 2014
Figure 4. Adobe Flash Player exploits detected and blocked by Microsoft real-time antimalware products in 2014
Regional threat assessments are available for over 100 countries as well as an online tool that enables you to quickly compare two locations.
Figure 5. Infection and Encounter Rate Trends tool available at
http://www.microsoft.com/security/sir/threat www.microsoft.com/security/sir/threat
There is plenty of other threat intelligence and guidance in the new report that can help you protect your infrastructure from modern attacks. Please download the latest report at
http://microsoft.com/sir
http://microsoft.com/sir .
In the meantime, thanks to all the sessions at Microsoft Ignite last month, and the announcement about the
http://www.microsoft.com/en-us/windows/windows-10-upgrade
free upgrade offer for consumers, the excitement around Windows 10 is building. As a result, this monthÆs newsletter features resources to help you find out whatÆs coming in Windows 10 with regard to security.
Best regards,
Tim Rains, Chief Security Advisor
Cybersecurity & Cloud Strategy, Microsoft
Want to share this newsletter with a friend or colleague?
https://technet.microsoft.com/en-us/security/cc307424.aspx
Click here for the online edition and subscription options .
Have feedback on how we can improve this newsletter? Email us at mailto:
secnlfb@microsoft.com
secnlfb@microsoft.com and share your ideas.
Top Stories
http://blogs.technet.com/b/srd/archive/2015/06/10/advances-in-scripting-securi ty-and-protection-in-windows-10-and-powershell-v5.aspx
Advances in scripting security and protection in Windows 10 and PowerShell V5
Learn how the Windows PowerShell team has significantly advanced security focused logging and detection in Windows 10 and PowerShell v5.
https://blogs.office.com/2015/06/10/new-access-and-security-controls-for-outlo ok-for-ios-and-android/
New access and security controls for Outlook for iOS and Android
Outlook now uses Active Directory Authentication Library (ADAL)-based authentication for Exchange Online mailboxes in Office 365, replacing the previously used basic authentication method. This new authentication method enables IT administrators to configure new access scenarios for sign in to Office 365 and to better control and manage Outlook on mobile devices in their organization. Learn more.
http://blogs.microsoft.com/cybertrust/2015/05/18/the-life-and-times-of-an-expl oit/
The life and times of an exploit
One of the items examined in the latest version of the Microsoft Security Intelligence Report is the increased speed at which purveyors of commercial exploit kits are trying to take advantage of newly disclosed vulnerabilities, even in cases where security updates have been developed, released and deployed to hundreds of millions of systems around the world. Learn more about this trend and the most effective way to mitigate risk.
http://blogs.msdn.com/b/azuresecurity/archive/2015/05/11/azure-disk-encryption -management-for-windows-and-linux-virtual-machines.aspx
Azure Disk Encryption management for Windows and Linux virtual machines
Microsoft Azure enables you to control your Azure hosted data through a range of advanced technologies to encrypt, control and manage encryption keys, control & audit access of data. Explore a new Azure Disk Encryption solution that can help protect and safeguard your data to meet your organizational security and compliance commitments.
Security Guidance
https://technet.microsoft.com/library/dn986865.aspx?ocid=wc-nl-secnews
What's new in Windows 10: Device Guard
Device Guard is a combination of hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. Find out how it works, when to use it, and learn about the software and hardware required.
https://technet.microsoft.com/library/dn985838.aspx?ocid=wc-nl-secnews
What's new in Windows 10: Enterprise Data Protection
Get an early look at Enterprise Data Protection (EDP), a new feature that will offer a better user experience, while helping to better separate and protect enterprise apps and data against disclosure risks across both company and personal devices, without requiring changes in environments or apps.
https://technet.microsoft.com/library/dn985839.aspx?ocid=wc-nl-secnews
What's new in Windows 10: Microsoft Passport
In Windows 10, Microsoft Passport will replace passwords with strong two-factor authentication that consists of an enrolled device and a Windows Hello (biometric) or PIN. Learn how Microsoft Passport works and start to explore enterprise scenarios for using this technology.
https://channel9.msdn.com/Events/Ignite/2015/BRK2325
A new era of threat resistance for the Windows 10 platform
Walk through the new capabilities in Windows, such as Device Guard, that will deliver decisive improvements when it comes to malware and other online threats.
https://channel9.msdn.com/Events/Ignite/2015/BRK2333
The end game for passwords and credential theft?
Find out how Windows 10 can help protected against credential theft crisis with a solution that is easy to deploy, always multi-factor, theft and phish proof, and provides true single sign-on even as you transition from on-premises to the web.
https://channel9.msdn.com/Events/Ignite/2015/BRK2306
Windows 10: disrupting the revolution of cyber-threats with revolutionary security
Explore the technologies that can truly end the use of passwords and make multi-factor authentication the default, provide an easy to use and deploy data loss prevention (DLP) capability right in the platform, and enable organizations to virtually eliminate malware threats to the Windows platform including those that come by way of the browser.
https://channel9.msdn.com/Events/Ignite/2015/BRK2324
Secure authentication with Windows Hello
Windows 10 will remove biometric frameworks dependencies on passwords, address bio sensor costs challenges, and have biometrics poised for mainstreaming. Learn more about MicrosoftÆs work on biometrics options such as fingerprints and other options, sensor types, and what you can expect in terms of bio-enabled devices in 2015.
https://channel9.msdn.com/Events/Ignite/2015/BRK2329
Protecting your data with containers without boxing yourself in
Windows 10 delivers a fully integrated data loss prevention (DLP) capability, making it easy to deploy, cost effective, and easy to use. Learn more about this new technology along with the improvements coming soon for BitLocker.
Community Update
https://channel9.msdn.com/Events/Ignite/2015/BRK3336
Black belt security with Windows 10
Learn why and how you should leverage Windows 10 security technologies like Device Guard, BitLocker, AppLocker, UAC, Least Privilege, and Remote Desktop Restricted Admin-mode. In this 75-minute session with Microsoft Windows MVP and Windows Technical Expert Program member Sami Laiho, youÆll see hands-on examples on how someone might attempt to break into an unprotected operating system—and learn how to protect your organization. If you still need to convince your boss to give you budget for implementing more security measures, don't miss this!
This Month's Security Bulletins
June 2015 Security Bulletins
Critical
-MS15-056:3058515
https://technet.microsoft.com/library/security/ms15-056
Cumulative Security Update for Internet Explorer
-MS15-057:3033890
https://technet.microsoft.com/library/security/ms15-057
Vulnerability in Windows Media Player Could Allow Remote Code Execution
Important
-MS15-059:3064949
https://technet.microsoft.com/library/security/ms15-059
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
-MS15-060:3059317
https://technet.microsoft.com/library/security/ms15-060
Vulnerability in Microsoft Common Controls Could Allow Remote Code Execution
-MS15-061:3057839
https://technet.microsoft.com/library/security/ms15-061
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege
-MS15-062:3062577
https://technet.microsoft.com/library/security/ms15-062
Vulnerability in Active Directory Federation Services Could Allow Elevation of Privilege
-MS15-063:3063858
https://technet.microsoft.com/library/security/ms15-063
Vulnerability in Windows Kernel Could Allow Elevation of Privilege
-MS15-064:3062157
https://technet.microsoft.com/library/security/ms15-064
Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege
June 2015 Security Bulletin Resources:
-
http://blogs.technet.com/b/msrc/archive/2015/06/09/june-2015-updates.aspx
June 2015 Bulletin Release Blog Post
-
http://www.microsoft.com/en-us/download/malicious-software-removal-tool-detai ls.aspx
Malicious Software Removal Tool: June 2015 Update
Security Events and Training
http://www.microsoftvirtualacademy.com/training-courses/microsoft-intune-core- skills-jump-start
Microsoft Intune Core Skills Jump Start
Look at the latest mobility features in Microsoft Intune, a born-in-the-cloud device management solution. Find out how you can integrate with the existing market leader in endpoint management, Microsoft System Center Configuration Manager and manage mobile devices with Office 365.
http://www.microsoftvirtualacademy.com/training-courses/endpoint-protection-in -configuration-manager-2012
Endpoint Protection in Configuration Manager 2012
Endpoint Protection in System Center 2012 Configuration Manager provides security, antimalware, and Windows Firewall management for computers in your enterprise. Walk through the planning, configuration, and administration of Endpoint Protection plus learn about prerequisites, best practices, and deployment.
Essential Tools
-
http://technet.microsoft.com/security/bulletin
Microsoft Security Bulletins
-
http://technet.microsoft.com/security/advisory
Microsoft Security Advisories
-
http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
Microsoft Security Development Lifecycle Starter Kit
-
http://support.microsoft.com/kb/2458544
Enhanced Mitigation Experience Toolkit
-
http://www.microsoft.com/security/pc-security/malware-removal.aspx
Malicious Software Removal Tool
-
http://technet.microsoft.com/security/cc184924.aspx
Microsoft Baseline Security Analyzer
Security Centers
-
http://technet.microsoft.com/security
Security TechCenter
-
http://msdn.microsoft.com/security
Security Developer Center
-
http://www.microsoft.com/security/msrc/default.aspx
Microsoft Security Response Center
-
http://www.microsoft.com/security/portal/
Microsoft Malware Protection Center
-
http://www.microsoft.com/privacy
Microsoft Privacy
-
http://support.microsoft.com/select/default.aspx?target=hub&c1=10750 Microsoft Security Product Solution Centers
Additional Resources
-
http://blogs.microsoft.com/cybertrust/
Microsoft Cybertrust Blog
-
http://www.microsoft.com/security/sir
Microsoft Security Intelligence Report
-
http://www.microsoft.com/security/sdl
Microsoft Security Development Lifecycle
-
http://technet.microsoft.com/library/cc162838.aspx
Malware Response Guide
-
http://technet.microsoft.com/security/bb980617.aspx
Security Troubleshooting and Support Resources
microsoft.com/about/twcTrustworthy Computing
This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.
(c) 2015 Microsoft Corporation
http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Copyright/defa ult.aspx
Terms of Use |
http://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/en-us.asp x
Trademarks
Microsoft respects your privacy. To learn more please read our online
http://go.microsoft.com/fwlink/?LinkId=248681
Privacy Statement .
If you would prefer not to receive the Microsoft Security Newsletter from Microsoft and its family of companies please
http://click.email.microsoftemail. com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b6311d344a0079e5cc587f4d16330b7c3cc 8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31618dc88c067dd0b5f3fe595391f1b00306 40e4337fbbbfcf98f3d7a9b65ba61ce0559b&oneClick=newsletter
click here . These settings will not affect any other newsletters you've requested or any mandatory service communications that are considered part of certain Microsoft services.
To set your contact preferences for other Microsoft communications
http://click .email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b6311d344a007 9e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31618dc88c067d d0b5f3fe595391f1b0030640e4337fbbbfcf98f3d7a9b65ba61ce0559b
click here .
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052 USA
---
■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games