• Microsoft Security Newsletter - June 2015

    From Lord Time@TIME to All on Wed Jun 24 09:29:17 2015
    Microsoft Security Newsletter - June 2015

    Trustworthy Computing | June 2015
    Microsoft Security Newsletter

    Welcome to June 2015's Security Newsletter!

    The latest volume of the
    Microsoft Security Intelligence Report is now available. This volume of the report focuses on the threat landscape in the second half of 2014 when there were some dramatic changes.

    The vulnerability disclosure data published in the report suggests that there was a 56.3% increase in vulnerability disclosures between the third and fourth quarters of 2014. After many periods of relatively small changes in disclosure totals, the 4,512 vulnerabilities disclosed during the second half of 2014 is the largest number of vulnerabilities disclosed in any half-year period since the CVE system was launched in 1999. Disclosures of vulnerabilities in applications other than web browsers and operating system applications increased 98.3% in the second half of 2014 and accounted for 76.5% of total disclosures for the period.

    Figure 1. Industrywide vulnerability disclosures between the first half of 2012 (1H12) and the second half of 2014 (2H14)

    Figure 2. Industrywide operating system, browser, and application vulnerabilities between the first half of 2012 (1H12) and the second half of 2014 (2H14)

    Overall, encounters with Java exploits continued to decrease significantly in the second half of 2014, while Flash Player exploit attempts increased.

    Figure 3. Trends for the top Java exploits detected and blocked by Microsoft real-time antimalware products in 2014

    Figure 4. Adobe Flash Player exploits detected and blocked by Microsoft real-time antimalware products in 2014

    Regional threat assessments are available for over 100 countries as well as an online tool that enables you to quickly compare two locations.

    Figure 5. Infection and Encounter Rate Trends tool available at http://www.microsoft.com/security/sir/threat www.microsoft.com/security/sir/threat

    There is plenty of other threat intelligence and guidance in the new report that can help you protect your infrastructure from modern attacks. Please download the latest report at
    http://microsoft.com/sir .

    In the meantime, thanks to all the sessions at Microsoft Ignite last month, and the announcement about the http://www.microsoft.com/en-us/windows/windows-10-upgrade
    free upgrade offer for consumers, the excitement around Windows 10 is building. As a result, this monthÆs newsletter features resources to help you find out whatÆs coming in Windows 10 with regard to security.

    Best regards,

    Tim Rains, Chief Security Advisor

    Cybersecurity & Cloud Strategy, Microsoft

    Want to share this newsletter with a friend or colleague? https://technet.microsoft.com/en-us/security/cc307424.aspx
    Click here for the online edition and subscription options .

    Have feedback on how we can improve this newsletter? Email us at mailto:secnlfb@microsoft.com
    secnlfb@microsoft.com and share your ideas.

    Top Stories

    http://blogs.technet.com/b/srd/archive/2015/06/10/advances-in-scripting-securi ty-and-protection-in-windows-10-and-powershell-v5.aspx

    Advances in scripting security and protection in Windows 10 and PowerShell V5

    Learn how the Windows PowerShell team has significantly advanced security focused logging and detection in Windows 10 and PowerShell v5.

    https://blogs.office.com/2015/06/10/new-access-and-security-controls-for-outlo ok-for-ios-and-android/

    New access and security controls for Outlook for iOS and Android

    Outlook now uses Active Directory Authentication Library (ADAL)-based authentication for Exchange Online mailboxes in Office 365, replacing the previously used basic authentication method. This new authentication method enables IT administrators to configure new access scenarios for sign in to Office 365 and to better control and manage Outlook on mobile devices in their organization. Learn more.

    http://blogs.microsoft.com/cybertrust/2015/05/18/the-life-and-times-of-an-expl oit/
    The life and times of an exploit

    One of the items examined in the latest version of the Microsoft Security Intelligence Report is the increased speed at which purveyors of commercial exploit kits are trying to take advantage of newly disclosed vulnerabilities, even in cases where security updates have been developed, released and deployed to hundreds of millions of systems around the world. Learn more about this trend and the most effective way to mitigate risk.

    http://blogs.msdn.com/b/azuresecurity/archive/2015/05/11/azure-disk-encryption -management-for-windows-and-linux-virtual-machines.aspx

    Azure Disk Encryption management for Windows and Linux virtual machines

    Microsoft Azure enables you to control your Azure hosted data through a range of advanced technologies to encrypt, control and manage encryption keys, control & audit access of data. Explore a new Azure Disk Encryption solution that can help protect and safeguard your data to meet your organizational security and compliance commitments.

    Security Guidance

    What's new in Windows 10: Device Guard

    Device Guard is a combination of hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. Find out how it works, when to use it, and learn about the software and hardware required.

    What's new in Windows 10: Enterprise Data Protection

    Get an early look at Enterprise Data Protection (EDP), a new feature that will offer a better user experience, while helping to better separate and protect enterprise apps and data against disclosure risks across both company and personal devices, without requiring changes in environments or apps.

    What's new in Windows 10: Microsoft Passport

    In Windows 10, Microsoft Passport will replace passwords with strong two-factor authentication that consists of an enrolled device and a Windows Hello (biometric) or PIN. Learn how Microsoft Passport works and start to explore enterprise scenarios for using this technology.

    A new era of threat resistance for the Windows 10 platform

    Walk through the new capabilities in Windows, such as Device Guard, that will deliver decisive improvements when it comes to malware and other online threats.

    The end game for passwords and credential theft?

    Find out how Windows 10 can help protected against credential theft crisis with a solution that is easy to deploy, always multi-factor, theft and phish proof, and provides true single sign-on even as you transition from on-premises to the web.

    Windows 10: disrupting the revolution of cyber-threats with revolutionary security

    Explore the technologies that can truly end the use of passwords and make multi-factor authentication the default, provide an easy to use and deploy data loss prevention (DLP) capability right in the platform, and enable organizations to virtually eliminate malware threats to the Windows platform including those that come by way of the browser.

    Secure authentication with Windows Hello

    Windows 10 will remove biometric frameworks dependencies on passwords, address bio sensor costs challenges, and have biometrics poised for mainstreaming. Learn more about MicrosoftÆs work on biometrics options such as fingerprints and other options, sensor types, and what you can expect in terms of bio-enabled devices in 2015.

    Protecting your data with containers without boxing yourself in

    Windows 10 delivers a fully integrated data loss prevention (DLP) capability, making it easy to deploy, cost effective, and easy to use. Learn more about this new technology along with the improvements coming soon for BitLocker.

    Community Update

    Black belt security with Windows 10

    Learn why and how you should leverage Windows 10 security technologies like Device Guard, BitLocker, AppLocker, UAC, Least Privilege, and Remote Desktop Restricted Admin-mode. In this 75-minute session with Microsoft Windows MVP and Windows Technical Expert Program member Sami Laiho, youÆll see hands-on examples on how someone might attempt to break into an unprotected operating system—and learn how to protect your organization. If you still need to convince your boss to give you budget for implementing more security measures, don't miss this!

    This Month's Security Bulletins

    June 2015 Security Bulletins



    Cumulative Security Update for Internet Explorer


    Vulnerability in Windows Media Player Could Allow Remote Code Execution



    Vulnerabilities in Microsoft Office Could Allow Remote Code Execution


    Vulnerability in Microsoft Common Controls Could Allow Remote Code Execution


    Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege


    Vulnerability in Active Directory Federation Services Could Allow Elevation of Privilege


    Vulnerability in Windows Kernel Could Allow Elevation of Privilege


    Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege

    June 2015 Security Bulletin Resources:


    June 2015 Bulletin Release Blog Post
    - http://www.microsoft.com/en-us/download/malicious-software-removal-tool-detai ls.aspx

    Malicious Software Removal Tool: June 2015 Update

    Security Events and Training

    http://www.microsoftvirtualacademy.com/training-courses/microsoft-intune-core- skills-jump-start

    Microsoft Intune Core Skills Jump Start

    Look at the latest mobility features in Microsoft Intune, a born-in-the-cloud device management solution. Find out how you can integrate with the existing market leader in endpoint management, Microsoft System Center Configuration Manager and manage mobile devices with Office 365.

    http://www.microsoftvirtualacademy.com/training-courses/endpoint-protection-in -configuration-manager-2012

    Endpoint Protection in Configuration Manager 2012

    Endpoint Protection in System Center 2012 Configuration Manager provides security, antimalware, and Windows Firewall management for computers in your enterprise. Walk through the planning, configuration, and administration of Endpoint Protection plus learn about prerequisites, best practices, and deployment.

    Essential Tools

    Microsoft Security Bulletins

    Microsoft Security Advisories

    Microsoft Security Development Lifecycle Starter Kit

    Enhanced Mitigation Experience Toolkit

    Malicious Software Removal Tool

    Microsoft Baseline Security Analyzer

    Security Centers

    Security TechCenter

    Security Developer Center

    Microsoft Security Response Center

    Microsoft Malware Protection Center

    Microsoft Privacy

    http://support.microsoft.com/select/default.aspx?target=hub&c1=10750 Microsoft Security Product Solution Centers

    Additional Resources

    Microsoft Cybertrust Blog

    Microsoft Security Intelligence Report

    Microsoft Security Development Lifecycle

    Malware Response Guide

    Security Troubleshooting and Support Resources

    microsoft.com/about/twcTrustworthy Computing

    This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.

    (c) 2015 Microsoft Corporation
    http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Copyright/defa ult.aspx

    Terms of Use |
    http://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/en-us.asp x

    Microsoft respects your privacy. To learn more please read our online http://go.microsoft.com/fwlink/?LinkId=248681
    Privacy Statement .

    If you would prefer not to receive the Microsoft Security Newsletter from Microsoft and its family of companies please http://click.email.microsoftemail. com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b6311d344a0079e5cc587f4d16330b7c3cc 8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31618dc88c067dd0b5f3fe595391f1b00306 40e4337fbbbfcf98f3d7a9b65ba61ce0559b&oneClick=newsletter

    click here . These settings will not affect any other newsletters you've requested or any mandatory service communications that are considered part of certain Microsoft services.

    To set your contact preferences for other Microsoft communications http://click .email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b6311d344a007 9e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31618dc88c067d d0b5f3fe595391f1b0030640e4337fbbbfcf98f3d7a9b65ba61ce0559b

    click here .

    Microsoft Corporation

    One Microsoft Way

    Redmond, WA 98052 USA
    ■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games