Microsoft Security Resources

New Version of Microsoft Security Compliance Manager (SCM) Version Now Available
Now updated to work reliably behind corporate proxy servers; Microsoft SCM v.1.1.2 also features security baselines for Windows 7, Microsoft Office 2010, Windows Server 2008 R2, and Windows Internet Explorer 8. Download the latest version of this free tool and starting moving toward more effective security and compliance processes for some of the most widely-used Microsoft products.

Securing Client Access Servers in Exchange Server 2010
Learn how to manage security and authentication related options available for a computer running Microsoft Exchange Server 2010 that has the Client Access server role installed.

Hardening SQL Server for SharePoint Environments
Get a summary of hardening recommendations then specific details on how to configure a SQL Server instance to listen on a non-default port, how to configure and test a SQL client alias, and much more.

BranchCache Security Guide
Get comprehensive guidance on how to manage the security of the Microsoft BranchCache feature introduced in Windows Server 2008 R2 and Windows 7.

Securing Windows Server
Get a consolidated view of the feature overviews, step-by-step-guides, and configuration tips for the various security and protection technologies in Windows Server 2008 and Windows Server 2008 R2 from authorization and information protection to security management and network security.

Windows Server 2008 and Windows Server 2008 R2 IT Compliance Management
Download the IT Compliance Management Series to access free tools and guidance to help you configure Windows Server 2008 and Windows Server 2008 R2 to address specific IT governance, risk, and compliance (GRC) requirements.

Security Tip of the Month: Using the Enhanced Mitigation Experience Toolkit to Safeguard Against Zero Days
There have been a number of zero-day vulnerabilities circulating around the Internet recently. Find out how the Enhanced Mitigation Experience Toolkit (EMET) can help you manage security mitigations for your systems.

And do not forget for the Home user if they get Virus, Malware or failed security up date they get free support by calling 1-866 PCSAFETY

 

Windows 7 Development Boot Camp

For the Win: Windows 7 Development Boot Camp
January and February 2011
Web and cloud may be all the rage, but many developers are still doing hardcore client development. If you are among them, this Boot Camp is for you. In this full-day event, we will explore how to maximize your impact on the Windows client. Interactive sessions will include topics from throughout the Windows development platform. We will look at application compatibility and transitioning your applications to Windows 7, integrating with the Windows Taskbar, developing for Internet Explorer 9, utilizing the cool functionality in the Sensors and Location Platform so that your application better responds to its current environment, and leveraging multi-touch capabilities.
Click on your desired city below to register:

Cross Post from Microsoft

 

Technorati Tags:

Bulk exam vouchers with free exam retakes

Save 15% on Microsoft Certification For Your IT Team
Organizations with more certified staff see a 10% increase in on-time and on-budget deployments. Microsoft Certification can help ensure your IT team has the qualifications to deploy, use, and manage Windows 7. Learn how you can save 15% when you purchase a 10-pack of Microsoft Certification exam vouchers with free exam retakes for your team.

 

Technorati Tags:

New Springboard Resources

Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit (MDT)
Get step-by-step guidance on how to use MDT 2010 to automate the installation and configuration of the core Optimized Desktop technologies: Windows 7, the Microsoft Desktop Optimization Pack (MDOP), Forefront, and Microsoft Office 2010. Guidance on deploying the core Optimized Desktop using System Center Configuration Manager 2007 R2 is also available.

Local P2V Migration Using MDT 2010 and Sysinternals Disk2VHD
Find out how to use MDT 2010 and Sysinternals Disk2VHD to redeliver users’ old desktops as fully functional virtual machines. Following these steps can provide a safety net by enabling continued access to users’ previous computing environment during Windows 7 deployment.

Updated: Windows 7 Application Compatibility List for IT Professionals
Download this Microsoft Office Excel-based spreadsheet for a list of software applications that have met Windows 7 Logo Program testing requirements for compatibility with 32-bit and 64-bit Windows 7. This list includes applications with the following compatibility statuses: "Compatible," "Free Update Required," "Paid Update Required," "Future Compatibility," and "Not Compatible." These statuses are based upon the software publishers’ statements of compatibility.

Go to Springboard site for Lots of great information click here

 

Phishing how to protect yourself

Phishing is  method that criminals use to steal you identity online. It uses email and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information.

Phishing send millions of fraudulent email messages with links to fraudulent websites that appear to come from websites you trust, like your bank or credit card company, and request that you provide personal information. Criminals can use this information for many different types of fraud, such as to steal money from your account, to open new accounts in your name, or to obtain official documents using your identity.

Prevent ID theft from phishing scams do the following to help protect yourself from phishing scams:

  • Don’t click links in email messages.

 

  • Type addresses directly into your browser or use your personal bookmarks.

 

  • Check the site’s security certificate before you enter personal or financial information into a website.

 

  • Don’t enter personal or financial information into pop-up windows.

 

  • Keep your computer software current with the latest security updates.

If you suspect that you’ve responded to a phishing scam with personal or financial information, do the following;

  • Change the passwords or PINs on all your online accounts that you think could be compromised.

 

  • Place a fraud alert on your credit reports. Check with your bank or financial advisor if you’re not sure how to do this.

 

  • Contact the bank or the online merchant directly. Do not follow the link in the fraudulent email.

 

  • If you know of any accounts that were accessed or opened fraudulently, close those accounts.

 

  • Routinely review your bank and credit card statements monthly for unexplained charges or inquiries that you didn’t initiate.

How do I report a possible phishing scam?

  • Internet Explorer. While you are on a suspicious site, click the Safety button or menu in Internet Explorer 8 and point to SmartScreen Filter. Then click Report Unsafe Website and use the webpage that is displayed to report the website.

 

  • Windows Live Hotmail. If you receive a suspicious email that asks for personal information, click the check box next to the message in your Hotmail inbox. Click Mark as and then point to Phishing scam.

 

 

The Bottom Line THINK if you not sure do not respond even better do not open the email….

Technorati Tags: ,

Web talks that I am doing

As an IT professional, you deal with securing operating systems, patching software, and installing and configuring firewall and routers on a daily basis," said Ferron. "But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this webinar, we will discuss one of the most important yet least-considered areas of security by IT professionals."

Webinar: Understanding Cyber Security Physical Security

Live Presentation: Wednesday, December 1, 2010, 12:00-1:00 pm EST

Ferron will also host "Understanding Cyber Security Patch Management" at 12 pm EST Wednesday, December 15. In this hour-long webinar, attendees will examine the area of systems management that involves acquiring, testing, and installing appropriate patches to administered systems.

"In this session, we will develop an actual process to secure hardware and software systems using a fictional company," said Ferron. "We will discuss automated systems versus manual systems, as well as incorporating virtualization and an audit process for patch management."

Webinar: Understanding Cyber Security Patch Management

Live Presentation: Wednesday, December 15, 2010, 12:00-1:00 pm EST

Register for Understanding Cyber Security Physical Security and Understanding Cyber Security Patch Management on the Global Knowledge web site. Recorded versions will also be available.

Browser Has Been Hijacked ?

  • Home page or other settings change on your computer. Links are added that point to websites that you’d usually avoid.
  • You can’t navigate to certain web pages, such as antispyware and other security software sites.
  • A seemingly endless barrage of ads pops up on your screen.
  • New toolbars or Favorites are installed that give you icons and links to web pages that you don’t want.
  • Your computer runs sluggishly. Malicious software can slow down your computer.

The following six tips can help restore your browser’s settings:

  1. Stop cascading pop-up windows. If endless pop-up windows appear on your screen, you’ll probably want to stop them first. To do this in Microsoft Windows 7, Windows Vista, Windows XP, or Windows 2000 while using Internet Explorer:
    • Press CTRL+ALT+DEL, click Task Manager, and then click the Processes tab.
    • Click IEXPLORE.EXE, and then click the End Process button.

    This closes all instances of Internet Explorer. Then you can re-open the program to continue browsing as usual. To help prevent future attacks, you should also have a pop-up blocker turned on.
    To turn on the pop-up blocker in Internet Explorer 8 click the Tools button (the gear icon), point to Pop-up Blocker, and then click Turn On Pop-Up Blocker.
    To turn on the pop-up blocker in Internet Explorer 7:

    • Click Tools menu, click Internet Options, and then click the Privacy tab.
    • In the Pop-up Blocker box, select the Block pop-ups check box. Click OK.

    If you still experience the other effects of a hijacked web browser, try the following:

  2. Install Microsoft Security Essentials or another antivirus and antispyware program. Microsoft Security Essentials is free software that will help protect your computer from malicious software such as viruses or spyware. Many browser hijacking programs can be identified and removed by downloading, installing, and running Microsoft Security Essentials or a similar tool.
  3. Run the Malicious Software Removal Tool . This can catch some, but not all, kinds of hijacking software.
  4. Reset Internet Explorer settings. If you’re using Internet Explorer and your home page has been changed, you can often reset it yourself.
    Note If you use Microsoft Security Essentials, Forefront Client Security, Windows Defender, or the Windows Malicious Software Removal Tool and these tools have detected and removed hijacking software from your computer, these tools might change your home page and your search page to help protect against the malicious software.
    For more information and step-by-step instructions, see How to restore your Internet Explorer home page and search page preferences.
  5. Disable add-ons. Many browser hijackings come from add-ons, also known as ActiveX controls, browser extensions, browser helper objects, or toolbars. These items can improve your experience on a website by providing multimedia or interactive content, such as animations. However, some add-ons can cause your computer to stop responding or display content that you don’t want, such as pop-up ads.
    To learn how to disable add-ons in Windows Vista or Windows XP Service Pack 2 (SP2), read How do browser add-ons affect my computer?
  6. Get more help.  call 1-866- PC safety
  7. go online to  Here let system try and fix these issues for you.

This is a combo of article posted on the Microsoft site.

More free E-books on Microsoft Technology

 

Moving to Microsoft Visual Studio 2010

Introducing Microsoft SQL Server 2008 R2 (

Programming Windows Phone 7 Series (DRAFT Preview)

Petzold’s Programming Windows Phone 7 (Special Excerpt 2)

Own Your Future: Update Your Skills with Resources and Career Ideas from Microsoft

Understanding Microsoft Virtualization Solutions (Second Edition)

First Look Microsoft Office 2010

Windows 7 troubleshooting tips

Introducing Windows Server 2008 R2

Deploying Windows 7, Essential Guidance

Windows 7 Resource Kit

Technorati Tags: ,

Windows 7 in a Nutshell – User talk

I will be presenting in Florida a talk on Windows 7  At BARC

The BARC Meeting starts at 7:30 PM, Program is Windows 7 in a Nutshell Tuesday, October 12, 2010, 7:30 p.m., at the Davie Police Department

Davie Police Department
1230 South Nob Hill Road in Davie Florida.

clip_image001

This will be located on the S.E. corner of State Road 84 and South Nob Hill Road.  The Entrance to the building is located on the East side of the building.

Tuesday, October 12, 2010, 7:30 p.m., at the Davie Police Department

Jay Ferron, N4GAA  will be presenting Windows 7 in a Nutshell for end users, please come and enjoy. Come learn about Microsoft Windows 7, the newest desktop operating system. Get an understanding of what is new, what improvements are in Windows 7, what hardware requirements you will need to run this OS. See the new user interface, security features, and much more.

Windows 7 introduces a breakthrough user experience and is designed to help you feel confident in your ability to view, find, and organize information, and to control your computing experience.

When you start using Windows 7, you will recognize familiar elements such as the Start menu, which is now faster, more streamlined, and more helpful than in previous versions of Windows. The Start menu features an integrated desktop search

through a new feature called Quick Search, which can help you find and launch almost anything on your PC. Just type in a word, a name, or a phrase, and Quick Search can find the right file for you. But more than that, the new Start menu makes clip_image002it very easy for you to navigate across all of the installed applications on your PC. Learn the new desktop tricks that make it easier to work with multiple documents.

Jay Ferron bio  is currently president of the Association of Personal Computer User Groups (APCUG), a global board director of GITCA, and board member of the Information Systems Audit and Control Association-CT. He is also a self proclaimed geek who has authored; Architecting Microsoft Server Virtualization Solutions with Hyper-V™ and System Center Virtual Machine Manager; Smart Computing Magazine (assorted articles on Microsoft Technologies) • Subject Matter Expert for Microsoft System Center Mobile Device Manager Course MOC Course 6064a.  His interest include that he is involved with the American Red Cross National Headquarters Emergency    response team dealing with computing and communications in a disasters. I have hobbies of RC Helicopters and Magic. Jay also holds an Extra Class Amateur license.

NOTE:  Jay will be raffling off two (2) Window 7 Ultimate operating systems. So, please plan on attending this meeting.