Pop-Up Thingie

Digital Distortion
  • Home
  • Forum
  • Files
  • Web Monitor
  • Log in

  1. Forum
  2. League10
  3. Microsoft Sec. Bulletin
  • Microsoft Security Newsletter - July 2013

    From Lord Time@TIME to All on Wed Jul 24 14:38:07 2013
    Microsoft Security Newsletter - July 2013

    Trustworthy Computing | July 2013
    Microsoft Security Newsletter

    Welcome to July’s Security Newsletter!

    This month our newsletter focuses on the Bring Your Own Device (BYOD) trend in the workplace and the implications it has for IT professionals. For many organizations, allowing employees to bring in personal computing devices—such as smart phones, tablets and PCs—can improve productivity and reduce the costs associated with deploying and supporting company-issued assets. As a result, BYOD has become a popular trend that is gaining wide acceptance in locations around the world. Microsoft recently commissioned the Trust in Computing survey to help uncover current attitudes and perceptions related to security and privacy. The study found that 78% of organizations allow employees to bring their own computing devices to the office for work purposes. There were also some interesting regional variations that can been seen in the below chart.



    While the immediate benefits of BYOD might seem clear, they also come with IT security and management implications as IT departments can lose some of the control they traditionally exercised over managed resources. The security challenges of BYOD include enforcing policies like the use of strong passwords on multiple devices, ensuring that every device has up-to-date patches and robust anti-malware protection, the encryption of sensitive data, and mitigating other risks such as the loss of devices and the use of unsecured third-party data connections. Recognizing the benefits that BYOD can provide, Microsoft has designed its products and services with BYOD-friendly policies in mind.There are a few resources I suggest for diving deeper if you are interested in learning more about the topic and Microsoft’s approach:



    -

    http://blogs.technet.com/b/security/archive/2013/07/10/trust-in-computing-surve y-part-i-consumerization-of-it-goes-mainstream.aspx
    Trust in Computing Survey, Part 1: Consumerization of IT Goes Mainstream

    -

    http://technet.microsoft.com/windows/jj874384.aspx?ocid=wc-nl-secnews
    Managing Windows 8 Devices in a Bring Your Own Device World

    -

    http://www.microsoft.com/en-us/windows/enterprise/scenarios/BYOD.aspx
    How to Embrace BYOD: Guidance for Enterprises


    Finally, I’d like to thank those of you who sent us your ideas on how to improve this newsletter moving forward. We are always looking for additional feedback so email us at
    mailto:secnlfb@microsoft.com
    secnlfb@microsoft.com and share your ideas.



    Best regards,

    Tim Rains, Director

    Microsoft
    Trustworthy
    Computing


    Top Stories

    http://blogs.technet.com/b/in_the_cloud/archive/2013/07/10/what-s-new-in-2012-r 2-making-device-users-productive-and-protecting-corporate-information.aspx What’s New in Windows Server 2012 R2: Making Device Users Productive and Protecting Corporate Information

    The modern workforce isn’t just better connected and more mobile than ever before, it’s also more discerning (and demanding) about the hardware and software used on the job. Get a helpful overview of the architecture and critical components of
    http://www.microsoft.com/en-us/server-cloud/pcit.aspx
    People-centric IT (PCIT) , learn how to embrace the consumerization of IT, and get insight into the technologies that will help you enable BYOD scenarios in your organization.



    http://blogs.technet.com/b/security/archive/2013/07/12/trust-in-computing-surve y-part-2-less-than-half-of-developers-use-a-security-development-process.aspx Trust in Computing Survey, Part 2: Less Than Half of Developers Use a Security Development Process

    The threat landscape is continually evolving. Attackers are constantly seeking out new ways to compromise potential victims on a broad or targeted scale. They attempt to exploit unpatched vulnerabilities, use deceitful tactics to trick users into installing malicious software, attempt to guess weak passwords, and employ other dirty tricks. Despite this reality, a large number of organizations are still not developing applications with security in mind. Explore the reasons behind this concerning trend.



    http://blogs.technet.com/b/security/archive/2013/07/08/trustworthy-blog-app-now -available-for-windows-phone-8.aspx
    Trustworthy Computing Blog App Now Available for Windows Phone 8

    Learn about the improvements available in the new version of our Trustworthy Computing Blogs Windows Phone application, which include optimization for Windows Phone 8 users, live tile notifications, and improved graphics.


    Security Guidance

    http://technet.microsoft.com/library/dn268299.aspx

    Windows Server 2012 R2 Preview: What's New in Access and Information Protection


    In Windows Server 2012 R2 Preview, Active Directory has been enhanced to allow IT risk management while also enabling IT to empower their users to be productive from a variety of devices. Learn about these enhancements, then get step-by-step guidance with these walkthroughs:



    -

    http://technet.microsoft.com/library/dn280938.aspx
    Workplace Join with a Windows Device

    -

    http://technet.microsoft.com/library/dn280933.aspx
    Workplace Join with an iOS Device

    -

    http://technet.microsoft.com/library/dn280943.aspx
    Connect to Applications and Services from Anywhere with Web Application Proxy

    -

    http://technet.microsoft.com/library/dn280936.aspx
    Manage Risk with Multi-factor Access Control

    -

    http://technet.microsoft.com/library/dn280946.aspx
    Manage Risk with Additional Multi-Factor Authentication for Sensitive Applications

    http://technet.microsoft.com/library/jj884158.aspx

    How to Manage Mobile Devices by Using Configuration Manager and Windows Intune

    Learn how to manage apps for Windows Phone 8, Windows RT, iOS, and Android devices by using the Windows Intune service and the System Center Configuration Manager console.


    http://technet.microsoft.com/systemcenter/hh927307.aspx

    Ensure the Compliance of Devices with Configuration Manager

    System Center 2012 Configuration Manager SP1 contains new capabilities you can use to manage roaming profiles, offline files, and folder redirection on computers that run Windows 8 in your organization. Learn how to create configuration data, and deploy and manage configuration baselines, in order to ensure that your devices all contain consistent configurations and settings, and even automatically remediate settings found to be noncompliant.


    http://technet.microsoft.com/library/ee424371.aspx?ocid=wc-nl-secnews

    When to Use AppLocker

    AppLocker is an application control feature in Windows Server 2012, Windows Server 2008 R2, Windows 8, and Windows 7 that helps you control which applications and files users can run. Find out how AppLocker can help you to protect the digital assets within your organization, reduce the threat of malicious software being introduced into your environment, and improve the management of application control and the maintenance of application control policies.


    http://technet.microsoft.com/windows/dn260725.aspx?ocid=wc-nl-secnews

    Windows RT in the Enterprise: Security Technologies

    Windows RT is designed to leverage all of the security technologies present in Windows 8, several of which are new. Explore why Windows RT not only supports these technologies, but requires many of them for all Windows RT devices to help ensure that the devices are protected from the first time they are turned on.


    http://technet.microsoft.com/en-us/library/aa998599(v=exchg.150).aspx

    Messaging Policy and Compliance in Exchange Server 2013

    Messaging stores and mailboxes have become repositories of valuable data. Explore the messaging policy and compliance features in Exchange Server 2013, then get step-by-step guidance to help you configure key features such as Data Loss Prevention (DLP) and messaging records management (MRM).


    Cloud Security Corner

    http://blogs.technet.com/b/trustworthycomputing/archive/2013/07/08/cloud-securi ty-best-practices-and-recommended-resources.aspx

    Cloud Security: Best Practices and Recommended Resources

    As cloud computing begins to mature, organizations are looking at ways to understand the opportunities and assess their own current IT environment with regard to security, privacy and reliability practices, policies and compliance.To help organizations make informed security decisions and evaluate IT readiness for moving assets to the cloud, check out the top two resources recommended by Microsoft Trustworthy Computing General Manager Adrienne Hall.


    This Month’s Security Bulletins

    Microsoft Security Bulletin Summary for June 2013


    Critical

    -MS13-052:2861561 https://technet.microsoft.com/en-us/security/bulletin/ms13-052

    Vulnerabilities in .NET Framework and Silverlight Could Allow Remote Code Execution

    -MS13-053:2850851 https://technet.microsoft.com/en-us/security/bulletin/ms13-053

    Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution

    -MS13-054:2848295 https://technet.microsoft.com/en-us/security/bulletin/ms13-054

    Vulnerability in GDI+ Could Allow Remote Code Execution

    -MS13-055:2846071 https://technet.microsoft.com/en-us/security/bulletin/ms13-055

    Cumulative Security Update for Internet Explorer

    -MS13-056:2845187 https://technet.microsoft.com/en-us/security/bulletin/ms13-056

    Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution

    -MS13-057:2847883 https://technet.microsoft.com/en-us/security/bulletin/ms13-057

    Vulnerability in Windows Media Format Runtime Could Allow Remote Code Execution



    Important

    -MS13-058:2847927
    http://technet.microsoft.com/en-us/security/bulletin/MS13-058

    Vulnerability in Windows Defender Could Allow Elevation of Privilege

    July 2013 Security Bulletin Resources:

    - http://blogs.technet.com/b/msrc/archive/2013/07/09/a-new-policy-for-store-apps- and-the-july-2013-security-updates.aspx

    Microsoft Security Response Center (MSRC) Blog Post

    -
    Security Bulletin Quick Overview (MP4) –

    http://content1.catalog.video.msn.com/e2/ds/939736f6-1014-4852-ab34-edc5f707541 9.mp4
    3000k |

    http://content3.catalog.video.msn.com/e2/ds/f4734742-c7f7-4011-8a60-58023630112 5.mp4
    600k |

    http://content3.catalog.video.msn.com/e2/ds/9e3d7e7c-c80d-4dc5-836b-3ff24b9a941 5.mp4
    400k

    -
    Security Bulletin Webcast (MP4) –

    http://content1.catalog.video.msn.com/e2/ds/7409a224-97f4-4ecc-a81e-f04763e7d60 8.mp4
    3000k |

    http://content3.catalog.video.msn.com/e2/ds/b0eec976-3c95-4181-a3e5-97f04f6077b c.mp4
    600k |

    http://content3.catalog.video.msn.com/e2/ds/b8e202cf-5798-45f2-8222-0b36ddd32f0 6.mp4
    400k

    -
    http://blogs.technet.com/b/msrc/p/july-2013-security-bulletin-q-a.aspx

    Security Bulletin Webcast Q&A

    Security Events and Training

    http://online.holsystems.com/Software/holLaunchPadOnline/holLaunchPadOnline.app lication?eng=Windows8&auth=none&src=microsoft.holsystems.com&altadd=true&labid= 7709

    Virtual Lab: Enabling Secure Remote Users with RemoteApp, DirectAccess, and Dynamic Access Control


    Windows Server 2012 provides new, features to easily implement secure remote user features. In this lab, you will begin by leveraging both RemoteApp and VDI to allow users to work securely on remote applications from home computers. Next, you will grant those users access to corporate resources by enabling them to leverage DirectAccess. Finally, you will grant those users access to secure files via Dynamic Access Control by modifying properties of the user accounts.


    http://online.holsystems.com/Software/holLaunchPadOnline/holLaunchPadOnline.app lication?eng=Windows8&auth=none&src=microsoft.holsystems.com&altadd=true&labid= 7709

    Microsoft Webcast: Information about the August 2013 Security Bulletin Release Wednesday, August 14, 2013

    Join this webcast for a brief overview of the technical details of August’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.


    https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032557378

    Microsoft Webcast: Information about the September 2013 Security Bulletin Release
    Wednesday, September 11, 2013

    Join this webcast for a brief overview of the technical details of September’s Microsoft security bulletins. Ask questions and get answers from Microsoft security experts.



    Essential Tools


    -
    http://technet.microsoft.com/security/bulletin
    Microsoft Security Bulletins

    -
    http://technet.microsoft.com/security/advisory
    Microsoft Security Advisories

    -
    http://technet.microsoft.com/solutionaccelerators/cc835245.aspx
    Security Compliance Manager

    -
    http://www.microsoft.com/security/sdl/adopt/starterkit.aspx
    Microsoft Security Development Lifecycle Starter Kit

    -
    http://support.microsoft.com/kb/2458544
    Enhanced Mitigation Experience Toolkit

    -
    http://www.microsoft.com/security/pc-security/malware-removal.aspx
    Malicious Software Removal Tool

    -
    http://technet.microsoft.com/security/cc184924.aspx
    Microsoft Baseline Security Analyzer


    Security Centers


    -
    http://technet.microsoft.com/security
    Security TechCenter

    -
    http://msdn.microsoft.com/security
    Security Developer Center

    -
    http://www.microsoft.com/security/msrc/default.aspx
    Microsoft Security Response Center

    -
    http://www.microsoft.com/security/portal/
    Microsoft Malware Protection Center

    -
    http://www.microsoft.com/privacy
    Microsoft Privacy

    -
    http://support.microsoft.com/select/default.aspx?target=hub&c1=10750
    Microsoft Security Product Solution Centers


    Additional Resources

    -
    http://www.microsoft.com/about/twc/en/us/blogs.aspx
    Trustworthy Computing Security and Privacy Blogs

    -
    http://www.microsoft.com/security/sir
    Microsoft Security Intelligence Report

    -
    http://www.microsoft.com/security/sdl
    Microsoft Security Development Lifecycle

    -
    http://technet.microsoft.com/library/cc162838.aspx
    Malware Response Guide

    -
    http://technet.microsoft.com/security/bb980617.aspx
    Security Troubleshooting and Support Resources

    microsoft.com/about/twcTrustworthy Computing


    This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.



    (c) 2013 Microsoft Corporation. All rights reserved. Microsoft, MSDN, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.



    Microsoft respects your privacy. To learn more please read our online http://go.microsoft.com/fwlink/?LinkId=81184
    Privacy Statement .



    If you would prefer to no longer receive this newsletter, please http://pages.email.microsoftemail.com/page.aspx?QS=38dfbe491fab00ea380afe73db21 804e1836ec2291e123ed&emailid=267002&memberid=10030559&jobid=2553033&listid=8857 87&listname=Subscription_10030559_1109&subscriberkey=lordtime@tds.net&emailaddr =lordtime@tds.net&subscriberid=328026660
    click here .



    To set your contact preferences for other Microsoft communications http://click.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b 6311d344a0079e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31 618dc84bb331c0f9343921fd47162ef456b0163d27fbf53070fe33e85bf6139eafc967
    click here .



    Microsoft Corporation

    One Microsoft Way

    Redmond, WA 98052 USA




    ---
    ■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games
  • Web-based telnet client

    Other Links
    What is a BBS?
    Doors installed on this BBS
    Digital Distortion Doors & Tools
    Door stats
    Trivia scores
    Message networks
    Terminal software
    Emulated games
    Synchronet archiver setup
    Ready.gov anti-terrorist guidelines as of 2003

    Other services
    Telnet
    RLogin
    IRC
    Email & news access

    Feel free to send me an email.

    BBS UPS stats
  • Who's Online

  • Recent Visitors

    • Merlin
      Mon Apr 14 06:31:48 2025
      from Milton, WV via HTTP
    • Merlin
      Sun Apr 6 09:19:55 2025
      from Milton, WV via HTTP
    • xbit
      Sat Feb 22 04:36:09 2025
      from Portland, Or via HTTP
    • Wilmaxs
      Wed Aug 16 04:20:48 2023
      via HTTP
  • System Info

    Sysop: Eric Oulashin
    Location: Beaverton, Oregon, USA
    Users: 98
    Nodes: 16 (0 / 16)
    Uptime: 05:08:58
    Calls: 6,375
    Calls today: 1
    Files: 8,467
    D/L today: 47 files
    (43,274K bytes)
    Messages: 355,193

© Digital Distortion, 2025