Microsoft Security Newsletter - July 2015
 
 
July 2015
Microsoft Security Newsletter
 
 
Welcome to July's Security Newsletter!
The focus of this month's newsletter is a topic that is top of mind for many of the CISOs and IT professionals I talk to these days—cloud security. With more and more organizations around the world leveraging cloud services, understanding how to protect your assets in the cloud and provide users with secure access to those assets is more important than ever. As a result, we have a great security tip from Tom Shinder on penetration testing applications hosted in Azure. 
Additionally, Windows 10 is now publicly available! Explore the  
http://blogs.w indows.com/business/2015/07/28/windows-10-available-for-business-today/
business benefits of Windows 10 , learn about the 
http://blogs.windows.com/bloggingwindows/2015/07/24/security-in-windows-10/ built-in security features , and take advantage of the free 
https://www.microsoft.com/en-us/windows/windows-10-upgrade 
Windows 10 Home and Windows 10 Pro upgrade offer  for those on Windows 7 or Windows 8.1. Then, when you're ready to start testing Windows 10 for your organization, download the 
http://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise Windows 10 Enterprise Evaluation  to try Windows 10 Enterprise free for 90 days.
Best regards,
Tim Rains, Chief Security Advisor
Cybersecurity & Cloud Strategy, Microsoft
Want to share this newsletter with a friend or colleague? 
https://technet.microsoft.com/en-us/security/cc307424.aspx 
Click here for the online edition and subscription options .
Have feedback on how we can improve this newsletter? Email us at mailto:
secnlfb@microsoft.com 
secnlfb@microsoft.com  and share your ideas.
 
Top Stories
 
http://blogs.microsoft.com/cybertrust/2015/07/20/cloud-security-controls-series -multi-factor-authentication/
Cloud security controls series: multi-factor authentication 
In a world where hundreds of millions of leaked credentials are bought and sold regularly, and phishing attacks are common and effective, passwords, even complex passwords and passphrases, by themselves are no longer sufficient to protect resources and data. Find out how to use multi-factor authentication to help protect users, data, and applications in the cloud.
http://blogs.microsoft.com/cybertrust/2015/07/13/cloud-security-controls-series -azure-active-directorys-access-and-usage-reports/
Cloud security controls series: Azure Active Directoryæs access and usage reports 
Explore the types of information and security controls facilitated by Azure Active Directory (Azure AD) access and usage reports. 
http://blogs.microsoft.com/cybertrust/2015/07/23/cloud-security-controls-series -azure-ad-privileged-identity-management/
Cloud security controls series: Azure AD Privileged Identity Management 
Using the principle of least privilege with Cloud resources makes as much sense as it does for on-premises resources. Learn how Azure AD Privileged Identity Management can help you discover the Azure AD privileged administrator roles and the user accounts they are assigned to, as well as enable you to revoke permanent privileged access and provide a mechanism that manages on-demand, time-limited access for Azure AD privileged accounts.
 
Security Guidance
https://technet.microsoft.com/security/mt346049.aspx 
Security Tip of the Month: Pen Testing Your Applications Hosted In Microsoft Azure 
By Tom Shinder, Program Manager, Microsoft Azure Security Engineering
One of the great things about using Microsoft Azure for application testing and deployment is that you don't need to put together an on-premises infrastructure to develop, test, and deploy your applications. All the infrastructure is taken care of by the Microsoft Azure platform services. You don't have to worry about requisitioning, acquiring, and "racking and stacking" your own on-premises hardware. Just dev and deploy!
As a reader of this newsletter, you're likely a security-conscious person. While the dev and deploy mantra sounds great and makes you as agile as agile can be, that fact is that security needs to be job one, not only on-premises, but perhaps even more so in the cloud. That's fine, because you can handle it.
You might already know that Microsoft performs regular  
http://download.microso ft.com/download/C/1/9/C1990DBA-502F-4C2A-848D-392B93D9B9C3/Microsoft_Enterprise _Cloud_Red_Teaming.pdf
internal penetration testing  of our own Azure environment. This is a good thing, as it helps us improve our platform and guides our actions in terms of changing current security controls, introducing new security controls, and improving our security processes. We live by the principle of continuous business improvement, and with Azure platform security, it's our passion.
If penetration testing is good for us, then it's good for you. No, we won't pen test your application for you, but we do understand that you will want to do perform pen testing on your own applications. That's a good thing, because when you enhance the security of your applications, you help make the entire Azure ecosystem more secure. 
The trick here is that when you pen test your applications, it might look like an attack to us. We  
http://blogs.msdn.com/b/azuresecurity/archive/2015/07/05/b est-practices-to-protect-your-azure-deployment-against-cloud-drive-by-attacks.a spx
continuously monitor for attack patterns  and will initiate an incident response process if we need to. It doesn't help you and it doesn't help us if we trigger an incident response due to your own due diligence pen testing. What to do?
That leads us to this month's security tip! When you're ready to pen test your Azure-hosted applications, all you need to do is let us know. Once we know that you're going to be performing specific tests, we'll have insight into what's going on and we won't shut you down, as long as your tests conform to the Azure pen testing terms and conditions.
Standard tests that you can perform include:
 
-
Tests on your endpoints to uncover the 
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project 
Open Web Application Security Project (OWASP) top 10 vulnerabilities 
 
-
https://en.wikipedia.org/wiki/Fuzz_testing" 
Fuzz testing  of your endpoints 
 
-
https://en.wikipedia.org/wiki/Port_scanner 
Port scanning  of your endpoints 
 
One type of test that you can't perform is any kind of 
https://en.wikipedia.org/wiki/Denial-of-service_attack 
Denial of Service (DoS)  attack. This includes initiating a DoS attack itself, or performing related tests that might determine, demonstrate or simulate any type of DoS attack.
Are you ready to get started with pen testing your applications hosted in Microsoft Azure? If so, then head on over to the 
https://security-forms.azure.com/penetration-testing/terms 
Penetration Test Overview  page (which is also linked to from the 
http://azure.microsoft.com/en-us/support/trust-center/security/ 
Azure Trust Center ) and click the Create a Testing Request button at the bottom of the page. You'll also find more information on the pen testing terms and conditions and helpful links on how you can report security flaws related to Azure or any other Microsoft service.
To keep up to date on the latest security information and topics as related to Microsoft Azure, make sure to bookmark the 
http://blogs.msdn.com/b/azuresecurity/ 
Azure Security Blog . Thanks!!! -Tom.
https://channel9.msdn.com/Events/Ignite/2015/BRK3865 
How Microsoft Azure Active Directory helps prevent, detect and remediate attacks to your enterprise 
Explore a set of solutions across Active Directory and Azure AD that can help your organization easily identify key risks, and learn how to implement mechanisms across the hybrid enterprise to prevent, detect, and remediate the attacks your organizations may face.
http://azure.microsoft.com/en-us/documentation/videos/build-2015-azure-active-d irectory-identity-management-as-a-service-for-modern-applications/
Azure Active Directory: Identity Management as a Service for modern applications 
Identity Management as a Service (IDMaaS) is an emerging capability to help developers and organizations manage access to modern applications. Learn more in this on demand session from //build.
https://azure.microsoft.com/en-us/documentation/articles/active-directory-admin ister/
Administer your Azure AD directory 
Find out how Azure AD can help you manage identities.
https://azure.microsoft.com/en-us/documentation/articles/active-directory-privi leged-identity-management-configure/
Azure AD Privileged Identity Management 
Azure AD Privileged Identity Management lets you manage, control, and monitor your privileged identities and their access to resources in Azure AD, and in other Microsoft online services such as Office 365 or Microsoft Intune. Walk through the core scenarios for Azure AD Privileged Identity Management and learn how to put it to work for you.
https://azure.microsoft.com/en-us/documentation/articles/active-directory-manag e-passwords/
Manage passwords in Azure AD 
Explore the full set of password management capabilities that Azure Active Directory supports, which include self-service password change and reset, administrator-initiated password reset, password management activity reports, and password writeback.
 
Community Update
https://channel9.msdn.com/blogs/Microsft-Services-Showcase/Cybersecurity-and-th e-Cloud
Cybersecurity and the cloud 
Watch Gartner VP of Research Lawrence Orans present details on the current cyber threat landscape and the latest trends in security and the cloud.
 
This Month's Security Bulletins
 
July 2015 Security Bulletins
Critical
 
-MS15-065:3076321
https://technet.microsoft.com/library/security/MS15-065 
Security Update for Internet Explorer  
 
-MS15-066:3072604
https://technet.microsoft.com/library/security/MS15-066 
Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution 
 
-MS15-067:3073094
https://technet.microsoft.com/library/security/MS15-067 
Vulnerability in RDP Could Allow Remote Code Execution 
 
-MS15-068:3072000
https://technet.microsoft.com/library/security/MS15-068 
Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution 
 
-MS15-078:3079904
https://technet.microsoft.com/library/security/MS15-078 
Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution 
Important
 
-MS15-058:3065718
https://technet.microsoft.com/library/security/MS15-058 
Vulnerabilities in SQL Server Could Allow Remote Code Execution 
 
-MS15-069:3072631
https://technet.microsoft.com/library/security/MS15-069 
Vulnerabilities in Windows Could Allow Remote Code Execution 
 
-MS15-070:3072620
https://technet.microsoft.com/library/security/MS15-070 
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution 
 
-MS15-071:3068457
https://technet.microsoft.com/library/security/MS15-071 
Vulnerability in Netlogon Could Allow Elevation of Privilege 
 
-MS15-072:3069392
https://technet.microsoft.com/library/security/MS15-072 
Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege 
 
-MS15-073:3070102
https://technet.microsoft.com/library/security/MS15-073 
Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege 
 
-MS15-074:3072630
https://technet.microsoft.com/library/security/MS15-074 
Vulnerability in Windows Installer Service Could Allow Elevation of Privilege 
 
-MS15-075:3072633
https://technet.microsoft.com/library/security/MS15-075 
Vulnerabilities in OLE Could Allow Elevation of Privilege 
 
-MS15-076:3067505
https://technet.microsoft.com/library/security/MS15-076 
Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege 
 
-MS15-077:3077657
https://technet.microsoft.com/library/security/MS15-077 
Vulnerability in ATM Font Driver Could Allow Elevation of Privilege 
 
July 2015 Security Bulletin Resources:
 
- 
http://blogs.technet.com/b/msrc/archive/2015/07/14/july-2015-security-updates .aspx 
July 2015 Bulletin Release Blog Post 
- 
http://www.microsoft.com/en-us/download/malicious-software-removal-tool-detai ls.aspx
Malicious Software Removal Tool: July 2015 Update 
 
Security Events and Training
 
https://www.microsoftvirtualacademy.com/en-US/training-courses/getting-started- with-azure-security-for-the-it-professional-11165
Getting started with Azure security for the IT professional 
Do IT security concerns keep you up at night? You're not alone! Many IT pros want to extend their organization's infrastructure but need reassurance about security. Whether you are researching a hybrid or a public cloud model with Microsoft Azure, the question remains the same: Does the solution meet your own personal and your organization's bar for security, including industry standards, attestations, and ISO certifications?
In this demo-filled Microsoft Virtual Academy course, you can explore these and other hot topics, as a team of security experts and Azure engineers takes you beyond the basic certifications and explores what's possible inside Azure. See how to design and use various technologies to ensure that you have the security and architecture you need to successfully launch your projects in the cloud. Dive into datacenter operations, virtual machine (VM) configuration, network architecture, and storage infrastructure. Get the information and the confidence you need, from the pros who know, as they demystify security in the cloud.
http://www.microsoftvirtualacademy.com/training-courses/azure-active-directory- core-skills-jump-start
Active Directory core skills jump start 
Constantly resetting customer passwords? Want to extend your on-premises Active Directory? Join this Microsoft Virtual Academy session to explore Azure Active Directory (Azure AD) as part of the Enterprise Mobility Core Skills series, arming you with key knowledge to enable enterprise mobility management and to prepare your environment for Windows 10.
 
 
Essential Tools
 
-
http://technet.microsoft.com/security/bulletin 
Microsoft Security Bulletins 
 
-
http://technet.microsoft.com/security/advisory 
Microsoft Security Advisories 
 
-
http://www.microsoft.com/security/sdl/adopt/starterkit.aspx 
Microsoft Security Development Lifecycle Starter Kit 
 
-
http://support.microsoft.com/kb/2458544 
Enhanced Mitigation Experience Toolkit 
 
-
http://www.microsoft.com/security/pc-security/malware-removal.aspx 
Malicious Software Removal Tool 
 
-
http://technet.microsoft.com/security/cc184924.aspx 
Microsoft Baseline Security Analyzer 
Security Centers
 
-
http://technet.microsoft.com/security 
Security TechCenter 
 
-
http://msdn.microsoft.com/security 
Security Developer Center 
 
-
http://www.microsoft.com/security/msrc/default.aspx 
Microsoft Security Response Center 
 
-
http://www.microsoft.com/security/portal/ 
Microsoft Malware Protection Center 
 
-
http://www.microsoft.com/privacy 
Microsoft Privacy 
 
-
http://support.microsoft.com/select/default.aspx?target=hub&c1=10750 
Microsoft Security Product Solution Centers 
Additional Resources
 
-
http://blogs.microsoft.com/cybertrust/ 
Microsoft Cybertrust Blog 
 
-
http://blogs.msdn.com/b/azuresecurity/ 
Microsoft Azure Security Blog 
 
-
http://www.microsoft.com/security/sir 
Microsoft Security Intelligence Report 
 
-
http://www.microsoft.com/security/sdl 
Microsoft Security Development Lifecycle 
 
-
http://technet.microsoft.com/library/cc162838.aspx 
Malware Response Guide 
 
-
http://technet.microsoft.com/security/bb980617.aspx 
Security Troubleshooting and Support Resources 
 
 
technet.microsoft.com/security 
 
 
This is a monthly newsletter for IT professionals and developers–bringing security news, guidance, updates, and community resources directly to your inbox. If you would like to receive less technical security news, guidance, and updates, please subscribe to the Microsoft Security for Home Computer Users Newsletter.
(c) 2015 Microsoft Corporation 
http://www.microsoft.com/About/Legal/EN/US/IntellectualProperty/Copyright/defau lt.aspx
Terms of Use  | 
http://www.microsoft.com/en-us/legal/intellectualproperty/trademarks/en-us.aspx Trademarks 
Microsoft respects your privacy. To learn more please read our online 
http://go.microsoft.com/fwlink/?LinkId=248681 
Privacy Statement .
If you would prefer not to receive the Microsoft Security Newsletter from Microsoft and its family of companies please  
http://click.email.microsoftemail .com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b6311d344a0079e5cc587f4d16330b7c3c c8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31618dc81de3497427fc4e7b96125265d46 2c55d9b9e1bfa8c94da7e35321aa1e11b03a0&oneClick=newsletter
click here . These settings will not affect any other newsletters you've requested or any mandatory service communications that are considered part of certain Microsoft services.
To set your contact preferences for other Microsoft communications  
http://clic k.email.microsoftemail.com/m_hcp.aspx?qs=0bb7f39debca1b0ad10fb2e924b6311d344a00 79e5cc587f4d16330b7c3cc8e7aa3d48879950d85d33a47e9a9586dfefd285dcac31618dc81de34 97427fc4e7b96125265d462c55d9b9e1bfa8c94da7e35321aa1e11b03a0
click here .
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052 USA
---
 ■ Synchronet ■ Time Warp of the Future BBS - Home of League 10 IBBS Games