Friday, April 28, 2006

Update for HTTP issues in ISA 2004 SP2

Microsoft has released an update for HTTP issues in Microsoft Internet Security and Acceleration (ISA) Server 2004 Service Pack 2 (SP2).

More Info

Microsoft ISA Server 2006 Beta: Frequently Asked Questions

Learn more about the ISA Server 2006 Beta by reading this frequently asked questions page. It will help you understand ISA Server 2006, why you should consider trying the beta in your infrastructure, and some features that will help you secure your Microsoft application infrastructure, streamline your network, and safeguard your IT environment

Read More

Wednesday, April 26, 2006

Microsoft Details SMS 2003 R2

Microsoft Details SMS 2003 R2, Configuration Manager 2007
Microsoft will release SMS 2003 R2 by the end of June as it preps System Center Configuration Manager 2007 for delivery next year.

As the company's annual management summit got underway in San Diego Tuesday morning, Microsoft provided a broad overview of its expanding System Center product lineup but later drilled down on the future of SMS, now named System Center Configuration Manager 2007.

During his keynote, Microsoft Server & Tools Senior Vice President Bob Muglia demonstrated System Center's new drag and drop feature for applying new policies, Task-based GUI interface to simplify use and tight integration with the Windows Vista client and the Network Access Protection feature in the next Windows Longhorn Server
Read More

Wednesday, April 19, 2006

WEBCAST:Smart Tactics for Antivirus and Antispyware

Antivirus is a necessary component of any intrusion defense strategy. However, while choosing where to place Antivirus is a relatively simple matter, choosing how much Antivirus your organization needs can be challenging. In this Webcast, guest instructor Joel Snyder discusses Antivirus and Antispyware from an architectural perspective. Joel explains the benefits of standalone products vs. integrated suites, and tells you what you need to know about perimeter and gateway Antivirus and Antispyware.

In this 20-minute Webcast, you will explore:

Where in your network Antivirus and Antispyware should sit
Antivirus implementation challenges
Best practices for implementing Antivirus
register

Mozilla fixes nearly two dozen Firefox flaws

The Mozilla Foundation has fixed approximately 21 flaws in the Firefox Web browser that could be exploited to bypass security restrictions, tamper with sensitive data or conduct cross-site scripting and phishing attacks

Read More

Security concerns of extended schema in Active Directory

The structure of Active Directory -- the formatting of records, the type of information stored in it, etc. -- is referred to as its schema. Since AD is basically a database, the default schema is not set in stone and it can in fact be changed if needed. That said, extending the AD schema is not something you want to do trivially. The presence of third-party products that do this can complicate the issue, especially as far as security is concerned.
The first thing to be conscious of when using these products is that any additions to the schema are typically available by default in a read-only fashion to everyone. If you extend the schema, you also need to take into account what kind of access to grant to the new schema elements -- who gets to add or change these new elements, whether or not they can be seen by most users, etc.

Read More

Monday, April 17, 2006

Is Open Source Really More Secure?

In this article we'll discuss the claim made by proponents of open source software that such software is more secure. Is open source really inherently more secure than closed source commercial software? If so, why? And if not, why do so many have that perception?
Read More

Tuesday, April 11, 2006

Microsoft Announces Beta Availability of ISA Server 2006 and Acquisition of a Web-Filtering Product from FutureSoft
REDMOND, Wash., Feb. 9, 2006 – Microsoft’s commitment to customers in the area of security is to ensure the highest degree of quality in Microsoft software, to deliver new security technology innovations in the Windows platform, and to invest in and develop security products and services that will evolve to meet future business and IT security needs.
In advance of next week's RSA Conference 2006 (Feb. 13-17 in San Jose, Calif.), PressPass spoke with Ted Kummert, corporate vice president, Security, Access and Solutions Division, Server and Tools Business, at Microsoft to understand how security products are helping customers better manage and address current and future security challenges.

Read More

Monday, April 10, 2006

Securing Your Exchange Server with Antigen and ISA Server

Event Description
Products: Exchange Server.
Recommended Audience: IT Professional.
Language: English-American
Description:
Every enterprise needs inter-site communication, but it opens conduits for everything from bandwidth-gobbling spam to malicious attacks that can cripple your organization. This webcast shows how to use Sybari Antigen and Microsoft Internet Security and Acceleration (ISA) Server to protect Microsoft Exchange Server from viruses, worms, spam and external attacks. Product managers from the ISA Server and Antigen teams discuss best practices for common Exchange deployment types, emphasizing configuration and tuning Antigen and ISA Server. This session is appropriate for information technology professionals who have a surface-level understanding of ISA and Antigen, and are ready to take their knowledge to the next level.Presenter: Peter Eicher, Senior Product Manager, Microsoft Corporation & Tom Bartlett, Security Solutions Specialist, CISSP, 2003 MCSE, Microsoft Corporation

Read More
TechNet Webcast: Configuring Exchange and VPN Connectivity with ISA Server 2004

Event Description
Products: ISA Server.
Recommended Audience: IT Professional.
Language: English-American
Description:
Do you currently have an effective way to secure your network perimeter against risks introduced by the Internet, remote users, and remote network segments? Learn how Microsoft Internet Security and Acceleration (ISA) Server 2004 can help protect against all of these threats and more. This session demonstrates how ISA Server 2004 can enhance security for internal servers as well as external-facing resources such as Microsoft Exchange Server or Microsoft Internet Information Services. We will also show how ISA Server can operate as a virtual private networking server for more secure remote access to the internal network.
Presenter: Kevin Remde, TechNet Presenter, Microsoft Corporation
Read More

Sunday, April 09, 2006

Branch Office Integration with ISA Server 2004 SP2
Learn how ISA Server 2004 Service Pack 2 can help you deliver streamlined branch office connectivity and security to your customers.
Read More

Thursday, April 06, 2006

Fake BBC e-mails seek to exploit IE flaw
Attackers are spamming out these messages and hoping readers will click on a link to "read more." Those who do will be sent to a Web site that exploits the createTextRange flaw in Internet Explorer, dropping keyloggers onto victims' machines that can be used to steal bank account information.
That warning comes from San Diego-based Websense Inc., which offered details on its Web site, including a screen shot of an infected Web page.
"These e-mail messages contain excerpts from actual BBC news stories and offer a link to 'read more,'" Websense said. "Users who follow this link are taken to a Web site that is a spoofed copy of the BBC news story from the e-mail."
Read more...
Security Concerns Threaten Enterprise Rollout of Mobile Technology

Symantec Global Survey Finds that Businesses are Slow to Deploy Mobile Security

Las Vegas, NV - April 4, 2006 - Security concerns are the biggest obstacle to the widespread adoption of wireless and remote computing in businesses worldwide today, according to a global survey by the Economist Intelligence Unit and sponsored by Symantec Corp (Nasdaq: SYMC). More than 60 percent of companies are holding back on deployment, citing security concerns. Close to 47 percent of respondents cite cost and complexity as a major obstacle to deployment. All the while, almost one in five businesses has already experienced financial loss due to attacks via mobile data platforms.
http://symantec.com/about/news/release/article.jsp?prid=20060404_01

Wednesday, April 05, 2006

Internet Security Threat Report
The Symantec Internet Security Threat Report offers analysis and discussion of threat activity over a six-month period. It covers Internet attacks, vulnerabilities, malicious code, and future trends. The latest report, released March 7, is now available.

http://www.symantec.com/enterprise/threatreport/index.jsp
The HP ProLiant DL320 Security Server running Microsoft® Internet Security & Acceleration Server 2004 is an advanced firewall, VPN, and Web caching solution that can be quickly and easily deployed in multiple network environments to protect Windows Server, Exchange, and other key applications against new and emerging security threats.

  • Built on ISA Server 2004 advanced multi-layer application firewall, VPN, cache technology
    Advanced RPC and OWA filtering
    Tightly integrated with Exchange
    Hardened (more secure) Windows Server 2003 OS
    HP Virus Throttle installed and enabled

Read more...