Defender Mindset

April 27, 2015

Hey A Great Post by MSTIC John Lambert: Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.   http://blogs.technet.com/b/johnla/archive/2015/04/26/defenders-think-in-lists-attackers-think-in-graphs-as-long-as-this-is-true-attackers-win.aspx  
tags:
no comments

Security of the Azure cloud platform

April 25, 2015

Hey The security of the Azure cloud platform is paramount to Microsoft. Microsoft recognize the trust that customers place in their when hosting applications and storing data in Azure.       Microsoft are committed to provide a secure cloud through:   Adhering to the Security Development Lifecycle (SDL) that Microsoft itself created as part of its Trustworthy Computing initiative and is considered an industry-leading methodology for developing secure software Using the Operational Security Assurance (OSA) framework as a template for operational security which builds on the SDL and decades of experience Microsoft has had in delivering online services Conducting regular penetration tests against Microsoft services              ...
tags:
no comments

2 Interesting new posts in the last day

April 24, 2015

Hey In the last Day Microsoft AD Team has published 2 interesting posts: 1. Active Directory products in the OpenID Connect certification launch: This provides confidence that certified implementations will "just work" together. Today's news is another important step on the road to widely-available secure interoperable digital identity for all the devices and applications that people use. For more details follow the link below: http://blogs.technet.com/b/ad/archive/2015/04/22/active-directory-products-in-the-openid-connect-certification-launch.asp   2. Azure AD Application Proxy supports custom domain names: Branded URLs that looks familiar to them. This new capability also enables existing apps to seamlessly work with the same URLs both internally and externally. This will solve many application compatibility problems and will...
tags:
no comments

Azure Government Overview – SLG.TV

April 20, 2015

Hey From Microsoft in Government Public Sector ,   Microsoft Azure Government is a government-community cloud (GCC) designed to support strategic government scenarios that require speed, scale, security, compliance and economics for U.S. government. In this Microsoft Azure Government webcast, learn how your organization could utilize Microsoft Azure Government Cloud Solutions to help you meet your cloud services and compliance objectives. Follow the Video link below: http://channel9.msdn.com/Blogs/Microsoft-in-Government-SLGtv/Azure-Government-Overview    
tags:
no comments

GPSVC Log Analysis

April 18, 2015

Hey This guide outlines basic steps used to troubleshoot Group Policy application errors using the Group Policy Service Debug logs (gpsvc.log).   A basic understanding of the logging discussed in the link below: http://blogs.technet.com/b/askds/archive/2015/04/17/a-treatise-on-group-policy-troubleshooting-now-with-gpsvc-log-analysis.aspx  
tags:
no comments

Microsoft Security Critical Bulletin for April 2015

April 15, 2015

Hey Microsoft has released the Security Critical Bulletin for April 2015     Cumulative Security Update for Internet Explorer (3038314) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3048019) Vulnerability in HTTP.sys Could Allow Remote Code Execution (3042553) Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution (3046306)      
tags:
no comments

Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six months

April 13, 2015

Hey A Great Article about 'Simda.AT'  that designed to divert Internet traffic to disseminate other types of malware.   Follow the link below: http://blogs.technet.com/b/mmpc/archive/2015/04/12/microsoft-partners-with-interpol-industry-to-disrupt-global-malware-attack-affecting-more-than-770-000-pcs-in-past-six-months-39-simda-at-39-designed-to-divert-internet-traffic-to-disseminate-other-types-of-malware.aspx  
tags:
no comments