News

Wednesday, September 03, 2008

Secure Your Desktops Using SRPs' Hidden Security Levels

WIN_SECURITY UPDATE_
A Penton Media Property
September 3, 2008


If you want to view this on the web go to:
http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391927-0-0-0-1-2-207

----------------------------------------
ADVERTISEMENT
Windows IT Pro

Email Archiving Implementation: Five Costly Mistakes to Avoid

This white paper will describe five key areas of email archiving
implementation, drawing upon real world examples and experiences, to
explore all the important issues that can impact total cost. In each
situation, alternatives will be presented that if adopted can help
reduce installation and maintenance costs.

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391928-0-0-0-1-2-207
----------------------------------------

SECURITY SOLUTIONS

--Secure Your Desktops Using SRPs' Hidden Security Levels
by Russell Smith
Many enterprise users operate workstations, PCs, or laptops as
administrators, which is a substantial security risk. Learn how software
restriction policies (SRPs), their little-known security levels that
produce restricted access tokens, and the Runas command can allow users
to remain productive while limiting exposure to high-risk programs and
malicious code.

Read this web-exclusive article at

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391929-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391930-0-0-0-1-2-207)

(The article is set for open access; however, you might need to log on
to view the full text.)

----------------------------------------
ADVERTISEMENT
Google

Google Apps Security Services

95% of email is spam. Want to spend more time on the other 5%?
Spam-proof your business with Google's hosted security services, powered
by Postini, and stop email threats before they reach your organization.
Google delivers complete spam and virus protection, content-based
policies, and reliable real-time processing. As a hosted solution,
there is no installation or maintenance required, freeing you to focus
on the strategic activities that drive your business. Watch our video
to learn how Google services can strengthen your security today.

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391931-0-0-0-1-2-207
----------------------------------------


SECURITY NEWS AND FEATURES

--IE 8 Beta 2 Ready
Internet Explorer 8 Beta 2 is now available for download. The new
version has some privacy features that might come in handy.
To view the full article go to:
http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391932-0-0-0-1-2-207

--Special Delivery: Malware
Trojan.Spy.ZBot is a dangerous piece of malware that arrives via an
email message from a shipping company such as UPS or FedEx.
To view the full article go to:
http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391933-0-0-0-1-2-207

--Maintaining Security in a Tight Economy
As security professionals face ever-increasing demands to keep their
companies' networks protected, they'll need to be creative to find the
resources to do so. A recent survey by Halock Security Labs details the
effects of a rough economy on companies' IT security budgets.
To view the full article go to:
http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391934-0-0-0-1-2-207

--Recent Security Vulnerabilities
If you subscribe to this newsletter, you also receive Security Alerts,
which inform you about recently discovered security vulnerabilities. You
can also find information about these discoveries at

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391935-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391936-0-0-0-1-2-207)


GIVE AND TAKE

--SECURITY MATTERS BLOG: Data Destruction Policies and Procedures
by Mark Joseph Edwards
Your company should have strict data destruction policies and
procedures, and more than one person needs to be accountable to ensure
adherence. Need a good example that demonstrates why? Read this blog
entry.

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391937-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391938-0-0-0-1-2-207)

--FAQ: Read-Only Domain Controller GUI Doesn't Show User Account's
Locked Status
by John Savill
Q. Why doesn't the read-only domain controller (RODC) GUI show that it
locked a user's account after the user entered an incorrect password too
many times?

Find the answer at

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391939-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391940-0-0-0-1-2-207)

--FROM THE FORUM: Windows Server 2003 Organizational Units
A forum participant wants to know how to place a computer into an
organizational unit (OU) in a Windows Server 2003 environment, as well
as how to link a Group Policy Object (GPO) to the OU. Lend your
expertise at the URL below.

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391941-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391942-0-0-0-1-2-207)

--SHARE YOUR SECURITY TIPS AND GET $100
Share your security-related tips, comments, or problems and solutions.
Email your contributions to r2r@windowsitpro.com
(mailto:r2r@windowsitpro.com). If we print your submission, you'll get
$100. We edit submissions for style, grammar, and length.


PRODUCTS

--Permanently Delete Data Rather Than Just Overwriting It
by Lavon Peters, Security Editor
Deleting files doesn't actually erase the data--it simply lets you
overwrite the data by removing the pointer to the data on the disk.
Diskeeper has a solution to this security problem with its Undelete 2009
software, which includes an electronic data shredding feature called
SecureDelete 2.0. This feature ensures that deleted files are
immediately purged from the recovery bin, then overwritten using
sophisticated bit patterns governed by the National Security Agency
(NSA) and the Department of Defense (DoD). For more information about
Undelete 2009 or its new features, contact Diskeeper at 818-771-1600 or
visit http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391943-0-0-0-1-2-207 (http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391944-0-0-0-1-2-207.


RESOURCES AND EVENTS

Latest Advancements in SSL Technologies

Learn the benefits of strong Secure Sockets Layer (SSL) encryption,
Extended Validation SSL, and security trust marks and what these
offerings can do for your site--read this white paper on the latest
advances in SSL technologies.

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391945-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391946-0-0-0-1-2-207)

Virtualization Congress in London, October 14-16

Don't miss Virtualization Congress, the premier conference event for
virtualization, on October 14-16 in London. See the top technical
speakers from the biggest industry players presenting real products
side-by-side with new startups announcing breakthrough technologies for
the first time. Register today.

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391947-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391948-0-0-0-1-2-207)

Addressing Insider Threats--Who Can You Trust?

Although an organization might allow an employee privileged access, why
should that person be trusted? Most organizations deal with insider
threats from end users by defining application roles, restricting access
to data, and identifying strict audit rules. However, they often forget
their computer administrators. IT administrators are granted extensive
rights to servers, Active Directory, and applications as part of their
jobs. Read this white paper to identify the key business processes that
your organization must secure, and you'll be equipped to contain insider
threats.

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391949-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391950-0-0-0-1-2-207)


FEATURED WHITE PAPER

DoubleTake WP Q308

Backup is a waste of time ... if the data can't be recovered. Most
organizations focus on disaster recovery so they can resume operations
quickly after a major outage, but it's just as important for
organizations to excel at operational recovery in order to have a
complete business continuity plan. This white paper addresses the
current challenges for operational recovery and discusses how you can
easily recover data from any point in time.

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391951-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391952-0-0-0-1-2-207)


ANNOUNCEMENTS

Master SharePoint with 3 eLearning Seminars--hosted by Windows IT Pro

Join MVPs Dan Holme and Michael Noel to learn how to build a better
SharePoint infrastructure and enable powerful collaboration. On October
1, 2008, at 11:00 AM EDT, direct from your computer, these SharePoint
gurus will guide you through three info-packed sessions: 21st Century
File Sharing: Configuring & Managing Document Libraries; Building
Code-Free SharePoint Applications and Business Intelligence Lite; and
Forms-Based Authentication and Extranet Deployment Options for
SharePoint 2007. All for only $99! Seats are limited to allow for lots
of live Q&A at the end. Register today!

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391953-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391954-0-0-0-1-2-207)

Know a Developer?

Pass on the SharePoint Mastery series, built especially for developers,
with speaker and Microsoft MVP Andrew Connell!

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391955-0-0-0-1-2-207
(http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391956-0-0-0-1-2-207)

IT Connections: Oct 6--8, San Francisco Marriott

Behind the hype, behind the scenes, dive into the Microsoft platforms
and products you implement and support with industry gurus and experts
from Microsoft, TechNet Magazine, and Windows IT Pro. There are 70+
sessions and interactive panels with networking opportunities. Receive a
free hotel night if you register by September 8, 2008!

http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391957-0-0-0-1-2-207 (http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391958-0-0-0-1-2-207)


CONTACT US
Security UDPATE is brought to you by the Windows IT Pro Web site's
Security page (first URL below) and Security Pro VIP (second URL
below).
http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391959-0-0-0-1-2-207
http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391960-0-0-0-1-2-207

You are subscribed to this newsletter as boy.blogger@gmail.com

Manage your Security UPDATE subscription at
http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391961-0-0-0-1-2-207.

To unsubscribe:
http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391962-0-0-0-1-2-207&list_id=803&email=boy.blogger@gmail.com&message_id=13286

Be sure to add Security_UPDATE@email.windowsitpro.com
to your spam filter's list of allowed senders.

To contact us:
About Security UPDATE content -- mailto:letters@windowsitpro.com
About technical questions -- http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391963-0-0-0-1-2-207
About your product news -- mailto:products@windowsitpro.com
About your subscription -- mailto:windowsitproupdate@windowsitpro.com
About sponsoring Security UPDATE -- mailto:salesopps@windowsitpro.com

View the Windows IT Pro privacy policy at
http://ct.email.windowsitpro.com/rd/cts?d=33-13286-803-202-62923-1391964-0-0-0-1-2-207

Windows IT Pro, a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538
Attention: Customer Service Department

Copyright 2008, Penton Media, Inc. All rights reserved.

No comments:

Blog Archive