Windows Vista Security Guide

The Windows Vista Security Guide provides guidance and tools to further protect Windows Vista against real-live threats such as malware and information theft. This solution accelerator recommends the Enterprise Client (EC) configuration for organizations of all types. Only in extreme security situations does the guide recommend the Specialized Security – Limited Functionality (SSLF) configuration, which…


Nouvelles appliances chez Network Engine : IAG 2007

Tout comme son concurrent Celestix, Network Engine enrichit sa gamme d’appliances ISA Server avec 2 versions IAG 2007 : Le NS-IAG et le NS-4700 (anciennement Whale Communication e-Gap ) Plus d’informations :http://www.networkengines.com/default.asp?LINKNAME=IAG


Nouvelles appliances Celestix : IAG 2007

Avec la nouvelle version IAG 2007, c’est 2 fournisseurs d’appliance qui enrichissent leur catalogue. Le premier est Celestix avec 3 modèles : Celestix WSA3000 SSL VPN Appliance http://www.celestix.com/products/iag/wsa3000.html Celestix WSA4000 SSL VPN Appliance http://www.celestix.com/products/iag/wsa4000.html Celestix WSA6000 SSL VPN Appliance http://www.celestix.com/products/iag/wsa6000.html Les 3 modèles de Celestix comparés dans un tableau de synthèse (avec informations sur le matériel,…


RSA Conference 2007 : Microsoft Executive Presentation

Keynote: Bill Gates, Microsoft Chairman, and Craig Mundie, Chief Research and Strategy Officer On-demand Webcasthttp://www.microsoft.com/winme/0702/29377/RSA_mbr.asx Transcripthttp://www.microsoft.com/Presspass/exec/billg/speeches/2007/02-06RSA.mspx


An update rollup is available for computers that are running ISA Server 2004, Standard Edition and Windows Small Business Server 2003, Premium Edition

Un package de correctifs pour ISA Server 2004 Standard et SBS 2003 Premium !!! An update rollup is available for computers that are running ISA Server 2004, Standard Edition and Windows Small Business Server 2003, Premium Edition Article ID : 930414 Last Review : January 30, 2007 Revision : 1.0 This article describes an update…


IAG 2007 / ISA Server 2006 : Virtual machines ready for testing, ready to be downloaded

9 machines virtuelles prêtes à être utilisées pour testé IAG 2007 (Intelligent Application Gateway) et ISA Server 2006 Forefront Edge Security and Access Demonstration Toolkit OverviewThe 9 non-persistent virtual machines in this toolkit which provides the following 4 scenario-based demonstrations. Secure Remote Access with IAG 2007This scenario shows Intelligent Application Gateway 2007 working with Exchange…


Microsoft TechDays 2007 : Session "facteur humain " : quelques ressources utiles

Suite à notre session “Le facteur humain : maillon faible ou dernière chance?” joué ce mardi aux Microsoft Techdays, voici quelques références et ressources utiles Un peu de lecture sur l’ingénierie sociale—————————————–——- Le blog de Cyril Voisin : https://blogs.technet.com/voy How to Protect Insiders from Social Engineering Threats http://www.microsoft.com/downloads/details.aspx?FamilyID=05033E55-AA96-4D49-8F57-C47664107938&displaylang=en Social Engineering Fundamentals – Exploiting the Human…

1

ISA Hotfix : Update for Publishing Exchange Server 2007 with ISA Server 2006

This ISA Server 2006 update adds support for publishing Exchange Server 2007 with ISA Server 2006. This hot fix also updates the ISA Server Management MMC snap-in File Name: ISA2006-KB925403-X86-ENU.msp Version: 5720.157 Date Published: 1/16/2007 Language: English Download Size: 5.2 MB Note :The Attachment Blocking option is no longer available when publishing Outlook Web Access…


Microsoft TechDays 2007 : la liste de mes sessions

A J-3 semaines des Microsoft TechDays 2007 (le plus gros évènement Microsoft gratuit jamais fait en France) qui auront lieu à Paris au Palais des Congrés Porte Maillot du 5 au 7 février 2007, voici les sessions dans lesquelles je vais intervenir (et donc dans lesquelles vous pourrez me rencontrer ;-)) : — Le mardi…


Best Practices and Tools for Computer Investigations

Microsoft customers are facing a rising tide of illegal or improper activity on their computers and networks. Unfortunately, most IT Professionals in these organizations don’t have the expertise to respond successfully to this growing problem. They’re unsure about when to turn the case over to law enforcement if evidence indicates a crime has taken place. In…