Click here to close now.


Cloud Security Authors: Marc Crespi, Pat Romanski, Mike Tierney, Liz McMillan, Cloud Best Practices Network

Related Topics: Microsoft Cloud, Cloud Security

Microsoft Cloud: Blog Feed Post

Working with Microsoft Security Tools

How many of us take for granted Microsoft’s family of tools that contribute to the security of your organization?

How many of us take for granted Microsoft’s family of tools that contribute to the security of your organization? The most commonly used and appreciated tools are:

  • Forefront Family
  • Microsoft Security Essentials
  • Windows Intune / Windows Update / Microsoft System Center Family
  • Windows Firewall (with Advanced Security)

Let’s take a look at all of these tools and their features. Then, we can look at other less popular tools offered by Microsoft — such as Microsoft Security Compliance Manager and Microsoft Security Assessment Tool.

  1. Forefront Family

Microsoft has spent a great amount of time trying to supply a manageable easy-to-use security solution for its products. The result of these efforts is the Forefront Family. It consists of several tools you can use to secure your Microsoft infrastructure. Also, it is designed to interact with other Microsoft tools, such as Active Directory, Group Policy and Windows Update.

Forefront Endpoint Protection is the enterprise-oriented product that delivers real-time, anti-virus, malware and spyware protection. Its integration with the System Center Family of managing products makes it extremely popular and easy for adoption.

Another product in the Forefront Family is Forefront Threat Management Gateway. It is the successor of the Internet Security and Acceleration (ISA) Server and provides advanced firewall functionalities, including URL filtering, intrusion prevention, HTTP/HTTPS inspection, and much more.

The two popular solutions for applications are Forefront protection for Exchange Server and Forefront protection for SharePoint. With the increasing popularity of cloud solutions, Forefront Online Protection for Exchange is used to secure the cloud-based version of Exchange – Exchange Online. All of these products can easily be managed through the Forefront Protection Server Management Console. It supports multiple servers and has great reporting capabilities.

Microsoft Forefront Identity Manager is a great tool that can help you manage access between heterogeneous systems, including Active Directory, Novell, Sun, IBM, Lotus Notes, Exchange, Oracle and SQL Server databases, SAP, and even flat file systems. It supports both password- and certificate-based access.
If you need to provide access to users outside your organization, such as partners or home-based employees, Forefront Unified Access Gateway is there to help you. It supports both VPN and Direct Access to your network and introduces policies and configurations over these connections.

  1. Microsoft Security Essentials

For end clients, who can’t afford to pay for the manageable Forefront client, Microsoft has delivered the free tool Microsoft Security Essentials, which uses the same definitions as Forefront, but lacks the manageability part.

Microsoft Security Essentials does provide antivirus, antispyware, and rootkit protection; it also supports Windows 7 and Windows Server 2008 R2; and it’s still using Dynamic Signature Service, which contributes to the daily definitions updates by detecting newly identified malware.

However, Microsoft Security Essentials doesn’t provide some of the handiest Forefront functionalities, such as Group Policy and External Device control; Network Access Protection integration (the Windows Server 2008 capability to granularly control network access based on who the client is and the groups to which the client belongs); and integrated host firewall management.

It also has the extremely useful capability of limiting processor usage during scans. Do youu ever encounter the problem of processor usage reaching 100% and the computer freezing with some other products? Microsoft promises that doesn’t happen with Microsoft Security Essentials.

  1. Updates

As keeping your system updated is a main part of its hardening, Microsoft has many tools that help you get important updates on time.

Your first option is to set your Windows Update feature to automatically download the updates from the Microsoft site. However, this way you don’t have much control over which updates get installed. You can set the feature to let you make a decision as to whether to install a particular update or not, but this then requires extra administrative efforts to achieve what is normally a simple task.

Another option is to use the Microsoft System Center Configuration Manager (SCCM) or Windows Intune to centrally manage the updates on all your clients’ computers. Both of these products offer a considerable amount of functionalities, including keeping computers up to date. While SCCM is a hosted application and needs to be installed on a local machine to work, Windows Intune is an entirely cloud-based Microsoft solution that can help you manage your network. All you need is a web browser. And with that, you can make sure your computers all over the world are properly updated.

  1. Windows Firewall (with Advanced Security)

Windows Firewall (In Windows Server 2008, it is called Windows Firewall with Advanced Security) can contribute to your current security configuration, providing a defense-in-depth mechanism for end users. If you haven’t purchased Forefront protection, then you can use the built-in Windows Firewall to specify rules regarding your inbound and outbound traffic.

  1. Microsoft Security Compliance Manager

Microsoft Security Compliance Manager includes various baseline security policies — both for client and server Windows systems and applications. The policies are based on industry practices and let you reduce the security threats your systems are exposed to. You can easily compare your existing policies with these baseline security policies for reference, or deploy the baseline policies to be sure your infrastructure is secured.

  1. Microsoft Security Assessment Tool

Microsoft Security Assessment Tool is a product that can help you secure your entire IT infrastructure by asking you various questions with a Yes/No answer. Questions are based on the ISO 17799 and NIST-800.x standards. Your answers are compared to the best practices that Microsoft has developed. Then a summary with lots of recommendations and relevant online topics is delivered to you. It can be very useful after your initial setup is completed.

If your infrastructure is now secured, take the time to set monitoring on your main servers. You can do that very easily with Monitis.

Read the original blog entry...

More Stories By Hovhannes Avoyan

Hovhannes Avoyan is the CEO of Monitis, Inc., a provider of on-demand systems management and monitoring software to 50,000 users spanning small businesses and Fortune 500 companies.

Prior to Monitis, he served as General Manager and Director of Development at prominent web portal Lycos Europe, where he grew the Lycos Armenia group from 30 people to over 200, making it the company's largest development center. Prior to Lycos, Avoyan was VP of Technology at Brience, Inc. (based in San Francisco and acquired by Syniverse), which delivered mobile internet content solutions to companies like Cisco, Ingram Micro, Washington Mutual, Wyndham Hotels , T-Mobile , and CNN. Prior to that, he served as the founder and CEO of CEDIT ltd., which was acquired by Brience. A 24 year veteran of the software industry, he also runs Sourcio cjsc, an IT consulting company and startup incubator specializing in web 2.0 products and open-source technologies.

Hovhannes is a senior lecturer at the American Univeristy of Armenia and has been a visiting lecturer at San Francisco State University. He is a graduate of Bertelsmann University.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing these ideas and some early experiments performed in the Kurento open source software community in areas ...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driving this change including privacy controls, data transparency and integration of real time context w...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, will discuss the impact of technology on identity. Should we federate, or not? How should identity be secured? Who owns the identity? How is identity ...
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new data-driven world, marketplaces reign supreme while interoperability, APIs and applications deliver un...
Electric power utilities face relentless pressure on their financial performance, and reducing distribution grid losses is one of the last untapped opportunities to meet their business goals. Combining IoT-enabled sensors and cloud-based data analytics, utilities now are able to find, quantify and reduce losses faster – and with a smaller IT footprint. Solutions exist using Internet-enabled sensors deployed temporarily at strategic locations within the distribution grid to measure actual line loads.
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, will explore the current state of IoT connectivity and review key trends and technology requirements that will drive the Internet of Things from hype to reality.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, along with new ways to engage with users.
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll share tips on how to speed up business initiatives, harness Big Data and remain one step ahead by apply...
There will be 20 billion IoT devices connected to the Internet soon. What if we could control these devices with our voice, mind, or gestures? What if we could teach these devices how to talk to each other? What if these devices could learn how to interact with us (and each other) to make our lives better? What if Jarvis was real? How can I gain these super powers? In his session at 17th Cloud Expo, Chris Matthieu, co-founder and CTO of Octoblu, will show you!
SYS-CON Events announced today that ProfitBricks, the provider of painless cloud infrastructure, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. ProfitBricks is the IaaS provider that offers a painless cloud experience for all IT users, with no learning curve. ProfitBricks boasts flexible cloud servers and networking, an integrated Data Center Designer tool for visual control over the cloud and the best price/performance value available. ProfitBricks was named one of the coolest Clo...
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
SYS-CON Events announced today that Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, will keynote at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target - this makes the integration of these separate pipelines and the coordination of software upd...